{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T22:28:47Z","timestamp":1775514527874,"version":"3.50.1"},"reference-count":98,"publisher":"Association for Computing Machinery (ACM)","issue":"1-4","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Ripple and the National Science Foundation","award":["1717554 and 1704615"],"award-info":[{"award-number":["1717554 and 1704615"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2023,11,30]]},"abstract":"<jats:p>Cross-domain applications are rapidly adopting blockchain techniques for immutability, availability, integrity, and interoperability. However, for most applications, global consensus is unnecessary and may not even provide sufficient guarantees.<\/jats:p>\n          <jats:p>\n            We propose a new distributed data structure: Attested Data Structures \u00a0(ADS), which generalize not only blockchains but also many other structures used by distributed applications. As in blockchains, data in ADSs is immutable and self-authenticating. ADSs go further by supporting application-defined proofs (\n            <jats:italic>attestations<\/jats:italic>\n            ). Attestations enable applications to plug in their own mechanisms to ensure availability and integrity.\n          <\/jats:p>\n          <jats:p>\n            We present\n            <jats:italic>Charlotte<\/jats:italic>\n            , a framework for composable ADSs. Charlotte deconstructs conventional blockchains into more primitive mechanisms. Charlotte can be used to construct blockchains but does not impose the usual global-ordering overhead. Charlotte offers a flexible foundation for interacting applications that define their own policies for availability and integrity. Unlike traditional distributed systems, Charlotte supports heterogeneous trust: different observers have their own beliefs about who might fail, and how. Nevertheless, each observer has a consistent, available view of data.\n          <\/jats:p>\n          <jats:p>\n            Charlotte\u2019s data structures are interoperable and\n            <jats:italic>composable<\/jats:italic>\n            : applications and data structures can operate fully independently or can share data when desired. Charlotte defines a language-independent format for data blocks and a network API for servers.\n          <\/jats:p>\n          <jats:p>To demonstrate Charlotte\u2019s flexibility, we implement several integrity mechanisms, including consensus and proof of work. We explore the power of disentangling availability and integrity mechanisms in prototype applications. The results suggest that Charlotte can be used to build flexible, fast, composable applications with strong guarantees.<\/jats:p>","DOI":"10.1145\/3607534","type":"journal-article","created":{"date-parts":[[2023,7,22]],"date-time":"2023-07-22T08:46:16Z","timestamp":1690015576000},"page":"1-52","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Charlotte: Reformulating Blockchains into a Web of Composable Attested Data Structures for Cross-Domain Applications"],"prefix":"10.1145","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7822-1503","authenticated-orcid":false,"given":"Isaac","family":"Sheff","sequence":"first","affiliation":[{"name":"Heliax, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2958-6589","authenticated-orcid":false,"given":"Xinwen","family":"Wang","sequence":"additional","affiliation":[{"name":"Cornell University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6776-5273","authenticated-orcid":false,"given":"Kushal","family":"Babel","sequence":"additional","affiliation":[{"name":"Cornell