{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:12:55Z","timestamp":1750219975844,"version":"3.41.0"},"reference-count":73,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2023,3,14]],"date-time":"2023-03-14T00:00:00Z","timestamp":1678752000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"FCT, Funda\u00e7\u00e3o para a Ci\u00eancia e a Tecnologia","award":["UIDB\/50021\/2020 and SFRH\/BD\/130017\/2017"],"award-info":[{"award-number":["UIDB\/50021\/2020 and SFRH\/BD\/130017\/2017"]}]},{"name":"European Union\u2019s Horizon 2020 - The EU Framework Programme for Research and Innovation","award":["952226"],"award-info":[{"award-number":["952226"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Distrib. Ledger Technol."],"published-print":{"date-parts":[[2023,9,30]]},"abstract":"<jats:p>Nakamoto\u2019s seminal work gave rise to permissionless blockchains, as well as a wide range of proposals to mitigate their performance shortcomings. Despite substantial throughput and energy efficiency achievements, most proposals only bring modest (or marginal) gains in transaction commit latency. Consequently, commit latencies in today\u2019s permissionless blockchain landscape remain prohibitively high.<\/jats:p>\n          <jats:p>\n            This article proposes NimbleChain, a novel algorithm that extends permissionless blockchains based on Nakamoto consensus with a fast path that delivers\n            <jats:italic>causal promises of commitment<\/jats:italic>\n            or simply\n            <jats:italic>promises<\/jats:italic>\n            . Since promises only partially order transactions, their latency is only a small fraction of the totally ordered commitment latency of Nakamoto consensus. Still, the weak consistency guarantees of promises are\n            <jats:italic>strong enough<\/jats:italic>\n            to correctly implement cryptocurrencies. To the best of our knowledge, NimbleChain is the first system to bring together fast, partially ordered transactions with consensus-based, totally ordered transactions in a permissionless setting. This hybrid consistency model is able to speed up cryptocurrency transactions while still supporting smart contracts, which typically have (strong) sequential consistency needs.\n          <\/jats:p>\n          <jats:p>We implement NimbleChain as an extension of Ethereum and evaluate it in a 500-node geo-distributed deployment. The results show NimbleChain can promise a cryptocurrency transactions up to an order of magnitude faster than a vanilla Ethereum implementation, with marginal overheads.<\/jats:p>","DOI":"10.1145\/3573895","type":"journal-article","created":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T12:47:46Z","timestamp":1671626866000},"page":"1-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["NimbleChain: Speeding up Cryptocurrencies in General-purpose Permissionless Blockchains"],"prefix":"10.1145","volume":"2","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2584-5726","authenticated-orcid":false,"given":"Paulo","family":"Silva","sequence":"first","affiliation":[{"name":"INESC-ID and IST, Universidade deLisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6916-2866","authenticated-orcid":false,"given":"Miguel","family":"Matos","sequence":"additional","affiliation":[{"name":"INESC-ID and IST, Universidade deLisboa, Portugal"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0726-2025","authenticated-orcid":false,"given":"Jo\u00e3o","family":"Barreto","sequence":"additional","affiliation":[{"name":"INESC-ID and IST, Universidade deLisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2023,3,14]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"25:1\u201325:19","volume-title":"Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS\u201917),","author":"Abraham Ittai","year":"2018","unstructured":"Ittai Abraham, Dahlia Malkhi, Kartik Nayak, Ling Ren, and Alexander Spiegelman. 