{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T01:04:29Z","timestamp":1728176669017},"reference-count":152,"publisher":"Association for Computing Machinery (ACM)","issue":"2","funder":[{"name":"Helmholtz Association of German Research Centers","award":["HRSF-0081"]},{"DOI":"10.13039\/501100006769","name":"Russian Science Foundation","doi-asserted-by":"crossref","award":["Project No. 19-41-06301"],"id":[{"id":"10.13039\/501100006769","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2021,3,31]]},"abstract":"When developing peer-to-peer applications on distributed ledger technology (DLT), a crucial decision is the selection of a suitable DLT design (e.g., Ethereum), because it is hard to change the underlying DLT design post hoc. To facilitate the selection of suitable DLT designs, we review DLT characteristics and identify trade-offs between them. Furthermore, we assess how DLT designs account for these trade-offs and we develop archetypes for DLT designs that cater to specific requirements of applications on DLT. The main purpose of our article is to introduce scientific and practical audiences to the intricacies of DLT designs and to support development of viable applications on DLT.<\/jats:p>","DOI":"10.1145\/3379463","type":"journal-article","created":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T04:39:15Z","timestamp":1590813555000},"page":"1-37","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":85,"title":["Trade-offs between Distributed Ledger Technology Characteristics"],"prefix":"10.1145","volume":"53","author":[{"ORCID":"http:\/\/orcid.org\/0000-0002-2880-3361","authenticated-orcid":false,"given":"Niclas","family":"Kannengie\u00dfer","sequence":"first","affiliation":[{"name":"Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology and Blockchain Center EU, University of Kassel, Kassel, Germany"}]},{"given":"Sebastian","family":"Lins","sequence":"additional","affiliation":[{"name":"Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"given":"Tobias","family":"Dehling","sequence":"additional","affiliation":[{"name":"Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology, Karlsruhe, Germany"}]},{"ORCID":"http:\/\/orcid.org\/0000-0002-4353-8519","authenticated-orcid":false,"given":"Ali","family":"Sunyaev","sequence":"additional","affiliation":[{"name":"Institute of Applied Informatics and Formal Description Methods, Karlsruhe Institute of Technology, Karlsruhe, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,5,29]]},"reference":[{"key":"e_1_2_1_1_1","first-page":"6","article-title":"Adding fintech and blockchain to your curriculum","volume":"8","author":"Kursh Steven R.","year":"2016","journal-title":"Bus. Educ. Innov. J."},{"key":"e_1_2_1_2_1","volume-title":"Proceedings of the 13th International Conference on Service Systems and Service Management. 1--6.","author":"Tian Feng","year":"2016"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/MITP.2018.021921651"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scs.2018.02.014"},{"key":"e_1_2_1_5_1","volume-title":"Food supply chain this summer, fishing in Finland means food traceability on the menu. IBM Blockchain Blog. 4","author":"Lehikoinen Tomi","year":"2019"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2017.8"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.15"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.23919\/FRUCT.2017.8071359"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2019.848"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343502"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the 27th International Telecommunication Networks and Applications Conference. 1--6.","author":"G\u00f6bel Johannes"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3155016.3155018"},{"key":"e_1_2_1_13_1","volume-title":"Freedman","author":"Nelson Jude","year":"2016"},{"key":"e_1_2_1_14_1","volume-title":"Proceedings of the 23rd European Conference on Information Systems. 1--18","author":"Glaser Florian","year":"2015"},{"key":"e_1_2_1_15_1","unstructured":"Karl W\u00fcst and Arthur Gervais. 