Tech, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7718-7905","authenticated-orcid":false,"given":"Haobin","family":"Ni","sequence":"additional","affiliation":[{"name":"Cornell University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3598-0283","authenticated-orcid":false,"given":"Robbert","family":"van Renesse","sequence":"additional","affiliation":[{"name":"Cornell University, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5819-7588","authenticated-orcid":false,"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,12,18]]},"reference":[{"key":"e_1_3_3_2_2","unstructured":"ARTiFACTS. n.d. Home Page. Retrieved September 1 2021 fromhttps:\/\/artifacts.ai"},{"key":"e_1_3_3_3_2","unstructured":"Amazon. 2023. Cloud Storage on AWS. Retrieved July 27 2023 from https:\/\/aws.amazon.com\/products\/storage"},{"key":"e_1_3_3_4_2","doi-asserted-by":"publisher","DOI":"10.1145\/319709.319718"},{"key":"e_1_3_3_5_2","unstructured":"arXiv. n.d. Monthly Submission Rates. Retrieved July 27 2023 from https:\/\/arxiv.org\/stats\/monthly_submissions"},{"key":"e_1_3_3_6_2","unstructured":"arXiv. n.d. Twitter: arXiv.org. Retrieved July 27 2023 from https:\/\/twitter.com\/arxiv\/status\/1192467597054361606"},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1109\/COINS49042.2020.9191430"},{"key":"e_1_3_3_9_2","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201912)","author":"Balakrishnan Mahesh","year":"2012","unstructured":"Mahesh Balakrishnan, Dahlia Malkhi, Vijayan Prabhakaran, Ted Wobbler, Michael Wei, and John D. Davis. 2012. CORFU: A shared log design for flash clusters. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201912). 1\u201314. https:\/\/www.usenix.org\/conference\/nsdi12\/technical-sessions\/presentation\/balakrishnan"},{"key":"e_1_3_3_10_2","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522732"},{"key":"e_1_3_3_11_2","unstructured":"Juan Benet. n.d. IPFS\u2014Content Addressed Versioned P2P File System. Retrieved July 27 2023 from https:\/\/github.com\/ipfs\/papers\/raw\/master\/ipfs-cap2pfs\/ipfs-p2p-file-system.pdf"},{"key":"e_1_3_3_12_2","doi-asserted-by":"publisher","DOI":"10.5555\/12518"},{"key":"e_1_3_3_13_2","volume-title":"An Introduction to Hyperledger","author":"Blummer Tamas","year":"2018","unstructured":"Tamas Blummer, Sean Bohan, Mic Bowman, Christian Cachin, Nick Gaski, Nathan George, Gordon Graham, Daniel Hardman, Ram Jagadeesan, Travin Keith, Renat Khasanshyn, Murali Krishna, Tracy Kuhrt, Arnaud Le Hors, Jonathan Levi, Stanislav Liberman, Esther Mendez, Dan Middleton, Hart Montgomery, Dan O\u2019Prey, Drummond Reed, Stefan Teis, Dave Voell, Greg Wallace, and Baohua Yang. 2018. An Introduction to Hyperledger. Technical Report. Hyperledger. https:\/\/www.hyperledger.org\/wp-content\/uploads\/2018\/08\/HL_Whitepaper_IntroductiontoHyperledger.pdf"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1145\/1655008.1655015"},{"key":"e_1_3_3_15_2","unstructured":"Vitalik Buterin Danny Ryan Hsiao-Wei Wang Terence Tsao and Chih Cheng Liang. Ethereum 2.0 Phase 1\u2014Shard Data Chains. Retrieved July 27 2023 from https:\/\/github.com\/ethereum\/eth2.0-specs\/blob\/master\/specs\/core\/1_shard-data-chains.md"},{"key":"e_1_3_3_16_2","article-title":"Blockchain consensus protocols in the wild","author":"Cachin Christian","year":"2017","unstructured":"Christian Cachin and Marko Vukoli\u0107. 2017. Blockchain consensus protocols in the wild. arXiv e-prints arXiv: cs.DC\/1707.01873 (July 2017).","journal-title":"arXiv e-prints arXiv: cs.DC\/1707.01873"},{"key":"e_1_3_3_17_2","volume-title":"OpenPGP Message Format","author":"Callas Jon","year":"2007","unstructured":"Jon Callas, Lutz Donnerhacke, Hal Finney, David Shaw, and Rodney Thayer. 