2018. Solida: A blockchain protocol based on reconfigurable byzantine consensus. In Proceedings of the 21st International Conference on Principles of Distributed Systems (OPODIS\u201917),LIPIcs,Vol. 95, James Aspnes, Alysson Bessani, Pascal Felber, and Jo\u00e3o Leit\u00e3o (Eds.). Schloss Dagstuhl\u2013Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 25:1\u201325:19. DOI:10.4230\/LIPIcs.OPODIS.2017.25"},{"doi-asserted-by":"crossref","unstructured":"Hamza Abusalah Jo\u00ebl Alwen Bram Cohen Danylo Khilko Krzysztof Pietrzak and Leonid Reyzin. 2017. Beyond Hellman\u2019s time-memory trade-offs with applications to proofs of pace 357\u2013379. DOI:10.1007\/978-3-319-70697-9_13","key":"e_1_3_2_3_2","DOI":"10.1007\/978-3-319-70697-9_13"},{"doi-asserted-by":"publisher","key":"e_1_3_2_4_2","DOI":"10.1007\/BF01784241"},{"key":"e_1_3_2_5_2","first-page":"30:1\u201330:15","volume-title":"Proceedings of the 13th European Conference on Computer Systems (EuroSys\u201918)","author":"Androulaki Elli","year":"2018","unstructured":"Elli Androulaki, Artem Barger, Vita Bortnikov, Christian Cachin, Konstantinos Christidis, Angelo De Caro, David Enyeart, Christopher Ferris, Gennady Laventman, Yacov Manevich, Srinivasan Muralidharan, Chet Murthy, Binh Nguyen, Manish Sethi, Gari Singh, Keith Smith, Alessandro Sorniotti, Chrysoula Stathakopoulou, Marko Vukolic, Sharon Weed Cocco, and Jason Yellick. 2018. Hyperledger fabric: A distributed operating system for permissioned blockchains. In Proceedings of the 13th European Conference on Computer Systems (EuroSys\u201918), Rui Oliveira, Pascal Felber, and Y. Charlie Hu (Eds.). ACM, 30:1\u201330:15. DOI:10.1145\/3190508.3190538"},{"key":"e_1_3_2_6_2","article-title":"Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation","author":"Asayag Avi","year":"2018","unstructured":"Avi Asayag, Gad Cohen, Ido Grayevsky, Maya Leshkowitz, Ori Rottenstreich, Ronen Tamari, and David Yakira. 2018. Helix: A Scalable and Fair Consensus Algorithm Resistant to Ordering Manipulation. Cryptology ePrint Archive, Paper 2018\/863.","journal-title":"Cryptology ePrint Archive, Paper 2018\/863"},{"key":"e_1_3_2_7_2","first-page":"585","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919)","author":"Bagaria Vivek","year":"2019","unstructured":"Vivek Bagaria, Sreeram Kannan, David Tse, Giulia Fanti, and Pramod Viswanath. 2019. Prism: Deconstructing the blockchain to approach physical limits. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201919). Association for Computing Machinery, New York, NY, 585\u2013602. DOI:10.1145\/3319535.3363213"},{"key":"e_1_3_2_8_2","first-page":"1","volume-title":"Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P\u201913)","author":"Bamert Tobias","year":"2013","unstructured":"Tobias Bamert, Christian Decker, Lennart Elsen, Roger Wattenhofer, and Samuel Welten. 2013. Have a snack, pay with Bitcoins. In Proceedings of the IEEE International Conference on Peer-to-Peer Computing (P2P\u201913). 1\u20135. DOI:10.1109\/P2P.2013.6688717"},{"doi-asserted-by":"crossref","unstructured":"Stefano Bistarelli Ivan Mercanti and Franceso Santini. 2018. An analysis of non-standard bitcoin transactions. Crypto Valley Conference on Blockchain Technology (CVCBT\u201918) 93\u201396. DOI:10.1109\/CVCBT.2018.00016","key":"e_1_3_2_9_2","DOI":"10.1109\/CVCBT.2018.00016"},{"key":"e_1_3_2_10_2","first-page":"7","volume-title":"Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing (PODC\u201900)","author":"Brewer Eric A.","year":"2000","unstructured":"Eric A. Brewer. 2000. Towards robust distributed systems (abstract). In Proceedings of the 19th Annual ACM Symposium on Principles of Distributed Computing (PODC\u201900). Association for Computing Machinery, New York, NY, 7. DOI:10.1145\/343477.343502"},{"key":"e_1_3_2_11_2","first-page":"282","volume-title":"International Symposium on Stabilization, Safety, and Security of Distributed Systems","author":"Chen Lin","year":"2017","unstructured":"Lin Chen, Lei Xu, Nolan Shah, Zhimin Gao, Yang Lu, and Weidong Shi. 2017. On security analysis of proof-of-elapsed-time (poet). In International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, 282\u2013297."