{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T21:26:10Z","timestamp":1730323570189,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,12]]},"DOI":"10.1145\/3419111.3421283","type":"proceedings-article","created":{"date-parts":[[2020,10,13]],"date-time":"2020-10-13T04:40:25Z","timestamp":1602564025000},"page":"238-252","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Shrec"],"prefix":"10.1145","author":[{"given":"Yilin","family":"Han","sequence":"first","affiliation":[{"name":"Shanghai Tree-Graph Blockchain Research Institute"}]},{"given":"Chenxing","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Peilun","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Ming","family":"Wu","sequence":"additional","affiliation":[{"name":"Shanghai Tree-Graph Blockchain Research Institute"}]},{"given":"Dong","family":"Zhou","sequence":"additional","affiliation":[{"name":"Tsinghua University"}]},{"given":"Fan","family":"Long","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2020,10,12]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. Ethereum White Paper. https:\/\/ethereum.org\/en\/whitepaper\/. 2020. Ethereum White Paper. https:\/\/ethereum.org\/en\/whitepaper\/."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"crossref","unstructured":"Marcin Andrychowicz Stefan Dziembowski Daniel Malinowski and Lukasz Mazurek. 2015. On the Malleability of Bitcoin Transactions.. In Financial Cryptography and Data Security. Marcin Andrychowicz Stefan Dziembowski Daniel Malinowski and Lukasz Mazurek. 2015. On the Malleability of Bitcoin Transactions.. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-48051-9_1"},{"key":"e_1_3_2_2_3_1","volume-title":"Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy (SP).","author":"Apostolaki Maria","year":"2017","unstructured":"Maria Apostolaki , Aviv Zohar , and Laurent Vanbever . 2017 . Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy (SP). Maria Apostolaki, Aviv Zohar, and Laurent Vanbever. 2017. Hijacking Bitcoin: Routing Attacks on Cryptocurrencies. In IEEE Symposium on Security and Privacy (SP)."},{"key":"e_1_3_2_2_4_1","volume-title":"Bernstein","author":"Aumasson Jean-Philippe","year":"2012","unstructured":"Jean-Philippe Aumasson and Daniel J . Bernstein . 2012 . SipHash: A Fast Short-Input PRF. In Progress in Cryptology - INDOCRYPT 2012, Steven Galbraith and Mridul Nandi (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 489--508. Jean-Philippe Aumasson and Daniel J. Bernstein. 2012. SipHash: A Fast Short-Input PRF. In Progress in Cryptology - INDOCRYPT 2012, Steven Galbraith and Mridul Nandi (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 489--508."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363213"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_2"},{"key":"e_1_3_2_2_8_1","unstructured":"JP Buntinx. 2017. F2Pool Allegedly Prevented Users From Investing in Status ICO. https:\/\/themerkle.com\/f2pool-allegedly-prevented-users-from-investing-in-status-ico\/. JP Buntinx. 2017. F2Pool Allegedly Prevented Users From Investing in Status ICO. https:\/\/themerkle.com\/f2pool-allegedly-prevented-users-from-investing-in-status-ico\/."},{"volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation","author":"Cappos Justin","key":"e_1_3_2_2_9_1","unstructured":"Justin Cappos and John H. Hartman . 2008. San Ferm\u00edn: Aggregating Large Data Sets Using a Binomial Swap Forest . In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation ( San Francisco, California) (NSDI'08). USENIX Association, USA, 147--160. Justin Cappos and John H. Hartman. 2008. San Ferm\u00edn: Aggregating Large Data Sets Using a Binomial Swap Forest. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (San Francisco, California) (NSDI'08). USENIX Association, USA, 147--160."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945474"},{"key":"e_1_3_2_2_11_1","volume-title":"Freenet: A Distributed Anonymous Information Storage and Retrieval System. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability","author":"Clarke Ian","year":"1931","unstructured":"Ian Clarke , Oskar Sandberg , Brandon Wiley , and Theodore W. Hong . 