{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:01:18Z","timestamp":1750309278969,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,9,22]],"date-time":"2023-09-22T00:00:00Z","timestamp":1695340800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,9,22]]},"DOI":"10.1145\/3641584.3641808","type":"proceedings-article","created":{"date-parts":[[2024,6,14]],"date-time":"2024-06-14T22:44:43Z","timestamp":1718405083000},"page":"1485-1490","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Improvement of graded PBFT algorithm based on threshold signature"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8937-433X","authenticated-orcid":false,"given":"Sheping","family":"Zhai","sequence":"first","affiliation":[{"name":"Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-7837-2638","authenticated-orcid":false,"given":"Yuanyuan","family":"Huo","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-4044-9087","authenticated-orcid":false,"given":"Haonan","family":"Nie","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts &amp; Telecommunications, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-5183-8990","authenticated-orcid":false,"given":"Rui","family":"Yang","sequence":"additional","affiliation":[{"name":"Xi'an University of Posts &amp; Telecommunications, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,14]]},"reference":[{"issue":"02","key":"e_1_3_2_1_1_1","first-page":"21260","article-title":"A peer-to-peer electronic cash system[J]","volume":"4","author":"Nakamoto S.","year":"2008","unstructured":"Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[J]. Decentralized Business Review, 2008, 4(02): 21260-21274.","journal-title":"Decentralized Business Review"},{"issue":"01","key":"e_1_3_2_1_2_1","first-page":"84","article-title":"The principle and core technology of blockchain[J]","volume":"44","author":"Cai X Q","year":"2021","unstructured":"Cai X Q, Deng Y, Zhang L, The principle and core technology of blockchain[J]. Chinese Journal of Computers, 2021, 44(01): 84-131.","journal-title":"Chinese Journal of Computers"},{"key":"e_1_3_2_1_3_1","volume-title":"An overview of blockchain technology: applications, challenges and future trends[C]\/\/2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC)","author":"Li W","year":"2021","unstructured":"Li W, He M, Haiquan S. An overview of blockchain technology: applications, challenges and future trends[C]\/\/2021 IEEE 11th International Conference on Electronics Information and Emergency Communication (ICEIEC). IEEE, 2021: 31-39."},{"issue":"01","key":"e_1_3_2_1_4_1","first-page":"33","article-title":"Survey on lightweight blockchain technology[J]","volume":"34","author":"Xie Q Q","year":"2023","unstructured":"Xie Q Q, Dong F. Survey on lightweight blockchain technology[J]. Journal of Software, 2023, 34(01): 33-49.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-010-9293-6"},{"issue":"02","key":"e_1_3_2_1_6_1","first-page":"277","article-title":"Survey on blockchain consensus protocol[J]","volume":"32","author":"Xia Q","year":"2021","unstructured":"Xia Q, Dou W S, Guo K W, Survey on blockchain consensus protocol[J]. Journal of Software, 2021, 32(02): 277\u2212299.","journal-title":"Journal of Software"},{"key":"e_1_3_2_1_7_1","volume-title":"Proofs of work and bread pudding protocols[M]\/\/Secure information networks","author":"Jakobsson M","year":"1999","unstructured":"Jakobsson M, Juels A. Proofs of work and bread pudding protocols[M]\/\/Secure information networks. Springer, Boston, MA, 1999: 258-272."},{"key":"e_1_3_2_1_8_1","volume-title":"PPcoin: Peer-to-peer crypto-currency with proof-of-stake[J]. self-published paper","author":"King S","year":"2012","unstructured":"King S, Nadal S. PPcoin: Peer-to-peer crypto-currency with proof-of-stake[J]. self-published paper, 2012, 19(01): 128-136."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"issue":"07","key":"e_1_3_2_1_10_1","first-page":"109","article-title":"Reputation-based two-stage traceability blockchain consensus strategy[J]","volume":"47","author":"Wang S","year":"2021","unstructured":"Wang S, Xu C H, Tang Z Y. Reputation-based two-stage traceability blockchain consensus strategy[J]. Computer Engineering, 2021, 47(07): 109-116.","journal-title":"Computer Engineering"},{"key":"e_1_3_2_1_11_1","volume-title":"Inproved PBFT protocol based on phase voting and threshold signature[J]","author":"Chen L Q","year":"2022","unstructured":"Chen L Q, Hu J, Gu P P. Inproved PBFT protocol based on phase voting and threshold signature[J]. Journal of Southeast University(English Edition), 2022, 38(03): 213-218."