},{"key":"e_1_3_2_12_2","first-page":"26","volume-title":"Proceedings of the 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201920)","author":"Collins Daniel","year":"2020","unstructured":"Daniel Collins, Rachid Guerraoui, Jovan Komatovic, Petr Kuznetsov, Matteo Monti, Matej Pavlovic, Yvonne-Anne Pignolet, Dragos-Adrian Seredinschi, Andrei Tonkikh, and Athanasios Xygkis. 2020. Online payments by merely broadcasting messages. In Proceedings of the 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201920). IEEE, 26\u201338."},{"key":"e_1_3_2_13_2","first-page":"123","volume-title":"Proceedings of the International Conference on Management of Data (SIGMOD\u201919)","author":"Dang Hung","year":"2019","unstructured":"Hung Dang, Tien Tuan Anh Dinh, Dumitrel Loghin, Ee-Chien Chang, Qian Lin, and Beng Chin Ooi. 2019. Towards scaling blockchain systems via sharding. In Proceedings of the International Conference on Management of Data (SIGMOD\u201919). Association for Computing Machinery, New York, NY, 123\u2013140. DOI:10.1145\/3299869.3319889"},{"key":"e_1_3_2_14_2","volume-title":"Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES\u201920)","author":"Dotan Maya","year":"2020","unstructured":"Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, and Aviv Zohar. 2020. SOK: Cryptocurrency networking context, state-of-the-art, challenges. In Proceedings of the 15th International Conference on Availability, Reliability and Security (ARES\u201920). Association for Computing Machinery, New York, NY, Article 5, 13 pages. DOI:10.1145\/3407023.3407043"},{"key":"e_1_3_2_15_2","first-page":"106","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201919)","author":"Dziembowski Stefan","year":"2019","unstructured":"Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2019. Perun: Virtual payment hubs over cryptocurrencies. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201919). IEEE, 106\u2013123. DOI:10.1109\/SP.2019.00020"},{"key":"e_1_3_2_16_2","first-page":"585","volume-title":"Annual Cryptology Conference","author":"Dziembowski Stefan","year":"2015","unstructured":"Stefan Dziembowski, Sebastian Faust, Vladimir Kolmogorov, and Krzysztof Pietrzak. 2015. Proofs of space. In Annual Cryptology Conference. Springer, 585\u2013605."},{"key":"e_1_3_2_17_2","article-title":"Geth","year":"2017","unstructured":"ETHDEV and the Ethereum community. 2017. Geth. Retrieved from https:\/\/github.com\/ethereum\/go-ethereum\/wiki\/geth.","journal-title":"https:\/\/github.com\/ethereum\/go-ethereum\/wiki\/geth"},{"key":"e_1_3_2_18_2","article-title":"Ethereum 2.0: Sharding Roadmap","year":"2019","unstructured":"ETHDEV and the Ethereum community. 2019. Ethereum 2.0: Sharding Roadmap. Retrieved from https:\/\/github.com\/ethereum\/wiki\/wiki\/Sharding-roadmap.","journal-title":"https:\/\/github.com\/ethereum\/wiki\/wiki\/Sharding-roadmap"},{"key":"e_1_3_2_19_2","article-title":"Etherscan\u2013Ethereum Blockchain Explorer","year":"2021","unstructured":"Etherscan. 2021. Etherscan\u2013Ethereum Blockchain Explorer. Retrieved from https:\/\/etherscan.io\/.","journal-title":"https:\/\/etherscan.io\/"},{"key":"e_1_3_2_20_2","first-page":"45","volume-title":"Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201916)","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201916). 45\u201359."},{"key":"e_1_3_2_21_2","first-page":"281","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Garay Juan","year":"2015","unstructured":"Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 281\u2013310."},{"key":"e_1_3_2_22_2","first-page":"291","volume-title":"Advances in Cryptology (CRYPTO\u201917)","author":"Garay Juan","year":"2017","unstructured":"Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2017. The bitcoin backbone protocol with chains of variable difficulty. In Advances in Cryptology (CRYPTO\u201917), Jonathan Katz and Hovav Shacham (Eds.). Springer International Publishing, Cham, 291\u2013323."},{"doi-asserted-by":"crossref","unstructured":"Adem Efe Gencer Soumya Basu Ittay Eyal Robbert van Renesse and Emin G\u00fcn Sirer. 