{"id":"https://openalex.org/W7148610674","doi":"https://doi.org/10.1109/tifs.2026.3679943","title":"CShard: Blockchain Sharding via Repairable Fountain Codes and the Paradigm for Sharding Design","display_name":"CShard: Blockchain Sharding via Repairable Fountain Codes and the Paradigm for Sharding Design","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7148610674","doi":"https://doi.org/10.1109/tifs.2026.3679943"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3679943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3679943","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5132797180","display_name":"Sheng Cao","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Sheng Cao","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), Sichuan Digital Economy Research Institute (Yibin), University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0002-0929-9067","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), Sichuan Digital Economy Research Institute (Yibin), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5132804552","display_name":"Yifan Tian","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifan Tian","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Junjie Peng","orcid":"https://orcid.org/0009-0001-5556-8870"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Junjie Peng","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0009-0001-5556-8870","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5089947502","display_name":"Butian Huang","orcid":"https://orcid.org/0009-0009-5986-697X"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Butian Huang","raw_affiliation_strings":["School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0009-0009-5986-697X","affiliations":[{"raw_affiliation_string":"School of Cyberspace Security, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5132822951","display_name":"Xiaosong Zhang","orcid":null},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China"],"raw_orcid":"https://orcid.org/0000-0001-9886-1412","affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering (School of Cyber Security), University of Electronic Science and Technology of China, Chengdu, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5132797180"],"corresponding_institution_ids":["https://openalex.org/I150229711"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.81385497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3615","last_page":"3629"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.13169999420642853,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.13169999420642853,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.07559999823570251,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.061400000005960464,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fountain-code","display_name":"Fountain code","score":0.5644000172615051},{"id":"https://openalex.org/keywords/fountain","display_name":"Fountain","score":0.43320000171661377},{"id":"https://openalex.org/keywords/server","display_name":"Server","score":0.325300008058548},{"id":"https://openalex.org/keywords/integrated-circuit-design","display_name":"Integrated circuit design","score":0.32190001010894775},{"id":"https://openalex.org/keywords/decoding-methods","display_name":"Decoding methods","score":0.32030001282691956},{"id":"https://openalex.org/keywords/maintenance-engineering","display_name":"Maintenance engineering","score":0.31459999084472656}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8113999962806702},{"id":"https://openalex.org/C76132124","wikidata":"https://www.wikidata.org/wiki/Q5474786","display_name":"Fountain code","level":5,"score":0.5644000172615051},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.4738999903202057},{"id":"https://openalex.org/C2778379427","wikidata":"https://www.wikidata.org/wiki/Q483453","display_name":"Fountain","level":2,"score":0.43320000171661377},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.38269999623298645},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.325300008058548},{"id":"https://openalex.org/C74524168","wikidata":"https://www.wikidata.org/wiki/Q1074539","display_name":"Integrated circuit design","level":2,"score":0.32190001010894775},{"id":"https://openalex.org/C57273362","wikidata":"https://www.wikidata.org/wiki/Q576722","display_name":"Decoding methods","level":2,"score":0.32030001282691956},{"id":"https://openalex.org/C23725684","wikidata":"https://www.wikidata.org/wiki/Q616377","display_name":"Maintenance engineering","level":2,"score":0.31459999084472656},{"id":"https://openalex.org/C106516650","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm design","level":2,"score":0.2782000005245209},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2759000062942505},{"id":"https://openalex.org/C131017901","wikidata":"https://www.wikidata.org/wiki/Q170451","display_name":"Logic gate","level":2,"score":0.26339998841285706},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2554999887943268},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.25369998812675476}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3679943","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3679943","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7819769978523254,"id":"https://metadata.un.org/sdg/11","display_name":"Sustainable cities and communities"}],"awards":[{"id":"https://openalex.org/G1594973751","display_name":null,"funder_award_id":"U2336204","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G3409775241","display_name":null,"funder_award_id":"62472075","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Sharding":[0],"is":[1,17,54,124,183,267],"an":[2,131],"important":[3],"solution":[4],"to":[5,18,28,50,84,125,139,157,193,233,255,268,299,310],"improve":[6],"the":[7,57,75,88,97,136,159,180,214,224,241,253,261,265,270,281,311],"scalability":[8],"of":[9,14,90,93,100,122,166,198,205,216,272,283,293],"blockchain.":[10],"The":[11,32,119,164,244],"basic":[12],"idea":[13,121],"blockchain":[15,109,217],"sharding":[16,34,63,76,101,110,141,181,200,242,285,316],"separate":[19],"transactions":[20],"among":[21,47,149],"multiple":[22,71],"disjoint":[23],"shards":[24,48,72,150,258],"processing":[25,115],"in":[26,213,240,274,295],"parallel":[27],"maximize":[29],"system":[30,77,182],"performance.":[31],"current":[33],"protocols":[35,317],"mainly":[36],"rely":[37],"on":[38],"node":[39,42],"rotation":[40],"(namely,":[41],"allocation":[43],"and":[44,179,186,209,259,313],"migration)":[45],"randomly":[46],"periodically":[49],"ensure":[51,300],"security,":[52],"which":[53,153,279],"often":[55],"considered":[56],"most":[58],"challenging":[59],"when":[60],"developing":[61],"a":[62,68,108,195,199,203,235,275,290,296],"system.":[64],"However,":[65],"(1)":[66],"if":[67],"shard":[69,86,95,177,277,298],"or":[70],"are":[73,151,154],"corrupted,":[74],"will":[78],"not":[79],"be":[80,170,308],"available":[81],"anymore;":[82],"(2)":[83],"avoid":[85],"corruption,":[87],"demand":[89],"large":[91],"size":[92],"each":[94],"limits":[96],"throughput":[98],"performance":[99],"protocols.":[102],"To":[103,219],"solve":[104,220],"(1),":[105],"we":[106,222],"introduce":[107],"protocol":[111],"with":[112,135],"scale-out":[113],"transaction":[114,236],"capacity":[116],"called":[117],"CShard.":[118],"main":[120],"CShard":[123],"use":[126],"repairable":[127],"fountain":[128],"codes":[129],"(RFCs),":[130],"information":[132],"coding":[133],"method":[134],"locality":[137],"feature,":[138],"innovate":[140],"design.":[142],"By":[143],"adjusting":[144],"encoding":[145,191],"parameters,":[146],"topological":[147],"associations":[148],"constructed,":[152],"then":[155],"utilized":[156],"define":[158],"verification":[160],"logic":[161],"for":[162,318],"transactions.":[163],"blocks":[165,262],"corrupted":[167,257],"shard(s)":[168],"can":[169,306],"recovered":[171],"through":[172],"decoding":[173],"by":[174,237,263],"its":[175,319],"corresponding":[176],"group(s),":[178],"still":[184],"secure":[185],"available.":[187],"Our":[188],"approach":[189],"utilizes":[190],"techniques":[192],"build":[194],"general":[196],"architecture":[197],"system,":[201],"establishing":[202],"paradigm":[204],"\u201cencoding":[206],"as":[207],"verification\u201d":[208],"showcases":[210],"new":[211],"horizons":[212],"field":[215],"sharding.":[218],"(2),":[221],"propose":[223],"ghost":[225],"reporter":[226],"mechanism":[227,245,305],"that":[228,287],"gives":[229],"all":[230],"nodes":[231,273,294],"chances":[232],"verify":[234],"submitting":[238],"reports":[239],"network.":[243],"brings":[246],"two":[247],"direct":[248],"benefits.":[249],"Firstly,":[250],"it":[251],"provides":[252],"way":[254],"detect":[256],"recover":[260],"RFCs;":[264],"second":[266],"make":[269],"number":[271,292],"single":[276,297],"smaller,":[278],"solves":[280],"limitation":[282],"existing":[284],"schemes":[286],"usually":[288],"require":[289],"larger":[291],"security.":[301],"In":[302],"principle,":[303],"this":[304],"also":[307],"applicable":[309],"known":[312],"even":[314],"unknown":[315],"generality.":[320]},"counts_by_year":[],"updated_date":"2026-04-08T06:01:36.053099","created_date":"2026-04-03T00:00:00"}
