{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:52:38Z","timestamp":1772909558195,"version":"3.50.1"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"7","license":[{"start":{"date-parts":[[2024,3,27]],"date-time":"2024-03-27T00:00:00Z","timestamp":1711497600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Keystone Research and Development Program of China","award":["2017YFB0803204"],"award-info":[{"award-number":["2017YFB0803204"]}]},{"name":"Foshan Innovation Team","award":["2018IT100082"],"award-info":[{"award-number":["2018IT100082"]}]},{"name":"Basic Research Enhancement Program of China","award":["2021-JCJQ-JJ-0483"],"award-info":[{"award-number":["2021-JCJQ-JJ-0483"]}]},{"name":"China Environment for Network Innovation, GJFGW","award":["[2020]386"],"award-info":[{"award-number":["[2020]386"]}]},{"name":"SZFGW","award":["[2019]261"],"award-info":[{"award-number":["[2019]261"]}]},{"name":"Guangdong Province Research and Development Key Program","award":["2019B010137001"],"award-info":[{"award-number":["2019B010137001"]}]},{"name":"Guangdong Province Basic Research","award":["2022A1515010836"],"award-info":[{"award-number":["2022A1515010836"]}]},{"name":"Shenzhen Research Programs","award":["JCYJ20220531093206015, JCYJ20210324122013036, JCYJ20190808155607340"],"award-info":[{"award-number":["JCYJ20220531093206015, JCYJ20210324122013036, JCYJ20190808155607340"]}]},{"DOI":"10.13039\/501100017607","name":"Shenzhen Fundamental Research Program","doi-asserted-by":"crossref","award":["GXWD20201231165807007-20200807164903001"],"award-info":[{"award-number":["GXWD20201231165807007-20200807164903001"]}],"id":[{"id":"10.13039\/501100017607","id-type":"DOI","asserted-by":"crossref"}]},{"name":"ZTE Funding","award":["2019ZTE03-01"],"award-info":[{"award-number":["2019ZTE03-01"]}]},{"name":"Huawei Funding","award":["TC20201222002"],"award-info":[{"award-number":["TC20201222002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Multimedia Comput. Commun. Appl."],"published-print":{"date-parts":[[2024,7,31]]},"abstract":"<jats:p>\n            The metaverse gradually evolves into a virtual world containing a series of interconnected sub-metaverses. Diverse digital resources, including identities, contents, services, and supporting data, are key components of the sub-metaverse. Therefore, a Domain Name System (DNS)-like system is necessary for efficient management and resolution. However, the legacy DNS was designed with security vulnerabilities and trust risks due to centralized issues. Blockchain is used to mitigate these concerns due to its decentralized features. Additionally, it supports identity management as a default feature, making it a natural fit for the metaverse. While there are several DNS alternatives based on the blockchain, they either manage only a single type of identifiers or isolate identities from other sorts of identifiers, making it difficult for sub-metaverses to coexist and connect with each other. This article proposes a\n            <jats:underline>M<\/jats:underline>\n            ulti-\n            <jats:underline>I<\/jats:underline>\n            dentifier management and resolution\n            <jats:underline>S<\/jats:underline>\n            ystem (MIS) in the metaverse, supporting the registration, resolution, and inter-translation functions. The basic MIS is portrayed as a four-tier architecture on a consortium blockchain due to its manageability, enhanced security, and efficiency properties. On-chain data is lightweight and compressed to save on storage while accelerating reading and writing operations. The resource data is encrypted based on the attributes of the sub-metaverse in the storage tier for privacy protection and access control. For users with decentralization priorities, a modification named EMIS is built on top of Ethereum. Finally, MIS is implemented on two testbeds and is available online as the open-source system. The first testbed consists of 4 physical servers located in the UK and Malaysia while the second is made up of 200 virtual machines (VMs) spread over 26 countries across all 5 continents on Google Cloud. Experiments indicate that MIS provides efficient reading and writing performance than the legacy DNS and other public blockchain-based workarounds including EMIS and Ethereum Name Service (ENS).