2018. Decentralization in bitcoin and ethereum networks. Financial Cryptography and Data Security Lecture Notes in Computer Science Vol. 10957.","key":"e_1_3_2_23_2","DOI":"10.1007\/978-3-662-58387-6_24"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1145\/3132747.3132757","volume-title":"Proceedings of the 26th Symposium on Operating Systems Principles","author":"Gilad Yossi","year":"2017","unstructured":"Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51\u201368."},{"key":"e_1_3_2_25_2","volume-title":"Proceedings of the 15th European Conference on Computer Systems (EuroSys\u201920)","author":"Gouveia Paulo","year":"2020","unstructured":"Paulo Gouveia, Jo\u00e3o Neves, Carlos Segarra, Luca Liechti, Shady Issa, Valerio Schiavoni, and Miguel Matos. 2020. Kollaps: Decentralized and dynamic topology emulation. In Proceedings of the 15th European Conference on Computer Systems (EuroSys\u201920). Association for Computing Machinery, New York, NY, Article 23, 16 pages. DOI:10.1145\/3342195.3387540"},{"key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"307","DOI":"10.1145\/3293611.3331589","volume-title":"Proceedings of the ACM Symposium on Principles of Distributed Computing","author":"Guerraoui Rachid","year":"2019","unstructured":"Rachid Guerraoui, Petr Kuznetsov, Matteo Monti, Matej Pavlovi\u010d, and Dragos-Adrian Seredinschi. 2019. The consensus number of a cryptocurrency. In Proceedings of the ACM Symposium on Principles of Distributed Computing. ACM, 307\u2013316."},{"key":"e_1_3_2_27_2","first-page":"01027","volume-title":"MATEC Web of Conferences","volume":"232","author":"Guo Hanyue","year":"2018","unstructured":"Hanyue Guo, Jiting Zhou, Jiaqi Wang, and Xiaodong Wang. 2018. A bike sharing system based on Blockchain platform. In MATEC Web of Conferences, Vol. 232. EDP Sciences, 01027."},{"key":"e_1_3_2_28_2","first-page":"410","volume-title":"Proceedings of the IEEE\/ACM Symposium on Edge Computing (SEC\u201918)","author":"Hao Zijiang","year":"2018","unstructured":"Zijiang Hao, Raymond Ji, and Qun Li. 2018. FastPay: A secure fast payment method for edge-IoT platforms using blockchain. In Proceedings of the IEEE\/ACM Symposium on Edge Computing (SEC\u201918). IEEE, 410\u2013415."},{"key":"e_1_3_2_29_2","volume-title":"Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS\u201917)","author":"Heilman Ethan","year":"2017","unstructured":"Ethan Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, and Sharon Goldberg. 2017. TumbleBit: An untrusted bitcoin-compatible anonymous payment hub. In Proceedings of the 24th Annual Network and Distributed System Security Symposium (NDSS\u201917). The Internet Society."},{"key":"e_1_3_2_30_2","first-page":"89","volume-title":"Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY\u201921)","author":"Hu Yiwen","year":"2021","unstructured":"Yiwen Hu, Sihan Wang, Guan-Hua Tu, Li Xiao, Tian Xie, Xinyu Lei, and Chi-Yu Li. 2021. Security threats from bitcoin wallet smartphone applications: Vulnerabilities, attacks, and countermeasures. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy (CODASPY\u201921). Association for Computing Machinery, New York, NY, 89\u2013100. DOI:10.1145\/3422337.3447832"},{"key":"e_1_3_2_31_2","first-page":"906","volume-title":"Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201912)","author":"Karame Ghassan O.","year":"2012","unstructured":"Ghassan O. Karame, Elli Androulaki, and Srdjan Capkun. 2012. Double-spending fast payments in Bitcoin. In Proceedings of the ACM Conference on Computer and Communications Security (CCS\u201912). Association for Computing Machinery, New York, NY, 906\u2013917. DOI:10.1145\/2382196.2382292"},{"key":"e_1_3_2_32_2","article-title":"Speed-Security Tradeoffs in Blockchain Protocols","author":"Kiayias Aggelos","year":"2015","unstructured":"Aggelos Kiayias and Giorgos Panagiotakos. 2015. Speed-Security Tradeoffs in Blockchain Protocols. Cryptology ePrint Archive, Paper 2015\/1019.","journal-title":"Cryptology ePrint Archive, Paper 2015\/1019"},{"key":"e_1_3_2_33_2","first-page":"357","volume-title":"Annual International Cryptology Conference","author":"Kiayias Aggelos","year":"2017","unstructured":"Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer, 357\u2013388."