{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:17:20Z","timestamp":1766441840553,"version":"3.48.0"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","funder":[{"name":"Guangzhou-HKUST(GZ) Joint Funding Program","award":["2024A03J0630, 2025A03J3882"],"award-info":[{"award-number":["2024A03J0630, 2025A03J3882"]}]},{"name":"Guangzhou Municipal Science and Technology Project","award":["2025A04J4168"],"award-info":[{"award-number":["2025A04J4168"]}]},{"name":"Stellar Development Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,11,19]]},"DOI":"10.1145\/3719027.3765220","type":"proceedings-article","created":{"date-parts":[[2025,11,22]],"date-time":"2025-11-22T23:32:38Z","timestamp":1763854358000},"page":"3780-3794","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Optimistic, Signature-Free Reliable Broadcast and Its Applications"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0110-5571","authenticated-orcid":false,"given":"Nibesh","family":"Shrestha","sequence":"first","affiliation":[{"name":"Supra Research, Rochester, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7910-8027","authenticated-orcid":false,"given":"Qianyu","family":"Yu","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2246-8416","authenticated-orcid":false,"given":"Aniket","family":"Kate","sequence":"additional","affiliation":[{"name":"Purdue University \/ Supra Research, West Lafayette, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2341-7928","authenticated-orcid":false,"given":"Giuliano","family":"Losa","sequence":"additional","affiliation":[{"name":"Stellar Development Foundation, San Francisco, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5675-263X","authenticated-orcid":false,"given":"Kartik","family":"Nayak","sequence":"additional","affiliation":[{"name":"Duke University, Durham, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6918-2699","authenticated-orcid":false,"given":"Xuechao","family":"Wang","sequence":"additional","affiliation":[{"name":"The Hong Kong University of Science and Technology (Guangzhou), Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2025,11,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467899"},{"key":"e_1_3_2_1_2_1","volume-title":"25th International Conference on Principles of Distributed Systems","author":"Abraham Ittai","year":"2022","unstructured":"Ittai Abraham, Ling Ren, and Zhuolun Xiang. Good-case and bad-case latency of unauthenticated byzantine broadcast: A complete categorization. In 25th International Conference on Principles of Distributed Systems, 2022."},{"key":"e_1_3_2_1_3_1","volume-title":"Asynchronous verifiable information dispersal with near-optimal communication. Cryptology ePrint Archive","author":"Alhaddad Nicolas","year":"2022","unstructured":"Nicolas Alhaddad, Sourav Das, Sisi Duan, Ling Ren, Mayank Varia, Zhuolun Xiang, and Haibin Zhang. Asynchronous verifiable information dispersal with near-optimal communication. Cryptology ePrint Archive, 2022."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519270.3538475"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_25"},{"key":"e_1_3_2_1_6_1","volume-title":"Shoal: High throughput dag bft can be fast! arXiv preprint 2405.20488","author":"Aurn Balaji","year":"2024","unstructured":"Balaji Aurn, Zekun Li, Florian Suri-Payer, Das Sourva, and Alexander Spiegelman. Shoal: High throughput dag bft can be fast! arXiv preprint 2405.20488, 2024."},{"key":"e_1_3_2_1_7_1","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Babel Kushal","year":"2025","unstructured":"Kushal Babel, Andrey Chursin, George Danezis, Lefteris Kokoris-Kogias, and Alberto Sonnino. Mysticeti: Low-latency dag consensus with fast commit path. In Network and Distributed System Security Symposium (NDSS), 2025 (To appear)."},{"key":"e_1_3_2_1_8_1","first-page":"9","article-title":"The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Swirlds Tech Reports SWIRLDS-TR-2016-01","volume":"34","author":"Baird Leemon","year":"2016","unstructured":"Leemon Baird. The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Swirlds Tech Reports SWIRLDS-TR-2016-01, Tech. Rep, 34:9-11, 2016.","journal-title":"Tech. Rep"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586124"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2005.9"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167105"},{"key":"e_1_3_2_1_13_1","first-page":"173","volume-title":"OSDI, number 1999 in 99","author":"Castro Miguel","year":"1999","unstructured":"Miguel Castro, Barbara Liskov, et al. Practical byzantine fault tolerance. In OSDI, number 1999 in 99, pages 173-186, 1999."},{"key":"e_1_3_2_1_14_1","volume-title":"Jumbo: Fully asynchronous bft consensus made truly scalable. arXiv preprint arXiv:2403.11238","author":"Cheng Hao","year":"2024","unstructured":"Hao Cheng, Yuan Lu, Zhenliang Lu, Qiang Tang, Yuxuan Zhang, and Zhenfeng Zhang. Jumbo: Fully asynchronous bft consensus made truly scalable. arXiv preprint arXiv:2403.11238, 2024."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629602"},{"key":"e_1_3_2_1_16_1","volume-title":"Blockmania: from block dags to consensus. arXiv preprint arXiv:1809.01620","author":"Danezis George","year":"2018","unstructured":"George Danezis and David Hrycyszyn. Blockmania: from block dags to consensus. arXiv preprint arXiv:1809.01620, 2018."