{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T17:10:04Z","timestamp":1756487404058,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,27]],"date-time":"2023-11-27T00:00:00Z","timestamp":1701043200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,27]]},"DOI":"10.1145\/3590140.3629114","type":"proceedings-article","created":{"date-parts":[[2023,11,24]],"date-time":"2023-11-24T18:06:33Z","timestamp":1700849193000},"page":"178-191","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Bridging the Gap of Timing Assumptions in Byzantine Consensus"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-8128-4669","authenticated-orcid":false,"given":"Zixuan","family":"Chen","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3975-091X","authenticated-orcid":false,"given":"Lei","family":"Fan","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1219-786X","authenticated-orcid":false,"given":"Shengyun","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9898-5383","authenticated-orcid":false,"given":"Marko","family":"Vukoli\u0107","sequence":"additional","affiliation":[{"name":"Protocol Labs"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6558-2548","authenticated-orcid":false,"given":"Xiangzhe","family":"Wang","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1498-4912","authenticated-orcid":false,"given":"Jingjing","family":"Zhang","sequence":"additional","affiliation":[{"name":"Fudan University"}]}],"member":"320","published-online":{"date-parts":[[2023,11,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Bitcoin Transaction Size. https:\/\/bitcoinvisuals.com\/chain-tx-size."},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. HotStuff Rust implementation. https:\/\/github.com\/asonnino\/hotstuff\/tree\/d771d4868db301bcb5e3deaa915b5017220463f6."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. kyber package. https:\/\/github.com\/dedis\/kyber."},{"key":"e_1_3_2_1_4_1","unstructured":"[n.d.]. Linux Network Emulator. https:\/\/www.linux.org\/docs\/man8\/tc-netem.html."},{"volume-title":"Sync HotStuff: Simple and Practical Synchronous State Machine Replication. In 2020 IEEE Symposium on Security and Privacy (SP). 106--118","author":"Abraham I.","key":"e_1_3_2_1_5_1","unstructured":"I. Abraham, D. Malkhi, K. Nayak, L. Ren, and M. Yin. 2020. Sync HotStuff: Simple and Practical Synchronous State Machine Replication. In 2020 IEEE Symposium on Security and Privacy (SP). 106--118."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/800221.806707"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0083-3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/197917.198088"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.214134"},{"key":"e_1_3_2_1_13_1","volume-title":"The latest gossip on BFT consensus. CoRR abs\/1807.04938","author":"Buchman Ethan","year":"2018","unstructured":"Ethan Buchman, Jae Kwon, and Zarko Milosevic. 2018. The latest gossip on BFT consensus. CoRR abs\/1807.04938 (2018). arXiv:1807.04938 http:\/\/arxiv.org\/abs\/1807.04938"},{"key":"e_1_3_2_1_14_1","volume-title":"Casper the Friendly Finality Gadget. CoRR abs\/1710.09437","author":"Buterin Vitalik","year":"2017","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the Friendly Finality Gadget. CoRR abs\/1710.09437 (2017). arXiv:1710.09437 http:\/\/arxiv.org\/abs\/1710.09437"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","unstructured":"Christian Cachin Rachid Guerraoui and Luis Rodrigues. 2011. Introduction to Reliable and Secure Distributed Programming. (2011). https:\/\/doi.org\/10.1007\/978-3-642-15260-3","DOI":"10.1007\/978-3-642-15260-3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281100.1281103"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294280"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00087"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519568"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1137\/0212045"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243812"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"volume-title":"SBFT: A Scalable and Decentralized Trust Infrastructure. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 568--580","author":"Gueta G. Golan","key":"e_1_3_2_1_27_1","unstructured":"G. Golan Gueta, I. Abraham, S. Grossman, D. Malkhi, B. Pinkas, M. Reiter, D. Seredinschi, O. Tamir, and A. Tomescu. 2019. SBFT: A Scalable and Decentralized Trust Infrastructure. In 2019 49th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN). 568--580."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"e_1_3_2_1_29_1","volume-title":"Advances in Cryptology -- CRYPTO","author":"Guo Yue","year":"2019","unstructured":"Yue Guo, Rafael Pass, and Elaine Shi. 2019. Synchronous, with a Chance of Partition Tolerance. In Advances in Cryptology -- CRYPTO 2019, Alexandra Boldyreva and Daniele Micciancio (Eds.). Springer International Publishing, Cham, 499--529."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE51399.2021.00124"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294279"},{"key":"e_1_3_2_1_32_1","volume-title":"Consensus System. CoRR abs\/1805.04548","author":"Hanke Timo","year":"2018","unstructured":"Timo Hanke, Mahnush Movahedi, and Dominic Williams. 2018. DFINITY Technology Overview Series, Consensus System. CoRR abs\/1805.04548 (2018). arXiv:1805.04548 http:\/\/arxiv.org\/abs\/1805.04548"},{"key":"e_1_3_2_1_33_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_1_34_1","volume-title":"Eclipsing Ethereum Peers with False Friends. CoRR abs\/1908.10141","author":"Henningsen Sebastian A.","year":"2019","unstructured":"Sebastian A. Henningsen, Daniel Teunis, Martin Florian, and Bj\u00f6rn Scheuermann. 