\n          <\/jats:p>","DOI":"10.1145\/3597641","type":"journal-article","created":{"date-parts":[[2023,5,26]],"date-time":"2023-05-26T11:12:24Z","timestamp":1685099544000},"page":"1-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["MIS: A Multi-Identifier Management and Resolution System in the Metaverse"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2654-2831","authenticated-orcid":false,"given":"Han","family":"Wang","sequence":"first","affiliation":[{"name":"School of Electronic and Computer Engineering, Peking University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5244-9473","authenticated-orcid":false,"given":"Hui","family":"Li","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, Peking University, Shenzhen, China, School of Mathematics and Big Data, Foshan University, Foshan, China, and Foshan Saisichan Technology Co. Ltd, Foshan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4371-433X","authenticated-orcid":false,"given":"Abla","family":"Smahi","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, Peking University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6069-9082","authenticated-orcid":false,"given":"Feng","family":"Zhao","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, Peking University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-0673-7724","authenticated-orcid":false,"given":"Yao","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Electronic and Computer Engineering, Peking University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8257-0896","authenticated-orcid":false,"given":"Ching Chuen","family":"Chan","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronic Engineering, The University of Hong Kong, Hong Kong, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-9514-7823","authenticated-orcid":false,"given":"Shiyu","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Electronic Science &amp; Technology of China, Chengdu, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-4097-1212","authenticated-orcid":false,"given":"Wenyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Sun Yat-sen University, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7575-2130","authenticated-orcid":false,"given":"Shuo-Yen Robert","family":"Li","sequence":"additional","affiliation":[{"name":"University of Electronic Science &amp; Technology of China, Chengdu, China"}]}],"member":"320","published-online":{"date-parts":[[2024,3,27]]},"reference":[{"key":"e_1_3_1_2_2","unstructured":"Lik-Hang Lee Tristan Braud Pengyuan Zhou Lin Wang Dianlei Xu Zijun Lin Abhishek Kumar Carlos Bermejo and Pan Hui. 2021. All one needs to know about metaverse: A complete survey on technological singularity virtual ecosystem and research agenda. arXiv:2110.05352 (2021). Retrieved from https:\/\/arxiv.org\/abs\/2110.05352."},{"key":"e_1_3_1_3_2","article-title":"Second life: An interactive qualitative analysis","author":"Sanchez Joe","year":"2007","unstructured":"Joe Sanchez. 2007. Second life: An interactive qualitative analysis. In Proceedings of the Society for Information Technology & Teacher Education International Conference 2007.","journal-title":"Proceedings of the Society for Information Technology & Teacher Education International Conference 2007"},{"key":"e_1_3_1_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/2480741.2480751"},{"key":"e_1_3_1_5_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29387-1_24"},{"key":"e_1_3_1_6_2","first-page":"12","article-title":"Interfacing cyber and physical worlds: Introduction to ieee 2888 standards","author":"Yoon Kyoungro","year":"2021","unstructured":"Kyoungro Yoon, Sang-Kyun Kim, Sangkwon Peter Jeong, and Jeong-Hwan Choi. 2021. Interfacing cyber and physical worlds: Introduction to ieee 2888 standards. In Proceedings of the 2021 IEEE International Conference on Intelligent Reality (ICIR) (12-13, 2021).","journal-title":"Proceedings of the 2021 IEEE International Conference on Intelligent Reality (ICIR)"},{"key":"e_1_3_1_7_2","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review (2008), 21260.","journal-title":"Decentralized Business Review"},{"key":"e_1_3_1_8_2","unstructured":"Ethereum. https:\/\/ethereum.org\/en\/."