},{"key":"e_1_3_2_1_17_1","volume-title":"Asynchronous consensus without trusted setup or public-key cryptography. Cryptology ePrint Archive","author":"Das Sourav","year":"2024","unstructured":"Sourav Das, Sisi Duan, Shengqi Liu, Atsuki Momose, Ling Ren, and Victor Shoup. Asynchronous consensus without trusted setup or public-key cryptography. Cryptology ePrint Archive, 2024."},{"key":"e_1_3_2_1_18_1","first-page":"5359","volume-title":"32nd USENIX Security Symposium (USENIX Security 23)","author":"Das Sourav","year":"2023","unstructured":"Sourav Das, Zhuolun Xiang, Lefteris Kokoris-Kogias, and Ling Ren. Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling. In 32nd USENIX Security Symposium (USENIX Security 23), pages 5359-5376, 2023."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484808"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00046"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"e_1_3_2_1_22_1","volume-title":"International Conference on Dependable Systems and Networks (DSN)","author":"Doidge Isaac","year":"2024","unstructured":"Isaac Doidge, Raghavendra Ramesh, Nibesh Shrestha, and Joshua Tobkin. Moonshot: Optimizing chain-based rotating leader bft via optimistic proposals. In International Conference on Dependable Systems and Networks (DSN), 2024."},{"key":"e_1_3_2_1_23_1","volume-title":"Consensus in the presence of partial synchrony. Journal of the ACM (JACM), 35(2):288-323","author":"Dwork Cynthia","year":"1988","unstructured":"Cynthia Dwork, Nancy Lynch, and Larry Stockmeyer. Consensus in the presence of partial synchrony. Journal of the ACM (JACM), 35(2):288-323, 1988."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355467"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0129626416500171"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467905"},{"key":"e_1_3_2_1_29_1","volume-title":"37th International Symposium on Distributed Computing (DISC 2023","author":"Keidar Idit","year":"2023","unstructured":"Idit Keidar, Oded Naor, Ouri Poupko, and Ehud Shapiro. Cordial miners: Fast and efficient consensus for every eventuality. In 37th International Symposium on Distributed Computing (DISC 2023). Schloss-Dagstuhl-Leibniz Zentrum f\u00fcr Informatik, 2023."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294267"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2002.1180196"},{"key":"e_1_3_2_1_32_1","volume-title":"Specifying Systems: The TLA, Language, and Tools, for Hardware, and Software Engineers","author":"Lamport Leslie","year":"2002","unstructured":"Leslie Lamport. Specifying Systems: The TLA, Language, and Tools, for Hardware, and Software Engineers. Addison-Wesley Longman Publishing Co., Inc., USA, July 2002."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03466-4_2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584684.3597265"},{"key":"e_1_3_2_1_35_1","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Malkhi Dahlia","year":"2024","unstructured":"Dahlia Malkhi, Chrysoula Stathakopoulou, and Maofan Yin. Bbca-chain: One-message, low latency bft consensus on a dag. In International Conference on Financial Cryptography and Data Security, 2024."},{"key":"e_1_3_2_1_36_1","first-page":"369","volume-title":"Conference on the theory and application of cryptographic techniques","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques, pages 369-378. Springer, 1987."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_1_38_1","volume-title":"Transition to post-quantum cryptography standards. Technical report","author":"Moody Dustin","year":"2024","unstructured":"Dustin Moody, Ray Perlner, Andrew Regenscheid, Angela Robinson, and David Cooper. Transition to post-quantum cryptography standards. Technical report, National Institute of Standards and Technology, 2024."},{"volume-title":"Google cloud platform - general-purpose machine family for compute engine. Online","year":"2025","key":"e_1_3_2_1_39_1","unstructured":"[n.d.]. Google cloud platform - general-purpose machine family for compute engine. Online; accessed 06-April-2025."},{"key":"e_1_3_2_1_40_1","unstructured":"[n.d.]. Pricing| Compute Engine | Virtual Machines (VMs) | Google Cloud. https:\/\/cloud.google.com\/compute\/all-pricing?hl=en."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_1"},{"key":"e_1_3_2_1_42_1","first-page":"129","volume-title":"Annual international cryptology conference","author":"Pedersen Torben Pryds","year":"1991","unstructured":"Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Annual international cryptology conference, pages 129-140. Springer, 1991."},{"key":"e_1_3_2_1_43_1","volume-title":"Starfish: A high throughput bft protocol on uncertified dag with linear amortized communication complexity. Cryptology ePrint Archive","author":"Polyanskii Nikita","year":"2025","unstructured":"Nikita Polyanskii, Sebastian Mueller, and Ilya Vorobyev. Starfish: A high throughput bft protocol on uncertified dag with linear amortized communication complexity. Cryptology ePrint Archive, 2025."},{"key":"e_1_3_2_1_44_1","volume-title":"Polynomial codes over certain finite fields. Journal of the society for industrial and applied mathematics, 8(2):300-304","author":"Reed Irving S","year":"1960","unstructured":"Irving S Reed and Gustave Solomon. Polynomial codes over certain finite fields. Journal of the society for industrial and applied mathematics, 8(2):300-304, 1960."