2001 . Freenet: A Distributed Anonymous Information Storage and Retrieval System. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability ( Berkeley, California, USA). Springer-Verlag, Berlin, Heidelberg, 46--66. http:\/\/dl.acm.org\/citation.cfm?id=37 1931 .371977 Ian Clarke, Oskar Sandberg, Brandon Wiley, and Theodore W. Hong. 2001. Freenet: A Distributed Anonymous Information Storage and Retrieval System. In International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability (Berkeley, California, USA). Springer-Verlag, Berlin, Heidelberg, 46--66. http:\/\/dl.acm.org\/citation.cfm?id=371931.371977"},{"key":"e_1_3_2_2_12_1","unstructured":"Matt Corallo. 2017. Compact block relay. BIP 152. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki. Matt Corallo. 2017. Compact block relay. BIP 152. https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0152.mediawiki."},{"key":"e_1_3_2_2_13_1","unstructured":"corbixgwelt. 2011. Timejacking and bitcoin. http:\/\/culubas.blogspot.de\/2011\/05\/timejacking-bitcoin_802.html corbixgwelt. 2011. Timejacking and bitcoin. http:\/\/culubas.blogspot.de\/2011\/05\/timejacking-bitcoin_802.html"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/P2P.2013.6688704"},{"key":"e_1_3_2_2_15_1","volume-title":"Bitcoin Transaction Malleability and MtGox. CoRR abs\/1403.6676","author":"Decker Christian","year":"2014","unstructured":"Christian Decker and Roger Wattenhofer . 2014. Bitcoin Transaction Malleability and MtGox. CoRR abs\/1403.6676 ( 2014 ). arXiv:1403.6676 http:\/\/arxiv.org\/abs\/1403.6676 Christian Decker and Roger Wattenhofer. 2014. Bitcoin Transaction Malleability and MtGox. CoRR abs\/1403.6676 (2014). arXiv:1403.6676 http:\/\/arxiv.org\/abs\/1403.6676"},{"key":"e_1_3_2_2_16_1","unstructured":"Deloitte. 2017. 5 blockchain technology use cases in financial services. http:\/\/blog.deloitte.com.ng\/5-blockchain-use-cases-in-financial-services\/. Deloitte. 2017. 5 blockchain technology use cases in financial services. http:\/\/blog.deloitte.com.ng\/5-blockchain-use-cases-in-financial-services\/."},{"volume-title":"Blockchain: Opportunities for health care. https:\/\/www2.deloitte.com\/us\/en\/pages\/public-sector\/articles\/blockchain-opportunities-for-health-care.html.","year":"2018","key":"e_1_3_2_2_17_1","unstructured":"Deloitte. 2018 . Blockchain: Opportunities for health care. https:\/\/www2.deloitte.com\/us\/en\/pages\/public-sector\/articles\/blockchain-opportunities-for-health-care.html. Deloitte. 2018. Blockchain: Opportunities for health care. https:\/\/www2.deloitte.com\/us\/en\/pages\/public-sector\/articles\/blockchain-opportunities-for-health-care.html."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/41840.41841"},{"key":"e_1_3_2_2_19_1","volume-title":"Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Advances in Cryptology - EUROCRYPT","author":"Dodis Yevgeniy","year":"2004","unstructured":"Yevgeniy Dodis , Leonid Reyzin , and Adam Smith . 2004 . Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Advances in Cryptology - EUROCRYPT 2004, Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg, 523--540. Yevgeniy Dodis, Leonid Reyzin, and Adam Smith. 2004. Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data. In Advances in Cryptology - EUROCRYPT 2004, Christian Cachin and Jan L. Camenisch (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 523--540."},{"key":"e_1_3_2_2_20_1","unstructured":"DwarfPool. 2016. Why DwarfPool mines mostly empty blocks and only few ones with transactions. https:\/\/www.reddit.com\/r\/ethereum\/comments\/57c1yn\/why_dwarfpool_mines_mostly_empty_blocks_and_only\/. DwarfPool. 2016. Why DwarfPool mines mostly empty blocks and only few ones with transactions. https:\/\/www.reddit.com\/r\/ethereum\/comments\/57c1yn\/why_dwarfpool_mines_mostly_empty_blocks_and_only\/."},{"key":"e_1_3_2_2_21_1","unstructured":"Morris J. Dworkin. 201"},{"key":"e_1_3_2_2_22_1","volume-title":"Emin G\u00fcn Sirer, and Robbert Van Renesse.","author":"Eyal Ittay","year":"2016","unstructured":"Ittay Eyal , Adem Efe Gencer , Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016 . Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45--59. Ittay Eyal, Adem Efe Gencer, Emin G\u00fcn Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A Scalable Blockchain Protocol.. In NSDI. 45--59."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813655"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"e_1_3_2_2_25_1","volume-title":"24th USENIX Security Symposium (USENIX Security 15)","author":"Heilman Ethan","year":"2015","unstructured":"Ethan Heilman , Alison Kendler , Aviv Zohar , and Sharon Goldberg . 2015 . Eclipse Attacks on Bitcoin's Peer-to-Peer Network . In 24th USENIX Security Symposium (USENIX Security 15) . USENIX Association, Washington, D.C., 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse Attacks on Bitcoin's Peer-to-Peer Network. In 24th USENIX Security Symposium (USENIX Security 15). USENIX Association, Washington, D.C., 129--144. https:\/\/www.usenix.org\/conference\/usenixsecurity15\/technical-sessions\/presentation\/heilman"},{"key":"e_1_3_2_2_26_1","unstructured":"IBM. 2020. Blockchain for Supply Chain. https:\/\/www.ibm.com\/blockchain\/supply-chain\/. IBM. 2020. Blockchain for Supply Chain. https:\/\/www.ibm.com\/blockchain\/supply-chain\/."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Benjamin Johnson Aron Laszka Jens Grossklags Marie Vasek and Tyler Moore. 2014. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.. In Financial Cryptography and Data Security. Benjamin Johnson Aron Laszka Jens Grossklags Marie Vasek and Tyler Moore. 2014. Game-Theoretic Analysis of DDoS Attacks Against Bitcoin Mining Pools.. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-44774-1_6"},{"key":"e_1_3_2_2_28_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Kogias Eleftherios Kokoris","year":"2016","unstructured":"Eleftherios Kokoris Kogias , Philipp Jovanovic , Nicolas Gailly , Ismail Khoffi , Linus Gasser , and Bryan Ford . 2016 . Enhancing bitcoin security and performance with strong consistency via collective signing . In 25th USENIX Security Symposium (USENIX Security 16) . 279--296. Eleftherios Kokoris Kogias, Philipp Jovanovic, Nicolas Gailly, Ismail Khoffi, Linus Gasser, and Bryan Ford. 2016. Enhancing bitcoin security and performance with strong consistency via collective signing. In 25th USENIX Security Symposium (USENIX Security 16). 279--296."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"crossref","unstructured":"Philip Koshy Diana Koshy and Patrick McDaniel. 2014. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.. In Financial Cryptography and Data Security. Philip Koshy Diana Koshy and Patrick McDaniel. 2014. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic.. In Financial Cryptography and Data Security.","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICW.2005.31"},{"key":"e_1_3_2_2_32_1","volume-title":"Vault: Fast Bootstrapping for Cryptocurrencies. IACR Cryptology ePrint Archive 2018","author":"Leung Derek","year":"2018","unstructured":"Derek Leung , Adam Suhl , Yossi Gilad , and Nickolai Zeldovich . 2018 . Vault: Fast Bootstrapping for Cryptocurrencies. IACR Cryptology ePrint Archive 2018 (2018), 269. Derek Leung, Adam Suhl, Yossi Gilad, and Nickolai Zeldovich. 2018. Vault: Fast Bootstrapping for Cryptocurrencies. IACR Cryptology ePrint Archive 2018 (2018), 269."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_33"},{"key":"e_1_3_2_2_34_1","volume-title":"Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870","author":"Li Chenxing","year":"2018","unstructured":"Chenxing Li , Peilun Li , Dong Zhou , Wei Xu , Fan Long , and Andrew Yao . 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870 ( 2018 ). Chenxing Li, Peilun Li, Dong Zhou, Wei Xu, Fan Long, and Andrew Yao. 2018. Scaling Nakamoto Consensus to Thousands of Transactions per Second. arXiv preprint arXiv:1805.03870 (2018)."},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation -","volume":"2","author":"Li Jinyang","unstructured":"Jinyang Li , Jeremy Stribling , Robert Morris , and M. Frans Kaashoek . 