{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:14:08Z","timestamp":1774023248625,"version":"3.50.1"},"reference-count":210,"publisher":"Association for Computing Machinery (ACM)","issue":"9","license":[{"start":{"date-parts":[[2024,5,8]],"date-time":"2024-05-08T00:00:00Z","timestamp":1715126400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2024,10,31]]},"abstract":"<jats:p>Blockchain has attracted significant attention in recent years due to its potential to revolutionize various industries by providing trustlessness. To comprehensively examine blockchain systems, this article presents both a macro-level overview on the most popular blockchain systems, and a micro-level analysis on a general blockchain framework and its crucial components. The macro-level exploration provides a big picture on the endeavors made by blockchain professionals over the years to enhance the blockchain performance while the micro-level investigation details the blockchain building blocks for deep technology comprehension. More specifically, this article introduces a general modular blockchain analytic framework that decomposes a blockchain system into interacting modules and then examines the major modules to cover the essential blockchain components of network, consensus, and distributed ledger at the micro-level. The framework as well as the modular analysis jointly build a foundation for designing scalable, flexible, and application-adaptive blockchains that can meet diverse requirements. Additionally, this article explores popular technologies that can be integrated with blockchain to expand functionality and highlights major challenges. Such a study provides critical insights to overcome the obstacles in designing novel blockchain systems and facilitates the further development of blockchain as a digital infrastructure to service new applications.<\/jats:p>","DOI":"10.1145\/3657288","type":"journal-article","created":{"date-parts":[[2024,4,11]],"date-time":"2024-04-11T09:55:43Z","timestamp":1712829343000},"page":"1-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Exploring Blockchain Technology through a Modular Lens: A Survey"],"prefix":"10.1145","volume":"56","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3675-3461","authenticated-orcid":false,"given":"Minghui","family":"Xu","sequence":"first","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3266-6002","authenticated-orcid":false,"given":"Yihao","family":"Guo","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0200-8092","authenticated-orcid":false,"given":"Chunchi","family":"Liu","sequence":"additional","affiliation":[{"name":"Ernst &amp; Young, London, United Kingdom of Great Britain and Northern Ireland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8847-8345","authenticated-orcid":false,"given":"Qin","family":"Hu","sequence":"additional","affiliation":[{"name":"Indiana University-Purdue University Indianapolis, Indianapolis, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6835-5981","authenticated-orcid":false,"given":"Dongxiao","family":"Yu","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4440-941X","authenticated-orcid":false,"given":"Zehui","family":"Xiong","sequence":"additional","affiliation":[{"name":"Singapore University of Technology and Design, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7442-7416","authenticated-orcid":false,"given":"Dusit (Tao)","family":"Niyato","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5912-4647","authenticated-orcid":false,"given":"Xiuzhen","family":"Cheng","sequence":"additional","affiliation":[{"name":"Shandong University, Qingdao, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,8]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"n. d. Blockstack. Retrieved September 27 2019 from https:\/\/blockstack.org"},{"key":"e_1_3_2_3_2","unstructured":"n. d. Cosmos. Retrieved September 22 2019 from https:\/\/github.com\/cosmos"},{"key":"e_1_3_2_4_2","unstructured":"n. d. Dogecoin. Retrieved September 27 2019 from https:\/\/dogecoin.com\/"},{"key":"e_1_3_2_5_2","doi-asserted-by":"crossref","unstructured":"n. d. Enigma. Retrieved September 27 2019 from https:\/\/enigma.co\/","DOI":"10.23943\/princeton\/9780691182933.003.0002"},{"key":"e_1_3_2_6_2","unstructured":"n. d. EOSIO. Retrieved September 22 2019 from https:\/\/github.com\/EOSIO"},{"key":"e_1_3_2_7_2","unstructured":"n. d. Forum member \u201cQuantumMechanic\u201d Proof of stake instead of proof of work. Retrieved September 22 2019 from https:\/\/bitcointalk.org\/index.php?topic=27787.0"},{"key":"e_1_3_2_8_2","unstructured":"n. d. Hyperledger. Retrieved September 22 2019 from https:\/\/www.hyperledger.org\/"},{"key":"e_1_3_2_9_2","unstructured":"n. d. IOHK. Retrieved September 27 2019 from https:\/\/iohk.io\/en\/research\/library\/"},{"key":"e_1_3_2_10_2","unstructured":"n. d. Liteecoin. Retrieved September 27 2019 from https:\/\/litecoin.com\/en\/"},{"key":"e_1_3_2_11_2","unstructured":"n. d. Monero. Retrieved September 27 2019 from https:\/\/web.getmonero.org\/"},{"key":"e_1_3_2_12_2","unstructured":"n. d. Multichain whitepaper. Retrieved September 22 2019 from https:\/\/www.multichain.com\/white-paper\/"},{"key":"e_1_3_2_13_2","unstructured":"n. d. Namecoin. Retrieved September 27 2019 from https:\/\/namecoin.org\/"},{"key":"e_1_3_2_14_2","unstructured":"n. d. Proof of Authority. Retrieved September 27 2019 from https:\/\/github.com\/ethereum\/guide\/blob\/master\/poa.md"},{"key":"e_1_3_2_15_2","unstructured":"n. d. Realtimebitcoin. Retrieved November 10 2019 from http:\/\/realtimebitcoin.info\/"},{"key":"e_1_3_2_16_2","unstructured":"n. d. Slimcoin. Retrieved September 27 2019 from http:\/\/slimco.in\/"},{"key":"e_1_3_2_17_2","unstructured":"n. d. Stellar. Retrieved September 27 2019 from https:\/\/www.stellar.org\/"},{"key":"e_1_3_2_18_2","unstructured":"n. d. What Is Delegated Proof of Stake. Retrieved September 27 2019 from https:\/\/crypto.com\/university\/what-is-dpos-delegated-proof-of-stake"},{"issue":"9","key":"e_1_3_2_19_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.15623\/ijret.2016.0509001","article-title":"Blockchain ready manufacturing supply chain using distributed ledger","volume":"5","author":"Abeyratne Saveen A.","year":"2016","unstructured":"Saveen A. Abeyratne and Radmehr P. Monfared. 2016. Blockchain ready manufacturing supply chain using distributed ledger. International Journal of Research in Engineering and Technology 5, 9 (2016), 1\u201310.","journal-title":"International Journal of Research in Engineering and Technology"},{"key":"e_1_3_2_20_2","article-title":"Chainspace: A sharded smart contracts platform","author":"Al-Bassam Mustafa","year":"2017","unstructured":"Mustafa Al-Bassam, Alberto Sonnino, Shehar Bano, Dave Hrycyszyn, and George Danezis. 2017. Chainspace: A sharded smart contracts platform. arXiv preprint arXiv:1708.03778 (2017).","journal-title":"arXiv preprint arXiv:1708.03778"},{"key":"e_1_3_2_21_2","volume-title":"Newcastle Univ","author":"Aldweesh Amjad","year":"2016","unstructured":"Amjad Aldweesh and Aad van Moorsel. 2016. A survey about blockchain software architectures. In Newcastle Univ."},{"issue":"2","key":"e_1_3_2_22_2","first-page":"1676","article-title":"Applications of blockchains in the Internet of Things: A comprehensive survey","volume":"21","author":"Ali Muhammad Salek","year":"2018","unstructured":"Muhammad Salek Ali, Massimo Vecchio, Miguel Pincheira, Koustabh Dolui, Fabio Antonelli, and Mubashir Husain Rehmani. 2018. Applications of blockchains in the Internet of Things: A comprehensive survey. IEEE Communications Surveys & Tutorials 21, 2 (2018), 1676\u20131717.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_23_2","doi-asserted-by":"crossref","unstructured":"Elli Androulaki Artem Barger Vita Bortnikov Christian Cachin Konstantinos Christidis Angelo De Caro David Enyeart Christopher Ferris Gennady Laventman Yacov Manevich Srinivasan Muralidharan Chet Murthy Binh Nguyen Manish Sethi Gari Singh Keith Smith Alessandro Sorniotti Chrysoula Stathakopoulou Marko Vukoli\u0107 Sharon Weed Cocco and Jason Yellick. 2018. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth EuroSys Conference. ACM 30.","DOI":"10.1145\/3190508.3190538"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Andrychowicz Marcin","year":"2014","unstructured":"Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and \u0141ukasz Mazurek. 2014. Fair two-party computations via Bitcoin deposits. In International Conference on Financial Cryptography and Data Security. Springer, 105\u2013121."},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"443","DOI":"10.1109\/SP.2014.35","volume-title":"2014 IEEE Symposium on Security and Privacy","author":"Andrychowicz Marcin","year":"2014","unstructured":"Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. 2014. Secure multiparty computations on Bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE, 443\u2013458."},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1109\/BLOC.2019.8751482","volume-title":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","author":"Asgaonkar Aditya","year":"2019","unstructured":"Aditya Asgaonkar and Bhaskar Krishnamachari. 2019. Solving the buyer and seller\u2019s dilemma: A dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator. In 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE, 262\u2013267."},{"key":"e_1_3_2_27_2","doi-asserted-by":"crossref","first-page":"901","DOI":"10.1109\/SP40001.2021.00097","volume-title":"2021 IEEE Symposium on Security and Privacy (SP)","author":"Aumayr Lukas","year":"2021","unstructured":"Lukas Aumayr, Matteo Maffei, O\u011fuzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Host\u00e1kov\u00e1, and Pedro Moreno-Sanchez. 2021. Bitcoin-compatible virtual channels. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 901\u2013918."