},{"key":"e_1_3_1_9_2","unstructured":"Namecoin. https:\/\/www.namecoin.org\/."},{"key":"e_1_3_1_10_2","unstructured":"Aaron Swartz. Squaring the Triangle: Secure Decentralized Human-readable Names. http:\/\/www.aaronsw.com\/weblog\/squarezooko."},{"key":"e_1_3_1_11_2","article-title":"Blockstack: A global naming and storage system secured by blockchains","author":"Ali Muneeb","year":"2016","unstructured":"Muneeb Ali, Jude Nelson, Ryan Shea, and Michael J. Freedman. 2016. Blockstack: A global naming and storage system secured by blockchains. In Proceedings of the the 2016 USENIX Conference on Usenix Annual Technical Conference.","journal-title":"Proceedings of the the 2016 USENIX Conference on Usenix Annual Technical Conference"},{"key":"e_1_3_1_12_2","unstructured":"Ens Documentation. 2022. https:\/\/docs.ens.domains\/."},{"key":"e_1_3_1_13_2","author":"Slepak Greg","year":"2014","unstructured":"Greg Slepak. 2014. Dnschain+okturtles. 2014. https:\/\/okturtles.org\/other\/dnschain_okturtles_overview.pdf.","journal-title":"Dnschain+okturtles"},{"key":"e_1_3_1_14_2","unstructured":"Emercoin. https:\/\/emercoin.com\/en\/."},{"issue":"7","key":"e_1_3_1_15_2","first-page":"436","article-title":"Majority is not enough: Bitcoin mining is vulnerable","volume":"61","author":"Eyal Ittay","year":"2014","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. Communications of the ACM 61, 7 (2014), 436\u2013454.","journal-title":"Communications of the ACM"},{"key":"e_1_3_1_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2966428"},{"key":"e_1_3_1_17_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.09.037"},{"key":"e_1_3_1_18_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2885037"},{"key":"e_1_3_1_19_2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2974327"},{"key":"e_1_3_1_20_2","unstructured":"Welcome to Decentraland. https:\/\/decentraland.org\/."},{"key":"e_1_3_1_21_2","unstructured":"Cryptovoxels - a user Owned Virtual World. https:\/\/cryptowexels.com\/."},{"key":"e_1_3_1_22_2","unstructured":"The Sandbox Game \u2014 user-Generated Crypto. https:\/\/www.sandbox.game."},{"key":"e_1_3_1_23_2","article-title":"Metaverse for social good: A university campus prototype","author":"Duan Haihan","year":"2021","unstructured":"Haihan Duan, Jiaye Li, Sizheng Fan, Zhonghao Lin, Xiao Wu, and Wei Cai. 2021. Metaverse for social good: A university campus prototype. In Proceedings of the MM '21: Proceedings of the 29th ACM International Conference on Multimedia.","journal-title":"Proceedings of the MM '21: Proceedings of the 29th ACM International Conference on Multimedia"},{"key":"e_1_3_1_24_2","doi-asserted-by":"publisher","DOI":"10.3390\/electronics11030317"},{"key":"e_1_3_1_25_2","unstructured":"Zijian Bao Wenbo Shi Debiao He and Kim-Kwang Raymond Chood. 2018. Iotchain: A three-tier blockchain-based iot security architecture. arXiv:1806.02008 (2018). Retrieved from https:\/\/arxiv.org\/abs\/1806.02008."},{"key":"e_1_3_1_26_2","doi-asserted-by":"publisher","DOI":"10.3390\/fi13020024"},{"key":"e_1_3_1_27_2","first-page":"9","article-title":"Build a secure smart city by using blockchain and digital twin","volume":"3","author":"Song Youngjun","year":"2021","unstructured":"Youngjun Song and Sunghyuck Hong. 2021. Build a secure smart city by using blockchain and digital twin. International Journal of Advanced Science and Convergence 3 (2021), 9\u201313.","journal-title":"International Journal of Advanced Science and Convergence"},{"key":"e_1_3_1_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2899300"},{"key":"e_1_3_1_29_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3076580"},{"key":"e_1_3_1_30_2","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0054122","article-title":"Divertible protocols and atomic proxy cryptography","author":"Blaze Matt","year":"1998","unstructured":"Matt Blaze, Gerrit Bleumer, and Martin Strauss. 