2019. Eclipsing Ethereum Peers with False Friends. CoRR abs\/1908.10141 (2019). arXiv:1908.10141 http:\/\/arxiv.org\/abs\/1908.10141"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2022.3148701"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168866"},{"key":"e_1_3_2_1_37_1","volume-title":"Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology -- CRYPTO","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Advances in Cryptology -- CRYPTO 2017, Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing, Cham, 357--388."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_39_1","first-page":"4","article-title":"Paxos Made Simple","volume":"32","author":"Lamport Leslie","year":"2001","unstructured":"Leslie Lamport. 2001. Paxos Made Simple. ACM SIGACT News 32, 4 (December 2001).","journal-title":"ACM SIGACT News"},{"key":"e_1_3_2_1_40_1","volume-title":"Leaderless Byzantine Paxos. Distributed Computing: 25th International Symposium: DISC 2011, David Peleg, editor. (December","author":"Lamport Leslie","year":"2011","unstructured":"Leslie Lamport. 2011. Leaderless Byzantine Paxos. Distributed Computing: 25th International Symposium: DISC 2011, David Peleg, editor. (December 2011), 141--142. https:\/\/www.microsoft.com\/en-us\/research\/publication\/leaderless-byzantine-paxos\/"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN48063.2020.00058"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation","author":"Liu Shengyun","year":"2016","unstructured":"Shengyun Liu, Paolo Viotti, Christian Cachin, Vivien Qu\u00e9ma, and Marko Vukolic. 2016. XFT: Practical Fault Tolerance beyond Crashes. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (Savannah, GA, USA) (OSDI'16). USENIX Association, USA, 485--500."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613164"},{"key":"e_1_3_2_1_45_1","unstructured":"Yuval Marcus Ethan Heilman and Sharon Goldberg. 2018. Low-Resource Eclipse Attacks on Ethereum's Peer-to-Peer Network. Cryptology ePrint Archive Report 2018\/236. https:\/\/eprint.iacr.org\/2018\/236."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611468"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785953"},{"key":"e_1_3_2_1_49_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260."},{"key":"e_1_3_2_1_50_1","volume-title":"Lumi\u00e8re: Byzantine View Synchronization. CoRR abs\/1909.05204","author":"Naor Oded","year":"2019","unstructured":"Oded Naor, Mathieu Baudet, Dahlia Malkhi, and Alexander Spiegelman. 2019. Lumi\u00e8re: Byzantine View Synchronization. CoRR abs\/1909.05204 (2019). arXiv:1909.05204 http:\/\/arxiv.org\/abs\/1909.05204"},{"key":"e_1_3_2_1_51_1","volume-title":"2014 USENIX Annual Technical Conference (USENIX ATC 14)","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout. 2014. In Search of an Understandable Consensus Algorithm. In 2014 USENIX Annual Technical Conference (USENIX ATC 14). USENIX Association, Philadelphia, PA, 305--319. https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/ongaro"},{"key":"e_1_3_2_1_52_1","volume-title":"Thunderella: Blockchains with Optimistic Instant Confirmation. In Advances in Cryptology -- EUROCRYPT","author":"Pass Rafael","year":"2018","unstructured":"Rafael Pass and Elaine Shi. 2018. Thunderella: Blockchains with Optimistic Instant Confirmation. In Advances in Cryptology -- EUROCRYPT 2018, Jesper Buus Nielsen and Vincent Rijmen (Eds.). Springer International Publishing, Cham, 3--33."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/322186.322188"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417284"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559361"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519579"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00027"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2011.221"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02007-0"},{"key":"e_1_3_2_1_61_1","volume-title":"DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Yang Lei","year":"2022","unstructured":"Lei Yang, Seo Jin Park, Mohammad Alizadeh, Sreeram Kannan, and David Tse. 2022. DispersedLedger: High-Throughput Byzantine Consensus on Variable Bandwidth Networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22). USENIX Association, Renton, WA, 493--512. https:\/\/www.usenix.org\/conference\/nsdi22\/presentation\/yang"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559348"}],"event":{"name":"Middleware '23: 24th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","IFIP International Federation for Information Processing"],"location":"Bologna Italy","acronym":"Middleware '23"},"container-title":["Proceedings of the 24th International Middleware Conference on ZZZ"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629114","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3590140.3629114","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,29]],"date-time":"2025-08-29T16:53:38Z","timestamp":1756486418000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3590140.3629114"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,27]]},"references-count":63,"alternative-id":["10.1145\/3590140.3629114","10.1145\/3590140"],"URL":"https:\/\/doi.org\/10.1145\/3590140.3629114","relation":{},"subject":[],"published":{"date-parts":[[2023,11,27]]},"assertion":[{"value":"2023-11-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}