},{"issue":"03","key":"e_1_3_2_1_12_1","first-page":"506","article-title":"A distance based consensus algorithm for blockchain[J]","volume":"43","author":"Zhu H","year":"2022","unstructured":"Zhu H, Jin Y. DS-PBFT: A distance based consensus algorithm for blockchain[J]. Journal of Chinese Computer Systems, 2022, 43(03): 506-513.","journal-title":"Journal of Chinese Computer Systems"},{"key":"e_1_3_2_1_13_1","volume-title":"Richard G G. Proteus: A scalable BFT consensus protocol for blockchains[C]\/\/2019 IEEE international conference on Blockchain","author":"Jalalzai M M","year":"2019","unstructured":"Jalalzai M M, Busch C, Richard G G. Proteus: A scalable BFT consensus protocol for blockchains[C]\/\/2019 IEEE international conference on Blockchain. IEEE, 2019: 308-313."},{"key":"e_1_3_2_1_14_1","volume-title":"Blocktrail: A scalable multichain solution for blockchain-based audit trails[C]\/\/ICC 2019-2019 IEEE International Conference on Communications (ICC)","author":"Ahmad A","year":"2019","unstructured":"Ahmad A, Saad M, Njilla L, Blocktrail: A scalable multichain solution for blockchain-based audit trails[C]\/\/ICC 2019-2019 IEEE International Conference on Communications (ICC). IEEE, 2019: 1-6."},{"key":"e_1_3_2_1_15_1","volume-title":"A fault resilient consensus protocol for large permissioned blockchain networks[C]\/\/2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","author":"Chander G","year":"2019","unstructured":"Chander G, Deshpande P, Chakraborty S. A fault resilient consensus protocol for large permissioned blockchain networks[C]\/\/2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 2019: 33-37."},{"issue":"06","key":"e_1_3_2_1_16_1","first-page":"1214","article-title":"Survey on blockchain consensus algorithms and application[J]","volume":"16","author":"Wang Q","year":"2022","unstructured":"Wang Q, Li F J, Ni X L, Survey on blockchain consensus algorithms and application[J]. Journal of Frontiers of Computer Science and Technology, 2022, 16(06): 1214-1242.","journal-title":"Journal of Frontiers of Computer Science and Technology"},{"issue":"12","key":"e_1_3_2_1_17_1","first-page":"457","article-title":"Shared generation of authenticators and signatures[J]","volume":"576","author":"Desmedt Y","year":"1991","unstructured":"Desmedt Y. Shared generation of authenticators and signatures[J]. Advances in Cryptology-CRYPTO, 1991, 576(12): 457-469.","journal-title":"Advances in Cryptology-CRYPTO"},{"issue":"01","key":"e_1_3_2_1_18_1","first-page":"1","article-title":"A survey of threshold cryptosystems[J]","volume":"7","year":"2020","unstructured":"TU B B, CHEN Y. A survey of threshold cryptosystems[J]. Journal of Cryptologic Research, 2020, 7(01): 1\u201314.","journal-title":"Journal of Cryptologic Research"},{"issue":"06","key":"e_1_3_2_1_19_1","first-page":"732","article-title":"zhang qi shan, liu jian wei. ELGamal type threshold digital signature scheme for AD hoc networks[J]","volume":"35","author":"Hu","year":"2009","unstructured":"Hu rong lei, zhang qi shan, liu jian wei. ELGamal type threshold digital signature scheme for AD hoc networks[J]. Journal of Beijing University of Aeronautics and Astronautics, 2009, 35(06): 732-736.","journal-title":"Journal of Beijing University of Aeronautics and Astronautics"}],"event":{"name":"AIPR 2023: 2023 6th International Conference on Artificial Intelligence and Pattern Recognition","acronym":"AIPR 2023","location":"Xiamen China"},"container-title":["2023 6th International Conference on Artificial Intelligence and Pattern Recognition (AIPR)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641808","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3641584.3641808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:05Z","timestamp":1750291385000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3641584.3641808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,22]]},"references-count":19,"alternative-id":["10.1145\/3641584.3641808","10.1145\/3641584"],"URL":"https:\/\/doi.org\/10.1145\/3641584.3641808","relation":{},"subject":[],"published":{"date-parts":[[2023,9,22]]},"assertion":[{"value":"2024-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}