{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T16:30:01Z","timestamp":1756312201342,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":79,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,12,2]],"date-time":"2024-12-02T00:00:00Z","timestamp":1733097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["ThreatAdapt (FCT-FNR\/0002\/2018)","SMaRtChain (2022. 08431.PTDC)"],"award-info":[{"award-number":["ThreatAdapt (FCT-FNR\/0002\/2018)","SMaRtChain (2022. 08431.PTDC)"]}]},{"name":"LASIGE Research Unit","award":["UIDB\/00408\/2020","UIDP\/00408\/2020"],"award-info":[{"award-number":["UIDB\/00408\/2020","UIDP\/00408\/2020"]}]},{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["446811880 (BFT2Chain)"],"award-info":[{"award-number":["446811880 (BFT2Chain)"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,12,2]]},"DOI":"10.1145\/3652892.3700756","type":"proceedings-article","created":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T19:36:13Z","timestamp":1732736173000},"page":"158-171","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Chasing Lightspeed Consensus: Fast Wide-Area Byzantine Replication with Mercury"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2754-9530","authenticated-orcid":false,"given":"Christian","family":"Berger","sequence":"first","affiliation":[{"name":"University of Passau, Passau, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0027-9094","authenticated-orcid":false,"given":"L\u00edvio","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"LASIGE, Inform\u00e1tica, Faculdade de Ciencias, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2815-5747","authenticated-orcid":false,"given":"Hans P.","family":"Reiser","sequence":"additional","affiliation":[{"name":"Reykjavik University, Reykjavik, Iceland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1299-8950","authenticated-orcid":false,"given":"Vinicius","family":"Cogo","sequence":"additional","affiliation":[{"name":"LASIGE, Inform\u00e1tica, Faculdade de Ciencias, Universidade de Lisboa, Lisbon, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8386-1628","authenticated-orcid":false,"given":"Alysson","family":"Bessani","sequence":"additional","affiliation":[{"name":"LASIGE, Inform\u00e1tica, Faculdade de Ciencias, Universidade de Lisboa, Lisbon, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2024,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467899"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC51483.2021.9679432"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2010.70"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2008.53"},{"volume-title":"Proc. of the 13th European Conf. on Computer Systems (EuroSys). ACM","author":"Elli","key":"e_1_3_2_1_5_1","unstructured":"Elli Androulaki et al. 2018. Hyperledger Fabric: a distributed operating system for permissioned blockchains. In Proc. of the 13th European Conf. on Computer Systems (EuroSys). ACM, New York, NY, USA, Article 30, 15 pages."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00045"},{"key":"e_1_3_2_1_7_1","unstructured":"Balaji Arun and Binoy Ravindran. 2022. DuoBFT: Resilience vs. Performance Trade-off in Byzantine Fault Tolerance. arXiv:2010.01387 [cs.DC] https:\/\/arxiv.org\/abs\/2010.01387"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/176575.176576"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2658994"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.53"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3662158.3662810"},{"key":"e_1_3_2_1_12_1","volume-title":"Mysticeti: Reaching the Limits of Latency with Uncertified DAGs. arXiv:2310.14821 [cs.DC]","author":"Babel Kushal","year":"2024","unstructured":"Kushal Babel, Andrey Chursin, George Danezis, Anastasios Kichidis, Lefteris Kokoris-Kogias, Arun Koshy, Alberto Sonnino, and Mingwei Tian. 2024. Mysticeti: Reaching the Limits of Latency with Uncertified DAGs. arXiv:2310.14821 [cs.DC]"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2015.21"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00010"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3030605"},{"key":"e_1_3_2_1_16_1","unstructured":"Christian Berger L\u00edvio Rodrigues Hans P. Reiser Vinicius Cogo and Alysson Bessani. 2024. Chasing the Speed of Light: Low-Latency Planetary-Scale Adaptive Byzantine Consensus. arXiv:2305.15000 [cs.DC] https:\/\/arxiv.org\/abs\/2305.15000"},{"key":"e_1_3_2_1_17_1","unstructured":"Christian Berger L\u00edvio Rodrigues Hans P. Reiser Vinicius Cogo and Alysson Bessani. 2024. Online Codebase. [Online]. Available: https:\/\/github.com\/bergerch\/Mercury."},{"volume-title":"Proc. of the 3rd Int. Workshop on Distributed Infrastructure for Common Good (DICG). ACM","author":"Berger Christian","key":"e_1_3_2_1_18_1","unstructured":"Christian Berger, Sadok Ben Toumia, and Hans P. Reiser. 