{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T17:59:32Z","timestamp":1773511172910,"version":"3.50.1"},"reference-count":57,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T00:00:00Z","timestamp":1717632000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Key Research and Development Project of China","award":["2023YFB2704900"],"award-info":[{"award-number":["2023YFB2704900"]}]},{"name":"Shanghai Committee of Science and Technology, China","award":["21511104600, 20DZ2221800"],"award-info":[{"award-number":["21511104600, 20DZ2221800"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["U2268202"],"award-info":[{"award-number":["U2268202"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Nanjing Turing AI Institute"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Storage"],"published-print":{"date-parts":[[2024,8,31]]},"abstract":"<jats:p>\n            Authenticated storage access is the performance bottleneck of a blockchain, because each access can be amplified to potentially\n            <jats:italic>O<\/jats:italic>\n            (log\n            <jats:italic>n<\/jats:italic>\n            ) disk I\/O operations in the standard Merkle Patricia Trie (MPT) storage structure. In this article, we propose a multi-Layer Versioned Multipoint Trie (LVMT), a novel high-performance blockchain storage with significantly reduced I\/O amplifications. LVMT uses the authenticated multipoint evaluation tree vector commitment protocol to update commitment proofs in constant time. LVMT adopts a multi-layer design to support unlimited key\u2013value pairs and stores version numbers instead of value hashes to avoid costly elliptic curve multiplication operations. In our experiment, LVMT outperforms the MPT in real Ethereum traces, delivering read and write operations 6\u00d7 faster. It also boosts blockchain system execution throughput by up to 2.7\u00d7.\n          <\/jats:p>","DOI":"10.1145\/3664818","type":"journal-article","created":{"date-parts":[[2024,5,16]],"date-time":"2024-05-16T11:25:17Z","timestamp":1715858717000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["LVMT: An Efficient Authenticated Storage for Blockchain"],"prefix":"10.1145","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-3519-5775","authenticated-orcid":false,"given":"Chenxing","family":"Li","sequence":"first","affiliation":[{"name":"Shanghai TreeGraph Blockchain Research Institute, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6526-9295","authenticated-orcid":false,"given":"Sidi Mohamed","family":"Beillahi","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4916-3551","authenticated-orcid":false,"given":"Guang","family":"Yang","sequence":"additional","affiliation":[{"name":"Shanghai TreeGraph Blockchain Research Institute, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6663-4861","authenticated-orcid":false,"given":"Ming","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai TreeGraph Blockchain Research Institute, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9271-0223","authenticated-orcid":false,"given":"Wei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7973-1188","authenticated-orcid":false,"given":"Fan","family":"Long","sequence":"additional","affiliation":[{"name":"University of Toronto, Toronto, Canada and Shanghai TreeGraph Blockchain Research Institute, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2024,6,6]]},"reference":[{"key":"e_1_3_3_2_2","unstructured":"0xngmi. 2023. DefiLlama\u2014DeFi Dashboard. Retrieved from https:\/\/defillama.com"},{"key":"e_1_3_3_3_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_3_4_2","first-page":"257","volume-title":"Proceedings of the International Conference on Security in Communication Networks","author":"Barreto Paulo S. L. M.","year":"2002","unstructured":"Paulo S. L. M. Barreto, Ben Lynn, and Michael Scott. 2002. Constructing elliptic curves with prescribed embedding degrees. In Proceedings of the International Conference on Security in Communication Networks. Springer, 257\u2013267."},{"key":"e_1_3_3_5_2","first-page":"319","volume-title":"Proceedings of the International Workshop on Selected Areas in Cryptography","author":"Barreto Paulo S. L. M.","year":"2005","unstructured":"Paulo S. L. M. Barreto and Michael Naehrig. 2005. Pairing-friendly elliptic curves of prime order. In Proceedings of the International Workshop on Selected Areas in Cryptography. Springer, 319\u2013331."},{"key":"e_1_3_3_6_2","first-page":"781","volume-title":"Proceedings of the 23rd USENIX Security Symposium","author":"Ben-Sasson Eli","year":"2014","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von neumann architecture. In Proceedings of the 23rd USENIX Security Symposium. 781\u2013796."