{"id":"https:\/\/openalex.org\/W4387947219","doi":"https:\/\/doi.org\/10.48550\/arxiv.2310.15460","title":"HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm","display_name":"HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm","publication_year":2023,"publication_date":"2023-10-24","ids":{"openalex":"https:\/\/openalex.org\/W4387947219","doi":"https:\/\/doi.org\/10.48550\/arxiv.2310.15460"},"language":"en","primary_location":{"id":"pmh:oai:arXiv.org:2310.15460","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2310.15460","pdf_url":"https:\/\/arxiv.org\/pdf\/2310.15460","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"type":"preprint","indexed_in":["arxiv","datacite"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https:\/\/arxiv.org\/pdf\/2310.15460","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5100666414","display_name":"Yang Li","orcid":"https:\/\/orcid.org\/0000-0003-4223-2048"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Li, Yang","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5035296513","display_name":"Chunhe Xia","orcid":"https:\/\/orcid.org\/0000-0003-4424-8449"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Xia, Chunhe","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5101460348","display_name":"Chunyan Li","orcid":"https:\/\/orcid.org\/0000-0001-9203-3456"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Li, Chunyan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5017039932","display_name":"Yuan Zhao","orcid":"https:\/\/orcid.org\/0000-0001-7642-3809"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zhao, Yuan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5111598130","display_name":"Chen Chen","orcid":"https:\/\/orcid.org\/0000-0002-4971-5029"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Chen, Chen","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5018085680","display_name":"Tianbo Wang","orcid":"https:\/\/orcid.org\/0000-0002-0227-9557"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Wang, Tianbo","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":6,"corresponding_author_ids":["https:\/\/openalex.org\/A5100666414"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":null,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":null,"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10101","display_name":"Cloud Computing and Resource Management","score":0.9739000201225281,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1710","display_name":"Information Systems"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.940500020980835,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.8059113025665283},{"id":"https:\/\/openalex.org\/keywords\/algorithm","display_name":"Algorithm","score":0.45736321806907654},{"id":"https:\/\/openalex.org\/keywords\/database-transaction","display_name":"Database transaction","score":0.45526978373527527},{"id":"https:\/\/openalex.org\/keywords\/distributed-computing","display_name":"Distributed computing","score":0.43337997794151306},{"id":"https:\/\/openalex.org\/keywords\/computer-network","display_name":"Computer network","score":0.38181501626968384},{"id":"https:\/\/openalex.org\/keywords\/computer-security","display_name":"Computer security","score":0.3446558117866516},{"id":"https:\/\/openalex.org\/keywords\/database","display_name":"Database","score":0.08094918727874756}],"concepts":[{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8059113025665283},{"id":"https:\/\/openalex.org\/C11413529","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8366","display_name":"Algorithm","level":1,"score":0.45736321806907654},{"id":"https:\/\/openalex.org\/C75949130","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q848010","display_name":"Database transaction","level":2,"score":0.45526978373527527},{"id":"https:\/\/openalex.org\/C120314980","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q180634","display_name":"Distributed computing","level":1,"score":0.43337997794151306},{"id":"https:\/\/openalex.org\/C31258907","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q1301371","display_name":"Computer network","level":1,"score":0.38181501626968384},{"id":"https:\/\/openalex.org\/C38652104","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q3510521","display_name":"Computer