Cryptography 08 00012
Cryptography 08 00012
Cryptography 08 00012
Article
A Survey of Consortium Blockchain and Its Applications
Xiaotong Chen 1,2 , Songlin He 1,2 , Linfu Sun 1,2 , Yangxin Zheng 1,2 and Chase Q. Wu 3, *
Abstract: Blockchain is a revolutionary technology that has reshaped the trust model among mutu-
ally distrustful peers in a distributed network. While blockchain is well-known for its initial usage
in a public manner, such as the cryptocurrency of Bitcoin, consortium blockchain, which requires
authentication of all involved participants, has also been widely adopted in various domains. Never-
theless, there is a lack of comprehensive study of consortium blockchain in terms of its architecture
design, consensus mechanisms, comparative performance, etc. In this study, we aim to fill this gap
by surveying the most popular consortium blockchain platforms and assessing their core designs
in a layered fashion. Particularly, Byzantine fault tolerant (BFT) state machine replication (SMR) is
introduced to act as a basic computational model of consortium blockchain. Then the consortium
blockchain is split into the hardware layer, layer-0 (network layer), layer-I (data layer, consensus
layer and contract layer), layer-II protocols, and application layer. Each layer is presented with
closely related discussion and analysis. Furthermore, with the extraction of the core functionalities,
i.e., robust storage and guaranteed execution, that a consortium blockchain can provide, several
typical consortium blockchain-empowered decentralized application scenarios are introduced. With
these thorough studies and analyses, this work aims to systematize the knowledge dispersed in the
consortium blockchain, highlight the unsolved challenges, and also indicate the propitious avenues
of future work.
Fblockchain [succ]
1. Parameter: successor relationship succ : {0, 1}∗ × {0, 1}∗ → {0, 1}
2. Upon receiving (“init”): Storage := ∅
3. Upon receiving (“read”, id): output Storage[id], or ⊥ if not found
4. Upon receiving (“write”, id, inp) from P :
5. let val := Storage[id], set to ⊥ if not found
6. if succ(val, inp) = 1 then Storage[id] := val||(inp, P ); output (“receipt′′ , id)
7. else output (“reject′′ , id)
8. Upon receiving (“ ∈′′ , id, val):
9. if val ∈ Storage[id] then output true else output false
Figure 1. Blockchain ideal functionality [20]. The parameter succ models the validity check of a
transaction, P refers to a client, and inp means the input data submitted by P .
services, and typical algorithms are investigated. Layer I relates to the blockchain itself,
containing a data layer, a consensus layer and a smart contract layer. The layer II protocols
mainly function to improve the scalability and performance of layer I. Based on these
layers, blockchain empowers a wide range of applications. Such a layered architecture of
blockchain works as a main guide to survey related techniques in later sections.
2. Consortium Blockchain
In this section, we introduce the computational model of a consortium blockchain
and popular consortium blockchain platforms and then present the consortium blockchain in
a layered fashion including the hardware layer, network layer, layer I and layer II protocols.
peer node would reach the new identical state. From a global viewpoint, all the replicas
transfer their state S0 to S1 . It is worth pointing out that invalid commands would be
rejected during execution. Typically a SMR protocol meets the following requirements [23]:
(i) any honest replica ri starts with the state S0 ; (ii) The honest replicas r1 , r2 , · · · applying
the same sequence of execution operations {c1 , c2 , · · · } would all reach the new state S j ,
j ∈ {1, 2, · · · }. Such a process satisfies two key security properties: (i) liveness, every
submitted valid command would be added to the commit; (ii) consistency, all peer nodes
perceive the same commits even though there is a communication delay.
𝑐𝑜𝑚𝑚𝑖𝑡! …
{𝑐! , 𝑐" , 𝑐# , … } ! , {𝑐! , 𝑐" , 𝑐# , … }
𝑆, 𝑆 𝑆 𝑆!
system collapse; a blockchain system can tolerate partial, e.g., one-third of the nodes
misbehaving arbitrarily. Essentially, a consortium blockchain-enabled storage system
supports more robust byzantine fault tolerance instead of merely crash fault tolerance.