2005. Bandwidth-efficient Management of DHT Routing Tables . In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association, Berkeley, CA, USA, 99--114. http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251211 Jinyang Li, Jeremy Stribling, Robert Morris, and M. Frans Kaashoek. 2005. Bandwidth-efficient Management of DHT Routing Tables. In Proceedings of the 2Nd Conference on Symposium on Networked Systems Design & Implementation - Volume 2 (NSDI'05). USENIX Association, Berkeley, CA, USA, 99--114. http:\/\/dl.acm.org\/citation.cfm?id=1251203.1251211"},{"key":"e_1_3_2_2_37_1","volume-title":"Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems (Druschel P., Kaashoek F., Rowstron A. (eds)","author":"Maymounkov Petar","year":"2002","unstructured":"Petar Maymounkov and David Mazi\u00e8res . 2002 . Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems (Druschel P., Kaashoek F., Rowstron A. (eds) . Springer, Berlin, Heidelberg ). Springer Verlag . Petar Maymounkov and David Mazi\u00e8res. 2002. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric. In Peer-to-Peer Systems (Druschel P., Kaashoek F., Rowstron A. (eds). Springer, Berlin, Heidelberg). Springer Verlag."},{"key":"e_1_3_2_2_38_1","volume-title":"The stellar consensus protocol: A federated model for internet-level consensus","author":"Mazieres David","year":"2015","unstructured":"David Mazieres . 2015. The stellar consensus protocol: A federated model for internet-level consensus . Stellar Development Foundation ( 2015 ). David Mazieres. 2015. The stellar consensus protocol: A federated model for internet-level consensus. Stellar Development Foundation (2015)."},{"key":"e_1_3_2_2_39_1","volume-title":"Refund attacks on Bitcoin's Payment Protocol. IACR Cryptology ePrint Archive 2016","author":"McCorry Patrick","year":"2016","unstructured":"Patrick McCorry , Siamak F. Shahandashti , and Feng Hao . 2016. Refund attacks on Bitcoin's Payment Protocol. IACR Cryptology ePrint Archive 2016 ( 2016 ). Patrick McCorry, Siamak F. Shahandashti, and Feng Hao. 2016. Refund attacks on Bitcoin's Payment Protocol. IACR Cryptology ePrint Archive 2016 (2016)."},{"key":"e_1_3_2_2_40_1","volume-title":"Conference on the theory and application of cryptographic techniques. Springer, 369--378","author":"Merkle Ralph C","year":"1987","unstructured":"Ralph C Merkle . 1987 . A digital signature based on a conventional encryption function . In Conference on the theory and application of cryptographic techniques. Springer, 369--378 . Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques. Springer, 369--378."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"e_1_3_2_2_42_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system . http:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. http:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354237"},{"key":"e_1_3_2_2_44_1","unstructured":"Till Neudecker. 2019. Characterization of the Bitcoin Peer-to-Peer Network (2015--2018). http:\/\/dsn.tm.kit.edu\/bitcoin\/publications\/bitcoin_network_characterization.pdf. Till Neudecker. 2019. Characterization of the Bitcoin Peer-to-Peer Network (2015--2018). http:\/\/dsn.tm.kit.edu\/bitcoin\/publications\/bitcoin_network_characterization.pdf."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3087801.3087809"},{"key":"e_1_3_2_2_47_1","volume-title":"LIPIcs-Leibniz International Proceedings in Informatics","volume":"91","author":"Pass Rafael","year":"2017","unstructured":"Rafael Pass and Elaine Shi . 2017 . Hybrid consensus: Efficient consensus in the permissionless model . In LIPIcs-Leibniz International Proceedings in Informatics , Vol. 91 . Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik. Rafael Pass and Elaine Shi. 2017. Hybrid consensus: Efficient consensus in the permissionless model. In LIPIcs-Leibniz International Proceedings in Informatics, Vol. 91. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik."},{"key":"e_1_3_2_2_48_1","volume-title":"Scalable and Efficient Data Authentication for Decentralized Systems. arXiv preprint arXiv:1909.11590","author":"Ponnapalli Soujanya","year":"2019","unstructured":"Soujanya Ponnapalli , Aashaka Shah , Amy Tai , Souvik Banerjee , Vijay Chidambaram , Dahlia Malkhi , and Michael Wei . 