},{"key":"e_1_3_2_1_45_1","volume-title":"Bullshark github repository. https:\/\/github.com\/facebookresearch\/narwhal\/tree\/bullshark. [Online","author":"Research Facebook","year":"2025","unstructured":"Facebook Research. Bullshark github repository. https:\/\/github.com\/facebookresearch\/narwhal\/tree\/bullshark. [Online; accessed 05-March-2025]."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3623080"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-024-09505-6"},{"key":"e_1_3_2_1_48_1","volume-title":"Sailfish github repository. https:\/\/github.com\/nibeshrestha\/sailfish. [Online","author":"Shrestha Nibesh","year":"2025","unstructured":"Nibesh Shrestha. Sailfish github repository. https:\/\/github.com\/nibeshrestha\/sailfish. [Online; accessed 02-March-2025]."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417284"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP61157.2025.00021"},{"key":"e_1_3_2_1_51_1","volume-title":"signature-free reliable broadcast and its applications. arXiv preprint arXiv:2505.02761","author":"Shrestha Nibesh","year":"2025","unstructured":"Nibesh Shrestha, Qianyu Yu, Aniket Kate, Giuliano Losa, Kartik Nayak, and Xuechao Wang. Optimistic, signature-free reliable broadcast and its applications. arXiv preprint arXiv:2505.02761, 2025."},{"key":"e_1_3_2_1_52_1","volume-title":"International Conference on Financial Cryptography and Data Security","author":"Spiegelman Alexander","year":"2024","unstructured":"Alexander Spiegelman, Balaji Aurn, Rati Gelashvili, and Zekun Li. Shoal: Improving dag-bft latency and robustness. In International Conference on Financial Cryptography and Data Security, 2024."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559361"},{"key":"e_1_3_2_1_54_1","volume-title":"Bullshark: The partially synchronous version. arXiv preprint arXiv:2209.05633","author":"Spiegelman Alexander","year":"2022","unstructured":"Alexander Spiegelman, Neil Giridharan, Alberto Sonnino, and Lefteris Kokoris-Kogias. Bullshark: The partially synchronous version. arXiv preprint arXiv:2209.05633, 2022."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616612"},{"key":"e_1_3_2_1_56_1","first-page":"493","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Yang Lei","year":"2022","unstructured":"Lei Yang, Seo Jin Park, Mohammad Alizadeh, Sreeram Kannan, and David Tse. DispersedLedger: High-Throughput byzantine consensus on variable bandwidth networks. In 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pages 493-512, 2022."},{"key":"e_1_3_2_1_57_1","volume-title":"Opt-sailfish-failure github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFSailfishFault. [Online","author":"Yu Qianyu","year":"2025","unstructured":"Qianyu Yu. Opt-sailfish-failure github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFSailfishFault. [Online; accessed 28-August-2025]."},{"key":"e_1_3_2_1_58_1","volume-title":"Sailfish-failure github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SailfishFault. [Online","author":"Yu Qianyu","year":"2025","unstructured":"Qianyu Yu. Sailfish-failure github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SailfishFault. [Online; accessed 28-August-2025]."},{"key":"e_1_3_2_1_59_1","volume-title":"Sf-bullshark-failure github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFBullsharkFault. [Online","author":"Yu Qianyu","year":"2025","unstructured":"Qianyu Yu. Sf-bullshark-failure github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFBullsharkFault. [Online; accessed 28-August-2025]."},{"key":"e_1_3_2_1_60_1","volume-title":"Sf-bullshark github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFBullshark. [Online","author":"Yu Qianyu","year":"2025","unstructured":"Qianyu Yu. Sf-bullshark github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFBullshark. [Online; accessed 28-August-2025]."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3662158.3662783"},{"key":"e_1_3_2_1_62_1","volume-title":"Bracha-sailfish github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFSailfish. [Online","author":"Yu Qianyu","year":"2025","unstructured":"Qianyu Yu and Nibesh Shrestha. Bracha-sailfish github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/SFSailfish. [Online; accessed 28-August-2025]."},{"key":"e_1_3_2_1_63_1","volume-title":"Opt-sailfish github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/OptSFSailfish. [Online","author":"Yu Qianyu","year":"2025","unstructured":"Qianyu Yu and Nibesh Shrestha. Opt-sailfish github repository. https:\/\/github.com\/qyu100\/SFSailfish\/tree\/OptSFSailfish. [Online; accessed 28-August-2025]."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48153-2_6"}],"event":{"name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"CCS '25"},"container-title":["Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3719027.3765220","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,22]],"date-time":"2025-12-22T22:14:13Z","timestamp":1766441653000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3719027.3765220"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,19]]},"references-count":64,"alternative-id":["10.1145\/3719027.3765220","10.1145\/3719027"],"URL":"https:\/\/doi.org\/10.1145\/3719027.3765220","relation":{},"subject":[],"published":{"date-parts":[[2025,11,19]]},"assertion":[{"value":"2025-11-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}