},{"key":"e_1_3_2_34_2","first-page":"729","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918)","author":"Kiffer Lucianna","year":"2018","unstructured":"Lucianna Kiffer, Rajmohan Rajaraman, and abhi shelat. 2018. A better method to analyze blockchain consistency. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918). Association for Computing Machinery, New York, NY, 729\u2013744. DOI:10.1145\/3243734.3243814"},{"key":"e_1_3_2_35_2","first-page":"279","volume-title":"Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Security Symposium (USENIX Security\u201916). 279\u2013296."},{"key":"e_1_3_2_36_2","volume-title":"Robust and Scalable Consensus for Sharded Distributed LedgersCryptology ePrint Archive, Report 2019\/676","author":"Kokoris-Kogias Eleftherios","year":"2019","unstructured":"Eleftherios Kokoris-Kogias. 2019. Robust and Scalable Consensus for Sharded Distributed Ledgers. Cryptology ePrint Archive, Report 2019\/676."},{"key":"e_1_3_2_37_2","first-page":"279","volume-title":"Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916)","author":"Kokoris-Kogias Eleftherios","year":"2016","unstructured":"Eleftherios Kokoris-Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing Bitcoin security and performance with strong consistency via collective signing. In Proceedings of the 25th USENIX Conference on Security Symposium (SEC\u201916). USENIX Association, 279\u2013296."},{"key":"e_1_3_2_38_2","first-page":"583","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918)","author":"Kokoris-Kogias Eleftherios","year":"2018","unstructured":"Eleftherios Kokoris-Kogias, Philipp Jovanovic, Linus Gasser, Nicolas Gailly, Ewa Syta, and Bryan Ford. 2018. Omniledger: A secure, scale-out, decentralized ledger via sharding. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201918). IEEE, 583\u2013598."},{"key":"e_1_3_2_39_2","series-title":"Proceedings of the 35th International Symposium on Distributed Computing (DISC\u201921),","first-page":"28:1\u201328:19","author":"Kuznetsov Petr","year":"2021","unstructured":"Petr Kuznetsov, Yvonne-Anne Pignolet, Pavel Ponomarev, and Andrei Tonkikh. 2021. Permissionless and asynchronous asset transfer. In Proceedings of the 35th International Symposium on Distributed Computing (DISC\u201921),LIPIcs,Vol. 209, Seth Gilbert (Ed.). Schloss Dagstuhl - Leibniz-Zentrum f\u00fcr Informatik, 28:1\u201328:19. DOI:10.4230\/LIPIcs.DISC.2021.28"},{"doi-asserted-by":"publisher","key":"e_1_3_2_40_2","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_41_2","series-title":"Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC\u201915),","first-page":"528","author":"Lewenberg Yoad","year":"2015","unstructured":"Yoad Lewenberg, Yonatan Sompolinsky, and Aviv Zohar. 2015. Inclusive block chain protocols. In Proceedings of the 19th International Conference on Financial Cryptography and Data Security (FC\u201915),Lecture Notes in Computer Science, Vol. 8975, Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). Springer, 528\u2013547. DOI:10.1007\/978-3-662-47854-7_33"},{"unstructured":"Chenxing Li Peilun Li Dong Zhou Wei Xu Fan Long and Andrew Yao. 2018. Scaling Nakamoto consensus to thousands of transactions per second. arXiv 2018. arXiv:1805.03870 [cs.DC]. Retrieved from https:\/\/arxiv.org\/abs\/1805.03870.","key":"e_1_3_2_42_2"},{"key":"e_1_3_2_43_2","first-page":"515","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201920)","author":"Li Chenxing","year":"2020","unstructured":"Chenxing Li, Peilun Li, Dong Zhou, Zhe Yang, Ming Wu, Guang Yang, Wei Xu, Fan Long, and Andrew Chi-Chih Yao. 2020. A decentralized blockchain with high throughput and fast confirmation. In Proceedings of the USENIX Annual Technical Conference (USENIX ATC\u201920). USENIX Association, 515\u2013528."},{"key":"e_1_3_2_44_2","first-page":"265","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912)","author":"Li Cheng","year":"2012","unstructured":"Cheng Li, Daniel Porto, Allen Clement, Johannes Gehrke, Nuno Pregui\u00e7a, and Rodrigo Rodrigues. 