2007. OpenPGP Message Format. RFC 4880. RFC Editor. http:\/\/www.rfc-editor.org\/rfc\/rfc4880.txt"},{"key":"e_1_3_3_18_2","doi-asserted-by":"crossref","first-page":"299","DOI":"10.1007\/978-1-4842-0076-6","volume-title":"Pro Git (2nd ed.)","author":"Chacon Scott","year":"2014","unstructured":"Scott Chacon and Ben Straub. 2014. 7.11 git tools\u2014submodules. In Pro Git (2nd ed.). Apress, 299\u2013318. https:\/\/git-scm.com\/book\/en\/v2\/Git-Tools-Submodules"},{"key":"e_1_3_3_19_2","unstructured":"Bram Cohen. 2017. The BitTorrent Protocol Specification. Retrieved July 27 2023 from http:\/\/bittorrent.org\/beps\/bep_0003.html"},{"key":"e_1_3_3_20_2","unstructured":"Wikipedia Contributors. 2019. Magnet URI Scheme\u2014Wikipedia The Free Encyclopedia. Retrieved March 25 2019 from http:\/\/en.wikipedia.org\/w\/index.php?title=Magnet%20URI%20scheme&oldid=888151611"},{"key":"e_1_3_3_21_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_3_22_2","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502054"},{"key":"e_1_3_3_23_2","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"e_1_3_3_24_2","volume-title":"Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS\u201916)","author":"Danezis George","year":"2016","unstructured":"George Danezis and Sarah Meiklejohn. 2016. Centrally banked cryptocurrencies. In Proceedings of the 23rd Annual Network and Distributed System Security Symposium (NDSS\u201916). https:\/\/arxiv.org\/pdf\/1505.06895.pdf"},{"key":"e_1_3_3_25_2","volume-title":"Bitcoin Energy Consumption Index","author":"Vries Alex de","year":"2018","unstructured":"Alex de Vries. 2018. Bitcoin Energy Consumption Index. Technical Report. Digiconomist. https:\/\/digiconomist.net\/bitcoin-energy-consumption"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2096170"},{"key":"e_1_3_3_27_2","volume-title":"Ethereum White Paper","author":"Foundation Ethereum","year":"2018","unstructured":"Ethereum Foundation. 2018. Ethereum White Paper. Technical Report. Ethereum Foundation. https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"e_1_3_3_28_2","unstructured":"Ethan Frey and Christopher Goes. 2018. Cosmos Inter-Blockchain Communication (IBC) Protocol. (October 2018). Retrieved July 27 2023 from https:\/\/github.com\/cosmos\/cosmos-sdk\/blob\/master\/docs\/spec\/ibc\/README.md"},{"key":"e_1_3_3_29_2","volume-title":"Proceedings of the 11th Workshop on Distributed Algorithms (WDAG\u201997)","author":"Garay Juan","year":"1997","unstructured":"Juan Garay, Rosario Gennaro, Charanjit Jutla, and Tai Rabin. 1997. Secure distributed storage and retrieval. In Proceedings of the 11th Workshop on Distributed Algorithms (WDAG\u201997)."},{"key":"e_1_3_3_30_2","unstructured":"Paul Ginsparg Oya Y. Rieger Steinn Sigurdsson Martin Lessmeister Erick Peirson Jim Entwood and Janelle Morano. n.d. ArXiv. Retrieved November 13 2019 from https:\/\/arxiv.org"},{"key":"e_1_3_3_31_2","unstructured":"Git LFS. 2018. Git Large File Storage. Retrieved July 27 2023 from https:\/\/git-lfs.github.com"},{"key":"e_1_3_3_32_2","article-title":"Google Cloud Storage","unstructured":"Google. 2023. Google Cloud Storage. Retrieved July 27, 2023 from https:\/\/cloud.google.com\/storage","journal-title":"https:\/\/cloud.google.com\/storage"},{"key":"e_1_3_3_33_2","volume-title":"The Java Language Specification (Java SE 11th ed.)","author":"Gosling James","year":"2018","unstructured":"James Gosling, Bill Joy, Guy Steele, Gilad Bracha, Alex Buckley, and Daniel Smith. 