{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:56:11Z","timestamp":1772906171018,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,12,15]],"date-time":"2023-12-15T00:00:00Z","timestamp":1702598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Xi'an Jiaotong-Liverpool University Research Development Fund","award":["RDF-22-02-106"],"award-info":[{"award-number":["RDF-22-02-106"]}]},{"name":"Guangdong Basic and Applied Basic Research Foundation","award":["2021A1515110286"],"award-info":[{"award-number":["2021A1515110286"]}]},{"DOI":"10.13039\/501100006374","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["G2021KY05101"],"award-info":[{"award-number":["G2021KY05101"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Basic Research Programs of Taicang","award":["TC2022JC23"],"award-info":[{"award-number":["TC2022JC23"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,12,15]]},"DOI":"10.1145\/3651655.3651663","type":"proceedings-article","created":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T16:13:56Z","timestamp":1716999236000},"page":"70-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["ZK-BFT: A Zero-knowledge and Byzantine Fault Tolerant Consensus for Permissioned Blockchain Networks"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4482-4445","authenticated-orcid":false,"given":"Wanxin","family":"Li","sequence":"first","affiliation":[{"name":"Department of Communications and Networking, Xi'an Jiaotong-Liverpool University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5245-6139","authenticated-orcid":false,"given":"Collin","family":"Meese","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Delaware, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2231-5735","authenticated-orcid":false,"given":"Mark","family":"Nejad","sequence":"additional","affiliation":[{"name":"Department of Civil and Environmental Engineering, University of Delaware, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2091-2771","authenticated-orcid":false,"given":"Hao","family":"Guo","sequence":"additional","affiliation":[{"name":"School of Software, Northwestern Polytechnical University, Taicang Campus, China"}]}],"member":"320","published-online":{"date-parts":[[2024,5,29]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.113385"},{"key":"e_1_3_2_2_2_1","volume-title":"transparent, and post-quantum secure computational integrity.IACR Cryptol. ePrint Arch. 2018","author":"Ben-Sasson Eli","year":"2018","unstructured":"Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. 2018. Scalable, transparent, and post-quantum secure computational integrity.IACR Cryptol. ePrint Arch. 2018 (2018), 46."},{"key":"e_1_3_2_2_3_1","volume-title":"23rd { USENIX} Security Symposium ({ USENIX} Security 14). 781\u2013796.","author":"Ben-Sasson Eli","unstructured":"Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, and Madars Virza. 2014. Succinct non-interactive zero knowledge for a von Neumann architecture. In 23rd { USENIX} Security Symposium ({ USENIX} Security 14). 781\u2013796."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_11"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERVICES48979.2020.00049"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"},{"key":"e_1_3_2_2_7_1","unstructured":"Miguel Castro Barbara Liskov 1999. Practical byzantine fault tolerance. In OSDI Vol.\u00a099. 173\u2013186."},{"key":"e_1_3_2_2_8_1","series-title":"SIAM Journal on computing 18, 1","volume-title":"The knowledge complexity of interactive proof systems","author":"Goldwasser Shafi","year":"1989","unstructured":"Shafi Goldwasser, Silvio Micali, and Charles Rackoff. 1989. The knowledge complexity of interactive proof systems. SIAM Journal on computing 18, 1 (1989), 186\u2013208."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169395"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2022.3186006"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2023.3318990"},{"key":"e_1_3_2_2_12_1","volume-title":"Secure information networks","author":"Jakobsson Markus","unstructured":"Markus Jakobsson and Ari Juels. 1999. Proofs of work and bread pudding protocols. In Secure information networks. Springer, 258\u2013272."},{"key":"e_1_3_2_2_13_1","volume-title":"Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11","author":"Kwon Jae","year":"2014","unstructured":"Jae Kwon. 2014. Tendermint: Consensus without mining. Draft v. 0.6, fall 1, 11 (2014)."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/HotICN50779.2020.9350858"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2023.3271436"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HotICN53262.2021.9680829"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","unstructured":"Wanxin Li Collin Meese Zijia\u00a0Gary Zhong Hao Guo and Mark Nejad. 2021. Location-aware Verification for Autonomous Truck Platooning Based on Blockchain and Zero-knowledge Proof. In 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). 1\u20135. https:\/\/doi.org\/10.1109\/ICBC51069.2021.9461116","DOI":"10.1109\/ICBC51069.2021.9461116"},{"key":"e_1_3_2_2_18_1","unstructured":"Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm. In 2014 { USENIX} Annual Technical Conference ({ USENIX}{ ATC} 14). 305\u2013319."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-6596\/978\/1\/012116"},{"key":"e_1_3_2_2_20_1","volume-title":"Blockchain without waste: Proof-of-stake. The Review of financial studies 34, 3","author":"Saleh Fahad","year":"2021","unstructured":"Fahad Saleh. 2021. Blockchain without waste: Proof-of-stake. The Review of financial studies 34, 3 (2021), 1156\u20131190."}],"event":{"name":"ICBTA 2023: 2023 6th International Conference on Blockchain Technology and Applications","location":"Xi'an China","acronym":"ICBTA 2023"},"container-title":["Proceedings of the 2023 6th International Conference on Blockchain Technology and Applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651655.3651663","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3651655.3651663","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,23]],"date-time":"2025-08-23T18:12:43Z","timestamp":1755972763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3651655.3651663"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,15]]},"references-count":20,"alternative-id":["10.1145\/3651655.3651663","10.1145\/3651655"],"URL":"https:\/\/doi.org\/10.1145\/3651655.3651663","relation":{},"subject":[],"published":{"date-parts":[[2023,12,15]]},"assertion":[{"value":"2024-05-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}