2012. Making geo-replicated systems fast as possible, consistent when necessary. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912). USENIX Association, Berkeley, CA, 265\u2013278. http:\/\/dl.acm.org\/citation.cfm?id=2387880.2387906."},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1145\/2043556.2043593","volume-title":"Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP\u201911)","author":"Lloyd Wyatt","year":"2011","unstructured":"Wyatt Lloyd, Michael J. Freedman, Michael Kaminsky, and David G. Andersen. 2011. Don\u2019T settle for eventual: Scalable causal consistency for wide-area storage with COPS. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP\u201911). ACM, New York, NY, 401\u2013416. DOI:10.1145\/2043556.2043593"},{"key":"e_1_3_2_46_2","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1145\/3341301.3359636","volume-title":"Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP\u201919)","author":"Lokhava Marta","year":"2019","unstructured":"Marta Lokhava, Giuliano Losa, David Mazi\u00e8res, Graydon Hoare, Nicolas Barry, Eli Gafni, Jonathan Jove, Rafa\u0142 Malinowsky, and Jed McCaleb. 2019. Fast and secure global payments with stellar. In Proceedings of the 27th ACM Symposium on Operating Systems Principles (SOSP\u201919). Association for Computing Machinery, New York, NY, USA, 80\u201396. DOI:10.1145\/3341301.3359636"},{"key":"e_1_3_2_47_2","first-page":"17","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916)","author":"Luu Loi","year":"2016","unstructured":"Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201916). Association for Computing Machinery, New York, NY, 17\u201330. DOI:10.1145\/2976749.2978389"},{"issue":"2","key":"e_1_3_2_48_2","doi-asserted-by":"crossref","first-page":"113","DOI":"10.3233\/JCS-1997-5203","article-title":"A high-throughput secure reliable multicast protocol","volume":"5","author":"Malkhi Dahlia","year":"1997","unstructured":"Dahlia Malkhi and Michael Reiter. 1997. A high-throughput secure reliable multicast protocol. J. Comput. Secur. 5, 2 (1997), 113\u2013127.","journal-title":"J. Comput. Secur."},{"key":"e_1_3_2_49_2","first-page":"236","article-title":"Low-resource Eclipse Attacks on Ethereum\u2019s Peer-to-peer Network","author":"Marcus Yuval","year":"2018","unstructured":"Yuval Marcus, Ethan Heilman, and Sharon Goldberg. 2018. Low-resource Eclipse Attacks on Ethereum\u2019s Peer-to-peer Network. IACR Cryptol. ePrint Arch., 236.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_50_2","volume-title":"Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS\u201920)","author":"Mavroudis Vasilios","year":"2020","unstructured":"Vasilios Mavroudis, Karl W\u00fcst, Aritra Dhar, Kari Kostiainen, and Srdjan Capkun. 2020. Snappy: Fast on-chain payments with practical collaterals. In Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS\u201920). The Internet Society."},{"key":"e_1_3_2_51_2","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1145\/3192366.3192375","volume-title":"Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"Milano Matthew","year":"2018","unstructured":"Matthew Milano and Andrew C. Myers. 2018. MixT: A language for mixing consistency in geodistributed transactions. In Proceedings of the 39th ACM SIGPLAN Conference on Programming Language Design and Implementation. ACM, 226\u2013241."},{"key":"e_1_3_2_52_2","first-page":"31","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Miller Andrew","year":"2016","unstructured":"Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 31\u201342."},{"unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system.","key":"e_1_3_2_53_2"},{"key":"e_1_3_2_54_2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/3477132.3483584","volume-title":"Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles (SOSP\u201921)","author":"Neiheiser Ray","year":"2021","unstructured":"Ray Neiheiser, Miguel Matos, and Lu\u00eds Rodrigues. 