},{"key":"e_1_3_2_28_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1109\/IRI.2018.00011","volume-title":"2018 IEEE International Conference on Information Reuse and Integration (IRI)","author":"Ayoade Gbadebo","year":"2018","unstructured":"Gbadebo Ayoade, Vishal Karande, Latifur Khan, and Kevin Hamlen. 2018. Decentralized IoT data management using blockchain and trusted execution environment. In 2018 IEEE International Conference on Information Reuse and Integration (IRI). IEEE, 15\u201322."},{"key":"e_1_3_2_29_2","first-page":"72","article-title":"Enabling blockchain innovations with pegged sidechains","author":"Back Adam","year":"2014","unstructured":"Adam Back, Matt Corallo, Luke Dashjr, Mark Friedenbach, Gregory Maxwell, Andrew Miller, Andrew Poelstra, Jorge Tim\u00f3n, and Pieter Wuille. 2014. Enabling blockchain innovations with pegged sidechains. URL: http:\/\/www.opensciencereview.com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains (2014), 72.","journal-title":"URL: http:\/\/www.opensciencereview.com\/papers\/123\/enablingblockchain-innovations-with-pegged-sidechains"},{"key":"e_1_3_2_30_2","doi-asserted-by":"crossref","first-page":"913","DOI":"10.1145\/3243734.3243848","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"Badertscher Christian","year":"2018","unstructured":"Christian Badertscher, Peter Ga\u017ei, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2018. Ouroboros Genesis: Composable proof-of-stake blockchains with dynamic availability. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 913\u2013930."},{"key":"e_1_3_2_31_2","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1145\/3319535.3363213","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Bagaria Vivek","year":"2019","unstructured":"Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, and Pramod Viswanath. 2019. Prism: Deconstructing the blockchain to approach physical limits. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 585\u2013602."},{"key":"e_1_3_2_32_2","article-title":"Hashgraph Consensus: Fair, Fast, Byzantine Fault Tolerance","author":"Baird Leemon","year":"2016","unstructured":"Leemon Baird. 2016. Hashgraph Consensus: Fair, Fast, Byzantine Fault Tolerance. Swirlds Tech Report. (2016).","journal-title":"Swirlds Tech Report."},{"key":"e_1_3_2_33_2","article-title":"Decrypting distributed ledger design-taxonomy, classification and blockchain community evaluation","author":"Ballandies Mark C.","year":"2018","unstructured":"Mark C. Ballandies, Marcus M. Dapp, and Evangelos Pournaras. 2018. Decrypting distributed ledger design-taxonomy, classification and blockchain community evaluation. arXiv preprint arXiv:1811.03419 (2018).","journal-title":"arXiv preprint arXiv:1811.03419"},{"key":"e_1_3_2_34_2","first-page":"7","volume-title":"Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers","author":"Bartoletti Massimo","year":"2017","unstructured":"Massimo Bartoletti, Stefano Lande, Livio Pompianu, and Andrea Bracciali. 2017. A general framework for blockchain analytics. In Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers. ACM, 7."},{"issue":"8","key":"e_1_3_2_35_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3471140","article-title":"A survey on blockchain interoperability: Past, present, and future trends","volume":"54","author":"Belchior Rafael","year":"2021","unstructured":"Rafael Belchior, Andr\u00e9 Vasconcelos, S\u00e9rgio Guerreiro, and Miguel Correia. 2021. A survey on blockchain interoperability: Past, present, and future trends. ACM Computing Surveys (CSUR) 54, 8 (2021), 1\u201341.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_36_2","first-page":"421","volume-title":"Annual Cryptology Conference","author":"Bentov Iddo","year":"2014","unstructured":"Iddo Bentov and Ranjit Kumaresan. 2014. How to use Bitcoin to design fair protocols. In Annual Cryptology Conference. Springer, 421\u2013439."},{"key":"e_1_3_2_37_2","first-page":"919","article-title":"Snow White: Provably secure proofs of stake.","volume":"2016","author":"Bentov Iddo","year":"2016","unstructured":"Iddo Bentov, Rafael Pass, and Elaine Shi. 2016. Snow White: Provably secure proofs of stake. IACR Cryptology ePrint Archive 2016 (2016), 919.","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"22","key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"8833","DOI":"10.3390\/s22228833","article-title":"A survey: Security, transparency, and scalability issues of NFT\u2019s and its marketplaces","volume":"22","author":"Bhujel Sangam","year":"2022","unstructured":"Sangam Bhujel and Yogachandran Rahulamathavan. 2022. A survey: Security, transparency, and scalability issues of NFT\u2019s and its marketplaces. Sensors 22, 22 (2022), 8833.","journal-title":"Sensors"},{"key":"e_1_3_2_39_2","unstructured":"Binance. n. d. Welcome to Binance. Retrieved September 27 2019 from https:\/\/www.binance.com\/en\/about"},{"key":"e_1_3_2_40_2","first-page":"561","volume-title":"Annual International Cryptology Conference","author":"Boneh Dan","year":"2019","unstructured":"Dan Boneh, Benedikt B\u00fcnz, and Ben Fisch. 2019. Batching techniques for accumulators with applications to IOPs and stateless blockchains. In Annual International Cryptology Conference. Springer, 561\u2013586."},{"key":"e_1_3_2_41_2","first-page":"43","volume-title":"Proceedings of the 2009 ACM Workshop on Cloud Computing Security","author":"Bowers Kevin D.","year":"2009","unstructured":"Kevin D. Bowers, Ari Juels, and Alina Oprea. 2009. Proofs of retrievability: Theory and implementation. In Proceedings of the 2009 ACM Workshop on Cloud Computing Security. 43\u201354."},{"key":"e_1_3_2_42_2","article-title":"Corda: An introduction","author":"Brown Richard Gendal","year":"2016","unstructured":"Richard Gendal Brown, James Carlyle, Ian Grigg, and Mike Hearn. 2016. Corda: An introduction. R3 CEV, August (2016).","journal-title":"R3 CEV, August"},{"key":"e_1_3_2_43_2","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1109\/SP.2018.00020","volume-title":"2018 IEEE Symposium on Security and Privacy (SP)","author":"B\u00fcnz Benedikt","year":"2018","unstructured":"Benedikt B\u00fcnz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In 2018 IEEE Symposium on Security and Privacy (SP). IEEE, 315\u2013334."},{"key":"e_1_3_2_44_2","unstructured":"Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. White Paper 3 37 (2014)."},{"key":"e_1_3_2_45_2","article-title":"A systematic literature review of blockchain-based applications: Current status, classification and open issues","author":"Casino Fran","year":"2018","unstructured":"Fran Casino, Thomas K. Dasaklis, and Constantinos Patsakis. 2018. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics and Informatics (2018).","journal-title":"Telematics and Informatics"},{"key":"e_1_3_2_46_2","doi-asserted-by":"crossref","first-page":"701","DOI":"10.1145\/3133956.3134010","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Cecchetti Ethan","year":"2017","unstructured":"Ethan Cecchetti, Fan Zhang, Yan Ji, Ahmed Kosba, Ari Juels, and Elaine Shi. 2017. Solidus: Confidential distributed ledger transactions via PVORM. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 701\u2013717."},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1109\/ICOIN.2018.8343266","volume-title":"2018 International Conference on Information Networking (ICOIN)","author":"Chalaemwongwan Nutthakorn","year":"2018","unstructured":"Nutthakorn Chalaemwongwan and Werasak Kurutach. 2018. State of the art and challenges facing consensus protocols on blockchain. In 2018 International Conference on Information Networking (ICOIN). IEEE, 957\u2013962."},{"key":"e_1_3_2_48_2","first-page":"282","volume-title":"International Symposium on Stabilization, Safety, and Security of Distributed Systems","author":"Chen Lin","year":"2017","unstructured":"Lin Chen, Lei Xu, Nolan Shah, Zhimin Gao, Yang Lu, and Weidong Shi. 2017. On security analysis of proof-of-elapsed-time (poet). In International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 282\u2013297."},{"key":"e_1_3_2_49_2","article-title":"An adaptive and modular blockchain enabled architecture for a decentralized metaverse","author":"Cheng Ye","year":"2023","unstructured":"Ye Cheng, Yihao Guo, Minghui Xu, Qin Hu, Dongxiao Yu, and Xiuzhen Cheng. 2023. An adaptive and modular blockchain enabled architecture for a decentralized metaverse. IEEE Journal on Selected Areas in Communications (2023).","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"e_1_3_2_50_2","article-title":"Byteball: A decentralized system for storage and transfer of value","author":"Churyumov Anton","year":"2016","unstructured":"Anton Churyumov. 2016. Byteball: A decentralized system for storage and transfer of value. URL https:\/\/byteball. org\/Byteball. pdf (2016).","journal-title":"URL https:\/\/byteball. org\/Byteball. pdf"},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","unstructured":"James C. Corbett Jeffrey Dean Michael Epstein Andrew Fikes Christopher Frost J. J. Furman Sanjay Ghemawat Andrey Gubarev Christopher Heiser Peter Hochschild Wilson Hsieh Sebastian Kanthak Eugene Kogan Hongyi Li Alexander Lloyd Sergey Melnik David Mwaura David Nagle Sean Quinlan Rajesh Rao Lindsay Rolig Yasushi Saito Michal Szymaniak Christopher Taylor Ruth Wang and Dale Woodford. 2013. Spanner: Google\u2019s globally distributed database. ACM Transactions on Computer Systems (TOCS\u201913) 31 3 (2013) 8.","DOI":"10.1145\/2518037.2491245"},{"key":"e_1_3_2_52_2","article-title":"Centrally banked cryptocurrencies","author":"Danezis George","year":"2015","unstructured":"George Danezis and Sarah Meiklejohn. 