2017. Do you need a blockchain? Retrieved from https:\/\/eprint.iacr.org\/2017\/375.pdf. Karl W\u00fcst and Arthur Gervais. 2017. Do you need a blockchain? Retrieved from https:\/\/eprint.iacr.org\/2017\/375.pdf."},{"key":"e_1_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security Nicolas Christin and Reihaneh Safavi-Naini (eds.). Retrieved from http:\/\/arxiv.org\/abs\/1311.0243. Ittay Eyal and Emin G\u00fcn Sirer. 2014. Majority is not enough: Bitcoin mining is vulnerable. In Financial Cryptography and Data Security Nicolas Christin and Reihaneh Safavi-Naini (eds.). Retrieved from http:\/\/arxiv.org\/abs\/1311.0243.","DOI":"10.1007\/978-3-662-45472-5_28"},{"key":"e_1_2_1_17_1","volume-title":"Manar Abu Talib, and Ali Bou Nassif","author":"Nasir Qassim","year":"2018"},{"key":"e_1_2_1_18_1","unstructured":"J. P. Morgan Chase 8 Co. 2018. J. P. Morgan interbank information networksm expands to more than 75 banks. Retrieved from https:\/\/web.archive.org\/save\/https:\/\/www.jpmorgan.com\/country\/US\/en\/detail\/1320570135560. J. P. Morgan Chase 8 Co. 2018. J. P. Morgan interbank information networksm expands to more than 75 banks. Retrieved from https:\/\/web.archive.org\/save\/https:\/\/www.jpmorgan.com\/country\/US\/en\/detail\/1320570135560."},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00134"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_21_1","volume-title":"Internet Computing: Principles of Distributed Systems and Emerging Internet-based Technologies","author":"Sunyaev Ali","edition":"1"},{"key":"e_1_2_1_22_1","unstructured":"Vitalik Buterin. 2018. Ethereum whitepaper. Retrieved from https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper\/f18902f4e7fb21dc92b37e8a0963eec4b3f4793a. Vitalik Buterin. 2018. Ethereum whitepaper. Retrieved from https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper\/f18902f4e7fb21dc92b37e8a0963eec4b3f4793a."},{"key":"e_1_2_1_23_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008"},{"key":"e_1_2_1_24_1","volume-title":"Global Blockchain Benchmarking Study (September 22","author":"Hileman Garrick","year":"2017"},{"key":"e_1_2_1_25_1","volume-title":"Lucius Gregory Meredith, and Joseph Denman","author":"Eykholt Ede","year":"2017"},{"key":"e_1_2_1_26_1","unstructured":"Soteria Lab. 2019. soteriaDAG - Soteria DAG Project. Github. Retrieved from https:\/\/github.com\/soteria-dag\/soterd\/blob\/master\/docs\/README.md. Soteria Lab. 2019. soteriaDAG - Soteria DAG Project. Github. Retrieved from https:\/\/github.com\/soteria-dag\/soterd\/blob\/master\/docs\/README.md."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2016.7778635"},{"key":"e_1_2_1_28_1","unstructured":"GoChain Foundation. 2019. Official GoChain documentation. Retrieved from https:\/\/web.archive.org\/web\/20190516083054\/https:\/\/github.com\/gochain-io\/docs. GoChain Foundation. 2019. Official GoChain documentation. Retrieved from https:\/\/web.archive.org\/web\/20190516083054\/https:\/\/github.com\/gochain-io\/docs."},{"key":"e_1_2_1_29_1","unstructured":"Hyperledger. 2017. Hyperledger-fabricdocs documentation release v0.6. Retrieved from https:\/\/buildmedia.readthedocs.org\/media\/pdf\/hyperledger-fabric\/v0.6\/hyperledger-fabric.pdf. Hyperledger. 2017. Hyperledger-fabricdocs documentation release v0.6. Retrieved from https:\/\/buildmedia.readthedocs.org\/media\/pdf\/hyperledger-fabric\/v0.6\/hyperledger-fabric.pdf."},{"key":"e_1_2_1_30_1","unstructured":"All In Bits Inc. 2019. Tendermint documentation. Retrieved from https:\/\/tendermint.com\/docs\/introduction\/. All In Bits Inc. 2019. Tendermint documentation. Retrieved from https:\/\/tendermint.com\/docs\/introduction\/."},{"key":"e_1_2_1_31_1","unstructured":"EOS.IO. 2018. EOS.IO Technical White Paper v2. Retrieved from https:\/\/github.com\/EOSIO\/Documentation\/blob\/master\/TechnicalWhitePaper.md. EOS.IO. 2018. EOS.IO Technical White Paper v2. Retrieved from https:\/\/github.com\/EOSIO\/Documentation\/blob\/master\/TechnicalWhitePaper.md."