{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T12:40:46Z","timestamp":1771332046331,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3629111","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"137-150","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["OrderlessChain"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3795-3078","authenticated-orcid":false,"given":"Pezhman","family":"Nasirifard","sequence":"first","affiliation":[{"name":"Technical University of Munich, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9870-7466","authenticated-orcid":false,"given":"Ruben","family":"Mayer","sequence":"additional","affiliation":[{"name":"University of Bayreuth, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0813-0101","authenticated-orcid":false,"given":"Hans-Arno","family":"Jacobsen","sequence":"additional","affiliation":[{"name":"University of Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00044"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_1_3_1","unstructured":"The Go Authors. 2023. Golang Go Programming Language. https:\/\/golang.org\/Accessed: 2023-09-12."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735509"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741972"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.32"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461099"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358504.3361231"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3152824.3152830"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2596631.2596633"},{"key":"e_1_3_2_1_11_1","unstructured":"C. Cachin and M. Vukolic. 2017. Blockchain Consensus Protocols in the Wild. CoRR (2017). arXiv:1707.01873"},{"key":"e_1_3_2_1_12_1","volume-title":"Setchain: Improving Blockchain Scalability with Byzantine Distributed Sets and Barriers. arXiv:2206.11845","author":"Capretto M.","year":"2022","unstructured":"M. Capretto, M. Ceresa, A. F. Anta, A. Russo, and C. S\u00e1nchez. 2022. Setchain: Improving Blockchain Scalability with Byzantine Distributed Sets and Barriers. arXiv:2206.11845"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745947.2745952"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","unstructured":"J. A. Chacko R. Mayer and H-A. Jacobsen. 2021. Why Do My Blockchain Transactions Fail? A Study of Hyperledger Fabric. ACM 221--234. https:\/\/doi.org\/10.1145\/3448016.3452823","DOI":"10.1145\/3448016.3452823"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588704"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"R. Chaganti B. Bhushan and V. Ravi. 2022. The Role of Blockchain in DDoS Attacks Mitigation: Techniques Open Challenges and Future Directions. arXiv:2202.03617","DOI":"10.1016\/j.comcom.2022.10.026"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196898"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"G. A.Di Luna E. Anceaume and L. Querzoni. 2020. Byzantine Generalized Lattice Agreement. In IEEE IPDPS.","DOI":"10.1109\/IPDPS47924.2020.00075"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.64"},{"key":"e_1_3_2_1_20_1","unstructured":"Cloud Native Computing Foundation. 2023. gRPC a High Performance Open-Source Universal RPC Framework. https:\/\/grpc.io\/ Accessed: 2023-10-10."},{"key":"e_1_3_2_1_21_1","unstructured":"R.Friedman and K.Birman. 1996. Trading Consistency for Availability in Distributed Systems. Technical Report."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"H. S. Galal and A. M. Youssef. 2019. Verifiable Sealed-Bid Auction on the Ethereum Blockchain. In Financial Cryptography and Data Security. Springer Berlin Heidelberg 265--278.","DOI":"10.1007\/978-3-662-58820-8_18"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2011.389"},{"key":"e_1_3_2_1_24_1","unstructured":"Google. 2021. LevelDB. https:\/\/github.com\/google\/leveldb Accessed: 2023-10-08."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","unstructured":"C. Gorenflo S. Lee L. Golab and S. Keshav. 2019. FastFabric: Scaling Hyperledger Fabric to 20 000 Transactions per Second. (2019) 455--463. https:\/\/doi.org\/10.1109\/BLOC.2019.8751452","DOI":"10.1109\/BLOC.2019.8751452"},{"key":"e_1_3_2_1_26_1","volume-title":"Multichain Private Blockchainm White Paper. 57--60 pages","author":"Greenspan G.","unstructured":"G. Greenspan. 2015. Multichain Private Blockchainm White Paper. 57--60 pages. http:\/\/www.multichain.com\/download\/MultiChain-White-Paper.pdf Accessed: 2023-08-28."