2015. Centrally banked cryptocurrencies. arXiv preprint arXiv:1505.06895 (2015).","journal-title":"arXiv preprint arXiv:1505.06895"},{"key":"e_1_3_2_53_2","unstructured":"DappRadar. n. d. The World\u2019s Dapp Store. Retrieved September 27 2019 from https:\/\/dappradar.com\/v"},{"key":"e_1_3_2_54_2","first-page":"66","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"David Bernardo","year":"2018","unstructured":"Bernardo David, Peter Ga\u017ei, Aggelos Kiayias, and Alexander Russell. 2018. Ouroboros Praos: An adaptively-secure, semi-synchronous proof-of-stake blockchain. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 66\u201398."},{"issue":"7","key":"e_1_3_2_55_2","doi-asserted-by":"crossref","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","article-title":"Untangling blockchain: A data processing view of blockchain systems","volume":"30","author":"Dinh Tien Tuan Anh","year":"2018","unstructured":"Tien Tuan Anh Dinh, Rui Liu, Meihui Zhang, Gang Chen, Beng Chin Ooi, and Ji Wang. 2018. Untangling blockchain: A data processing view of blockchain systems. IEEE Transactions on Knowledge and Data Engineering 30, 7 (2018), 1366\u20131385.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"issue":"1","key":"e_1_3_2_56_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3436728","article-title":"Byzantine fault-tolerant state-machine replication from a systems perspective","volume":"54","author":"Distler Tobias","year":"2021","unstructured":"Tobias Distler. 2021. Byzantine fault-tolerant state-machine replication from a systems perspective. ACM Computing Surveys (CSUR) 54, 1 (2021), 1\u201338.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_57_2","article-title":"Promoting the sustainability of blockchain in Web 3.0 and the metaverse through diversified incentive mechanism design","author":"Doe Daniel Mawunyo","year":"2023","unstructured":"Daniel Mawunyo Doe, Jing Li, Niyato Dusit, Zhen Gao, Jun Li, and Zhu Han. 2023. Promoting the sustainability of blockchain in Web 3.0 and the metaverse through diversified incentive mechanism design. IEEE Open Journal of the Computer Society (2023).","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"e_1_3_2_58_2","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1145\/3054977.3055003","volume-title":"Proceedings of the Second International Conference on Internet-of-Things Design and Implementation","author":"Dorri Ali","year":"2017","unstructured":"Ali Dorri, Salil S. Kanhere, and Raja Jurdak. 2017. Towards an optimized blockchain for IoT. In Proceedings of the Second International Conference on Internet-of-Things Design and Implementation. ACM, 173\u2013178."},{"key":"e_1_3_2_59_2","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1109\/PERCOMW.2017.7917634","volume-title":"2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops)","author":"Dorri Ali","year":"2017","unstructured":"Ali Dorri, Salil S. Kanhere, Raja Jurdak, and Praveen Gauravaram. 2017. Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops). IEEE, 618\u2013623."},{"key":"e_1_3_2_60_2","first-page":"650","volume-title":"AMIA Annual Symposium Proceedings","volume":"2017","author":"Dubovitskaya Alevtina","year":"2017","unstructured":"Alevtina Dubovitskaya, Zhigang Xu, Samuel Ryu, Michael Schumacher, and Fusheng Wang. 2017. Secure and trustable electronic medical records sharing using blockchain. In AMIA Annual Symposium Proceedings, Vol. 2017. American Medical Informatics Association, 650."},{"issue":"2","key":"e_1_3_2_61_2","doi-asserted-by":"crossref","first-page":"288","DOI":"10.1145\/42282.42283","article-title":"Consensus in the presence of partial synchrony","volume":"35","author":"Dwork Cynthia","year":"1988","unstructured":"Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. 1988. Consensus in the presence of partial synchrony. Journal of the ACM (JACM) 35, 2 (1988), 288\u2013323.","journal-title":"Journal of the ACM (JACM)"},{"key":"e_1_3_2_62_2","first-page":"139","volume-title":"Annual International Cryptology Conference","author":"Dwork Cynthia","year":"1992","unstructured":"Cynthia Dwork and Moni Naor. 1992. Pricing via processing or combatting junk mail. In Annual International Cryptology Conference. Springer, 139\u2013147."},{"key":"e_1_3_2_63_2","first-page":"625","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Dziembowski Stefan","year":"2019","unstructured":"Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, and Kristina Host\u00e1kov\u00e1. 2019. Multi-party virtual state channels. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 625\u2013656."},{"key":"e_1_3_2_64_2","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/SP.2019.00020","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Dziembowski Stefan","year":"2019","unstructured":"Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2019. Perun: Virtual payment hubs over cryptocurrencies. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 106\u2013123."},{"key":"e_1_3_2_65_2","doi-asserted-by":"crossref","first-page":"949","DOI":"10.1145\/3243734.3243856","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"Dziembowski Stefan","year":"2018","unstructured":"Stefan Dziembowski, Sebastian Faust, and Kristina Host\u00e1kov\u00e1. 2018. General state channel networks. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 949\u2013966."},{"key":"e_1_3_2_66_2","doi-asserted-by":"crossref","first-page":"585","DOI":"10.1007\/978-3-662-48000-7_29","volume-title":"Advances in Cryptology \u2013 CRYPTO 2015","author":"Dziembowski Stefan","year":"2015","unstructured":"Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak. 2015. Proofs of space. In Advances in Cryptology \u2013 CRYPTO 2015, Rosario Gennaro and Matthew Robshaw (Eds.). Springer Berlin, 585\u2013605."},{"key":"e_1_3_2_67_2","unstructured":"EthHub. n. d. Optimistic-Rollup. Retrieved September 27 2019 from https:\/\/docs.ethhub.io\/ethereum-roadmap\/layer-2-scaling\/optimistic_rollups\/"},{"key":"e_1_3_2_68_2","unstructured":"EthHub. n. d. zkRollup. Retrieved September 27 2019 from https:\/\/docs.ethhub.io\/ethereum-roadmap\/layer-2-scaling\/zk-rollups\/"},{"key":"e_1_3_2_69_2","unstructured":"Ittay Eyal. n. d. Profile of Ittay Eyal. Retrieved September 27 2019 from https:\/\/webee.technion.ac.il\/people\/ittay\/"},{"key":"e_1_3_2_70_2","unstructured":"Ittay Eyal Adem Efe Gencer Emin G\u00fcn Sirer and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201916). 45\u201359."},{"key":"e_1_3_2_71_2","doi-asserted-by":"crossref","first-page":"427","DOI":"10.1109\/SFCS.1987.4","volume-title":"28th Annual Symposium on Foundations of Computer Science (SFCS 1987)","author":"Feldman Paul","year":"1987","unstructured":"Paul Feldman. 1987. A practical scheme for non-interactive verifiable secret sharing. In 28th Annual Symposium on Foundations of Computer Science (SFCS 1987). IEEE, 427\u2013438."},{"key":"e_1_3_2_72_2","volume-title":"Impossibility of Distributed Consensus with One Faulty Process.","author":"Fischer Michael J.","year":"1982","unstructured":"Michael J. Fischer, Nancy A. Lynch, and Michael S. Paterson. 1982. Impossibility of Distributed Consensus with One Faulty Process.Technical Report. Massachusetts Inst. of Tech Cambridge Lab for Computer Science."},{"key":"e_1_3_2_73_2","unstructured":"FUSION Foundation. n. d. FUSION Whitepaper: An Inclusive Cryptofinance Platform Based on Blockchain. Retrieved September 27 2019 from https:\/\/www.fusion.org\/themes\/fusion\/assets\/pdf\/Fusion-White-Paper.pdf"},{"key":"e_1_3_2_74_2","unstructured":"Interledger Foundation. n. d. An open and inclusive payments network that puts humanity first. Retrieved September 27 2019 from https:\/\/interledger.org\/"},{"key":"e_1_3_2_75_2","unstructured":"NFT Foundation. n. d. When You Collect or Create Please also Donate to: Nft Foundation. Retrieved September 27 2019 from http:\/\/nftfoundation.com\/"},{"key":"e_1_3_2_76_2","first-page":"666","volume-title":"International Conference on Database Systems for Advanced Applications","author":"Gai Fangyu","year":"2018","unstructured":"Fangyu Gai, Baosheng Wang, Wenping Deng, and Wei Peng. 2018. Proof of reputation: A reputation-based consensus protocol for peer-to-peer network. In International Conference on Database Systems for Advanced Applications. Springer, 666\u2013681."},{"key":"e_1_3_2_77_2","article-title":"Blockchain-based multisignature lock for UAC in metaverse","author":"Gai Keke","year":"2022","unstructured":"Keke Gai, Shuo Wang, Hui Zhao, Yufeng She, Zijian Zhang, and Liehuang Zhu. 2022. Blockchain-based multisignature lock for UAC in metaverse. IEEE Transactions on Computational Social Systems (2022).","journal-title":"IEEE Transactions on Computational Social Systems"},{"key":"e_1_3_2_78_2","first-page":"1","volume-title":"2018 27th International Conference on Computer Communication and Networks (ICCCN)","author":"Gao Weichao","year":"2018","unstructured":"Weichao Gao, William G. Hatcher, and Wei Yu. 2018. A survey of blockchain: Techniques, applications, and challenges. In 2018 27th International Conference on Computer Communication and Networks (ICCCN). IEEE, 1\u201311."},{"key":"e_1_3_2_79_2","first-page":"281","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Garay Juan","year":"2015","unstructured":"Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The Bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 281\u2013310."},{"key":"e_1_3_2_80_2","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1109\/SP.2019.00040","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Ga\u017ei Peter","year":"2019","unstructured":"Peter Ga\u017ei, Aggelos Kiayias, and Dionysis Zindros. 2019. Proof-of-stake sidechains. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 139\u2013156."},{"key":"e_1_3_2_81_2","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/2976749.2978341","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Gervais Arthur","year":"2016","unstructured":"Arthur Gervais, Ghassan O. Karame, Karl W\u00fcst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 3\u201316."