2018. The Java Language Specification (Java SE 11th ed.). Oracle America. https:\/\/docs.oracle.com\/javase\/specs\/jls\/se11\/jls11.pdf"},{"key":"e_1_3_3_34_2","unstructured":"gRPC 2018. gRPC: A High Performance Open Source Universal RPC Framework. Retrieved July 28 2023 from https:\/\/grpc.io"},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/289.291"},{"key":"e_1_3_3_36_2","unstructured":"Joe Halpern and Paul Ginsparg. n.d. Personal correspondence."},{"key":"e_1_3_3_37_2","unstructured":"Sascha Hanse Luca Favetella Hans Svensson Emin Mahrt Tobias Lindahl and Erik Stenman. 2019. \u00e6ternity Protocol. (Jan. 2019). Retrieved July 27 2023 from https:\/\/github.com\/aeternity\/protocol\/blob\/master\/README.md"},{"key":"e_1_3_3_38_2","article-title":"How to Setup an OpenLDAP-Based PGP Keyserver","author":"Heinecke Andre","year":"2017","unstructured":"Andre Heinecke. 2017. How to Setup an OpenLDAP-Based PGP Keyserver. (Dec. 2017). Retrieved July 27, 2023 from https:\/\/wiki.gnupg.org\/LDAPKeyserver","journal-title":"https:\/\/wiki.gnupg.org\/LDAPKeyserver"},{"key":"e_1_3_3_39_2","unstructured":"Shidokht Hejazi-Sepehr Ross Kitsis and Ali Sharif. 2019. Transwarp-Conduit: Interoperable Blockchain Application Framework. Retrieved July 27 2023 from https:\/\/arxiv.org\/abs\/1906.03256"},{"key":"e_1_3_3_40_2","volume-title":"A PGP Public Key Server","author":"Horowitz Marc","year":"1996","unstructured":"Marc Horowitz. 1996. A PGP Public Key Server. Technical Report. MIT, Cambridge, MA. https:\/\/stuff.mit.edu\/afs\/net.mit.edu\/project\/pks\/thesis\/paper\/thesis.html"},{"key":"e_1_3_3_41_2","article-title":"Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile","author":"Housley Russell","year":"2002","unstructured":"Russell Housley, Tim Polk, Warwick Ford, and David Solo. 2002. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Internet RFC-3280. Retrieved July 27, 2023 from http:\/\/www.ietf.org\/rfc\/rfc3280.txt","journal-title":"Internet RFC-3280"},{"key":"e_1_3_3_42_2","volume-title":"Proceedings of the 2010 USENIX Annual Technical Conference (USENIX ATC\u201910)","author":"Hunt Patrick","year":"2010","unstructured":"Patrick Hunt, Mahadev Konar, Flavio P. Junqueira, and Benjamin Reed. 2010. ZooKeeper: Wait-free coordination for Internet-scale systems. In Proceedings of the 2010 USENIX Annual Technical Conference (USENIX ATC\u201910). https:\/\/www.usenix.org\/legacy\/event\/usenix10\/tech\/full_papers\/Hunt.pdf"},{"key":"e_1_3_3_43_2","unstructured":"IBM. 2018. Blockchain for Supply Chain. Retrieved January 27 2023 from https:\/\/www.ibm.com\/blockchain\/supply-chain"},{"key":"e_1_3_3_44_2","unstructured":"IBREA. 2021. International Blockchain Real Estate Association (IBREA). Retrieved July 27 2023 from https:\/\/ibrea.info"},{"key":"e_1_3_3_45_2","volume-title":"The Open Group Base Specifications Issue 7 (2018 ed.)","year":"2018","unstructured":"IEEE. 2018. The Open Group Base Specifications Issue 7 (2018 ed.). IEEE and The Open Group. Retrieved 13 March 2022 from https:\/\/web.archive.org\/web\/20220313110850\/https:\/\/ibrea.info\/"},{"key":"e_1_3_3_46_2","article-title":"n.d. Qubic: Quorum Based Computations Powered by IOTA","unstructured":"IOTA. n.d. Qubic: Quorum Based Computations Powered by IOTA. Retrieved July 27, 2023 from https:\/\/qubic.iota.org","journal-title":"https:\/\/qubic.iota.org"},{"key":"e_1_3_3_47_2","unstructured":"IPLD. n.d. Home Page. Retrieved 30 May 2020 from https:\/\/web.archive.org\/web\/20200530013139\/https:\/\/qubic.iota.org\/to"},{"key":"e_1_3_3_48_2","doi-asserted-by":"publisher","DOI":"10.3233\/SW-180322"},{"key":"e_1_3_3_49_2","unstructured":"JPMorgan. J.P. Morgan Creates Digital Coin for Payments. (n.d.). https:\/\/www.jpmorgan.com\/global\/news\/digital-coin-paymentsAccessed: 2019-11-13."