• Transaction processing. Though most consortium blockchain systems also support
parallel transaction processing capability, they differ from the database systems in
several aspects: (i) consortium blockchain commits transactions at the block level while
the database commits at the individual transaction level; (ii) consortium blockchain
is a distributed system where the state is fully replicated across the network and the
transaction operates on all nodes, while for a database system, the transactions usually
operate on a subset of network nodes; (iii) during transaction execution, the state on
different nodes may differ in a consortium blockchain network, while for a database,
a transaction is executed once against the only state present in the system; (iv) the
factors dominating the performance of a consortium blockchain and a database is
distinct, i.e., cryptographic primitive computations, network communication for the
former, and the locking mechanism of concurrency control for the latter.
It is strongly believed that transitioning the technology of storage from a traditional
database system to a consortium blockchain is the right direction, and we have seen several
works [38,39] that are dedicated to research in such a field. Consortium blockchains indeed
possess the potential to improve storage robustness. However, the storage cost is huge as all
nodes need to store a full copy of the data submitted to the consortium blockchain network.
A group of work also concentrated on reducing the on-chain storage costs, as tabulated
in Table 1.
Table 1. The methods for reducing consortium blockchain on-chain storage costs.
to committing nodes or committers, which would write to the distributed ledger upon the
validation of the generated blocks pass. Note, that the orderers can either be the full nodes
in the blockchain network or extra servers can be employed. Surrounding Hyperledger
Fabric, research mainly focusing on the following aspects is conducted: (i) performance
modeling and analysis [55–57]; (ii) privacy and security [58–60]; (iii) interoperability [34,61];
(iv) benchmark and visualization [57,62,63].
2.2.3. Ethereum
Ethereum [5] is blockchain 2.0 since it supports the Turing-complete smart contract,
which enables the execution of much more complex logic in various application scenarios
beyond cryptocurrency. In contrast to the unspent transaction output (UTXO) model in
Bitcoin, Ethereum is designed with the account-based model where the latest balance for a
user equipping with a public-private key pair is bound with his/her address (hash of the
user’s public key). In addition, Ethereum has transitioned its consensus mechanism from
Proof of Work (PoW) to Proof of Stake (PoS) in 2022, i.e., the so-called Merge [64], to signifi-
cantly reduce the criticized energy cost. Ethereum is usually characterized by three features:
(i) smart contract [65]; (ii) Ethereum virtual machine (EVM) [66] and (iii) decentralized
applications (DAPPs) [67]. Apart from the wide application in public settings, Ethereum
can also be deployed in a consortium [68] or private [69] manner. It is worth pointing
out that Ethereum is popularized as a public blockchain protocol, yet it also supports the
customization of building a consortium blockchain environment for diversified application
scenarios [70,71].
2.2.5. Corda
Corda [73] is a distributed ledger platform designed specifically for the financial sector.
It is utilized by over 60 companies, banks such as HSBC, J.P. Morgan, and institutions like
Cryptography 2024, 8, 12 7 of 25
Intel, Microsoft and NASDAQ [74]. There exist several key differences [75] between Corda
and conventional blockchains: (i) there are no transactions structured in blocks; (ii) the
occurred transactions are only shared with involved parties instead of all participants; (iii) a
set of trusted parties called notaries are introduced in order to prevent a double-spending
attack. In light of these characteristics, Corda highlights three key properties:
• Privacy. Corda prioritizes privacy by design, ensuring that transactions are only shared
on a need-to-know basis. Unlike many other blockchains, Corda achieves a weaker
security notion partial consistency where parties in the blockchain network may only
see part of the state but accumulating all parties’ states can result in the global view.
This minimizes the exposure of sensitive data and reduces the network load and
storage requirements [35].
• Scalability. Unlike many other blockchains, Corda does not rely on a global consensus
mechanism that requires every node to validate every transaction but instead utilizes
a pluggable notary service that can employ various consensus algorithms depending
on the use case. Such a design allows Corda to handle high transaction volumes and
complex business logic without compromising performance or security [76].
• Interoperability. Corda allows businesses to use their legacy infrastructure while
benefiting from the advantages of distributed ledger technology. It also supports
interoperability among different Corda networks, as well as with other blockchain
platforms via the use of common standards and protocols. Such a design enables
cross-industry and cross-border collaboration and innovation [77].
