{"id":"https://openalex.org/W4412062529","doi":"https://doi.org/10.1186/s42400-025-00362-9","title":"Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures","display_name":"Grouped Byzantine fault tolerant consensus algorithm based on aggregated signatures","publication_year":2025,"publication_date":"2025-07-07","ids":{"openalex":"https://openalex.org/W4412062529","doi":"https://doi.org/10.1186/s42400-025-00362-9"},"language":"en","primary_location":{"id":"doi:10.1186/s42400-025-00362-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00362-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00362-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00362-9","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100751600","display_name":"Yong Wang","orcid":"https://orcid.org/0000-0002-5383-5736"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yong Wang","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101545464","display_name":"Qian Wan","orcid":null},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qiancheng Wan","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000234334","display_name":"Yucheng Wu","orcid":"https://orcid.org/0000-0002-8231-8172"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yifan Wu","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100611490","display_name":"Lijie Chen","orcid":"https://orcid.org/0000-0002-6084-4729"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I5343935","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42","country_code":"CN","type":"education","lineage":["https://openalex.org/I5343935"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Lijie Chen","raw_affiliation_strings":["Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China"],"affiliations":[{"raw_affiliation_string":"Guangxi Key Laboratory of Cryptography and Information Security, Guilin, 541000, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"School of Computer Science and Information Security, Guilin University of Electronic Technology, Guilin, 541004, China","institution_ids":["https://openalex.org/I5343935"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100751600"],"corresponding_institution_ids":["https://openalex.org/I4210132990","https://openalex.org/I5343935"],"apc_list":null,"apc_paid":null,"fwci":2.9537,"has_fulltext":true,"cited_by_count":2,"citation_normalized_percentile":{"value":0.91891816,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":91,"max":99},"biblio":{"volume":"8","issue":"1","first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.996999979019165,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.965399980545044,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5838583111763},{"id":"https://openalex.org/keywords/byzantine-fault-tolerance","display_name":"Byzantine fault tolerance","score":0.5616562366485596},{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.5109319090843201},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42711177468299866},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.42176276445388794},{"id":"https://openalex.org/keywords/fault-tolerance","display_name":"Fault tolerance","score":0.2996350824832916},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.25816580653190613}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5838583111763},{"id":"https://openalex.org/C168021876","wikidata":"https://www.wikidata.org/wiki/Q1353446","display_name":"Byzantine fault tolerance","level":3,"score":0.5616562366485596},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.5109319090843201},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42711177468299866},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.42176276445388794},{"id":"https://openalex.org/C63540848","wikidata":"https://www.wikidata.org/wiki/Q3140932","display_name":"Fault tolerance","level":2,"score":0.2996350824832916},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.25816580653190613}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1186/s42400-025-00362-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00362-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00362-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1a97e64bc5664c6a81371a31d3243b90","is_oa":true,"landing_page_url":"https://doaj.org/article/1a97e64bc5664c6a81371a31d3243b90","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cybersecurity, Vol 8, Iss 1, Pp 1-13 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1186/s42400-025-00362-9","is_oa":true,"landing_page_url":"https://doi.org/10.1186/s42400-025-00362-9","pdf_url":"https://cybersecurity.springeropen.com/counter/pdf/10.1186/s42400-025-00362-9","source":{"id":"https://openalex.org/S3035238565","display_name":"Cybersecurity","issn_l":"2523-3246","issn":["2523-3246"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cybersecurity","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1033922712","display_name":null,"funder_award_id":"KX202328","funder_id":"https://openalex.org/F4320336367","funder_display_name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology"}],"funders":[{"id":"https://openalex.org/F4320323266","display_name":"Guilin