},{"key":"e_1_3_2_82_2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/3132747.3132757","volume-title":"Proceedings of the 26th Symposium on Operating Systems Principles","author":"Gilad Yossi","year":"2017","unstructured":"Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51\u201368."},{"key":"e_1_3_2_83_2","doi-asserted-by":"crossref","first-page":"473","DOI":"10.1145\/3133956.3134093","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Green Matthew","year":"2017","unstructured":"Matthew Green and Ian Miers. 2017. Bolt: Anonymous payment channels for decentralized currencies. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 473\u2013489."},{"key":"e_1_3_2_84_2","article-title":"BlockMaze: An efficient privacy-preserving account-model blockchain based on zk-SNARKs","author":"Guan Zhangshuang","year":"2020","unstructured":"Zhangshuang Guan, Zhiguo Wan, Yang Yang, Yan Zhou, and Butian Huang. 2020. BlockMaze: An efficient privacy-preserving account-model blockchain based on zk-SNARKs. IEEE Transactions on Dependable and Secure Computing (2020).","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"e_1_3_2_85_2","article-title":"FileDAG: A multi-version decentralized storage network built on DAG-based blockchain","author":"Guo Hechuan","year":"2022","unstructured":"Hechuan Guo, Minghui Xu, Jiahao Zhang, Chunchi Liu, Dongxiao Yu, Schahram Dustdar, and Xiuzhen Cheng. 2022. FileDAG: A multi-version decentralized storage network built on DAG-based blockchain. arXiv preprint arXiv:2212.09096 (2022).","journal-title":"arXiv preprint arXiv:2212.09096"},{"key":"e_1_3_2_86_2","doi-asserted-by":"crossref","DOI":"10.1109\/TC.2023.3288765","article-title":"Cross-channel: Scalable off-chain channels supporting fair and atomic cross-chain operations","author":"Guo Yihao","year":"2023","unstructured":"Yihao Guo, Minghui Xu, Dongxiao Yu, Yong Yu, Rajiv Ranjan, and Xiuzhen Cheng. 2023. Cross-channel: Scalable off-chain channels supporting fair and atomic cross-chain operations. IEEE Trans. Comput. (2023).","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_87_2","first-page":"3","volume-title":"Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg International Conference of Logistics (HICL), Vol. 23","author":"Hackius Niels","year":"2017","unstructured":"Niels Hackius and Moritz Petersen. 2017. Blockchain in logistics and supply chain: Trick or treat?. In Digitalization in Supply Chain Management and Logistics: Smart and Digital Solutions for an Industry 4.0 Environment. Proceedings of the Hamburg International Conference of Logistics (HICL), Vol. 23. Berlin: epubli GmbH, 3\u201318."},{"key":"e_1_3_2_88_2","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/2899007.2899012","volume-title":"Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security","author":"Hardjono Thomas","year":"2016","unstructured":"Thomas Hardjono and Ned Smith. 2016. Cloud-based commissioning of constrained devices using permissioned blockchains. In Proceedings of the 2nd ACM International Workshop on IoT Privacy, Trust, and Security. 29\u201336."},{"key":"e_1_3_2_89_2","article-title":"Global blockchain benchmarking study","volume":"122","author":"Hileman Garrick","year":"2017","unstructured":"Garrick Hileman and Michel Rauchs. 2017. Global blockchain benchmarking study. Cambridge Centre for Alternative Finance, University of Cambridge 122 (2017).","journal-title":"Cambridge Centre for Alternative Finance, University of Cambridge"},{"key":"e_1_3_2_90_2","first-page":"1","volume-title":"IEEE INFOCOM 2021-IEEE Conference on Computer Communications","author":"Hong Zicong","year":"2021","unstructured":"Zicong Hong, Song Guo, Peng Li, and Wuhui Chen. 2021. Pyramid: A layered sharding blockchain system. In IEEE INFOCOM 2021-IEEE Conference on Computer Communications. IEEE, 1\u201310."},{"key":"e_1_3_2_91_2","article-title":"Zcash protocol specification","author":"Hopwood Daira","year":"2016","unstructured":"Daira Hopwood, Sean Bowe, Taylor Hornby, and Nathan Wilcox. 2016. Zcash protocol specification. GitHub: San Francisco, CA, USA (2016).","journal-title":"GitHub: San Francisco, CA, USA"},{"key":"e_1_3_2_92_2","doi-asserted-by":"crossref","first-page":"629","DOI":"10.1109\/ICDCS51616.2021.00066","volume-title":"2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS)","author":"Huang Huawei","year":"2021","unstructured":"Huawei Huang, Zhenyi Huang, Xiaowen Peng, Zibin Zheng, and Song Guo. 2021. MVCom: Scheduling most valuable committees for the large-scale sharded blockchain. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 629\u2013639."},{"key":"e_1_3_2_93_2","volume-title":"IEEE INFOCOM","author":"Huang Huawei","year":"2022","unstructured":"Huawei Huang, Xiaowen Peng, Jianzhou Zhan, Shenyang Zhang, Yue Lin, Zibin Zheng, and Song Guo. 2022. BrokerChain: A cross-shard blockchain protocol for account\/balance-based state sharding. In IEEE INFOCOM."},{"key":"e_1_3_2_94_2","first-page":"464","volume-title":"2017 19th International Conference on Advanced Communication Technology (ICACT)","author":"Huh Seyoung","year":"2017","unstructured":"Seyoung Huh, Sangrae Cho, and Soohyung Kim. 2017. Managing IoT devices using blockchain platform. In 2017 19th International Conference on Advanced Communication Technology (ICACT). IEEE, 464\u2013467."},{"key":"e_1_3_2_95_2","first-page":"1","volume-title":"2018 International Conference on Smart Communications and Networking (SmartNets)","author":"Jesus Vitor","year":"2018","unstructured":"Vitor Jesus. 2018. Blockchain-enhanced roots-of-trust. In 2018 International Conference on Smart Communications and Networking (SmartNets). IEEE, 1\u20137."},{"key":"e_1_3_2_96_2","volume-title":"Quorum Documentation","author":"Morgan Ethereum J. P.","year":"2019","unstructured":"Ethereum J. P. Morgan. 2019. Quorum Documentation. https:\/\/github.com\/jpmorganchase\/quorum\/wiki\/Quorum-Overview"},{"key":"e_1_3_2_97_2","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1145\/3465084.3467905","volume-title":"Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing","author":"Keidar Idit","year":"2021","unstructured":"Idit Keidar, Eleftherios Kokoris-Kogias, Oded Naor, and Alexander Spiegelman. 2021. All you need is DAG. In Proceedings of the 2021 ACM Symposium on Principles of Distributed Computing. 165\u2013175."},{"key":"e_1_3_2_98_2","first-page":"451","volume-title":"Annual International Cryptology Conference","author":"Kelkar Mahimna","year":"2020","unstructured":"Mahimna Kelkar, Fan Zhang, Steven Goldfeder, and Ari Juels. 2020. Order-fairness for Byzantine consensus. In Annual International Cryptology Conference. Springer, 451\u2013480."},{"key":"e_1_3_2_99_2","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1109\/SP.2019.00063","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Kerber Thomas","year":"2019","unstructured":"Thomas Kerber, Aggelos Kiayias, Markulf Kohlweiss, and Vassilis Zikas. 2019. Ouroboros Crypsinous: Privacy-preserving proof-of-stake. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 157\u2013174."},{"key":"e_1_3_2_100_2","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/3133956.3134033","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Khalil Rami","year":"2017","unstructured":"Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing off-blockchain payment networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 439\u2013453."},{"key":"e_1_3_2_101_2","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.future.2017.11.022","article-title":"IoT security: Review, blockchain solutions, and open challenges","volume":"82","author":"Khan Minhaj Ahmad","year":"2018","unstructured":"Minhaj Ahmad Khan and Khaled Salah. 2018. IoT security: Review, blockchain solutions, and open challenges. Future Generation Computer Systems 82 (2018), 395\u2013411.","journal-title":"Future Generation Computer Systems"},{"key":"e_1_3_2_102_2","first-page":"357","volume-title":"Annual International Cryptology Conference","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer, 357\u2013388."},{"key":"e_1_3_2_103_2","volume-title":"Proof-of-work Sidechains","author":"Kiayias Aggelos","year":"2018","unstructured":"Aggelos Kiayias and Dionysis Zindros. 2018. Proof-of-work Sidechains. Technical Report. Cryptology ePrint Archive, Report 2018\/1048."},{"issue":"1","key":"e_1_3_2_104_2","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1002\/isaf.1424","article-title":"Toward an ontology-driven blockchain design for supply-chain provenance","volume":"25","author":"Kim Henry M.","year":"2018","unstructured":"Henry M. Kim and Marek Laskowski. 2018. Toward an ontology-driven blockchain design for supply-chain provenance. Intelligent Systems in Accounting, Finance and Management 25, 1 (2018), 18\u201327.","journal-title":"Intelligent Systems in Accounting, Finance and Management"},{"key":"e_1_3_2_105_2","article-title":"PPCoin: Peer-to-peer crypto-currency with proof-of-stake","volume":"19","author":"King Sunny","year":"2012","unstructured":"Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper, August 19 (2012).","journal-title":"Self-published paper, August"},{"key":"e_1_3_2_106_2","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1109\/BDCloud.2015.60","volume-title":"2015 IEEE Fifth International Conference on Big Data and Cloud Computing","author":"Kishigami Junichi","year":"2015","unstructured":"Junichi Kishigami, Shigeru Fujimura, Hiroki Watanabe, Atsushi Nakadaira, and Akihiko Akutsu. 2015. The blockchain-based digital content distribution system. In 2015 IEEE Fifth International Conference on Big Data and Cloud Computing. IEEE, 187\u2013190."},{"key":"e_1_3_2_107_2","first-page":"279","volume-title":"25th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. In 25th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security Symposium ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) Security 16). 