},{"key":"e_1_3_3_50_2","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315317"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_3_53_2","doi-asserted-by":"publisher","DOI":"10.1145\/3267323.3268947"},{"key":"e_1_3_3_54_2","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_3_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/2075029.2075058"},{"key":"e_1_3_3_56_2","volume-title":"Nano: A Feeless Distributed Cryptocurrency Network","author":"LeMahieu Colin","year":"2018","unstructured":"Colin LeMahieu. 2018. Nano: A Feeless Distributed Cryptocurrency Network. Technical Report. Nano. https:\/\/nano.org\/en\/whitepaper"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.3233\/JCS-0559"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_3_3_59_2","doi-asserted-by":"publisher","DOI":"10.1145\/3360000\/3359636\/p80-lokhava.pdf"},{"key":"e_1_3_3_60_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_3_61_2","volume-title":"A General Model for Authentic Data Publication","author":"Martel Chip","year":"2001","unstructured":"Chip Martel, Glen Nuckolls, Michael Gertz, Prem Devanbu, April Kwong, and Stuart G. Stubblebine. 2001. A General Model for Authentic Data Publication. Technical Report CSE-2001-9. Department of Computer Science, UC Davis."},{"key":"e_1_3_3_62_2","article-title":"Orvium: Accelerating Scientific Publishing","author":"Martin Manuel","year":"2019","unstructured":"Manuel Martin, Antonio Romero, and Roberto Rabasco. 2019. Orvium: Accelerating Scientific Publishing. Retrieved September 1, 2021 from https:\/\/docs.orvium.io\/Orvium-WP.pdf","journal-title":"https:\/\/docs.orvium.io\/Orvium-WP.pdf"},{"key":"e_1_3_3_63_2","article-title":"The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus","author":"Mazi\u00e8res David","year":"2015","unstructured":"David Mazi\u00e8res. 2015. The Stellar Consensus Protocol: A Federated Model for Internet-Level Consensus. (April 2015). Retrieved July 27, 2023 from https:\/\/www.stellar.org","journal-title":"https:\/\/www.stellar.org"},{"key":"e_1_3_3_64_2","article-title":"BigchainDB: A Scalable Blockchain Database","author":"McConaghy Trent","year":"2016","unstructured":"Trent McConaghy, Rodolphe Marques, and Andreas M\u00fcller. 2016. BigchainDB: A Scalable Blockchain Database. Retrieved July 27, 2023 from https:\/\/www.bigchaindb.com\/whitepaper","journal-title":"Retrieved July 27, 2023 from https:\/\/www.bigchaindb.com\/whitepaper"},{"key":"e_1_3_3_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.1980.10006"},{"key":"e_1_3_3_66_2","article-title":"Azure Storage","unstructured":"Microsoft. 2023. Azure Storage. Retrieved July 27, 2023 from https:\/\/azure.microsoft.com\/services\/storage","journal-title":"https:\/\/azure.microsoft.com\/services\/storage"},{"key":"e_1_3_3_67_2","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535851"},{"key":"e_1_3_3_68_2","unstructured":"Multiformats. n.d. Home Page. Retrieved July 27 2023 from https:\/\/multiformats.io"},{"key":"e_1_3_3_69_2","unstructured":"Byron Murphy. 2019. The History of 51% Attacks and the Implications for Bitcoin. Retrieved November 13 2019 from https:\/\/medium.com\/hackernoon\/the-history-of-51-attacks-and-the-implications-for-bitcoin-ec1aa0f20b94"},{"key":"e_1_3_3_70_2","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A Peer-to-peer Electronic Cash System. Retrieved July 27 2023 from https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_3_71_2","volume-title":"Proceedings of the 7th USENIX Security Symposium (USENIX Security\u201998)","author":"Naor Moni","year":"1998","unstructured":"Moni Naor and Kobbi Nissim. 