2019. Scalable and Efficient Data Authentication for Decentralized Systems. arXiv preprint arXiv:1909.11590 ( 2019 ). Soujanya Ponnapalli, Aashaka Shah, Amy Tai, Souvik Banerjee, Vijay Chidambaram, Dahlia Malkhi, and Michael Wei. 2019. Scalable and Efficient Data Authentication for Decentralized Systems. arXiv preprint arXiv:1909.11590 (2019)."},{"key":"e_1_3_2_2_49_1","series-title":"Lecture Notes in Computer Science - LNCS 2218 (01","volume-title":"Pastry: Scalable, Decentralized Object Location and Routing for Large-Scale Peer-to-Peer Systems","author":"Rowstron Antony","year":"2001","unstructured":"Antony Rowstron and Peter Druschel . 2001 . Pastry: Scalable, Decentralized Object Location and Routing for Large-Scale Peer-to-Peer Systems . Lecture Notes in Computer Science - LNCS 2218 (01 2001), 329--350. Antony Rowstron and Peter Druschel. 2001. Pastry: Scalable, Decentralized Object Location and Routing for Large-Scale Peer-to-Peer Systems. Lecture Notes in Computer Science - LNCS 2218 (01 2001), 329--350."},{"key":"e_1_3_2_2_50_1","unstructured":"SECBIT. 2018. How the winner got Fomo3D prize - A Detailed Explanation. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f. SECBIT. 2018. How the winner got Fomo3D prize - A Detailed Explanation. https:\/\/medium.com\/coinmonks\/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f."},{"key":"e_1_3_2_2_51_1","unstructured":"Yonatan Sompolinsky Shai Wyborski and Aviv Zohar. 2020. PHANTOM and GHOSTDAG A Scalable Generalization of Nakamoto Consensus. (2020). https:\/\/eprint.iacr.org\/2018\/104.pdf. Yonatan Sompolinsky Shai Wyborski and Aviv Zohar. 2020. PHANTOM and GHOSTDAG A Scalable Generalization of Nakamoto Consensus. (2020). https:\/\/eprint.iacr.org\/2018\/104.pdf."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383071"},{"volume-title":"Proceedings of the 2006 IEEE International Conference on Network Protocols. 2--11","author":"Venkataraman V.","key":"e_1_3_2_2_54_1","unstructured":"V. Venkataraman , K. Yoshida , and P. Francis . 2006. Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast . In Proceedings of the 2006 IEEE International Conference on Network Protocols. 2--11 . V. Venkataraman, K. Yoshida, and P. Francis. 2006. Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast. In Proceedings of the 2006 IEEE International Conference on Network Protocols. 2--11."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/PTP.2003.1231532"},{"key":"e_1_3_2_2_56_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Wang Jiaping","year":"2019","unstructured":"Jiaping Wang and Hao Wang . 2019 . Monoxide: Scale out Blockchains with Asynchronous Consensus Zones . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) . USENIX Association, Boston, MA, 95--112. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/wang-jiaping Jiaping Wang and Hao Wang. 2019. Monoxide: Scale out Blockchains with Asynchronous Consensus Zones. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). USENIX Association, Boston, MA, 95--112. https:\/\/www.usenix.org\/conference\/nsdi19\/presentation\/wang-jiaping"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00008"}],"event":{"name":"SoCC '20: ACM Symposium on Cloud Computing","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Virtual Event USA","acronym":"SoCC '20"},"container-title":["Proceedings of the 11th ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419111.3421283","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T22:30:37Z","timestamp":1673303437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419111.3421283"}},"subtitle":["bandwidth-efficient transaction relay in high-throughput blockchain systems"],"short-title":[],"issued":{"date-parts":[[2020,10,12]]},"references-count":56,"alternative-id":["10.1145\/3419111.3421283","10.1145\/3419111"],"URL":"https:\/\/doi.org\/10.1145\/3419111.3421283","relation":{},"subject":[],"published":{"date-parts":[[2020,10,12]]},"assertion":[{"value":"2020-10-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}