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331589"},{"key":"e_1_3_2_1_28_1","volume-title":"Corda: A Distributed Ledger. Corda Technical White Paper 2016","author":"Hearn M.","year":"2016","unstructured":"M. Hearn and R. G. Brown. 2016. Corda: A Distributed Ledger. Corda Technical White Paper 2016 (2016)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","unstructured":"J. M. Hellerstein. 2010. The Declarative Imperative: Experiences and Conjectures in Distributed Logic. SIGMOD Rec. (2010) 5--19. https:\/\/doi.org\/10.1145\/1860702.1860704","DOI":"10.1145\/1860702.1860704"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","unstructured":"J. Huang D. He M. S. Obaidat P. Vijayakumar M. Luo and Kim-Kwang R. Choo. 2021. The Application of the Blockchain Technology in Voting Systems: A Review. ACM Comput. Surv. (2021). https:\/\/doi.org\/10.1145\/3439725","DOI":"10.1145\/3439725"},{"key":"e_1_3_2_1_31_1","volume-title":"RAMBLE: Reliable Asynchronous Messaging for Byzantine Linked Entities.","author":"Imam M.","year":"2017","unstructured":"M. Imam, S. Takiar, and J. Wang. 2017. RAMBLE: Reliable Asynchronous Messaging for Byzantine Linked Entities. (2017)."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3066276"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064889.3064891"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00114"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539529"},{"key":"e_1_3_2_1_36_1","unstructured":"M. Kleppmann. 2020. Automerge A JSON-like CRDT. https:\/\/github.com\/automerge\/automerge Accessed: 2023-10-11."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","unstructured":"M. Kleppmann and A. R. Beresford. 2017. A Conflict-Free Replicated JSON Datatype. IEEE Transactions on Parallel and Distributed Systems (2017) 2733--2746. https:\/\/doi.org\/10.1109\/TPDS.2017.2697382","DOI":"10.1109\/TPDS.2017.2697382"},{"key":"e_1_3_2_1_38_1","unstructured":"M. Kleppmann and H. Howard. 2020. Byzantine Eventual Consistency and the Fundamental Limits of Peer-to-Peer Databases. CoRR (2020). arXiv:2012.00472"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359591.3359737"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3563336"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_42_1","unstructured":"L. Lamport. 2005. Generalized Consensus and Paxos. (2005)."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0155-x"},{"key":"e_1_3_2_1_44_1","unstructured":"C. Li D. Porto A. Clement J. Gehrke N. Pregui\u00e7a and R. Rodrigues. 2012. Making Geo-Replicated Systems Fast as Possible Consistent When Necessary. In OSDI. USENIX Association 265--278."},{"key":"e_1_3_2_1_45_1","unstructured":"J. Liu T. Magrino O. Arden M. D. George and A. C. Myers. 2014. Warranties for Faster Strong Consistency. In USENIX NSDI. USENIX Association 503--517."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043593"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3528535.3565252"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","unstructured":"J.-P. Martin and L. Alvisi. 2006. Fast Byzantine Consensus. (2006) 402--411. https:\/\/doi.org\/10.1109\/DSN.2005.48","DOI":"10.1109\/DSN.2005.48"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61770-1_45"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3301419.3323973"},{"key":"e_1_3_2_1_51_1","unstructured":"J. P. Morgan Chase. 2018. A Permissioned Implementation of Ethereum. https:\/\/github.com\/ConsenSys\/quorum Accessed: 2023-10-08."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"M. Najafzadeh M. Shapiro and P. Eugster. 2018. Co-Design and Verification of an Available File System. In Verification Model Checking and Abstract Interpretation. Springer International Publishing 358--381.","DOI":"10.1007\/978-3-319-73721-8_17"},{"key":"e_1_3_2_1_53_1","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System.","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto. 2008. Bitcoin: A Peer-to-Peer Electronic Cash System."},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3361525.3361540"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565386.3565486"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565386.3565491"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3565386.3565487"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957276.2957310"},{"key":"e_1_3_2_1_59_1","volume-title":"2014 USENIX Annual Technical Conference. USENIX Association, 305--319","author":"Ongaro D.","unstructured":"D. Ongaro and J. Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In 2014 USENIX Annual Technical Conference. USENIX Association, 305--319."},{"key":"e_1_3_2_1_60_1","unstructured":"Oracle. 2021. Read-Your-Writes Consistency. https:\/\/bit.ly\/3dIAXOp Accessed: 2023-09-20."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","unstructured":"P. E. O'Neil. 1986. The Escrow Transactional Method. ACM Trans. Database Syst. (1986) 405--430. https:\/\/doi.org\/10.1145\/7239.7265","DOI":"10.1145\/7239.7265"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"F. Pedone and A. Schiper. 1999. Generic Broadcast. In Distributed Computing. Springer-Verlag 94--108.","DOI":"10.1007\/3-540-48169-9_7"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"M. Pires S. Ravi and R. Rodrigues. 2017. Generalized Paxos Made Byzantine (and Less Complex). In Stabilization Safety and Security of Distributed Systems. Springer International Publishing 203--218.","DOI":"10.1007\/978-3-319-69084-1_14"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"N. Pregui\u00e7a. 2018. Conflict-free Replicated Data Types: An Overview. arXiv:1806.10254","DOI":"10.1007\/978-3-319-63962-8_185-1"},{"key":"e_1_3_2_1_65_1","unstructured":"Hyperledger Project. 2023. Hyperledger Caliper. https:\/\/hyperledger.github.io\/caliper\/ Accessed: 2023-10-02."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483574"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"crossref","unstructured":"P. Raykov N. Schiper and F. Pedone. 2011. Byzantine Fault-Tolerance with Commutative Commands. In Principles of Distributed Systems. 329--342.","DOI":"10.1007\/978-3-642-25873-2_23"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCS.2017.8014672"},{"key":"e_1_3_2_1_69_1","unstructured":"M. Shapiro A. Bieniusa N. M. Pregui\u00e7a V. Balegas and C. Meiklejohn. 2018. Just-Right Consistency: Reconciling Availability and Safety. CoRR (2018). arXiv:1801.06340"},{"key":"e_1_3_2_1_70_1","volume-title":"Conflict-Free Replicated Data Types. In Symposium on Self-Stabilizing Systems. Springer, 386--400","author":"Shapiro M.","unstructured":"M. Shapiro, N. Pregui\u00e7a, C. Baquero, and M. Zawirski. 2011. Conflict-Free Replicated Data Types. In Symposium on Self-Stabilizing Systems. Springer, 386--400."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319883"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064889.3064895"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031681"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2757667.2757683"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052673"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380787.3393683"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.75"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","unstructured":"M. Whittaker and J. M. Hellerstein. 2020. Checking Invariant Confluence In Whole or In Parts. SIGMOD (2020) 7--14. https:\/\/doi.org\/10.1145\/3422648.3422651","DOI":"10.1145\/3422648.3422651"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","unstructured":"H. Y. Wu L. Jie Li H.-Y. Paik and S. S. Kanhere. 2021. MEChain: A Multi-layer Blockchain Structure with Hierarchical Consensus for Secure EHR System. In 2021 IEEE 20th International Conference on Trust Security and Privacy in Computing and Communications. IEEE 976--987. https:\/\/doi.org\/10.1109\/TrustCom53373.2021.00136","DOI":"10.1109\/TrustCom53373.2021.00136"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2957319.2957375"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814576.2814733"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/EIT.2016.7535248"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","location":"Bologna Italy","acronym":"Middleware '23","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"]},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629111","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3629111","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:52:10Z","timestamp":1756486330000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629111"}},"subtitle":["A CRDT-based BFT Coordination-free Blockchain Without Global Order of Transactions"],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":83,"alternative-id":["10.1145\/3590140.3629111","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3629111","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}