},{"key":"e_1_2_1_32_1","volume-title":"Nano: A feeless distributed cryptocurrency network.","author":"LeMahieu Colin","year":"2018"},{"key":"e_1_2_1_33_1","unstructured":"Cody Born. 2018. Ethereum proof-of-authority on Azure. Microsoft Azure. Retrieved from https:\/\/web.archive.org\/web\/20190501134839\/https:\/\/azure.microsoft.com\/en-us\/blog\/ethereum-proof-of-authority-on-azure\/. Cody Born. 2018. Ethereum proof-of-authority on Azure. Microsoft Azure. Retrieved from https:\/\/web.archive.org\/web\/20190501134839\/https:\/\/azure.microsoft.com\/en-us\/blog\/ethereum-proof-of-authority-on-azure\/."},{"key":"e_1_2_1_34_1","unstructured":"Intel Corporation. 2015. PoET 1.0 Specification. Retrieved from https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/1.0\/architecture\/poet.html. Intel Corporation. 2015. PoET 1.0 Specification. Retrieved from https:\/\/sawtooth.hyperledger.org\/docs\/core\/releases\/1.0\/architecture\/poet.html."},{"key":"e_1_2_1_35_1","unstructured":"GoChain. 2018. Proof of reputation. Retrieved from https:\/\/medium.com\/gochain\/proof-of-reputation-e37432420712. GoChain. 2018. Proof of reputation. Retrieved from https:\/\/medium.com\/gochain\/proof-of-reputation-e37432420712."},{"key":"e_1_2_1_36_1","volume-title":"Dash: A privacy-centric cryptocurrency.","author":"Duffield Evan","year":"2019"},{"key":"e_1_2_1_37_1","unstructured":"Serguei Popov. 2018. The tangle. Retrieved from https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf. Serguei Popov. 2018. The tangle. Retrieved from https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf."},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70697-9_14"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2016.28"},{"key":"e_1_2_1_40_1","volume-title":"Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI\u201999)","author":"Castro Miguel","year":"1999"},{"key":"e_1_2_1_41_1","unstructured":"Demiro Massessi. 2018. Public vs private blockchain in a Nutshell. Retrieved from https:\/\/medium.com\/coinmonks\/public-vs-private-blockchain-in-a-nutshell-c9fe284fa39f. Demiro Massessi. 2018. Public vs private blockchain in a Nutshell. Retrieved from https:\/\/medium.com\/coinmonks\/public-vs-private-blockchain-in-a-nutshell-c9fe284fa39f."},{"key":"e_1_2_1_42_1","unstructured":"Paige Cabianca. 2018. What's the difference between public private and permissioned blockchains? Retrieved from https:\/\/medium.com\/nakamo-to\/whats-the-difference-between-a-public-and-a-private-blockchain-c08d6d1886a0. Paige Cabianca. 2018. What's the difference between public private and permissioned blockchains? Retrieved from https:\/\/medium.com\/nakamo-to\/whats-the-difference-between-a-public-and-a-private-blockchain-c08d6d1886a0."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"},{"key":"e_1_2_1_44_1","unstructured":"J. P. Morgan Chase 8 Co. 2016. Quorum Whitepaper. Retrieved from https:\/\/github.com\/jpmorganchase\/quorum-docs\/blob\/master\/Quorum%20Whitepaper%20v0.1.pdf. J. P. Morgan Chase 8 Co. 2016. Quorum Whitepaper. Retrieved from https:\/\/github.com\/jpmorganchase\/quorum-docs\/blob\/master\/Quorum%20Whitepaper%20v0.1.pdf."},{"key":"e_1_2_1_45_1","unstructured":"ARK.io. 2019. ARK Ecosystem Whitepaper. Retrieved from https:\/\/ark.io\/Whitepaper.pdf. ARK.io. 2019. ARK Ecosystem Whitepaper. Retrieved from https:\/\/ark.io\/Whitepaper.pdf."},{"key":"e_1_2_1_46_1","unstructured":"Tom Rodgers. 2019. Ethereum classic price roaring just weeks after 51% attack. Retrieved from https:\/\/www.forbes.com\/sites\/tomrodgers1\/2019\/04\/08\/ethereum-classic-price-roaring-just-weeks-after-51-attack\/#2906e2a6f7ef. Tom Rodgers. 2019. Ethereum classic price roaring just weeks after 51% attack. Retrieved from https:\/\/www.forbes.com\/sites\/tomrodgers1\/2019\/04\/08\/ethereum-classic-price-roaring-just-weeks-after-51-attack\/#2906e2a6f7ef."