2021. Kauri: Scalable BFT consensus with pipelined tree-based dissemination and aggregation. In Proceedings of the ACM SIGOPS 28th Symposium on Operating Systems Principles (SOSP\u201921). Association for Computing Machinery, New York, NY, 35\u201348. DOI:10.1145\/3477132.3483584"},{"doi-asserted-by":"crossref","unstructured":"Pim Otte Martijn de Vos and Johan Pouwelse. 2020. TrustChain: A sybil-resistant scalable blockchain. Future Generation Computer Systems . 107 (2020) 770\u2013780. 10.1016\/j.future.2017.08.048","key":"e_1_3_2_55_2","DOI":"10.1016\/j.future.2017.08.048"},{"key":"e_1_3_2_56_2","first-page":"643","volume-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the blockchain protocol in asynchronous networks. In Annual International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 643\u2013673."},{"key":"e_1_3_2_57_2","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1145\/3087801.3087809","volume-title":"Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC\u201917)","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi. 2017. FruitChains: A fair blockchain. In Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC\u201917). Association for Computing Machinery, New York, NY, 315\u2013324. DOI:10.1145\/3087801.3087809"},{"key":"e_1_3_2_58_2","series-title":"Proceedings of the 31st International Symposium on Distributed Computing (DISC\u201917),","first-page":"39:1\u201339:16","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In Proceedings of the 31st International Symposium on Distributed Computing (DISC\u201917),LIPIcs, Vol. 91, Andr\u00e9a W. Richa (Ed.). Schloss Dagstuhl\u2013Leibniz-Zentrum f\u00fcr Informatik, 39:1\u201339:16. DOI:10.4230\/LIPIcs.DISC.2017.39"},{"key":"e_1_3_2_59_2","first-page":"115","volume-title":"Proceedings of the IEEE 30th Computer Security Foundations Symposium (CSF\u201917)","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi. 2017. Rethinking large-scale consensus. In Proceedings of the IEEE 30th Computer Security Foundations Symposium (CSF\u201917). IEEE, 115\u2013129."},{"key":"e_1_3_2_60_2","article-title":"The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments","author":"Poon Joseph","year":"2016","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. Retrieved from https:\/\/ lightning.network\/lightning-network-paper.pdf.","journal-title":"https:\/\/ lightning.network\/lightning-network-paper.pdf"},{"unstructured":"Team Rocket Maofan Yin Kevin Sekniqi Robbert van Renesse and Emin G\u00fcn Sirer. 2020. Scalable and probabilistic leaderless BFT consensus through metastability. arxiv:1906.08936 [cs.DC]. Retrieved from https:\/\/arxiv.org\/abs\/1906.08936.","key":"e_1_3_2_61_2"},{"key":"e_1_3_2_62_2","first-page":"245","volume-title":"Proceedings of the 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201920)","author":"Silva Paulo","year":"2020","unstructured":"Paulo Silva, David Vav\u0159i\u010dka, Jo\u00e3o Barreto, and Miguel Matos. 2020. Impact of geo-distribution and mining pools on blockchains: A study of ethereum. In Proceedings of the 50th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201920). IEEE Computer Society, 245\u2013252. DOI:10.1109\/DSN48063.2020.00041"},{"doi-asserted-by":"publisher","key":"e_1_3_2_63_2","DOI":"10.1016\/j.future.2020.05.047"},{"key":"e_1_3_2_64_2","article-title":"ABC: Asynchronous blockchain without consensus","author":"Sliwinski Jakub","year":"2019","unstructured":"Jakub Sliwinski and Roger Wattenhofer. 2019. ABC: Asynchronous blockchain without consensus. arXiv:1909.10926. Retrieved from https:\/\/arxiv.org\/abs\/1909.10926.","journal-title":"arXiv:1909.10926"},{"key":"e_1_3_2_65_2","article-title":"SPECTRE: A Fast and Scalable Cryptocurrency Protocol","author":"Sompolinsky Yonatan","year":"2016","unstructured":"Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. Cryptology ePrint Archive, Paper 2016\/1159.","journal-title":"Cryptology ePrint Archive, Paper 2016\/1159"},{"key":"e_1_3_2_66_2","article-title":"PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus","author":"Sompolinsky Yonatan","year":"2018","unstructured":"Yonatan Sompolinsky, Shai Wyborski, and Aviv Zohar. 