1998. Certificate revocation and certificate update. In Proceedings of the 7th USENIX Security Symposium (USENIX Security\u201998). https:\/\/www.usenix.org\/conference\/7th-usenix-security-symposium\/certificate-revocation-and-certificate-update"},{"key":"e_1_3_3_72_2","unstructured":"Joseph Poon and Vitalik Buterin. 2017. Plasma: Scalable Autonomous Smart Contracts. (Aug. 2017). Retrieved July 27 2023 from https:\/\/plasma.io\/plasma.pdf"},{"key":"e_1_3_3_73_2","volume-title":"The Tangle","author":"Popov Serguei","year":"2018","unstructured":"Serguei Popov. 2018. The Tangle. Technical Report. Iota. https:\/\/iota.org\/IOTA_Whitepaper.pdf"},{"key":"e_1_3_3_74_2","unstructured":"Protobufs. 2018. Protocol Buffers. Retrieved July 27 2023 from https:\/\/developers.google.com\/protocol-buffers\/"},{"key":"e_1_3_3_75_2","doi-asserted-by":"publisher","DOI":"10.5555\/645918.672337"},{"key":"e_1_3_3_76_2","article-title":"Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies","author":"Rocket Team","year":"2018","unstructured":"Team Rocket. 2018. Snowflake to Avalanche: A Novel Metastable Consensus Protocol Family for Cryptocurrencies. (May 2018). Retrieved July 27, 2023 from https:\/\/ipfs.io\/ipfs\/QmUy4jh5mGNZvLkjies1RWM4YuvJh5o2FYopNPVY wrRVGV","journal-title":"https:\/\/ipfs.io\/ipfs\/QmUy4jh5mGNZvLkjies1RWM4YuvJh5o2FYopNPVY wrRVGV"},{"key":"e_1_3_3_77_2","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751445"},{"key":"e_1_3_3_78_2","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_3_79_2","first-page":"67","article-title":"Convergent and commutative replicated data types","volume":"104","author":"Shapiro Marc","year":"2011","unstructured":"Marc Shapiro, Nuno M. Pregui\u00e7a, Carlos Baquero, and Marek Zawirski. 2011. Convergent and commutative replicated data types. Bulletin of the EATCS 104 (2011), 67\u201388.","journal-title":"Bulletin of the EATCS"},{"key":"e_1_3_3_80_2","volume-title":"The OpenPGP HTTP Keyserver Protocol (HKP)","author":"Shaw David","year":"2003","unstructured":"David Shaw. 2003. The OpenPGP HTTP Keyserver Protocol (HKP) draft-shaw-openpgp-hkp-00.txt. Retrieved July 27, 2023 from https:\/\/tools.ietf.org\/html\/draft-shaw-openpgp-hkp-00"},{"key":"e_1_3_3_81_2","article-title":"Charlotte-Public","author":"Sheff Isaac","year":"2021","unstructured":"Isaac Sheff, Xinwen Wang, Kushal Babel, Haobin Ni, Robbert van Renesse, and Andrew C. Myers. 2021. Charlotte-Public. Retrieved July 27, 2023 from https:\/\/github.com\/isheff\/charlotte-public","journal-title":"https:\/\/github.com\/isheff\/charlotte-public"},{"key":"e_1_3_3_82_2","volume-title":"Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS\u201920)","author":"Sheff Isaac","year":"2020","unstructured":"Isaac Sheff, Xinwen Wang, Robbert van Renesse, and Andrew C. Myers. 2020. Heterogeneous Paxos. In Proceedings of the 24th International Conference on Principles of Distributed Systems (OPODIS\u201920)."},{"key":"e_1_3_3_83_2","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516669"},{"key":"e_1_3_3_84_2","volume-title":"Proceedings of the 11th ACM Symposium on Operating System Principles (SOSP\u201911)","author":"Sirer Emin G\u00fcn","year":"2011","unstructured":"Emin G\u00fcn Sirer, Willem de Bruijn, Patrick Reynolds, Alan Shieh, Kevin Walsh, Dan Williams, and Fred B. Schneider. 2011. Logical attestation: An authorization architecture for trustworthy computing. In Proceedings of the 11th ACM Symposium on Operating System Principles (SOSP\u201911)."