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/647800.757199"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.44"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/2831143.2831152"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.29"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2016.07.001"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2901858"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45748-8_24"},{"key":"e_1_2_1_55_1","unstructured":"Pim Otte Martijn de Vos and Johan Pouwelse. 2017. TrustChain: A Sybil-resistant scalable blockchain. Fut. Gen. Comput. Syst. (2017). https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167739X17318988?via%3Dihub. Pim Otte Martijn de Vos and Johan Pouwelse. 2017. TrustChain: A Sybil-resistant scalable blockchain. Fut. Gen. Comput. Syst. (2017). https:\/\/www.sciencedirect.com\/science\/article\/abs\/pii\/S0167739X17318988?via%3Dihub."},{"key":"e_1_2_1_56_1","volume-title":"Retreived on","author":"Levine Brian Neil","year":"2019"},{"key":"e_1_2_1_57_1","unstructured":"Patrick Dai Neil Mahi Jordan Earls and Alex Norta. 2017. Smart-contract value-transfer protocol on a distributed mobile application platform. Retrieved from https:\/\/web.archive.org\/web\/20190506095324\/https:\/\/qtum.org\/user\/pages\/01.home\/Qtum%20whitepaper_en%20v0.7.pdf. Patrick Dai Neil Mahi Jordan Earls and Alex Norta. 2017. Smart-contract value-transfer protocol on a distributed mobile application platform. Retrieved from https:\/\/web.archive.org\/web\/20190506095324\/https:\/\/qtum.org\/user\/pages\/01.home\/Qtum%20whitepaper_en%20v0.7.pdf."},{"key":"e_1_2_1_58_1","unstructured":"Daira Hopwood Sean Bowe Taylor Hornby and Nathan Wilcox. 2018. Zcash protocol specification. Retrieved from https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2018\/03\/z-cash-zec-whitepaper.pdf. Daira Hopwood Sean Bowe Taylor Hornby and Nathan Wilcox. 2018. Zcash protocol specification. Retrieved from https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2018\/03\/z-cash-zec-whitepaper.pdf."},{"key":"e_1_2_1_59_1","first-page":"504","article-title":"Enigma: Decentralized computation platform with guaranteed privacy. In New Solutions for Cybersecurity","volume":"15","author":"Shrobe Howard","year":"2018","journal-title":"Chapter"},{"key":"e_1_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Jonathan Heiss Jan Eberhardt and Stefan Tai. 2019. From oracles to trustworthy data on-chaining systems. Retrieved from https:\/\/www.redaktion.tu-berlin.de\/fileadmin\/fg308\/publications\/2019\/Heiss-et-al-oracles_preprint.pdf. Jonathan Heiss Jan Eberhardt and Stefan Tai. 2019. From oracles to trustworthy data on-chaining systems. Retrieved from https:\/\/www.redaktion.tu-berlin.de\/fileadmin\/fg308\/publications\/2019\/Heiss-et-al-oracles_preprint.pdf.","DOI":"10.1109\/Blockchain.2019.00075"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276486"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWBOSE.2018.8327565"},{"key":"e_1_2_1_63_1","unstructured":"Nicola Atzei Massimo Bartoletti and Tiziana Cimoli. 2016. A survey of attacks on ethereum smart contracts. Retrieved from https:\/\/allquantor.at\/blockchainbib\/pdf\/atzei2016survey.pdf. Nicola Atzei Massimo Bartoletti and Tiziana Cimoli. 2016. A survey of attacks on ethereum smart contracts. Retrieved from https:\/\/allquantor.at\/blockchainbib\/pdf\/atzei2016survey.pdf."},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2017.8248566"},{"key":"e_1_2_1_65_1","unstructured":"Peter Vessenes. 2016. Ethereum griefing wallets: Send w\/Throw Is Dangerous. Retrieved from https:\/\/vessenes.com\/ethereum-griefing-wallets-send-w-throw-considered-harmful\/. Peter Vessenes. 2016. Ethereum griefing wallets: Send w\/Throw Is Dangerous. Retrieved from https:\/\/vessenes.com\/ethereum-griefing-wallets-send-w-throw-considered-harmful\/."