{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T07:22:47Z","timestamp":1763018567423,"version":"3.37.3"},"reference-count":34,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172040","62002094","U1836212"],"award-info":[{"award-number":["62172040","62002094","U1836212"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key Research and Development Program of China","award":["2021YFB2701200","2022YFB2702402"],"award-info":[{"award-number":["2021YFB2701200","2022YFB2702402"]}]},{"DOI":"10.13039\/501100003995","name":"Natural Science Foundation of Anhui Province","doi-asserted-by":"publisher","award":["2008085MF196"],"award-info":[{"award-number":["2008085MF196"]}],"id":[{"id":"10.13039\/501100003995","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tdsc.2023.3262283","type":"journal-article","created":{"date-parts":[[2023,3,28]],"date-time":"2023-03-28T19:29:46Z","timestamp":1680031786000},"page":"775-788","source":"Crossref","is-referenced-by-count":12,"title":["HCA: Hashchain-Based Consensus Acceleration Via Re-Voting"],"prefix":"10.1109","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6313-4407","authenticated-orcid":false,"given":"Zijian","family":"Zhang","sequence":"first","affiliation":[{"name":"School of Cyberspace Science and Technology and the School of Southeast Institute of Information Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-2118-8896","authenticated-orcid":false,"given":"Xuyang","family":"Liu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, School of Computer Science and Information Engineering, Anhui Province Key Laboratory of Industry Safety and Emergency Technology and Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, Anhui, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1755-8225","authenticated-orcid":false,"given":"Hao","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7522-1241","authenticated-orcid":false,"given":"Bakh","family":"Khoussainov","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Electronic Science and Technology of China, Sichuan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6784-0221","authenticated-orcid":false,"given":"Keke","family":"Gai","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2017.85"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.3745\/JIPS.01.0024"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355458"},{"article-title":"A peer-to-peer electronic cash system","year":"2008","author":"Nakamoto","key":"ref4"},{"article-title":"Mastering bitcoin: Programming the open blockchain","year":"2017","author":"Antonopoulos","key":"ref5"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.09.023"},{"key":"ref7","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume":"99","author":"Castro","year":"1999","journal-title":"Operating Syst. Des. Implementation"},{"article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","year":"2016","author":"Buchman","key":"ref8"},{"key":"ref9","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"issue":"8","key":"ref10","article-title":"The ripple protocol consensus algorithm","volume":"5","author":"Schwartz","year":"2014","journal-title":"Ripple Lab. Inc. White Paper"},{"article-title":"The latest gossip on BFT consensus","year":"2018","author":"Buchman","key":"ref11"},{"key":"ref12","first-page":"279","article-title":"Enhancing bitcoin security and performance with strong consistency via collective signing","volume-title":"Proc. 25th {Usenix} Secur. Symp.","author":"Kogias"},{"article-title":"Solidus: An incentive-compatible cryptocurrency based on permissionless Byzantine consensus","year":"2016","author":"Abraham","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132757"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23241"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00044"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423256"},{"key":"ref20","article-title":"No-commit proofs: Defeating livelock in BFT","author":"Giridharan","year":"2021","journal-title":"Cryptol. ePrint Arch."},{"key":"ref21","article-title":"Marlin: Two-phase BFT with linearity","author":"Sui","year":"2022","journal-title":"Cryptol. ePrint Arch."},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559361"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519594"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_32"},{"article-title":"The swirlds hashgraph consensus algorithm: Fair, fast, Byzantine fault tolerance","year":"2016","author":"Baird","key":"ref26"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3205230.3205235"},{"key":"ref28","article-title":"Phantom","author":"Sompolinsky","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"volume-title":"Distributed Systems: Principles and Paradigms","year":"2007","author":"Tanenbaum","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/3335772.3335936"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2833312.2833321"},{"article-title":"Casper the friendly finality gadget","year":"2017","author":"Buterin","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.43"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/10472294\/10083306.pdf?arnumber=10083306","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T18:45:13Z","timestamp":1725648313000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10083306\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":34,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2023.3262283","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}