1998. Divertible protocols and atomic proxy cryptography. In Proceedings of the Advances in Cryptology\u2014EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31\u2013June 4, 1998 Proceedings 17 (1998).","journal-title":"Proceedings of the Advances in Cryptology\u2014EUROCRYPT'98: International Conference on the Theory and Application of Cryptographic Techniques Espoo, Finland, May 31\u2013June 4, 1998 Proceedings 17"},{"key":"e_1_3_1_31_2","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-39568-7_5","article-title":"Identity-based cryptosystems and signature schemes","author":"Shamir Adi","year":"1985","unstructured":"Adi Shamir. 1985. Identity-based cryptosystems and signature schemes. In Proceedings of the Advances in Cryptology: Proceedings of CRYPTO (1985).","journal-title":"Proceedings of the Advances in Cryptology: Proceedings of CRYPTO"},{"key":"e_1_3_1_32_2","doi-asserted-by":"crossref","DOI":"10.1007\/11426639_27","article-title":"Fuzzy identity-based encryption","author":"Sahai Amit","year":"2005","unstructured":"Amit Sahai and Brent Waters. 2005. Fuzzy identity-based encryption. In Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, (2005).","journal-title":"Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"e_1_3_1_33_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"issue":"6","key":"e_1_3_1_34_2","first-page":"2787","article-title":"Secure keyword search and data sharing mechanism for cloud computing","volume":"18","author":"Ge Chunpeng","year":"2020","unstructured":"Chunpeng Ge, Willy Susilo, Zhe Liu, Jinyue Xia, Pawel Szalachowski, and Liming Fang. 2020. Secure keyword search and data sharing mechanism for cloud computing. IEEE Transactions on Dependable and Secure Computing 18, 6 (2020), 2787\u20132800.","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_1_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3065999"},{"key":"e_1_3_1_36_2","author":"Liang Xiaohui","year":"2010","unstructured":"Xiaohui Liang, Rongxing Lu, Xiaodong Lin, and Xuemin Sherman Shen. 2010. Ciphertext Policy Attribute based Encryption with Efficient Revocation. 2010, http:\/\/bbcr.uwaterloo.ca\/\u223cx27liang\/abe_with_revocation.pdf.","journal-title":"Ciphertext Policy Attribute based Encryption with Efficient Revocation"},{"key":"e_1_3_1_37_2","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxw007"},{"key":"e_1_3_1_38_2","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122949"},{"key":"e_1_3_1_39_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-019-06187-3"},{"key":"e_1_3_1_40_2","article-title":"Decentralizing attribute-based encryption","author":"Lewko Allison","year":"2011","unstructured":"Allison Lewko and Brent Waters. 2011. Decentralizing attribute-based encryption. In Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques.","journal-title":"Proceedings of the Advances in Cryptology\u2013EUROCRYPT 2011: 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"e_1_3_1_41_2","unstructured":"Ipfs Powers the Distributed Web. https:\/\/ipfs.io."},{"key":"e_1_3_1_42_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.frl.2021.102097"},{"key":"e_1_3_1_43_2","article-title":"Selling land in decentraland: The regime of non-fungible tokens on the ethereum blockchain under the digital content directive","author":"Goanta Catalina","year":"2020","unstructured":"Catalina Goanta. 2020. Selling land in decentraland: The regime of non-fungible tokens on the ethereum blockchain under the digital content directive. Springer International Publishing 2020.","journal-title":"Springer International Publishing"},{"key":"e_1_3_1_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2016.109"},{"key":"e_1_3_1_45_2","unstructured":"Handshake. https:\/\/hsd-dev.org\/."