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.652"},{"key":"e_1_2_1_67_1","volume-title":"A taxonomy of blockchain technologies: Principles of identification and classification. Ledger 4","author":"Tasca Paolo","year":"2019"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA.2017.33"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.23919\/ICACT.2017.7890132"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSPEC.2017.8048838"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328739"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2818623"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MECO.2018.8406041"},{"key":"e_1_2_1_74_1","unstructured":"Ripple. 2017. Solution overview. Retrieved from https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2017\/09\/Ripple-XRP-Whitepaper.pdf. Ripple. 2017. Solution overview. Retrieved from https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2017\/09\/Ripple-XRP-Whitepaper.pdf."},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/NTMS.2018.8328736"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064033"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2020.770"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.2196\/12426"},{"key":"e_1_2_1_79_1","first-page":"205","article-title":"Standing on the shoulders of giants: Challenges and recommendations of literature search in information systems research","volume":"37","author":"vom Brocke Jan","year":"2015","journal-title":"Commun. AIS"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.09.009"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.im.2014.08.008"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017160.2017162"},{"key":"e_1_2_1_83_1","unstructured":"Gavin Wood. 2016. Polkadot. Retrieved from https:\/\/icowhitepapers.co\/wp-content\/uploads\/PolkaDot-Whitepaper.pdf. Gavin Wood. 2016. Polkadot. Retrieved from https:\/\/icowhitepapers.co\/wp-content\/uploads\/PolkaDot-Whitepaper.pdf."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/3291064.3291073"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1057\/jit.2010.21"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1042-8143(89)80010-X"},{"key":"e_1_2_1_88_1","volume-title":"Strauss","author":"Corbin Juliet M.","year":"2015"},{"key":"e_1_2_1_89_1","volume-title":"Strauss","author":"Glaser Barney G.","year":"2009"},{"key":"e_1_2_1_90_1","unstructured":"Martin Davis. 1982. Computability 8 Unsolvability. Dover. Martin Davis. 1982. Computability 8 Unsolvability. Dover."},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2814624"},{"key":"e_1_2_1_92_1","unstructured":"NewsBTC. 2018. Increased SegWit Adoption for Bitcoin\u2014Is Lightning Network Next? Retrieved from https:\/\/web.archive.org\/web\/20190410173449\/https:\/\/www.newsbtc.com\/2018\/03\/01\/segwit-adoption-lightning-network-increases-bitcoin\/. NewsBTC. 2018. Increased SegWit Adoption for Bitcoin\u2014Is Lightning Network Next? Retrieved from https:\/\/web.archive.org\/web\/20190410173449\/https:\/\/www.newsbtc.com\/2018\/03\/01\/segwit-adoption-lightning-network-increases-bitcoin\/."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2017.2776459"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.150"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"e_1_2_1_96_1","volume-title":"Proceedings of the 2nd International Workshop on Hardware and Architectural Support for Security and Privacy.","author":"Anati Ittai"},{"key":"e_1_2_1_97_1","unstructured":"Oraclize. 2019. Oraclize documentary. Retrieved from https:\/\/provable.xyz\/. Oraclize. 2019. Oraclize documentary. Retrieved from https:\/\/provable.xyz\/."},{"key":"e_1_2_1_98_1","first-page":"1","article-title":"A survey on the security of blockchain systems","volume":"107","author":"Li Xiaoqi","year":"2017","journal-title":"Fut. Gen. Comput. Syst."},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.03.017"},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the IEEE 8th International Conference on Mobile Ad-Hoc and Sensor Systems. 715--720","author":"Chatzigiannakis Ioannis"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/2699026.2699100"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184558.3191555"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the IEEE 27th Canadian Conference on Electrical and Computer Engineering. 