},{"key":"e_1_3_3_7_2","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"e_1_3_3_8_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_20"},{"key":"e_1_3_3_9_2","unstructured":"Sean Bowe. 2017. BLS12-381: New zk-SNARK Elliptic Curve Construction. Retrieved from https:\/\/z.cash\/blog\/new-snark-curve"},{"key":"e_1_3_3_10_2","first-page":"64","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Bowe Sean","year":"2018","unstructured":"Sean Bowe, Ariel Gabizon, and Matthew D. Green. 2018. A multi-party protocol for constructing the public parameters of the Pinocchio zk-SNARK. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 64\u201377."},{"key":"e_1_3_3_11_2","unstructured":"Sean Bowe Ariel Gabizon and Ian Miers. 2017. Scalable multi-party computation for zk-SNARK parameters in the random beacon model. IACR Cryptol. ePrint Arch. (2017) 1050. http:\/\/eprint.iacr.org\/2017\/1050"},{"key":"e_1_3_3_12_2","unstructured":"Vitalik Buterin. 2023. Ethereum Whitepaper. Retrieved from https:\/\/ethereum.org\/en\/whitepaper\/"},{"key":"e_1_3_3_13_2","unstructured":"Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. CoRR abs\/1710.09437 (2017). arXiv:1710.09437 http:\/\/arxiv.org\/abs\/1710.09437"},{"key":"e_1_3_3_14_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_5"},{"key":"e_1_3_3_15_2","unstructured":"Chenxing Li and Sidi Mohamed Beillahi and Guang Yang and Ming Wu and Wei Xu and Fan Long. 2023. Authenticated Storage Benchmarks. Retrieved from https:\/\/github.com\/ChenxingLi\/authenticated-storage-benchmarks"},{"key":"e_1_3_3_16_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC54727.2022.9805484"},{"key":"e_1_3_3_17_2","unstructured":"Conflux Network. 2023. Conflux Rust for Authenticated Storage Benchmarks. Retrieved from https:\/\/github.com\/Conflux-Chain\/conflux-rust\/tree\/asb-e2e"},{"key":"e_1_3_3_18_2","unstructured":"Arkworks contributors. 2022. arkworks zkSNARK Ecosystem. Retrieved from https:\/\/arkworks.rs"},{"key":"e_1_3_3_19_2","unstructured":"Ethereum. 2023. Merkle Patricia Tree. Retrieved from https:\/\/ethereum.org\/en\/developers\/docs\/data-structures-and-encoding\/patricia-merkle-trie\/"},{"key":"e_1_3_3_20_2","unstructured":"Ethereum. 2023. Zero-Knowledge Rollups. Retrieved from https:\/\/ethereum.org\/en\/developers\/docs\/scaling\/zk-rollups\/"},{"key":"e_1_3_3_21_2","unstructured":"Etherscanners. 2023. ERC-20 Top Tokens. Retrieved from https:\/\/etherscan.io\/tokens"},{"key":"e_1_3_3_22_2","unstructured":"Etherscanners. 2023. Ethereum Gas Tracker. Retrieved from https:\/\/etherscan.io\/gastracker"},{"key":"e_1_3_3_23_2","first-page":"45","volume-title":"Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. 45\u201359."},{"key":"e_1_3_3_24_2","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_3_25_2","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417244"},{"key":"e_1_3_3_26_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96878-0_24"},{"key":"e_1_3_3_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421283"},{"key":"e_1_3_3_28_2","unstructured":"Koh Wei Jie. 2021. Perpetual Powers of Tau. Retrieved from https:\/\/github.com\/weijiekoh\/perpetualpowersoftau"},{"key":"e_1_3_3_29_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17373-8_11"},{"key":"e_1_3_3_30_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_3_31_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_19"},{"key":"e_1_3_3_32_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_3_33_2","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385982"},{"key":"e_1_3_3_34_2","volume-title":"Proceedings of the USENIX Annul Technical Conference","author":"Li Chenxing","year":"2020","unstructured":"Chenxing Li, Peilun Li, Dong Zhou, Zhe Yang, Ming Wu, Wei Xu, Fan Long, and Andrew Yao. 2020. A decentralized blockchain with high throughput and fast confirmation. In Proceedings of the USENIX Annul Technical Conference. USENIX."},{"key":"e_1_3_3_35_2","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_3_3_36_2","first-page":"1","article-title":"The stellar consensus protocol: A federated model for internet-level consensus","volume":"32","author":"Mazieres David","year":"2015","unstructured":"David Mazieres. 2015. The stellar consensus protocol: A federated model for internet-level consensus. Stellar Dev. Found. 32 (2015), 1\u201345.","journal-title":"Stellar Dev. Found."},{"key":"e_1_3_3_37_2","unstructured":"Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. Retrieved from http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_3_38_2","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354237"},{"key":"e_1_3_3_39_2","doi-asserted-by":"publisher","DOI":"10.5555\/3489212.3489329"},{"key":"e_1_3_3_40_2","unstructured":"Parity Technologies. 2020. Crate kvdb. Retrieved from https:\/\/docs.rs\/kvdb\/0.4.0\/kvdb\/"},{"key":"e_1_3_3_41_2","first-page":"333","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC \u201921)","author":"Ponnapalli Soujanya","year":"2021","unstructured":"Soujanya Ponnapalli, Aashaka Shah, Souvik Banerjee, Dahlia Malkhi, Amy Tai, Vijay Chidambaram, and Michael Wei. 2021. RainBlock: Faster transaction processing in public blockchains. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC \u201921). 333\u2013347."},{"key":"e_1_3_3_42_2","unstructured":"Ponnapalli Soujanya and Shah Aashaka and Banerjee Souvik and Malkhi Dahlia and Tai Amy and Chidambaram Vijay and Wei Michael. 2023. RainBlock Protocol. Retrieved from https:\/\/github.com\/RainBlock\/rainblock-protocol"},{"key":"e_1_3_3_43_2","unstructured":"Ethereum Improvement Proposals. 2015. EIP-20: Token Standard. Retrieved from https:\/\/eips.ethereum.org\/EIPS\/eip-20"},{"key":"e_1_3_3_44_2","volume-title":"Proceedings of the 10th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage \u201918)","author":"Raju Pandian","year":"2018","unstructured":"Pandian Raju, Soujanya Ponnapalli, Evan Kaminsky, Gilad Oved, Zachary Keener, Vijay Chidambaram, and Ittai Abraham. 2018. mLSM: Making authenticated storage faster in ethereum. In Proceedings of the 10th USENIX Workshop on Hot Topics in Storage and File Systems (HotStorage \u201918), Ashvin Goel and Nisha Talagala (Eds.). USENIX Association."},{"key":"e_1_3_3_45_2","first-page":"10","volume-title":"Proceedings of the 10th USENIX Workshop on Hot Topics in Storage and File Systems","author":"Raju Pandian","year":"2018","unstructured":"Pandian Raju, Soujanya Ponnapalli, Evan Kaminsky, Gilad Oved, Zachary Keener, Vijay Chidambaram, and Ittai Abraham. 2018. mLSM: Making authenticated storage faster in ethereum. In Proceedings of the 10th USENIX Workshop on Hot Topics in Storage and File Systems. 10."},{"key":"e_1_3_3_46_2","doi-asserted-by":"publisher","unstructured":"Yonatan Sompolinsky Shai Wyborski and Aviv Zohar. 2021. PHANTOM GHOSTDAG: A scalable generalization of nakamoto consensus. In 3rd ACM Conference on Advances in Financial Technologies (AFT\u201921) Foteini Baldimtsi and Tim Roughgarden (Eds.). Arlington Virginia ACM 57\u201370. 10.1145\/3479722.3480990","DOI":"10.1145\/3479722.3480990"},{"key":"e_1_3_3_47_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_3_48_2","first-page":"3001","volume-title":"Proceedings of the 31st USENIX Security Symposium (USENIX Security \u201922)","author":"Srinivasan Shravan","year":"2022","unstructured":"Shravan Srinivasan, Alexander Chepurnoy, Charalampos Papamanthou, Alin Tomescu, and Yupeng Zhang. 2022. Hyperproofs: Aggregating and maintaining proofs in vector commitments. In Proceedings of the 31st USENIX Security Symposium (USENIX Security \u201922). 3001\u20133018."},{"key":"e_1_3_3_49_2","unstructured":"Facebook Database Engineering Team. 2022. RocksDB: A Persistent Key-Value Store for Flash and RAM Storage. Retrieved from https:\/\/rocksdb.org."},{"key":"e_1_3_3_50_2","unstructured":"Parity Technologies. 2019. OpenEthereum. Retrieved from https:\/\/www.parity.io\/ethereum\/"},{"key":"e_1_3_3_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-57990-6_3"},{"key":"e_1_3_3_52_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00059"},{"key":"e_1_3_3_53_2","unstructured":"Uniswap Labs. 2023. Peripheral Smart Contracts for Interacting with Uniswap V2. Retrieved from https:\/\/github.com\/Uniswap\/v2-periphery"},{"key":"e_1_3_3_54_2","unstructured":"Uniswap Labs. 2023. Uniswap Protocol. Retrieved from https:\/\/uniswap.org\/"},{"key":"e_1_3_3_55_2","first-page":"95","volume-title":"Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation","author":"Wang Jiaping","year":"2019","unstructured":"Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out blockchains with asynchronous consensus zones. In Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation. 95\u2013112."},{"key":"e_1_3_3_56_2","doi-asserted-by":"publisher","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"e_1_3_3_57_2","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00008"},{"key":"e_1_3_3_58_2","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"}],"container-title":["ACM Transactions on Storage"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664818","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3664818","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:17:29Z","timestamp":1750295849000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3664818"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,6,6]]},"references-count":57,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,8,31]]}},"alternative-id":["10.1145\/3664818"],"URL":"https:\/\/doi.org\/10.1145\/3664818","relation":{},"ISSN":["1553-3077","1553-3093"],"issn-type":[{"value":"1553-3077","type":"print"},{"value":"1553-3093","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,6,6]]},"assertion":[{"value":"2023-11-11","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-06-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}