{"id":"https://openalex.org/W4416251372","doi":"https://doi.org/10.1109/bcca66705.2025.11229659","title":"Enhanced Efficient Fast Data Availability Sampling under Majority Dishonest Byzantine Attacks","display_name":"Enhanced Efficient Fast Data Availability Sampling under Majority Dishonest Byzantine Attacks","publication_year":2025,"publication_date":"2025-10-14","ids":{"openalex":"https://openalex.org/W4416251372","doi":"https://doi.org/10.1109/bcca66705.2025.11229659"},"language":null,"primary_location":{"id":"doi:10.1109/bcca66705.2025.11229659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcca66705.2025.11229659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 7th International Conference on Blockchain Computing and Applications (BCCA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5108987072","display_name":"Arunima Chaudhuri","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Arunima Chaudhuri","raw_affiliation_strings":["Codex,India"],"affiliations":[{"raw_affiliation_string":"Codex,India","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030558743","display_name":"Csaba Kir\u00e1ly","orcid":"https://orcid.org/0000-0002-6839-5024"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Csaba Kiraly","raw_affiliation_strings":["Codex,Italy"],"affiliations":[{"raw_affiliation_string":"Codex,Italy","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5013543252","display_name":"Leonardo Bautista-Gomez","orcid":"https://orcid.org/0000-0002-0814-5779"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Leonardo Bautista-Gomez","raw_affiliation_strings":["Codex, MigaLabs,Spain"],"affiliations":[{"raw_affiliation_string":"Codex, MigaLabs,Spain","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5108987072"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.42065596,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"153","last_page":"160"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.8166000247001648,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.8166000247001648,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.037700001150369644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.0272000003606081,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7699999809265137},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5916000008583069},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.5562000274658203},{"id":"https://openalex.org/keywords/data-integrity","display_name":"Data integrity","score":0.5504999756813049},{"id":"https://openalex.org/keywords/block","display_name":"Block (permutation group theory)","score":0.5139999985694885},{"id":"https://openalex.org/keywords/sampling","display_name":"Sampling (signal processing)","score":0.4620000123977661},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.3424000144004822}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7817999720573425},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7699999809265137},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5916000008583069},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.5562000274658203},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.5504999756813049},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.5139999985694885},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.4948999881744385},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.48249998688697815},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4745999872684479},{"id":"https://openalex.org/C140779682","wikidata":"https://www.wikidata.org/wiki/Q210868","display_name":"Sampling (signal processing)","level":3,"score":0.4620000123977661},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.3424000144004822},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.3321000039577484},{"id":"https://openalex.org/C70061542","wikidata":"https://www.wikidata.org/wiki/Q989016","display_name":"Distributed database","level":2,"score":0.31150001287460327},{"id":"https://openalex.org/C89611455","wikidata":"https://www.wikidata.org/wiki/Q6804646","display_name":"Mechanism (biology)","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2890999913215637},{"id":"https://openalex.org/C12725497","wikidata":"https://www.wikidata.org/wiki/Q810247","display_name":"Baseline (sea)","level":2,"score":0.2757999897003174},{"id":"https://openalex.org/C2778717966","wikidata":"https://www.wikidata.org/wiki/Q4189076","display_name":"Protection mechanism","level":3,"score":0.25540000200271606}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/bcca66705.2025.11229659","is_oa":false,"landing_page_url":"https://doi.org/10.1109/bcca66705.2025.11229659","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 7th International Conference on Blockchain Computing and Applications (BCCA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":11,"referenced_works":["https://openalex.org/W1707628848","https://openalex.org/W2086441484","https://openalex.org/W2126147068","https://openalex.org/W2324505151","https://openalex.org/W2794533297","https://openalex.org/W2964303100","https://openalex.org/W2969915801","https://openalex.org/W3039746697","https://openalex.org/W4308910122","https://openalex.org/W4390188856","https://openalex.org/W4402264147"],"related_works":[],"abstract_inverted_index":{"Ethereum\u2019s":[0,88,116],"decentralized":[1],"network":[2,20,96],"relies":[3],"on":[4],"effective":[5],"peer-to-peer":[6],"communication":[7,93],"to":[8,27,36,74],"achieve":[9],"scalability,":[10],"security,":[11],"and":[12,29,48,69,94,107,118],"consensus":[13,89],"integrity.":[14],"To":[15],"address":[16],"scalability":[17,121],"challenges,":[18],"the":[19,64],"adopts":[21],"data-sharding":[22],"as":[23],"a":[24],"critical":[25],"mechanism":[26],"divide":[28],"manage":[30],"large-scale":[31],"data":[32,46,77],"more":[33],"efficiently.":[34],"Central":[35],"this":[37,110],"approach":[38],"is":[39],"Data":[40],"Availability":[41],"Sampling":[42],"(DAS),":[43],"which":[44],"ensures":[45],"integrity":[47,97],"accessibility":[49],"in":[50,62,99,104],"sharded":[51],"environments.":[52],"This":[53],"work":[54],"evaluates":[55],"various":[56],"sampling":[57],"techniques,":[58],"highlighting":[59],"their":[60],"role":[61],"mitigating":[63],"impact":[65],"of":[66],"Byzantine":[67],"attacks":[68],"correlated":[70],"failures":[71],"that":[72],"threaten":[73],"disrupt":[75],"block":[76],"availability.":[78],"Our":[79],"analysis":[80],"emphasizes":[81],"how":[82],"our":[83],"proposed":[84],"strategies":[85],"can":[86],"enhance":[87],"protocol,":[90],"ensuring":[91],"reliable":[92],"maintaining":[95],"even":[98],"adversarial":[100],"conditions.":[101],"Through":[102],"simulations":[103],"both":[105],"regular":[106],"attack":[108],"scenarios,":[109],"study":[111],"provides":[112],"insights":[113],"into":[114],"securing":[115],"infrastructure":[117],"achieving":[119],"its":[120],"goals.":[122]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-11-14T00:00:00"}