1--6.","author":"Dev Jega Anish","year":"2014"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2535718"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/SMC.2017.8123011"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3148330.3148345"},{"key":"e_1_2_1_108_1","volume-title":"Consensus-as-a-service: A brief report on the emergence of permissioned, distributed ledger systems.","author":"Swanson Tim","year":"2015"},{"key":"e_1_2_1_109_1","unstructured":"Stefano De Angelis Leonardo Aniello Roberto Baldoni Federico Lombardi Andrea Margheri and Vladimiro Sassone. 2018. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. Retrieved from https:\/\/eprints.soton.ac.uk\/415083\/. Stefano De Angelis Leonardo Aniello Roberto Baldoni Federico Lombardi Andrea Margheri and Vladimiro Sassone. 2018. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain. Retrieved from https:\/\/eprints.soton.ac.uk\/415083\/."},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2017.36"},{"key":"e_1_2_1_111_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_2_1_112_1","unstructured":"Dvora Dolev and H. R. Strong. 1982. Distributed commit with bounded waiting. Retrieved from https:\/\/www.cs.huji.ac.il\/\u223cdolev\/\/pubs\/dist-commit.pdf. Dvora Dolev and H. R. Strong. 1982. Distributed commit with bounded waiting. Retrieved from https:\/\/www.cs.huji.ac.il\/\u223cdolev\/\/pubs\/dist-commit.pdf."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSF.2017.37"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078468.3078492"},{"key":"e_1_2_1_117_1","volume-title":"ITU Kaleidoscope: Challenges for a Data-Driven Society","author":"Hofmann Frank"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"e_1_2_1_119_1","volume-title":"Retreived on","author":"ISO.","year":"1989"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000259.2000263"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0163477"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.19"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3007748.3018280"},{"key":"e_1_2_1_124_1","unstructured":"Adam Back. 1997. A partial hash collision based postage scheme. Retrieved from http:\/\/www.hashcash.org\/papers\/announce.txt. Adam Back. 1997. A partial hash collision based postage scheme. Retrieved from http:\/\/www.hashcash.org\/papers\/announce.txt."},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2016.03.011"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.03.012"},{"key":"e_1_2_1_127_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.33"},{"key":"e_1_2_1_128_1","volume-title":"Medium. Retrieved","author":"Consultant The Cryptocurrency","year":"2019"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"e_1_2_1_130_1","unstructured":"Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https:\/\/cryptonote.org\/whitepaper.pdf. Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https:\/\/cryptonote.org\/whitepaper.pdf."},{"key":"e_1_2_1_131_1","unstructured":"Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2017\/09\/Monero-whitepaper.pdf. Nicolas van Saberhagen. 2013. CryptoNote v 2.0. Retrieved from https:\/\/whitepaperdatabase.com\/wp-content\/uploads\/2017\/09\/Monero-whitepaper.pdf."},{"key":"e_1_2_1_132_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"e_1_2_1_133_1","unstructured":"The Zilliqa Team. 2017. The Zilliqa technical whitepaper. Retrieved from https:\/\/docs.zilliqa.com\/whitepaper.pdf. The Zilliqa Team. 2017. The Zilliqa technical whitepaper. Retrieved from https:\/\/docs.zilliqa.com\/whitepaper.pdf."},{"key":"e_1_2_1_134_1","unstructured":"Jack Lu Boris Yang Zane Liang Ying Zhang Demmon Shi Eric Swartz and Lizzie Lu. 2017. Wanchain. Retrieved from https:\/\/wanchain.org\/files\/Wanchain-Whitepaper-EN-version.pdf. Jack Lu Boris Yang Zane Liang Ying Zhang Demmon Shi Eric Swartz and Lizzie Lu. 2017. Wanchain. Retrieved from https:\/\/wanchain.org\/files\/Wanchain-Whitepaper-EN-version.pdf."