2022. Does My BFT Protocol Implementation Scale?. In Proc. of the 3rd Int. Workshop on Distributed Infrastructure for Common Good (DICG). ACM, New York, NY, USA, 1--6."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"},{"key":"e_1_3_2_1_20_1","unstructured":"Erica Blum Jonathan Katz and Julian Loss. 2020. Network-Agnostic State Machine Replication. arXiv:2002.03437 [cs.CR]"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3397230.3397246"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815701"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3167132.3167179"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00012"},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. of the 3rd Symp. on Operating Systems Design and Implementation (OSDI). USENIX Association","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro and Barbara Liskov. 1999. Practical Byzantine fault tolerance. In Proc. of the 3rd Symp. on Operating Systems Design and Implementation (OSDI). USENIX Association, Berkeley, CA, 173--186."},{"key":"e_1_3_2_1_26_1","volume-title":"Network Bandwidth Variation-Adapted State Transfer for Geo-Replicated State Machines and its Application to Dynamic Replica Replacement. Concurrency and Computation: Practice and Experience Early view","author":"Chiba Tairi","year":"2022","unstructured":"Tairi Chiba, Ren Ohmura, and Junya Nakamura. 2022. Network Bandwidth Variation-Adapted State Transfer for Geo-Replicated State Machines and its Application to Dynamic Replica Replacement. Concurrency and Computation: Practice and Experience Early view (2022), e7408."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS51616.2021.00046"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00061"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2018.00034"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00087"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519568"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2495213"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00053"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3423211.3425689"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3380787.3393686"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2005.13"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559379"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387540"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3552326.3567482"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026891"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. of the 49th Ann. IEEE\/IFIP Int. Conf. on Dependable Systems and Networks (DSN). IEEE","author":"Gueta Guy Golan","year":"2019","unstructured":"Guy Golan Gueta, Ittai Abraham, Shelly Grossman, Dahlia Malkhi, Benny Pinkas, Michael Reiter, Dragos-Adrian Seredinschi, Orr Tamir, and Alin Tomescu. 2019. SBFT: a scalable and decentralized trust infrastructure. In Proc. of the 49th Ann. IEEE\/IFIP Int. Conf. on Dependable Systems and Networks (DSN). IEEE, Piscataway, NJ, USA, 568--580."},{"key":"e_1_3_2_1_43_1","volume-title":"Int. Conf. on Extending Database Technology. ACM","author":"Gupta Suyash","year":"2019","unstructured":"Suyash Gupta, Jelle Hellings, Sajjad Rahnama, and Mohammad Sadoghi. 2019. Proof-of-Execution: Reaching Consensus through Fault-Tolerant Speculation. In Int. Conf. on Extending Database Technology. ACM, New York, NY, USA, 13 pages. https:\/\/openproceedings.org\/2021\/conf\/edbt\/p111.pdf"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/3380750.3380757"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3427796.3427815"},{"key":"e_1_3_2_1_47_1","volume-title":"Proc. of the USENIX Ann. Technical Conf. (USENIX ATC). USENIX Association","author":"Jansen Rob","year":"2022","unstructured":"Rob Jansen, Jim Newsome, and Ryan Wails. 2022. Co-opting Linux Processes for High-Performance Network Simulation. In Proc. of the USENIX Ann. Technical Conf. (USENIX ATC). USENIX Association, Berkeley, CA, 327--350."},{"key":"e_1_3_2_1_48_1","volume-title":"Proc. of USENIX Hot Topics in System Dependability (HotDep). USENIX Association","author":"Junqueira Flavio","year":"2007","unstructured":"Flavio Junqueira, Yanhua Mao, and Keith Marzullo. 2007. Classic Paxos vs. fast Paxos: caveat emptor. In Proc. of USENIX Hot Topics in System Dependability (HotDep). USENIX Association, Berkeley, CA, 6 pages."},{"key":"e_1_3_2_1_49_1","volume-title":"Proc. of the 31st USENIX Security Symp. (USENIX Security). USENIX Association","author":"Kohls Katharina","year":"2022","unstructured":"Katharina Kohls and Claudia Diaz. 2022. VerLoc: Verifiable Localization in Decentralized Systems. In Proc. of the 31st USENIX Security Symp. (USENIX Security). USENIX Association, Berkeley, CA, 2637--2654."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467924"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2636148"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559346"},{"key":"e_1_3_2_1_54_1","volume-title":"Byzantine quorum systems. Distributed computing 11, 4","author":"Malkhi Dahlia","year":"1998","unstructured":"Dahlia Malkhi and Michael Reiter. 