279\u2013296."},{"key":"e_1_3_2_108_2","unstructured":"Koko. n. d. SuperRare: A Guide For NFT Collectors and Artists. Retrieved September 27 2019 from https:\/\/nftevening.com\/superrare-a-guide-for-nft-collectors-and-artists\/"},{"key":"e_1_3_2_109_2","volume-title":"Proceedings of the 50th Hawaii International Conference on System Sciences","author":"Korpela Kari","year":"2017","unstructured":"Kari Korpela, Jukka Hallikas, and Tomi Dahlberg. 2017. Digital supply chain transformation toward blockchain integration. In Proceedings of the 50th Hawaii International Conference on System Sciences."},{"key":"e_1_3_2_110_2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.ijinfomgt.2017.12.005","article-title":"1 Blockchain\u2019s roles in meeting key supply chain management objectives","volume":"39","author":"Kshetri Nir","year":"2018","unstructured":"Nir Kshetri. 2018. 1 Blockchain\u2019s roles in meeting key supply chain management objectives. International Journal of Information Management 39 (2018), 80\u201389.","journal-title":"International Journal of Information Management"},{"key":"e_1_3_2_111_2","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/2810103.2813712","volume-title":"Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security","author":"Kumaresan Ranjit","year":"2015","unstructured":"Ranjit Kumaresan, Tal Moran, and Iddo Bentov. 2015. How to use Bitcoin to play decentralized poker. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security. 195\u2013206."},{"key":"e_1_3_2_112_2","unstructured":"Offchain Labs. n. d. Arbitrum Monorepo. Retrieved September 27 2019 from https:\/\/github.com\/OffchainLabs\/arbitrum"},{"key":"e_1_3_2_113_2","article-title":"Nano: A feeless distributed cryptocurrency network","author":"LeMahieu Colin","year":"2018","unstructured":"Colin LeMahieu. 2018. Nano: A feeless distributed cryptocurrency network. URL: https:\/\/nano. org\/en\/whitepaper (2018).","journal-title":"URL: https:\/\/nano. org\/en\/whitepaper"},{"key":"e_1_3_2_114_2","doi-asserted-by":"crossref","first-page":"528","DOI":"10.1007\/978-3-662-47854-7_33","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Lewenberg Yoad","year":"2015","unstructured":"Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive block chain protocols. In International Conference on Financial Cryptography and Data Security. Springer, 528\u2013547."},{"key":"e_1_3_2_115_2","first-page":"515","volume-title":"2020 \\(\\lbrace\\) USENIX \\(\\rbrace\\) Annual Technical Conference ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) \\(\\lbrace\\) ATC \\(\\rbrace\\) 20)","author":"Li Chenxin","year":"2020","unstructured":"Chenxin Li, Peilun Li, Dong Zhou, Zhe Yang, Ming Wu, Guang Yang, Wei Xu, Fan Long, and Andrew Chi-Chih Yao. 2020. A decentralized blockchain with high throughput and fast confirmation. In 2020 \\(\\lbrace\\) USENIX \\(\\rbrace\\) Annual Technical Conference ( \\(\\lbrace\\) USENIX \\(\\rbrace\\) \\(\\lbrace\\) ATC \\(\\rbrace\\) 20). 515\u2013528."},{"key":"e_1_3_2_116_2","first-page":"1728","volume-title":"IEEE INFOCOM 2020-IEEE Conference on Computer Communications","author":"Li Peng","year":"2020","unstructured":"Peng Li, Toshiaki Miyazaki, and Wanlei Zhou. 2020. Secure balance planning of off-blockchain payment channel networks. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 1728\u20131737."},{"key":"e_1_3_2_117_2","article-title":"A unified blockchain-semantic framework for wireless edge intelligence enabled Web 3.0","author":"Lin Yijing","year":"2023","unstructured":"Yijing Lin, Zhipeng Gao, Hongyang Du, Dusit Niyato, Jiawen Kang, Ruilong Deng, and Xuemin Sherman Shen. 2023. A unified blockchain-semantic framework for wireless edge intelligence enabled Web 3.0. IEEE Wireless Communications (2023).","journal-title":"IEEE Wireless Communications"},{"key":"e_1_3_2_118_2","article-title":"Teechain: Scalable blockchain payments using trusted execution environments","author":"Lind Joshua","year":"2017","unstructured":"Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter Pietzuch, and Emin G\u00fcn Sirer. 2017. Teechain: Scalable blockchain payments using trusted execution environments. arXiv preprint arXiv:1707.05454 (2017).","journal-title":"arXiv preprint arXiv:1707.05454"},{"key":"e_1_3_2_119_2","first-page":"468","volume-title":"2017 IEEE International Conference on Web Services (ICWS)","author":"Liu Bin","year":"2017","unstructured":"Bin Liu, Xiao Liang Yu, Shiping Chen, Xiwei Xu, and Liming Zhu. 2017. Blockchain based data integrity service framework for IoT data. In 2017 IEEE International Conference on Web Services (ICWS). IEEE, 468\u2013475."},{"key":"e_1_3_2_120_2","article-title":"Extending on-chain trust to off-chain\u2013trustworthy blockchain data collection using trusted execution environment (TEE)","author":"Liu Chunchi","year":"2022","unstructured":"Chunchi Liu, Hechuan Guo, Minghui Xu, Shengling Wang, Dongxiao Yu, Jiguo Yu, and Xiuzhen Cheng. 2022. Extending on-chain trust to off-chain\u2013trustworthy blockchain data collection using trusted execution environment (TEE). IEEE Trans. Comput. (2022).","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_121_2","article-title":"Tokoin: A coin-based accountable access control scheme for Internet of Things","author":"Liu Chunchi","year":"2020","unstructured":"Chunchi Liu, Minghui Xu, Hechuan Guo, Xiuzhen Cheng, Yinhao Xiao, Dongxiao Yu, Bei Gong, Arkady Yerukhimovich, Shengling Wang, and Weifeng Lv. 2020. Tokoin: A coin-based accountable access control scheme for Internet of Things. arXiv preprint arXiv:2011.04919 (2020).","journal-title":"arXiv preprint arXiv:2011.04919"},{"issue":"5","key":"e_1_3_2_122_2","first-page":"1097","article-title":"Parallel and asynchronous smart contract execution","volume":"33","author":"Liu Jian","year":"2021","unstructured":"Jian Liu, Peilun Li, Raymond Cheng, N. Asokan, and Dawn Song. 2021. Parallel and asynchronous smart contract execution. IEEE Transactions on Parallel and Distributed Systems 33, 5 (2021), 1097\u20131108.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_123_2","doi-asserted-by":"crossref","first-page":"47615","DOI":"10.1109\/ACCESS.2019.2909924","article-title":"A survey on blockchain: A game theoretical perspective","volume":"7","author":"Liu Ziyao","year":"2019","unstructured":"Ziyao Liu, Nguyen Cong Luong, Wenbo Wang, Dusit Niyato, Ping Wang, Ying-Chang Liang, and Dong In Kim. 2019. A survey on blockchain: A game theoretical perspective. IEEE Access 7 (2019), 47615\u201347643.","journal-title":"IEEE Access"},{"key":"e_1_3_2_124_2","first-page":"549","volume-title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security","author":"Liu Zhuotao","year":"2019","unstructured":"Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, and Yih-Chun Hu. 2019. Hyperservice: Interoperability and programmability across heterogeneous blockchains. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. ACM, 549\u2013566."},{"key":"e_1_3_2_125_2","unstructured":"Loopring. n. d. Loopring. Retrieved September 27 2019 from https:\/\/github.com\/LoopringSecondary\/protocol"},{"issue":"04","key":"e_1_3_2_126_2","doi-asserted-by":"crossref","first-page":"1850015","DOI":"10.1142\/S242486221850015X","article-title":"Blockchain: A survey on functions, applications and open issues","volume":"3","author":"Lu Yang","year":"2018","unstructured":"Yang Lu. 2018. Blockchain: A survey on functions, applications and open issues. Journal of Industrial Integration and Management 3, 04 (2018), 1850015.","journal-title":"Journal of Industrial Integration and Management"},{"key":"e_1_3_2_127_2","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/2976749.2978389","volume-title":"Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security","author":"Luu Loi","year":"2016","unstructured":"Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 17\u201330."},{"key":"e_1_3_2_128_2","article-title":"A study of encryption algorithms AES, DES and RSA for security","author":"Mahajan Prerna","year":"2013","unstructured":"Prerna Mahajan and Abhishek Sachdeva. 2013. A study of encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology (2013).","journal-title":"Global Journal of Computer Science and Technology"},{"key":"e_1_3_2_129_2","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/3133956.3134096","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Malavolta Giulio","year":"2017","unstructured":"Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and privacy with payment-channel networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 455\u2013471."},{"key":"e_1_3_2_130_2","unstructured":"Matter-labs. n. d. zkSync. Retrieved September 27 2019 from https:\/\/github.com\/matter-labs\/zksync"},{"key":"e_1_3_2_131_2","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1109\/SFFCS.1999.814584","volume-title":"40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039)","author":"Micali Silvio","year":"1999","unstructured":"Silvio Micali, Michael Rabin, and Salil Vadhan. 1999. Verifiable random functions. In 40th Annual Symposium on Foundations of Computer Science (Cat. No. 99CB37039). IEEE, 120\u2013130."},{"key":"e_1_3_2_132_2","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1109\/SP.2013.34","volume-title":"2013 IEEE Symposium on Security and Privacy","author":"Miers Ian","year":"2013","unstructured":"Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous distributed e-cash from Bitcoin. In 2013 IEEE Symposium on Security and Privacy. IEEE, 397\u2013411."},{"key":"e_1_3_2_133_2","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1109\/SP.2014.37","volume-title":"2014 IEEE Symposium on Security and Privacy","author":"Miller Andrew","year":"2014","unstructured":"Andrew Miller, Ari Juels, Elaine Shi, Bryan Parno, and Jonathan Katz. 2014. Permacoin: Repurposing Bitcoin work for data preservation. In 2014 IEEE Symposium on Security and Privacy. IEEE, 475\u2013490."