},{"key":"e_1_2_1_135_1","first-page":"1","article-title":"Untangling blockchain: A data processing view of blockchain systems","volume":"30","author":"Anh Dinh Tien Tuan","year":"2018","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"e_1_2_1_137_1","unstructured":"Seele. 2018. Seele whitepaper. Retrieved from http:\/\/seele.hk.ufileos.com\/Seele_White_Paper_English_v3.1.pdf. Seele. 2018. Seele whitepaper. Retrieved from http:\/\/seele.hk.ufileos.com\/Seele_White_Paper_English_v3.1.pdf."},{"key":"e_1_2_1_138_1","volume-title":"Retrieved on","author":"Compert Cindy","year":"2018"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2017.3791019"},{"key":"e_1_2_1_140_1","unstructured":"Josh Swihart Benjamin Winston and Sean Bowe. 2019. Zcash counterfeiting vulnerability successfully remediated. Retrieved from https:\/\/electriccoin.co\/blog\/zcash-counterfeiting-vulnerability-successfully-remediated\/. Josh Swihart Benjamin Winston and Sean Bowe. 2019. Zcash counterfeiting vulnerability successfully remediated. Retrieved from https:\/\/electriccoin.co\/blog\/zcash-counterfeiting-vulnerability-successfully-remediated\/."},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_2_1_142_1","volume-title":"Proceedings of the International Conference on Dependable Systems and Networks. 307--314","author":"Lamport L."},{"key":"e_1_2_1_143_1","unstructured":"Diego Ongaro and John Ousterhout. 2016. In search of an understandable consensus algorithm (extended version). Retrieved from https:\/\/raft.github.io\/raft.pdf. Diego Ongaro and John Ousterhout. 2016. In search of an understandable consensus algorithm (extended version). Retrieved from https:\/\/raft.github.io\/raft.pdf."},{"key":"e_1_2_1_144_1","unstructured":"Vitalik Buterin. 2016. Chain interoperability [white paper]. Retrieved from http:\/\/www.r3cev.com\/s\/Chain-Interoperability-8g6f.pdf. Vitalik Buterin. 2016. Chain interoperability [white paper]. Retrieved from http:\/\/www.r3cev.com\/s\/Chain-Interoperability-8g6f.pdf."},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2018.00120"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2018.2876184"},{"key":"e_1_2_1_147_1","unstructured":"Shijun Liu Bedir Tekinerdogan Mikio Aoyama Liang-Jie Zhang Liping Deng Huan Chen and Jing Zeng (Eds.). 2018. Research on cross-chain technology based on sidechain and hash-locking. Retrieved from https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-3-319-94340-4.pdf. Shijun Liu Bedir Tekinerdogan Mikio Aoyama Liang-Jie Zhang Liping Deng Huan Chen and Jing Zeng (Eds.). 2018. Research on cross-chain technology based on sidechain and hash-locking. Retrieved from https:\/\/link.springer.com\/content\/pdf\/10.1007%2F978-3-319-94340-4.pdf."},{"key":"e_1_2_1_148_1","volume-title":"Information Technology for Peace and Security: IT Applications and Infrastructures in Conflicts","author":"Dehling Tobias"},{"key":"e_1_2_1_149_1","unstructured":"Diego Marmsoler and Leo Eichhorn. 2018. Simulation-based analysis of blockchain architectures. Retrieved from http:\/\/rgdoi.net\/10.13140\/RG.2.2.19898.44481. Diego Marmsoler and Leo Eichhorn. 2018. Simulation-based analysis of blockchain architectures. Retrieved from http:\/\/rgdoi.net\/10.13140\/RG.2.2.19898.44481."},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308897.3308951"},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2016.21"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.5555\/2017458.2017460"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3379463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T10:48:52Z","timestamp":1672570132000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3379463"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5,29]]},"references-count":152,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2021,3,31]]}},"alternative-id":["10.1145\/3379463"],"URL":"https:\/\/doi.org\/10.1145\/3379463","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,5,29]]},"assertion":[{"value":"2019-06-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-05-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}