{"id":"https://openalex.org/W3114496279","doi":"https://doi.org/10.1109/isncc49221.2020.9297326","title":"The Security Ingredients for Correct and Byzantine Fault-tolerant Blockchain Consensus Algorithms","display_name":"The Security Ingredients for Correct and Byzantine Fault-tolerant Blockchain Consensus Algorithms","publication_year":2020,"publication_date":"2020-10-20","ids":{"openalex":"https://openalex.org/W3114496279","doi":"https://doi.org/10.1109/isncc49221.2020.9297326","mag":"3114496279"},"language":"en","primary_location":{"id":"doi:10.1109/isncc49221.2020.9297326","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc49221.2020.9297326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5060400318","display_name":"Amani Altarawneh","orcid":null},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Amani Altarawneh","raw_affiliation_strings":["SimCenter & Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, TN, USA"],"affiliations":[{"raw_affiliation_string":"SimCenter & Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, TN, USA","institution_ids":["https://openalex.org/I177097968"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5026440046","display_name":"Anthony Skjellum","orcid":"https://orcid.org/0000-0001-5252-6600"},"institutions":[{"id":"https://openalex.org/I177097968","display_name":"University of Tennessee at Chattanooga","ror":"https://ror.org/00nqb1v70","country_code":"US","type":"education","lineage":["https://openalex.org/I177097968"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Anthony Skjellum","raw_affiliation_strings":["SimCenter & Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, TN, USA"],"affiliations":[{"raw_affiliation_string":"SimCenter & Computer Science and Engineering, University of Tennessee at Chattanooga, Chattanooga, TN, USA","institution_ids":["https://openalex.org/I177097968"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5060400318"],"corresponding_institution_ids":["https://openalex.org/I177097968"],"apc_list":null,"apc_paid":null,"fwci":1.8713,"has_fulltext":false,"cited_by_count":15,"citation_normalized_percentile":{"value":0.89669852,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9753999710083008,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.8947222232818604},{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.8256045579910278},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7682725191116333},{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.7153760194778442},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.5728760957717896},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5662693977355957},{"id":"https://openalex.org/keywords/consistency","display_name":"Consistency (knowledge bases)","score":0.5565702319145203},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.5021347999572754},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.4747096598148346},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.41411447525024414},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3242782652378082},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2969094216823578},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.13359680771827698}],"concepts":[{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.8947222232818604},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.8256045579910278},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7682725191116333},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.7153760194778442},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.5728760957717896},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5662693977355957},{"id":"https://openalex.org/C2776436953","wikidata":"https://www.wikidata.org/wiki/Q5163215","display_name":"Consistency (knowledge bases)","level":2,"score":0.5565702319145203},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.5021347999572754},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.4747096598148346},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.41411447525024414},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3242782652378082},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2969094216823578},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.13359680771827698}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/isncc49221.2020.9297326","is_oa":false,"landing_page_url":"https://doi.org/10.1109/isncc49221.2020.9297326","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2020 International Symposium on Networks, Computers and Communications (ISNCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":53,"referenced_works":["https://openalex.org/W1508143344","https://openalex.org/W1526359699","https://openalex.org/W1592932141","https://openalex.org/W1604617555","https://openalex.org/W1973501242","https://openalex.org/W1980650074","https://openalex.org/W2003214215","https://openalex.org/W2024624176","https://openalex.org/W2030877481","https://openalex.org/W2075854425","https://openalex.org/W2102526983","https://openalex.org/W2107815843","https://openalex.org/W2120510885","https://openalex.org/W2156580773","https://openalex.org/W2182688186","https://openalex.org/W2281208003","https://openalex.org/W2486460265","https://openalex.org/W2614305404","https://openalex.org/W2624307925","https://openalex.org/W2726001757","https://openalex.org/W2754866430","https://openalex.org/W2794533297","https://openalex.org/W2794647042","https://openalex.org/W2801673812","https://openalex.org/W2802417999","https://openalex.org/W2914797198","https://openalex.org/W2921874430","https://openalex.org/W2921980263","https://openalex.org/W2926987861","https://openalex.org/W2945978829","https://openalex.org/W2950226614","https://openalex.org/W2963517786","https://openalex.org/W2963519394","https://openalex.org/W2963822137","https://openalex.org/W2981750966","https://openalex.org/W2986719485","https://openalex.org/W3009356768","https://openalex.org/W3011600599","https://openalex.org/W3098532907","https://openalex.org/W3137220996","https://openalex.org/W3151748982","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W4251986490","https://openalex.org/W4295720133","https://openalex.org/W4313679519","https://openalex.org/W6682904396","https://openalex.org/W6686169942","https://openalex.org/W6740384779","https://openalex.org/W6749548732","https://openalex.org/W6751564047","https://openalex.org/W6793285265","https://openalex.org/W6903913235"],"related_works":["https://openalex.org/W2998727879","https://openalex.org/W4288627412","https://openalex.org/W2911946911","https://openalex.org/W3155932073","https://openalex.org/W3098545956","https://openalex.org/W4293865007","https://openalex.org/W2773507181","https://openalex.org/W4303443798","https://openalex.org/W4312378530","https://openalex.org/W4225494391"],"abstract_inverted_index":{"The":[0,93,115],"blockchain":[1,91],"technology":[2],"revolution":[3],"and":[4,17,20,27,39,47,63,81,89,105,126,161,167],"the":[5,32,37,55,68,100,111,137,176],"use":[6],"of":[7,41,53,96,102,140,163,179],"blockchains":[8],"in":[9,14,86,128],"various":[10],"applications":[11],"have":[12],"resulted":[13],"many":[15],"companies":[16],"programmers":[18],"developing":[19],"customizing":[21],"specific":[22,138],"fit-for-purpose":[23],"consensus":[24,34,75,129],"algorithms.":[25],"Security":[26],"performance":[28],"are":[29,99,133],"determined":[30],"by":[31,151],"chosen":[33],"algorithm;":[35],"hence,":[36],"reliability":[38],"security":[40,56],"these":[42,103],"algorithms":[43,61],"must":[44],"be":[45],"assured":[46],"tested,":[48],"which":[49,132],"requires":[50],"an":[51],"understanding":[52],"all":[54],"assumptions":[57],"that":[58,71,109,158],"make":[59],"such":[60],"correct":[62],"byzantine":[64,82],"fault-tolerant.This":[65],"paper":[66,98,156],"studies":[67],"\"security":[69],"ingredients\"":[70],"enable":[72],"a":[73,106,141],"given":[74,142],"algorithm":[76,130],"to":[77,120,174],"achieve":[78],"safety,":[79],"liveness,":[80],"fault":[83],"tolerance":[84],"(BFT)":[85],"both":[87],"permissioned":[88],"permissionless":[90],"systems.":[92],"key":[94],"contributions":[95],"this":[97,155,170],"organization":[101],"requirements":[104,112],"new":[107],"taxonomy":[108],"describes":[110],"for":[113],"security.":[114],"CAP":[116],"Theorem":[117],"is":[118],"utilized":[119],"explain":[121],"important":[122],"tradeoffs":[123],"between":[124],"consistency":[125,164],"availability":[127,166],"design,":[131],"crucial":[134],"depending":[135],"on":[136],"application":[139],"algorithm.":[143],"This":[144],"topic":[145],"has":[146],"also":[147],"been":[148],"explored":[149],"previously":[150],"De":[152],"Angelis.":[153],"However,":[154],"expands":[157],"prior":[159],"explanation":[160],"dilemma":[162],"vs.":[165],"then":[168],"combines":[169],"with":[171],"Buterin's":[172],"Trilemma":[173],"complete":[175],"overall":[177],"exposition":[178],"tradeoffs.":[180]},"counts_by_year":[{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":5},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":4}],"updated_date":"2026-03-01T08:55:55.761014","created_date":"2025-10-10T00:00:00"}