security","level":1,"score":0.3446558117866516},{"id":"https:\/\/openalex.org\/C77088390","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q8513","display_name":"Database","level":1,"score":0.08094918727874756}],"mesh":[],"locations_count":2,"locations":[{"id":"pmh:oai:arXiv.org:2310.15460","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2310.15460","pdf_url":"https:\/\/arxiv.org\/pdf\/2310.15460","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"doi:10.48550\/arxiv.2310.15460","is_oa":true,"landing_page_url":"https:\/\/doi.org\/10.48550\/arxiv.2310.15460","pdf_url":null,"source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":null,"raw_source_name":null,"raw_type":"article"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:2310.15460","is_oa":true,"landing_page_url":"http:\/\/arxiv.org\/abs\/2310.15460","pdf_url":"https:\/\/arxiv.org\/pdf\/2310.15460","source":{"id":"https:\/\/openalex.org\/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https:\/\/openalex.org\/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https:\/\/openalex.org\/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[{"id":"https:\/\/metadata.un.org\/sdg\/16","score":0.5400000214576721,"display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https:\/\/openalex.org\/G6559365115","display_name":null,"funder_award_id":"62272024","funder_id":"https:\/\/openalex.org\/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https:\/\/openalex.org\/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https:\/\/ror.org\/01h0zpd94"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https:\/\/content.openalex.org\/works\/W4387947219.pdf","grobid_xml":"https:\/\/content.openalex.org\/works\/W4387947219.grobid-xml"},"referenced_works_count":0,"referenced_works":[],"related_works":["https:\/\/openalex.org\/W2051487156","https:\/\/openalex.org\/W2073681303","https:\/\/openalex.org\/W2053286651","https:\/\/openalex.org\/W2181743346","https:\/\/openalex.org\/W2187401768","https:\/\/openalex.org\/W2181413294","https:\/\/openalex.org\/W2989452537","https:\/\/openalex.org\/W2052122378","https:\/\/openalex.org\/W2544423928","https:\/\/openalex.org\/W2062023542"],"abstract_inverted_index":{"The":[0,41],"consensus":[1,21,39,43,159,166],"algorithm":[2,44,64,97,160],"is":[3,30],"crucial":[4],"in":[5,27,135],"blockchain":[6,28,84],"for":[7],"ensuring":[8],"the":[9,16,63,80,83,113,142],"validity":[10],"and":[11,24,37,57,72,117,126,151],"security":[12,162],"of":[13,82],"transactions":[14,140],"across":[15],"decentralized":[17],"network.":[18,85],"However,":[19],"achieving":[20,164],"among":[22],"nodes":[23,102,112],"packaging":[25],"blocks":[26],"networks":[29],"a":[31,48,132],"complex":[32],"task":[33],"that":[34,137,156],"requires":[35],"efficient":[36],"secure":[38],"algorithms.":[40],"DPoS":[42,96],"has":[45],"emerged":[46],"as":[47,70],"popular":[49],"choice":[50],"due":[51],"to":[52,74,105,115,145],"its":[53],"fast":[54],"transaction":[55],"processing":[56],"high":[58,124,127],"throughput.":[59],"Despite":[60],"these":[61,88],"advantages,":[62],"still":[65],"suffers":[66],"from":[67,119],"weaknesses":[68],"such":[69],"centralization":[71,107],"vulnerability":[73],"long-range":[75,147],"attacks,":[76],"which":[77],"can":[78],"compromise":[79],"integrity":[81],"To":[86],"combat":[87],"problems,":[89],"we":[90,100,130],"developed":[91],"an":[92],"Enhanced":[93],"Anti-Long-Range":[94],"Attack":[95],"(HL-DPoS).":[98],"First,":[99],"split":[101],"into":[103],"pieces":[104],"reduce":[106],"issues":[108],"while":[109,163],"giving":[110],"witness":[111],"power":[114],"report":[116],"benefit":[118],"malicious":[120],"node's":[121],"reports,":[122],"maintaining":[123],"efficiency":[125],"security.":[128],"Second,":[129],"propose":[131],"validation":[133],"method":[134],"HL-DPoS":[136,158],"compares":[138],"consensuses":[139],"with":[141],"longest":[143],"chain":[144],"detect":[146],"attacks.":[148],"Algorithm":[149],"analysis":[150],"simulation":[152],"experiment":[153],"results":[154],"demonstrate":[155],"our":[157],"improves":[161],"better":[165],"performance.":[167]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-10T00:00:00"}