2.2.6. Quorum
Quorum [78] is an Ethereum-based, enterprise-focused, permissioned blockchain in-
frastructure specifically designed for financial use cases [37]. This open-source project was
initiated by J.P. Morgan Chase and has been acquired by ConsenSys. Quorum contains two
blockchain projects: one is based on GoQuorum [79], and the other one is based on Hyper-
ledger Besu [80]. Each Quorum node is composed of two main services: (i) Quorum client,
which is responsible for executing the Ethereum p2p protocol and the consensus algorithm;
(ii) privacy manager, which enables private transactions and smart contract operations. As a
consortium blockchain, Quorum is mainly introduced to satisfy the following demands [81]:
(i) empowered by the privacy manager to execute private transactions and smart contract
operations; (ii) supporting multiple pluggable consensus mechanisms; (iii) enabling flexible
and expressive network permissions management.
2.2.7. Ripple
Ripple [82] is a real-time gross settlement (RTGS) system aiming at fast global pay-
ments, asset exchange, and settlement [83]. Ripple maintains a ledger of transactions
where participants can trade user-issued currencies along with the native cryptocurrency of
Ripple, i.e., XRP. The Ripple protocol consensus algorithm (RPCA) allows for a flexible security
assumption for consensus protocols (typically tolerating < 1/3 faulty nodes) in the sense
that each node can declare which nodes it trusts instead of using a global assumption about
how many faulty nodes may collude simultaneously and misbehave. In practical usage,
a company that wants to employ the Ripple network can develop software and interact
with it, e.g., SAP developed a Ripple-enabled application for cross-border payments be-
tween two banks which significantly decreased time costs, i.e., from six business days to
only 20 s [84].
Table 2 presents the comparison of the aforementioned consortium blockchain plat-
forms in terms of their data models, supported consensus mechanisms, state databases,
highlighted properties and performance under specific experimental environments.
Cryptography 2024, 8, 12 8 of 25
Performance
Platform Data Model Consensus State Database Highlights
Tested Net. TPS (tx/s)
Hyperledger CouchDB, Pluggable Consensus,
Account Based Raft, PBFT 4 nodes ∼3000
Fabric [54] LevelDB Scalability
Turing-Complete Smart
Ethereum [85] Account Based PoW, PoS MPT 10 nodes ∼6000
Contract
FISCO BCOS [33] Account Based Raft, PBFT LevelDB Efficiency, Flexibility 6 nodes ∼3000
Corda [86] UTXO Based Raft, PBFT H2 Privacy, Scalability 4 node ∼2500
Quorum [87] Account Based Raft, PBFT Go-Ethereum Modularity, Privacy 3 nodes ∼2000
Ripple Data
Ripple [88] XRP Rippled Database RTGS, Native Token 16 nodes ∼1000
Model
Table 3. Related surveys involving consensus mechanisms (Fully: , Partial: ∗, Not Applicable: ×).
Consensus Consortium
Surveys Year
Comparison Blockchain-Specific
Du et al. [118] ∗ 2017
Nguyen et al. [119] ∗ 2018
Alsunaidi et al. [120] ∗ 2020
Fu et al. [121] ∗ 2020
Cryptography 2024, 8, 12 11 of 25
Table 3. Cont.
Consensus Consortium
Surveys Year
Comparison Blockchain-Specific
Wan et al. [122] ∗ 2020
Ferdous et al. [123] × 2021
Lashkari et al. [124] 2021
Bouraga [125] ∗ 2021
Divya et al. [126] ∗ 2021
Khan et al. [127] ∗ 2022
Yao et al. [128] 2023
Guru et al. [129] × × 2023
Morais et al. [130] ∗ 2023
Consensus Mechanisms Supportive Blockchain Type Safety Scalability Costs Tolerance Threshold
Raft [130,131] Consortium H
# #
H n/2
PoS [132] Consortium, Public # # H→
# n/2
PoA [133] Consortium, Private #→#
H -
PoET [132] Consortium, Private H
# # n/2
PoC [134] Consortium, Public # # -
DPoS [135] Consortium, Public H
# # n/2
FBA [136] Consortium, Private # # -
PBFT [32] Consortium # H
# H
# n/3
RBFT [136] Consortium # H
# H
# n/3
BFT-SMART [136] Consortium # H
# #→#
H n/3
RPCA [136] Consortium # # #
H n/5
SCP [136] Consortium, Public # # n/3
HotStuff [136] Consortium, Private # # n/3
Tendermint [137] Consortium, Public # # #
H n/2
HoneyBadger [138] Consortium # # #
H n/2
Dumbo [139] Public, Consortium, Private # # n/3
itself, via designing alternative consensus mechanisms [141] or adopting techniques such as
sharding [142] and side-chains [143]. However, these layer-I solutions possess shortcomings,
e.g., adopting new consensus means changing the core part of a blockchain network, leading
to blockchain forking and making the blockchain system backward incompatible. Similarly,
sharding implies significant changes in existing blockchain architecture, which seriously
hinders its usage in practice.
