{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T17:03:17Z","timestamp":1758819797879},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2018,8]]},"abstract":"<jats:p>Bitcoin is a successful and interesting example of a global scale peer-to-peer cryptocurrency that integrates many techniques and protocols from cryptography, distributed systems, and databases. The main underlying data structure is blockchain, a scalable fully replicated structure that is shared among all participants and guarantees a consistent view of all user transactions by all participants in the cryptocurrency system. In this tutorial, we discuss the basic protocols used in blockchain, and elaborate on its main advantages and limitations. To overcome these limitations, we provide the necessary distributed systems background in managing large scale fully replicated ledgers, using Byzantine Agreement protocols to solve the consensus problem. Finally, we expound on some of the most recent proposals to design scalable and efficient blockchains. The focus of the tutorial is on the distributed systems and database technical aspects of the recent innovations in blockchains.<\/jats:p>","DOI":"10.14778\/3229863.3229877","type":"journal-article","created":{"date-parts":[[2018,9,10]],"date-time":"2018-09-10T12:12:28Z","timestamp":1536581548000},"page":"2098-2101","source":"Crossref","is-referenced-by-count":19,"title":["Database and distributed computing fundamentals for scalable, fault-tolerant, and consistent maintenance of blockchains"],"prefix":"10.14778","volume":"11","author":[{"given":"Sujaya","family":"Maiyya","sequence":"first","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Victor","family":"Zakhary","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Divyakant","family":"Agrawal","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]},{"given":"Amr El","family":"Abbadi","sequence":"additional","affiliation":[{"name":"UC Santa Barbara"}]}],"member":"320","published-online":{"date-parts":[[2018,8]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Hashcash-a denial of service counter-measure","author":"Back A.","year":"2002","unstructured":"A. Back Hashcash-a denial of service counter-measure . 2002 . A. Back et al. Hashcash-a denial of service counter-measure. 2002."},{"key":"e_1_2_1_2_1","volume-title":"Concurrency control and recovery in database systems","author":"Bernstein P. A.","year":"1987","unstructured":"P. A. Bernstein , V. Hadzilacos , and N. Goodman . Concurrency control and recovery in database systems . 1987 . P. A. Bernstein, V. Hadzilacos, and N. Goodman. Concurrency control and recovery in database systems. 1987."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298487"},{"key":"e_1_2_1_4_1","first-page":"173","volume-title":"OSDI","volume":"99","author":"Castro M.","year":"1999","unstructured":"M. Castro , B. Liskov , Practical byzantine fault tolerance . In OSDI , volume 99 , pages 173 -- 186 , 1999 . M. Castro, B. Liskov, et al. Practical byzantine fault tolerance. In OSDI, volume 99, pages 173--186, 1999."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_2_1_6_1","volume-title":"A survey on security and privacy issues of bitcoin. arXiv preprint arXiv:1706.00916","author":"Conti M.","year":"2017","unstructured":"M. Conti , C. Lal , S. Ruj , A survey on security and privacy issues of bitcoin. arXiv preprint arXiv:1706.00916 , 2017 . M. Conti, C. Lal, S. Ruj, et al. A survey on security and privacy issues of bitcoin. arXiv preprint arXiv:1706.00916, 2017."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_2_1_10_1","first-page":"279","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias E. K.","year":"2016","unstructured":"E. K. Kogias , P. Jovanovic , N. Gailly , I. Khoffi , L. Gasser , and B. Ford . Enhancing bitcoin security and performance with strong consistency via collective signing . In 25th USENIX Security Symposium (USENIX Security 16) , pages 279 -- 296 , 2016 . E. K. Kogias, P. Jovanovic, N. Gailly, I. Khoffi, L. Gasser, and B. Ford. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16), pages 279--296, 2016."},{"issue":"4","key":"e_1_2_1_11_1","first-page":"18","volume":"32","author":"Lamport L.","year":"2001","unstructured":"L. Lamport ACM Sigact News , 32 ( 4 ): 18 -- 25 , 2001 . L. Lamport et al. Paxos made simple. ACM Sigact News, 32(4):18--25, 2001.","journal-title":"ACM Sigact News"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137830"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"key":"e_1_2_1_16_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto S.","year":"2008","unstructured":"S. Nakamoto . Bitcoin: A peer-to-peer electronic cash system . 2008 . S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. 2008."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132259"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"e_1_2_1_20_1","volume-title":"Transactional information systems: theory, algorithms, and the practice of concurrency control and recovery","author":"Weikum G.","year":"2001","unstructured":"G. Weikum and G. Vossen . Transactional information systems: theory, algorithms, and the practice of concurrency control and recovery . Elsevier , 2001 . G. Weikum and G. Vossen. Transactional information systems: theory, algorithms, and the practice of concurrency control and recovery. Elsevier, 2001."}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/3229863.3229877","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:09:43Z","timestamp":1672222183000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/3229863.3229877"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8]]},"references-count":20,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2018,8]]}},"alternative-id":["10.14778\/3229863.3229877"],"URL":"https:\/\/doi.org\/10.14778\/3229863.3229877","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2018,8]]}}}