},{"key":"e_1_3_2_134_2","first-page":"1","volume-title":"Proceedings of the 1st Workshop on System Software for Trusted Execution","author":"Milutinovic Mitar","year":"2016","unstructured":"Mitar Milutinovic, Warren He, Howard Wu, and Maxinder Kanwal. 2016. Proof of luck: An efficient blockchain consensus protocol. In Proceedings of the 1st Workshop on System Software for Trusted Execution. 1\u20136."},{"key":"e_1_3_2_135_2","doi-asserted-by":"crossref","unstructured":"Mingxiao Du Xiaofeng Ma Zhe Zhang Xiangwei Wang and Qijun Chen. 2017. A review on consensus algorithm of blockchain. In 2017 IEEE International Conference on Systems Man and Cybernetics (SMC\u201917). IEEE 2567\u20132572.","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_3_2_136_2","doi-asserted-by":"crossref","first-page":"601","DOI":"10.1145\/3372297.3417247","volume-title":"Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security","author":"Mirkin Michael","year":"2020","unstructured":"Michael Mirkin, Yan Ji, Jonathan Pang, Ariah Klages-Mundt, Ittay Eyal, and Ari Juels. 2020. BDoS: Blockchain denial-of-service. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. 601\u2013619."},{"key":"e_1_3_2_137_2","unstructured":"Monax. n. d. Do you know what you have agreed to? Retrieved September 27 2019 from https:\/\/monax.io\/"},{"key":"e_1_3_2_138_2","doi-asserted-by":"crossref","first-page":"745","DOI":"10.1109\/PST.2016.7906988","volume-title":"2016 14th Annual Conference on Privacy, Security and Trust (PST)","author":"Mukhopadhyay Ujan","year":"2016","unstructured":"Ujan Mukhopadhyay, Anthony Skjellum, Oluwakemi Hambolu, Jon Oakley, Lu Yu, and Richard Brooks. 2016. A brief survey of cryptocurrency systems. In 2016 14th Annual Conference on Privacy, Security and Trust (PST). IEEE, 745\u2013752."},{"key":"e_1_3_2_139_2","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_140_2","first-page":"65","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Narula Neha","year":"2018","unstructured":"Neha Narula, Willy Vasquez, and Madars Virza. 2018. \\(\\lbrace\\) zkLedger \\(\\rbrace\\) : \\(\\lbrace\\) Privacy-Preserving \\(\\rbrace\\) Auditing for Distributed Ledgers. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 65\u201380."},{"issue":"2","key":"e_1_3_2_141_2","doi-asserted-by":"crossref","first-page":"1184","DOI":"10.1109\/JIOT.2018.2812239","article-title":"Blockchain meets IoT: An architecture for scalable access management in IoT","volume":"5","author":"Novo Oscar","year":"2018","unstructured":"Oscar Novo. 2018. Blockchain meets IoT: An architecture for scalable access management in IoT. IEEE Internet of Things Journal 5, 2 (2018), 1184\u20131195.","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_142_2","unstructured":"OpenSea. n. d. OpenSea. Retrieved September 27 2019 from https:\/\/github.com\/ProjectOpenSea"},{"key":"e_1_3_2_143_2","unstructured":"Optimism. n. d. The Optimism Monorepo. Retrieved September 27 2019 from https:\/\/github.com\/ethereum-optimism\/optimism"},{"key":"e_1_3_2_144_2","doi-asserted-by":"crossref","first-page":"523","DOI":"10.1007\/978-3-319-46568-5_53","volume-title":"Europe and MENA Cooperation Advances in Information and Communication Technologies","author":"Ouaddah Aafaf","year":"2017","unstructured":"Aafaf Ouaddah, Anas Abou Elkalam, and Abdellah Ait Ouahman. 2017. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer, 523\u2013533."},{"issue":"8","key":"e_1_3_2_145_2","doi-asserted-by":"crossref","first-page":"2575","DOI":"10.3390\/s18082575","article-title":"Blockchain and IoT integration: A systematic survey","volume":"18","author":"Panarello Alfonso","year":"2018","unstructured":"Alfonso Panarello, Nachiket Tapas, Giovanni Merlino, Francesco Longo, and Antonio Puliafito. 2018. Blockchain and IoT integration: A systematic survey. Sensors 18, 8 (2018), 2575.","journal-title":"Sensors"},{"key":"e_1_3_2_146_2","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/INFOCOM48880.2022.9796862","volume-title":"IEEE INFOCOM 2022-IEEE Conference on Computer Communications","author":"Papadis Nikolaos","year":"2022","unstructured":"Nikolaos Papadis and Leandros Tassiulas. 2022. Payment channel networks: Single-hop scheduling for throughput maximization. In IEEE INFOCOM 2022-IEEE Conference on Computer Communications. IEEE, 900\u2013909."},{"key":"e_1_3_2_147_2","first-page":"643","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the blockchain protocol in asynchronous networks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 643\u2013673."},{"key":"e_1_3_2_148_2","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/3087801.3087809","volume-title":"Proceedings of the ACM Symposium on Principles of Distributed Computing","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi. 2017. FruitChains: A fair blockchain. In Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM, 315\u2013324."},{"key":"e_1_3_2_149_2","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments. Technical Report. Lightning Network. Retrieved on 1 April 2020 from https:\/\/lightning.network\/lightning-networkpaper.pdf"},{"key":"e_1_3_2_150_2","doi-asserted-by":"crossref","unstructured":"Serguei Popov. 2018. The tangle. White paper 1 3 (2018) 30.","DOI":"10.12968\/S2514-9768(23)90020-7"},{"key":"e_1_3_2_151_2","unstructured":"Huayi Qi Minghui Xu Xiuzhen Cheng and Weifeng Lyu. 2023. Latency-first smart contract: Overclock the blockchain for a while. IEEE."},{"key":"e_1_3_2_152_2","first-page":"1926","volume-title":"2020 IEEE 36th International Conference on Data Engineering (ICDE)","author":"Qi Xiaodong","year":"2020","unstructured":"Xiaodong Qi, Zhao Zhang, Cheqing Jin, and Aoying Zhou. 2020. BFT-store: Storage partition for permissioned blockchain via erasure coding. In 2020 IEEE 36th International Conference on Data Engineering (ICDE). IEEE, 1926\u20131929."},{"key":"e_1_3_2_153_2","article-title":"Trusted multi-party computation and verifiable simulations: A scalable blockchain approach","author":"Raman Ravi Kiran","year":"2018","unstructured":"Ravi Kiran Raman, Roman Vaculin, Michael Hind, Sekou L. Remy, Eleftheria K. Pissadaki, Nelson Kibichii Bore, Roozbeh Daneshvar, Biplav Srivastava, and Kush R. Varshney. 2018. Trusted multi-party computation and verifiable simulations: A scalable blockchain approach. arXiv preprint arXiv:1809.08438 (2018).","journal-title":"arXiv preprint arXiv:1809.08438"},{"key":"e_1_3_2_154_2","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1016\/j.future.2018.05.046","article-title":"On blockchain and its integration with IoT. Challenges and opportunities","volume":"88","author":"Reyna Ana","year":"2018","unstructured":"Ana Reyna, Cristian Mart\u00edn, Jaime Chen, Enrique Soler, and Manuel D\u00edaz. 2018. On blockchain and its integration with IoT. Challenges and opportunities. Future Generation Computer Systems 88 (2018), 173\u2013190.","journal-title":"Future Generation Computer Systems"},{"issue":"6","key":"e_1_3_2_155_2","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/s12599-017-0506-0","article-title":"A blockchain research framework","volume":"59","author":"Risius Marten","year":"2017","unstructured":"Marten Risius and Kai Spohrer. 2017. A blockchain research framework. Business & Information Systems Engineering 59, 6 (2017), 385\u2013409.","journal-title":"Business & Information Systems Engineering"},{"key":"e_1_3_2_156_2","first-page":"552","volume-title":"International Conference on the Theory and Application of Cryptology and Information Security","author":"Rivest Ronald L.","year":"2001","unstructured":"Ronald L. Rivest, Adi Shamir, and Yael Tauman. 2001. How to leak a secret. In International Conference on the Theory and Application of Cryptology and Information Security. Springer, 552\u2013565."},{"issue":"8","key":"e_1_3_2_157_2","doi-asserted-by":"crossref","first-page":"1961","DOI":"10.1109\/TPDS.2020.3048853","article-title":"e-PoS: Making proof-of-stake decentralized and fair","volume":"32","author":"Saad Muhammad","year":"2021","unstructured":"Muhammad Saad, Zhan Qin, Kui Ren, DaeHun Nyang, and David Mohaisen. 2021. e-PoS: Making proof-of-stake decentralized and fair. IEEE Transactions on Parallel and Distributed Systems 32, 8 (2021), 1961\u20131973.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"7","key":"e_1_3_2_158_2","doi-asserted-by":"crossref","first-page":"2117","DOI":"10.1080\/00207543.2018.1533261","article-title":"Blockchain technology and its relationships to sustainable supply chain management","volume":"57","author":"Saberi Sara","year":"2019","unstructured":"Sara Saberi, Mahtab Kouhizadeh, Joseph Sarkis, and Lejia Shen. 2019. Blockchain technology and its relationships to sustainable supply chain management. International Journal of Production Research 57, 7 (2019), 2117\u20132135.","journal-title":"International Journal of Production Research"},{"key":"e_1_3_2_159_2","first-page":"1","volume-title":"2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS)","author":"Sankar Lakshmi Siva","year":"2017","unstructured":"Lakshmi Siva Sankar, M. Sindhu, and M. Sethumadhavan. 2017. Survey of consensus protocols on blockchain applications. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS). IEEE, 1\u20135."},{"key":"e_1_3_2_160_2","doi-asserted-by":"crossref","first-page":"459","DOI":"10.1109\/SP.2014.36","volume-title":"2014 IEEE Symposium on Security and Privacy","author":"Sasson Eli Ben","year":"2014","unstructured":"Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from Bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE, 459\u2013474."},{"key":"e_1_3_2_161_2","first-page":"567","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Satija Sambhav","year":"2020","unstructured":"Sambhav Satija, Apurv Mehra, Sudheesh Singanamalla, Karan Grover, Muthian Sivathanu, Nishanth Chandran, Divya Gupta, and Satya Lokam. 