},{"key":"e_1_3_1_46_2","article-title":"Bitcoin-ng: A scalable blockchain protocol","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-ng: A scalable blockchain protocol. In Proceedings of the the 13th Usenix Conference on Networked Systems Design and Implementation.","journal-title":"Proceedings of the the 13th Usenix Conference on Networked Systems Design and Implementation"},{"key":"e_1_3_1_47_2","unstructured":"Muneeb Ali. 2020. Stacks 2.0: Apps and Smart Contracts for Bitcoin. 2020. https:\/\/gaia.blockstack.org\/hub\/1Eo6q4qLMcSSpkhoUADxRAGZhgUyjVEVcK\/stacks-zh.pdf."},{"key":"e_1_3_1_48_2","article-title":"Blockzone: A blockchain-based dns storage and retrieval scheme","author":"Wang Wentong","year":"2019","unstructured":"Wentong Wang, Ning Hu, and Xin Liu. 2019. Blockzone: A blockchain-based dns storage and retrieval scheme. In Proceedings of the International Conference on Artificial Intelligence and Security.","journal-title":"Proceedings of the International Conference on Artificial Intelligence and Security"},{"key":"e_1_3_1_49_2","article-title":"Practical byzantine fault tolerance","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov. 1999. Practical byzantine fault tolerance. In Proceedings of the OSDI '99: Proceedings of the Third Symposium on Operating Systems Design and Implementation (1999).","journal-title":"Proceedings of the OSDI '99: Proceedings of the Third Symposium on Operating Systems Design and Implementation"},{"key":"e_1_3_1_50_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICUFN.2017.7993751"},{"key":"e_1_3_1_51_2","first-page":"18","article-title":"A data storage method based on blockchain for decentralization dns","author":"Liu Jingqiang","year":"2018","unstructured":"Jingqiang Liu, Bin Li, Lizhang Chen, Meng Hou, Feiran Xiang, and Peijun Wang. 2018. A data storage method based on blockchain for decentralization dns. In Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC) (2018), 18\u201321.","journal-title":"Proceedings of the 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC)"},{"key":"e_1_3_1_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751464"},{"key":"e_1_3_1_53_2","doi-asserted-by":"publisher","DOI":"10.32604\/iasc.2021.013704"},{"key":"e_1_3_1_54_2","article-title":"Consortiumdns: A distributed domain name service based on consortium chain","author":"Wang Xiangui","year":"2017","unstructured":"Xiangui Wang, Kedan Li, Hui Li, Yinghui Li, and Zhiwei Liang. 2017. Consortiumdns: A distributed domain name service based on consortium chain. In Proceedings of the 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS) (2017).","journal-title":"Proceedings of the 2017 IEEE 19th International Conference on High Performance Computing and Communications; IEEE 15th International Conference on Smart City; IEEE 3rd International Conference on Data Science and Systems (HPCC\/SmartCity\/DSS)"},{"key":"e_1_3_1_55_2","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_1_56_2","article-title":"On parallel mechanism of consortium blockchain: Take pov as an example","author":"Bai Yongjie","year":"2021","unstructured":"Yongjie Bai, Yang Zhi, Hui Li, Han Wang, Ping Lu, and Chengtao Ma. 2021. On parallel mechanism of consortium blockchain: Take pov as an example. In Proceedings of the 2021 The 3rd International Conference on Blockchain Technology.","journal-title":"Proceedings of the 2021 The 3rd International Conference on Blockchain Technology"},{"key":"e_1_3_1_57_2","article-title":"Short signatures from the weil pairing","author":"Boneh Dan","year":"2001","unstructured":"Dan Boneh, Ben Lynn, and Hovav Shacham. 2001. Short signatures from the weil pairing. In Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security (2001).","journal-title":"Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security"},{"key":"e_1_3_1_58_2","doi-asserted-by":"crossref","unstructured":"Stephen B. Wicker and Vijay K. Bhargava. 