1998. Byzantine quorum systems. Distributed computing 11, 4 (1998), 203--213."},{"key":"e_1_3_2_1_55_1","volume-title":"Proc. of the 5th Workshop on Hot Topics in System Dependability (HotDep). USENIX Association","author":"Mao Yanhua","year":"2009","unstructured":"Yanhua Mao, Flavio P. Junqueira, and Keith Marzullo. 2009. Towards low latency state machine replication for uncivil wide-area networks. In Proc. of the 5th Workshop on Hot Topics in System Dependability (HotDep). USENIX Association, Berkeley, CA, 6 pages."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. of the 8th USENIX Conf. on Operating Systems Design and Implementation (OSDI). USENIX Association","author":"Mao Yanhua","year":"2008","unstructured":"Yanhua Mao, Flavio P. Junqueira, and Keith Marzullo. 2008. Mencius: Building Efficient Replicated State Machines for WANs. In Proc. of the 8th USENIX Conf. on Operating Systems Design and Implementation (OSDI). USENIX Association, Berkeley, CA, 369--384."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2006.35"},{"key":"e_1_3_2_1_58_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483584"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2020.2981019"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN53696.2022.9843564"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDSW49218.2019.00014"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF57540.2023.00002"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_65_1","volume-title":"Proc. of the 19th USENIX Symp. on Networked Systems Design and Implementation (NSDI). USENIX Association","author":"Shamis Alex","year":"2022","unstructured":"Alex Shamis, Peter Pietzuch, Burcu Canakci, Miguel Castro, C\u00e9dric Fournet, Edward Ashton, Amaury Chamayou, Sylvan Clebsch, Antoine Delignat-Lavaud, Matthew Kerner, Julien Maffre, Olga Vrousgou, Christoph M. Wintersteiger, Manuel Costa, and Mark Russinovich. 2022. IA-CCF: Individual Accountability for Permissioned Ledgers. In Proc. of the 19th USENIX Symp. on Networked Systems Design and Implementation (NSDI). USENIX Association, Berkeley, CA, 467--491."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484566"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS53918.2021.00017"},{"key":"e_1_3_2_1_68_1","volume-title":"Proc. of the 5th USENIX Symp. on Networked Systems Design and Implementation","volume":"8","author":"Singh Atul","year":"2008","unstructured":"Atul Singh, Tathagata Das, Petros Maniatis, Peter Druschel, and Timothy Roscoe. 2008. BFT Protocols Under Fire. In Proc. of the 5th USENIX Symp. on Networked Systems Design and Implementation, Vol. 8. USENIX Association, Berkeley, CA, 189--204."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87779-0_30"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.40"},{"key":"e_1_3_2_1_71_1","unstructured":"Chrysoula Stathakopoulou Tudor David and Marko Vukoli\u0107. 2019. Mir-BFT: High-throughput BFT for blockchains. 18 pages. arXiv:1906.05552v2 [cs.DC]"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519579"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00018"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2010.19"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1558994"},{"key":"e_1_3_2_1_76_1","volume-title":"Tolerating Disasters with Hierarchical Consensus. In IEEE Int. Conf. on Computer Communications (INFOCOM","author":"Yahyaoui Wassim","year":"2024","unstructured":"Wassim Yahyaoui, Joachim Bruneau-Queyreix, Marcus V\u00f6lp, and J\u00e9r\u00e9mie Decouchant. 2024. Tolerating Disasters with Hierarchical Consensus. In IEEE Int. Conf. on Computer Communications (INFOCOM 2024). IEEE, Vancouver, Canada, IEEE, Piscataway, NJ, USA, 1241--1250."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559348"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.5555\/3488766.3488802"}],"event":{"name":"Middleware '24: 25th International Middleware Conference","sponsor":["IFIP","Usenix"],"location":"Hong Kong Hong Kong","acronym":"Middleware '24"},"container-title":["Proceedings of the 25th International Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700756","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3652892.3700756","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T22:53:57Z","timestamp":1750287237000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3652892.3700756"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,2]]},"references-count":79,"alternative-id":["10.1145\/3652892.3700756","10.1145\/3652892"],"URL":"https:\/\/doi.org\/10.1145\/3652892.3700756","relation":{},"subject":[],"published":{"date-parts":[[2024,12,2]]},"assertion":[{"value":"2024-12-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}