2020. Blockene: A high-throughput blockchain over mobile devices. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20). 567\u2013582."},{"key":"e_1_3_2_162_2","unstructured":"David Schwartz Noah Youngs and Arthur Britto. 2014. The ripple protocol consensus algorithm. Ripple Labs Inc White Paper 5 (2014)."},{"key":"e_1_3_2_163_2","unstructured":"Shobhit Seth. n. d. Proof of Activity. Retrieved September 27 2019 from https:\/\/www.investopedia.com\/terms\/p\/proof-activity-cryptocurrency.asp"},{"issue":"9","key":"e_1_3_2_164_2","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/MCOM.2017.1700041","article-title":"DistBlockNet: A distributed blockchains-based secure SDN architecture for IoT networks","volume":"55","author":"Sharma Pradip Kumar","year":"2017","unstructured":"Pradip Kumar Sharma, Saurabh Singh, Young-Sik Jeong, and Jong Hyuk Park. 2017. DistBlockNet: A distributed blockchains-based secure SDN architecture for IoT networks. IEEE Communications Magazine 55, 9 (2017), 78\u201385.","journal-title":"IEEE Communications Magazine"},{"key":"e_1_3_2_165_2","doi-asserted-by":"crossref","first-page":"102471","DOI":"10.1016\/j.jnca.2019.102471","article-title":"Sidechain technologies in blockchain networks: An examination and state-of-the-art review","volume":"149","author":"Singh Amritraj","year":"2020","unstructured":"Amritraj Singh, Kelly Click, Reza M. Parizi, Qi Zhang, Ali Dehghantanha, and Kim-Kwang Raymond Choo. 2020. Sidechain technologies in blockchain networks: An examination and state-of-the-art review. Journal of Network and Computer Applications 149 (2020), 102471.","journal-title":"Journal of Network and Computer Applications"},{"key":"e_1_3_2_166_2","unstructured":"Ned M. Smith Rajesh Poornachandran and Vincent J. Zimmer. 2019. Methods and apparatus to facilitate blockchain-based boot tracking. US Patent 10 262 140."},{"key":"e_1_3_2_167_2","first-page":"1159","article-title":"SPECTRE: A fast and scalable cryptocurrency protocol.","volume":"2016","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A fast and scalable cryptocurrency protocol. IACR Cryptology ePrint Archive 2016 (2016), 1159.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_168_2","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/3479722.3480990","volume-title":"Proceedings of the 3rd ACM Conference on Advances in Financial Technologies","author":"Sompolinsky Yonatan","year":"2021","unstructured":"Yonatan Sompolinsky, Shai Wyborski, and Aviv Zohar. 2021. PHANTOM GHOSTDAG: A scalable generalization of Nakamoto consensus: September 2, 2021. In Proceedings of the 3rd ACM Conference on Advances in Financial Technologies. 57\u201370."},{"key":"e_1_3_2_169_2","doi-asserted-by":"crossref","first-page":"507","DOI":"10.1007\/978-3-662-47854-7_32","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Sompolinsky Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in Bitcoin. In International Conference on Financial Cryptography and Data Security. Springer, 507\u2013527."},{"key":"e_1_3_2_170_2","first-page":"37","volume-title":"2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012","author":"Sousa Jo\u00e3o","year":"2012","unstructured":"Jo\u00e3o Sousa and Alysson Neves Bessani. 2012. From Byzantine consensus to BFT state machine replication: A latency-optimal transformation. In 2012 Ninth European Dependable Computing Conference, Sibiu, Romania, May 8-11, 2012, Cristian Constantinescu and Miguel P. Correia (Eds.). IEEE Computer Society, 37\u201348. DOI:10.1109\/EDCC.2012.32"},{"key":"e_1_3_2_171_2","article-title":"Applications of game theory in vehicular networks: A survey","author":"Sun Zemin","year":"2021","unstructured":"Zemin Sun, Yanheng Liu, Jian Wang, Guofa Li, Carie Anil, Keqiang Li, Xinyu Guo, Geng Sun, Daxin Tian, and Dongpu Cao. 2021. Applications of game theory in vehicular networks: A survey. IEEE Communications Surveys & Tutorials (2021).","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_172_2","doi-asserted-by":"crossref","first-page":"444","DOI":"10.1109\/SP.2017.45","volume-title":"2017 IEEE Symposium on Security and Privacy (SP)","author":"Syta Ewa","year":"2017","unstructured":"Ewa Syta, Philipp Jovanovic, Eleftherios Kokoris Kogias, Nicolas Gailly, Linus Gasser, Ismail Khoffi, Michael J. Fischer, and Bryan Ford. 2017. Scalable bias-resistant distributed randomness. In 2017 IEEE Symposium on Security and Privacy (SP). IEEE, 444\u2013460."},{"key":"e_1_3_2_173_2","first-page":"308","volume-title":"International Conference on Soft Computing and Pattern Recognition","author":"Tavares Bruno","year":"2018","unstructured":"Bruno Tavares, Filipe Figueiredo Correia, Andr\u00e9 Restivo, Jo\u00e3o Pascoal Faria, and Ademar Aguiar. 2018. A survey of blockchain frameworks and applications. In International Conference on Soft Computing and Pattern Recognition. Springer, 308\u2013317."},{"key":"e_1_3_2_174_2","volume-title":"Tendermint Documentation","year":"2019","unstructured":"Tendermint. 2019. Tendermint Documentation. https:\/\/www.hyperledger.org\/projects\/hyperledger-burrow"},{"key":"e_1_3_2_175_2","doi-asserted-by":"crossref","first-page":"1299","DOI":"10.1109\/SP46214.2022.9833731","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"Thyagarajan Sri AravindaKrishnan","year":"2022","unstructured":"Sri AravindaKrishnan Thyagarajan, Giulio Malavolta, and Pedro Moreno-Sanchez. 2022. Universal atomic swaps: Secure exchange of coins across all blockchains. In 2022 IEEE Symposium on Security and Privacy (SP). IEEE, 1299\u20131316."},{"key":"e_1_3_2_176_2","first-page":"1","volume-title":"2016 13th International Conference on Service Systems and Service Management (ICSSSM)","author":"Tian Feng","year":"2016","unstructured":"Feng Tian. 2016. An agri-food supply chain traceability system for China based on RFID & blockchain technology. In 2016 13th International Conference on Service Systems and Service Management (ICSSSM). IEEE, 1\u20136."},{"key":"e_1_3_2_177_2","doi-asserted-by":"crossref","first-page":"713","DOI":"10.1145\/3243734.3243737","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"Tsabary Itay","year":"2018","unstructured":"Itay Tsabary and Ittay Eyal. 2018. The gap game. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 713\u2013728."},{"key":"e_1_3_2_178_2","doi-asserted-by":"crossref","first-page":"1230","DOI":"10.1109\/SP40001.2021.00080","volume-title":"2021 IEEE Symposium on Security and Privacy (SP)","author":"Tsabary Itay","year":"2021","unstructured":"Itay Tsabary, Matan Yechieli, Alex Manuskin, and Ittay Eyal. 2021. MAD-HTLC: Because HTLC is crazy-cheap to attack. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE, 1230\u20131248."},{"issue":"3","key":"e_1_3_2_179_2","doi-asserted-by":"crossref","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","article-title":"Bitcoin and beyond: A technical survey on decentralized digital currencies","volume":"18","author":"Tschorsch Florian","year":"2016","unstructured":"Florian Tschorsch and Bj\u00f6rn Scheuermann. 2016. Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys & Tutorials 18, 3 (2016), 2084\u20132123.","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"e_1_3_2_180_2","unstructured":"Wanchain. n. d. Decentralised Blockchain Interoperability. Retrieved September 27 2019 from https:\/\/www.wanchain.org\/"},{"key":"e_1_3_2_181_2","first-page":"95","volume-title":"16th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 19)","author":"Wang Jiaping","year":"2019","unstructured":"Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out blockchains with asynchronous consensus zones. In 16th \\(\\lbrace\\) USENIX \\(\\rbrace\\) Symposium on Networked Systems Design and Implementation ( \\(\\lbrace\\) NSDI \\(\\rbrace\\) 19). 95\u2013112."},{"key":"e_1_3_2_182_2","doi-asserted-by":"crossref","first-page":"22328","DOI":"10.1109\/ACCESS.2019.2896108","article-title":"A survey on consensus mechanisms and mining strategy management in blockchain networks","volume":"7","author":"Wang Wenbo","year":"2019","unstructured":"Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen, and Dong In Kim. 2019. A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7 (2019), 22328\u201322370.","journal-title":"IEEE Access"},{"issue":"10","key":"e_1_3_2_183_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3503042","article-title":"BFT in blockchains: From protocols to use cases","volume":"54","author":"Wang Xin","year":"2022","unstructured":"Xin Wang, Sisi Duan, James Clavin, and Haibin Zhang. 2022. BFT in blockchains: From protocols to use cases. ACM Computing Surveys (CSUR) 54, 10s (2022), 1\u201337.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_184_2","article-title":"Incentive mechanism design for joint resource allocation in blockchain-based federated learning","author":"Wang Zhilin","year":"2022","unstructured":"Zhilin Wang, Qin Hu, Ruinian Li, Minghui Xu, and Zehui Xiong. 2022. Incentive mechanism design for joint resource allocation in blockchain-based federated learning. arXiv preprint arXiv:2202.10938 (2022).","journal-title":"arXiv preprint arXiv:2202.10938"},{"key":"e_1_3_2_185_2","unstructured":"Bitcoin Wiki. n. d. Proof of Burn. Retrieved September 27 2019 from https:\/\/en.bitcoin.it\/wiki\/Proof_of_burn"},{"key":"e_1_3_2_186_2","unstructured":"Wikipedia. n. d. Colored Coins. Retrieved September 27 2019 from https:\/\/en.bitcoin.it\/wiki\/Colored_Coins"},{"key":"e_1_3_2_187_2","article-title":"Polkadot: Vision for a Heterogeneous Multi-chain Framework","author":"Wood Gavin","year":"2016","unstructured":"Gavin Wood. 2016. Polkadot: Vision for a Heterogeneous Multi-chain Framework. White Paper (2016).","journal-title":"White Paper"},{"key":"e_1_3_2_188_2","article-title":"A survey of distributed consensus protocols for blockchain networks","author":"Xiao Yang","year":"2019","unstructured":"Yang Xiao, Ning Zhang, Wenjing Lou, and Y. Thomas Hou. 2019. A survey of distributed consensus protocols for blockchain networks. arXiv preprint arXiv:1904.04098 (2019).","journal-title":"arXiv preprint arXiv:1904.04098"},{"key":"e_1_3_2_189_2","first-page":"3003","volume-title":"Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security","author":"Xie Tiancheng","year":"2022","unstructured":"Tiancheng Xie, Jiaheng Zhang, Zerui Cheng, Fan Zhang, Yupeng Zhang, Yongzheng Jia, Dan Boneh, and Dawn Song. 2022. ZkBridge: Trustless cross-chain bridges made practical. In Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. 