1999. Reed-solomon Codes and their Applications. John Wiley & Sons Published 1999.","DOI":"10.1109\/9780470546345"},{"key":"e_1_3_1_59_2","unstructured":"Mis-blockchain. https:\/\/github.com\/MIN-Group\/mis."},{"key":"e_1_3_1_60_2","unstructured":"Emis. https:\/\/github.com\/MIN-Group\/EMIS."},{"key":"e_1_3_1_61_2","unstructured":"https:\/\/www.speedtest.cn\/."},{"key":"e_1_3_1_62_2","unstructured":"Delegated proof of stake (dpos). 2019 https:\/\/how.bitshares.works\/en\/master\/technology\/dpos.html."},{"key":"e_1_3_1_63_2","article-title":"Ouroboros: A provably secure proof-of-stake blockchain protocol","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings of the Annual International Cryptology Conference.","journal-title":"Proceedings of the Annual International Cryptology Conference"},{"key":"e_1_3_1_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_1_65_2","article-title":"Secure high-rate transaction processing in bitcoin","author":"Sompolinsky Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in bitcoin. In Proceedings of the International Conference on Financial Cryptography and Data Security.","journal-title":"Proceedings of the International Conference on Financial Cryptography and Data Security"},{"key":"e_1_3_1_66_2","article-title":"A decentralized blockchain with high throughput and fast confirmation","author":"Li Chenxin","year":"2020","unstructured":"Chenxin Li, Peilun Li, Dong Zhou, Zhe Yang, Ming Wu, Guang Yang, Wei Xu, Fan Long, and Andrew Chi-Chih Yao. 2020. A decentralized blockchain with high throughput and fast confirmation. In Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 20) (2020).","journal-title":"Proceedings of the 2020 USENIX Annual Technical Conference (USENIX ATC 20)"},{"key":"e_1_3_1_67_2","unstructured":"Serguei Popov. The Tangle. 2018. https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf."},{"key":"e_1_3_1_68_2","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_1_69_2","unstructured":"Kejiao Li Hui Li Hanxu Hou Kedan Li and Yongle Chen. 2017. Proof of vote: A high-performance consensus protocol based on vote mechanism & consortium blockchain. IEEE 2017."},{"issue":"11","key":"e_1_3_1_70_2","first-page":"1","article-title":"Pov: An efficient voting-based consensus algorithm for consortium blockchains","volume":"3","author":"Li Kejiao","year":"2020","unstructured":"Kejiao Li, Hui Li, Han Wang, Huiyao An, Ping Lu, Peng Yi, and Fusheng Zhu. 2020. Pov: An efficient voting-based consensus algorithm for consortium blockchains. Frontiers in Blockchain 3, 11 (2020), 1\u201316.","journal-title":"Frontiers in Blockchain"},{"key":"e_1_3_1_71_2","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_1_72_2","unstructured":"Size of the Bitcoin Blockchain from January 2009 to july 11 2022(in gigabytes). https:\/\/www.statista.com\/statistics\/647523\/worldwide-bitcoin-blockchain-size\/."},{"key":"e_1_3_1_73_2","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00271"},{"key":"e_1_3_1_74_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE48307.2020.00205"}],"container-title":["ACM Transactions on Multimedia Computing, Communications, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597641","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3597641","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:48:41Z","timestamp":1750182521000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3597641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,27]]},"references-count":73,"journal-issue":{"issue":"7","published-print":{"date-parts":[[2024,7,31]]}},"alternative-id":["10.1145\/3597641"],"URL":"https:\/\/doi.org\/10.1145\/3597641","relation":{},"ISSN":["1551-6857","1551-6865"],"issn-type":[{"value":"1551-6857","type":"print"},{"value":"1551-6865","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,27]]},"assertion":[{"value":"2022-07-31","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-04-02","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-03-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}