University of Electronic Technology","ror":"https://ror.org/05arjae42"},{"id":"https://openalex.org/F4320336367","display_name":"Guangxi Key Laboratory of Trusted Software, Guilin University of Electronic Technology","ror":null},{"id":"https://openalex.org/F4320337368","display_name":"Division of Graduate Education","ror":"https://ror.org/00whkrf32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4412062529.pdf","grobid_xml":"https://content.openalex.org/works/W4412062529.grobid-xml"},"referenced_works_count":43,"referenced_works":["https://openalex.org/W808860418","https://openalex.org/W2114579022","https://openalex.org/W2120510885","https://openalex.org/W2156523427","https://openalex.org/W2480510614","https://openalex.org/W2534313446","https://openalex.org/W2584120063","https://openalex.org/W2916931547","https://openalex.org/W2964159515","https://openalex.org/W2969395421","https://openalex.org/W2971709009","https://openalex.org/W2998562842","https://openalex.org/W3003936169","https://openalex.org/W3016687266","https://openalex.org/W3040708662","https://openalex.org/W3041649336","https://openalex.org/W3042588811","https://openalex.org/W3046264753","https://openalex.org/W3091665258","https://openalex.org/W3102600874","https://openalex.org/W3108722340","https://openalex.org/W3124927426","https://openalex.org/W3125673262","https://openalex.org/W3139203732","https://openalex.org/W3159661279","https://openalex.org/W3179056683","https://openalex.org/W3217650101","https://openalex.org/W4286470730","https://openalex.org/W4293057141","https://openalex.org/W4301187814","https://openalex.org/W4308642224","https://openalex.org/W4308661851","https://openalex.org/W4313254960","https://openalex.org/W4320717855","https://openalex.org/W4327784918","https://openalex.org/W4366977140","https://openalex.org/W4386211363","https://openalex.org/W4386364565","https://openalex.org/W4387019186","https://openalex.org/W4388302078","https://openalex.org/W4389509728","https://openalex.org/W4390155112","https://openalex.org/W4404257738"],"related_works":["https://openalex.org/W4400410098","https://openalex.org/W3194244590","https://openalex.org/W3210065602","https://openalex.org/W4292223684","https://openalex.org/W4366607545","https://openalex.org/W3132443168","https://openalex.org/W4200413673","https://openalex.org/W4313015754","https://openalex.org/W3088605168","https://openalex.org/W4313890288"],"abstract_inverted_index":{"Abstract":[0],"The":[1,112],"Practical":[2],"Byzantine":[3,41],"Fault":[4],"Tolerance":[5],"consensus":[6,114,131],"algorithm":[7,51,139],"faces":[8],"several":[9],"challenges":[10],"in":[11],"large-scale":[12,156],"networks,":[13],"such":[14],"as":[15],"the":[16,65,84,87,93,137],"simplistic":[17],"primary":[18],"node":[19,103,106,117],"selection,":[20],"high":[21],"communication":[22,59,124,150],"overhead,":[23,151],"poor":[24],"scalability,":[25],"and":[26,60,82,104,119,126,130,144,149],"low":[27],"costs":[28],"for":[29,155],"malicious":[30],"behavior.":[31],"To":[32],"address":[33],"these":[34],"issues,":[35],"this":[36],"paper":[37],"proposes":[38],"a":[39,71,109],"Grouped":[40],"Fault-Tolerant":[42],"Consensus":[43],"Algorithm":[44],"based":[45],"on":[46],"aggregated":[47,53],"signatures":[48,66],"(GABFT).":[49],"This":[50,74],"utilizes":[52],"signature":[54],"technology":[55],"to":[56,101],"reduce":[57],"both":[58],"storage":[61],"overhead":[62],"by":[63,79],"combining":[64],"of":[67,86],"multiple":[68],"nodes":[69,81],"into":[70],"single":[72],"signature.":[73],"effectively":[75],"prevents":[76],"dishonest":[77],"behavior":[78,107],"proxy":[80],"ensures":[83],"security":[85],"consensus.":[88],"Additionally,":[89],"we":[90],"have":[91],"developed":[92],"HonestPeer++":[94],"reputation":[95],"model.":[96],"It":[97],"assigns":[98],"trust":[99],"values":[100],"each":[102],"regulates":[105],"through":[108],"penalty":[110],"mechanism.":[111],"optimized":[113],"protocol":[115],"adopts":[116],"grouping":[118],"one-to-many":[120],"communication,":[121],"achieving":[122],"linear":[123],"complexity":[125],"enhancing":[127],"system":[128,142],"scalability":[129,145],"efficiency.":[132],"Experimental":[133],"results":[134],"show":[135],"that":[136],"GABFT":[138],"significantly":[140],"improves":[141],"throughput":[143],"while":[146],"reducing":[147],"latency":[148],"making":[152],"it":[153],"well-suited":[154],"networks.":[157]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-01T17:29:45.350535","created_date":"2025-10-10T00:00:00"}