3003\u20133017."},{"key":"e_1_3_2_190_2","first-page":"100088","article-title":"A trustless architecture of blockchain-enabled metaverse","author":"Xu Minghui","year":"2022","unstructured":"Minghui Xu, Yihao Guo, Qin Hu, Zehui Xiong, Dongxiao Yu, and Xiuzhen Cheng. 2022. A trustless architecture of blockchain-enabled metaverse. High-Confidence Computing (2022), 100088.","journal-title":"High-Confidence Computing"},{"key":"e_1_3_2_191_2","doi-asserted-by":"publisher","DOI":"10.1109\/TWC.2021.3078639"},{"key":"e_1_3_2_192_2","article-title":"CloudChain: A cloud blockchain using shared memory consensus and RDMA","author":"Xu Minghui","year":"2022","unstructured":"Minghui Xu, Shuo Liu, Dongxiao Yu, Xiuzhen Cheng, Shaoyong Guo, and Jiguo Yu. 2022. CloudChain: A cloud blockchain using shared memory consensus and RDMA. IEEE Trans. Comput. (2022).","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_193_2","article-title":"When quantum information technologies meet blockchain in Web 3.0","author":"Xu Minrui","year":"2023","unstructured":"Minrui Xu, Xiaoxu Ren, Dusit Niyato, Jiawen Kang, Chao Qiu, Zehui Xiong, Xiaofei Wang, and Victor C. M. Leung. 2023. When quantum information technologies meet blockchain in Web 3.0. IEEE Network (2023).","journal-title":"IEEE Network"},{"key":"e_1_3_2_194_2","first-page":"492","volume-title":"2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS)","author":"Xu Minghui","year":"2022","unstructured":"Minghui Xu, Chenxu Wang, Yifei Zou, Dongxiao Yu, Xiuzhen Cheng, and Weifeng Lyu. 2022. Curb: Trusted and scalable software-defined network control plane for edge computing. In 2022 IEEE 42nd International Conference on Distributed Computing Systems (ICDCS). IEEE, 492\u2013502."},{"key":"e_1_3_2_195_2","article-title":"BLOWN: A blockchain protocol for single-hop wireless networks under adversarial SINR","author":"Xu Minghui","year":"2022","unstructured":"Minghui Xu, Feng Zhao, Yifei Zou, Chunchi Liu, Xiuzhen Cheng, and Falko Dressler. 2022. BLOWN: A blockchain protocol for single-hop wireless networks under adversarial SINR. IEEE Transactions on Mobile Computing (2022).","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"e_1_3_2_196_2","article-title":"SPDL: A blockchain-enabled secure and privacy-preserving decentralized learning system","author":"Xu Minghui","year":"2022","unstructured":"Minghui Xu, Zongrui Zou, Ye Cheng, Qin Hu, Dongxiao Yu, and Xiuzhen Cheng. 2022. SPDL: A blockchain-enabled secure and privacy-preserving decentralized learning system. IEEE Trans. Comput. (2022).","journal-title":"IEEE Trans. Comput."},{"key":"e_1_3_2_197_2","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1109\/OJCS.2022.3188249","article-title":"Fusing blockchain and AI with metaverse: A survey","volume":"3","author":"Yang Qinglin","year":"2022","unstructured":"Qinglin Yang, Yetong Zhao, Huawei Huang, Zehui Xiong, Jiawen Kang, and Zibin Zheng. 2022. Fusing blockchain and AI with metaverse: A survey. IEEE Open Journal of the Computer Society 3 (2022), 122\u2013136.","journal-title":"IEEE Open Journal of the Computer Society"},{"key":"e_1_3_2_198_2","doi-asserted-by":"crossref","first-page":"3465","DOI":"10.1109\/TIFS.2022.3209546","article-title":"Bool network: An open, distributed, secure cross-chain notary platform","volume":"17","author":"Yin Zeyuan","year":"2022","unstructured":"Zeyuan Yin, Bingsheng Zhang, Jingzhong Xu, Kaiyu Lu, and Kui Ren. 2022. Bool network: An open, distributed, secure cross-chain notary platform. IEEE Transactions on Information Forensics and Security 17 (2022), 3465\u20133478.","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"e_1_3_2_199_2","first-page":"90","volume-title":"2020 IEEE Symposium on Security and Privacy (SP)","author":"Yu Haifeng","year":"2020","unstructured":"Haifeng Yu, Ivica Nikoli\u0107, Ruomu Hou, and Prateek Saxena. 2020. OHIE: Blockchain scaling made simple. In 2020 IEEE Symposium on Security and Privacy (SP). IEEE, 90\u2013105."},{"key":"e_1_3_2_200_2","first-page":"1010","volume-title":"2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS)","author":"Yu Zhaoyang","year":"2018","unstructured":"Zhaoyang Yu, XiaoGuang Liu, and Gang Wang. 2018. A survey of consensus and incentive mechanism in blockchain derived from P2P. In 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS). IEEE, 1010\u20131015."},{"key":"e_1_3_2_201_2","doi-asserted-by":"crossref","first-page":"931","DOI":"10.1145\/3243734.3243853","volume-title":"Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security","author":"Zamani Mahdi","year":"2018","unstructured":"Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: Scaling blockchain via full sharding. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. ACM, 931\u2013948."},{"key":"e_1_3_2_202_2","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/SP.2019.00085","volume-title":"2019 IEEE Symposium on Security and Privacy (SP)","author":"Zamyatin Alexei","year":"2019","unstructured":"Alexei Zamyatin, Dominik Harz, Joshua Lind, Panayiotis Panayiotou, Arthur Gervais, and William Knottenbelt. 2019. XCLAIM: Trustless, interoperable, cryptocurrency-backed assets. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 193\u2013210."},{"key":"e_1_3_2_203_2","first-page":"1337","volume-title":"ICDCS","author":"Zhang Kaiwen","year":"2018","unstructured":"Kaiwen Zhang and Hans-Arno Jacobsen. 2018. Towards dependable, scalable, and pervasive distributed ledgers with blockchains. In ICDCS. 1337\u20131346."},{"key":"e_1_3_2_204_2","doi-asserted-by":"crossref","first-page":"1847","DOI":"10.1109\/ICDE51399.2021.00165","volume-title":"2021 IEEE 37th International Conference on Data Engineering (ICDE)","author":"Zheng Peilin","year":"2021","unstructured":"Peilin Zheng, Quanqing Xu, Zibin Zheng, Zhiyuan Zhou, Ying Yan, and Hui Zhang. 2021. Meepo: Sharded consortium blockchain. In 2021 IEEE 37th International Conference on Data Engineering (ICDE). IEEE, 1847\u20131852."},{"key":"e_1_3_2_205_2","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1109\/BigDataCongress.2017.85","volume-title":"2017 IEEE International Congress on Big Data (BigData Congress)","author":"Zheng Zibin","year":"2017","unstructured":"Zibin Zheng, Shaoan Xie, Hongning Dai, Xiangping Chen, and Huaimin Wang. 2017. An overview of blockchain technology: Architecture, consensus, and future trends. In 2017 IEEE International Congress on Big Data (BigData Congress). IEEE, 557\u2013564."},{"issue":"4","key":"e_1_3_2_206_2","doi-asserted-by":"crossref","first-page":"352","DOI":"10.1504\/IJWGS.2018.095647","article-title":"Blockchain challenges and opportunities: A survey","volume":"14","author":"Zheng Zibin","year":"2018","unstructured":"Zibin Zheng, Shaoan Xie, Hong-Ning Dai, Xiangping Chen, and Huaimin Wang. 2018. Blockchain challenges and opportunities: A survey. International Journal of Web and Grid Services 14, 4 (2018), 352\u2013375.","journal-title":"International Journal of Web and Grid Services"},{"key":"e_1_3_2_207_2","unstructured":"zkSync. n. d. zkEVM FAQ. Retrieved September 27 2019 from https:\/\/docs.zksync.io\/zkevm\/#general"},{"key":"e_1_3_2_208_2","article-title":"A fast consensus for permissioned wireless blockchains","author":"Zou Yifei","year":"2021","unstructured":"Yifei Zou, Minghui Xu, Jiguo Yu, Feng Zhao, and Xiuzhen Cheng. 2021. A fast consensus for permissioned wireless blockchains. IEEE Internet of Things Journal (2021).","journal-title":"IEEE Internet of Things Journal"},{"key":"e_1_3_2_209_2","first-page":"113","volume-title":"Proceedings of the 2nd ACM Conference on Advances in Financial Technologies","author":"Zur Roi Bar","year":"2020","unstructured":"Roi Bar Zur, Ittay Eyal, and Aviv Tamar. 2020. Efficient MDP analysis for selfish-mining in blockchains. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. 113\u2013131."},{"key":"e_1_3_2_210_2","doi-asserted-by":"crossref","unstructured":"Guy Zyskind and Oz Nathan. 2015. Decentralizing privacy: Using blockchain to protect personal data. In 2015 IEEE Security and Privacy Workshops. IEEE 180\u2013184.","DOI":"10.1109\/SPW.2015.27"},{"key":"e_1_3_2_211_2","doi-asserted-by":"crossref","unstructured":"Steven J. J. Tedjamulia Douglas L. Dean David R. Olsen and Conan C. Albrecht. 2005. Motivating content contributions to online communities: Toward a more comprehensive theory. In Proceedings of the 38th Annual Hawaii International Conference on System Sciences. IEEE 193b\u2013193b.","DOI":"10.1109\/HICSS.2005.444"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3657288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:39Z","timestamp":1750295859000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3657288"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,8]]},"references-count":210,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2024,10,31]]}},"alternative-id":["10.1145\/3657288"],"URL":"https:\/\/doi.org\/10.1145\/3657288","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,5,8]]},"assertion":[{"value":"2023-04-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-06","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-05-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}