},{"key":"e_1_3_3_85_2","article-title":"SPECTRE: A Fast and Scalable Cryptocurrency Protocol","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. Report 2016\/1159. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2016\/1159","journal-title":"Report 2016\/1159"},{"key":"e_1_3_3_86_2","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2018. PHANTOM: A Scalable BlockDAG Protocol . Report 2018\/104. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2018\/104"},{"key":"e_1_3_3_87_2","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00018"},{"key":"e_1_3_3_88_2","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559361"},{"key":"e_1_3_3_89_2","unstructured":"Matthew Spoke and Nuco Engineering Team. 2017. Aion: Enabling the Decentralized Internet. (July 2017). Retrieved July 27 2023 from https:\/\/aion.network\/media\/en-aion-network-technical-introduction.pdf"},{"key":"e_1_3_3_90_2","doi-asserted-by":"crossref","unstructured":"Ion Stoica Robert Morris David Karger M. Frans Kaashoek and Hari Balakrishnan. 2001. Chord: A scalable peer-to-peer lookup service for Internet applications. ACM SIGCOMM Communication Review 31 4 (2001) 149\u2013160.","DOI":"10.1145\/964723.383071"},{"key":"e_1_3_3_91_2","volume-title":"CryptoKitties: Collectible and Breedable Cats Empowered by Blockchain Technology: White Pa-purr, Version 2.0","author":"Team CryptoKitties","year":"2018","unstructured":"CryptoKitties Team. 2018. CryptoKitties: Collectible and Breedable Cats Empowered by Blockchain Technology: White Pa-purr, Version 2.0. Technical Report. CryptoKitties. https:\/\/www.cryptokitties.co\/"},{"key":"e_1_3_3_92_2","article-title":"Git Distributed Version Control System","author":"Torvalds L.","year":"2010","unstructured":"L. Torvalds and J. Hamano. 2010. Git Distributed Version Control System. Retrieved July 27, 2023 from https:\/\/git-scm.com","journal-title":"https:\/\/git-scm.com"},{"key":"e_1_3_3_93_2","article-title":"Alephium: A Scalable Cryptocurrency System Based on Blockflow","author":"Wang Cheng","unstructured":"Cheng Wang. n.d. Alephium: A Scalable Cryptocurrency System Based on Blockflow. Retrieved July 27, 2023 from https:\/\/alephium.org","journal-title":"https:\/\/alephium.org"},{"key":"e_1_3_3_94_2","doi-asserted-by":"publisher","DOI":"10.1145\/3576899"},{"key":"e_1_3_3_95_2","volume-title":"Subresource Integrity","author":"Weinberger Joel","year":"2016","unstructured":"Joel Weinberger, Francois Marier, Devdatta Akhawe, and Frederik Braun. 2016. Subresource Integrity. W3C Recommendation. W3C. http:\/\/www.w3.org\/TR\/2016\/REC-SRI-20160623\/"},{"key":"e_1_3_3_96_2","unstructured":"Gavin Wood. n.d. Polkadot: Vision for a Heterogeneous Multi-Chain Framework. Retrieved July 27 2023 from https:\/\/polkadot.network\/PolkaDotPaper.pdf"},{"key":"e_1_3_3_97_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"e_1_3_3_98_2","doi-asserted-by":"publisher","DOI":"10.1145\/566340.566343"},{"key":"e_1_3_3_99_2","doi-asserted-by":"publisher","DOI":"10.5555\/1387589.1387610"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3607534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:28Z","timestamp":1750178188000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3607534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":98,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2023,11,30]]}},"alternative-id":["10.1145\/3607534"],"URL":"https:\/\/doi.org\/10.1145\/3607534","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2021-10-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-02-23","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-12-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}