2018. PHANTOM and GHOSTDAG: A Scalable Generalization of Nakamoto Consensus. Cryptology ePrint Archive, Report 2018\/104.","journal-title":"Cryptology ePrint Archive, Report 2018\/104"},{"key":"e_1_3_2_67_2","series-title":"Proceedings of the 19th International Conference on Financial Cryptography and Data Security(FC\u201915),","first-page":"507","author":"Sompolinsky Yonatan","year":"2015","unstructured":"Yonatan Sompolinsky and Aviv Zohar. 2015. Secure high-rate transaction processing in Bitcoin. In Proceedings of the 19th International Conference on Financial Cryptography and Data Security(FC\u201915),Lecture Notes in Computer Science, Vol. 8975, Rainer B\u00f6hme and Tatsuaki Okamoto (Eds.). Springer, 507\u2013527. DOI:10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_68_2","first-page":"1357","volume-title":"Proceedings of the IEEE 36th International Conference on Data Engineering (ICDE\u201920)","author":"Tao Yuechen","year":"2020","unstructured":"Yuechen Tao, Bo Li, Jingjie Jiang, Hok Chu Ng, Cong Wang, and Baochun Li. 2020. On sharding open blockchains with smart contracts. In Proceedings of the IEEE 36th International Conference on Data Engineering (ICDE\u201920). 1357\u20131368. DOI:10.1109\/ICDE48307.2020.00121"},{"key":"e_1_3_2_69_2","first-page":"95","volume-title":"Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201919)","author":"Wang Jiaping","year":"2019","unstructured":"Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out blockchains with asynchronous consensus zones. In Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201919). 95\u2013112."},{"key":"e_1_3_2_70_2","article-title":"The ERC20 Token Standard","author":"Wiki Bitcoin","year":"2018","unstructured":"Bitcoin Wiki. 2018. The ERC20 Token Standard. Retrieved from https:\/\/en.bitcoinwiki.org\/wiki\/ERC20.","journal-title":"https:\/\/en.bitcoinwiki.org\/wiki\/ERC20"},{"key":"e_1_3_2_71_2","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood et\u00a0al. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014), 1\u201332.","journal-title":"Ethereum Project Yellow Paper"},{"key":"e_1_3_2_72_2","first-page":"90","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy (SP\u201920)","author":"Yu H.","year":"2020","unstructured":"H. Yu, I. Nikolic, R. Hou, and P. Saxena. 2020. OHIE: Blockchain scaling made simple. In Proceedings of the IEEE Symposium on Security and Privacy (SP\u201920). IEEE Computer Society, Los Alamitos, CA, 90\u2013105. DOI:10.1109\/SP40000.2020.00008"},{"key":"e_1_3_2_73_2","first-page":"931","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918)","author":"Zamani Mahdi","year":"2018","unstructured":"Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS\u201918). Association for Computing Machinery, New York, NY, 931\u2013948. DOI:10.1145\/3243734.3243853"},{"key":"e_1_3_2_74_2","article-title":"Casper the Friendly Ghost: A Correct by Construction Blockchain Consensus Protocol.","author":"Zamfir Vlad","year":"2017","unstructured":"Vlad Zamfir. 2017. Casper the Friendly Ghost: A Correct by Construction Blockchain Consensus Protocol.White Paper. Retrieved from https:\/\/github.com\/ethereum\/research\/blob\/master\/papers\/CasperTFG\/CasperTFG.pdf. (2017).","journal-title":"White Paper"}],"container-title":["Distributed Ledger Technologies: Research and Practice"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573895","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3573895","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:49:21Z","timestamp":1750182561000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3573895"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,14]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2023,9,30]]}},"alternative-id":["10.1145\/3573895"],"URL":"https:\/\/doi.org\/10.1145\/3573895","relation":{},"ISSN":["2769-6472","2769-6480"],"issn-type":[{"type":"print","value":"2769-6472"},{"type":"electronic","value":"2769-6480"}],"subject":[],"published":{"date-parts":[[2023,3,14]]},"assertion":[{"value":"2022-08-08","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-11-16","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}