Layer II protocols are meant to increase the scalability of the underlying blockchain
network, thus considerably improving the performance without modifying anything in
layer-I. The rationale behind the Layer-II protocols lies in enabling users to perform transac-
tions off-chain via private and authenticated communication. Particularly, layer-II protocols
can be divided into three categories: (i) channels, which establish a private p2p medium
governed by pre-agreed rules that deployed as smart contracts, and allow users to consent
to state updates with state transitions exchanged off-chain [109]. Channels can further
be categorized as state channel [144] and payment channel [145,146], where the former is a
generalized version and the latter is specific to payment-oriented applications; (ii) commit
chains, where an operator can launch a commit-chain and users can join by contacting
the operator and submitting transactions. The operator can then periodically submit a
commitment to all collected transactions to the parent chain. The typical protocols include
NOCUST [147] and Plasma [148]; (iii) protocols for refereed delegation, which function to tackle
the disputes among participants, and typically include Truebit [149] and Arbitrum [150].
3.2. Healthcare
With the wide adoption of the Internet of Medical Things (IoMT), a great deal of
personal health data are collected as personal health records (PHRs). The global PHRs
market was about 26.8 billion dollars in 2020 with a probable compound annual growth
rate to reach 3.7% by 2028 [167]. Correspondingly, the sharing of PHRs becomes an urgent
demand since it can help significantly improve the accuracy of diagnosis, and also be
beneficial to disease study [168]. However, PHRs sharing is challenging since the data
might be manipulated improperly or revealed during the operational process. Thus,
protecting the data integrity and confidentiality is a basic requirement. To address these
issues, consortium blockchain emerges as a promising way to build trust among involved
hospitals and patients. In particular, [167] proposes a security-aware and privacy-preserved
PHR management and sharing scheme based on consortium blockchain where IPFS is
Cryptography 2024, 8, 12 14 of 25
involved to store PHR ciphertext, and zero-knowledge proof (ZKP) to provide evidence for
verifying keyword index authentication on-chain. The works [168–170] mainly focus on
privacy-preserved data sharing and access control based on consortium blockchain.
3.4. Agriculture
Current agricultural advancement and reform are calling for new techniques and
innovations to create a more transparent and accountable environment in the agriculture
sector [176]. The promising answer lies in blockchain, which can meet the diverse demands
in the ecosystem of agricultural products. Existing solutions hinging on a centralized man-
agement system suffer from several drawbacks: (i) the centralized server is readily hacked,
causing damage to data integrity; (ii) the supply chain management of the agricultural
products usually relies on centralized servers, resulting in a single point of failure (SPOF);
(iii) high costs are involved to either maintain a set of necessary systems or for a third-party
helping to verify and monitor the transactions. To this end, [177] propose a consortium
blockchain-based agricultural machinery scheduling system, which optimizes the matching
function and scheduling algorithm in the smart contract, and improves the scheduling
efficiency. The work [178] proposes a food traceability system based on IoT and blockchain
for agricultural products. [70] proposes a consortium blockchain-enabled food trading
system, which sets permission for different roles in food transactions and helps choose an
optimized trading portfolio for buyers. A set of literature [179–181] investigates the usage
of consortium blockchain in the agricultural supply chain. Several works [176,182,183]
also review the related techniques, security and privacy challenges and potential research
directions in consortium blockchain-enabled agricultural applications.
control [193]. The key role of (consortium) blockchain is to act as a trusted third party
in a smart grid which is scarce in practice. Furthermore, by integrating cryptographic
primitives such as digital signature, encryption algorithms and additional designs such
as enhanced consensus mechanisms, blockchain-based solutions can achieve the desired
design goals such as reliability, efficiency, flexibility and security in smart grid trading.
Figure 5. Blockchain’s impossible triangle (left) and the balancing between decentralization and
performance (right).
Cryptography 2024, 8, 12 16 of 25
5. Conclusions
Consortium blockchain has been widely applied to many practical scenarios such as
finance, IoT, cyber security and the metaverse. It provides two core functionalities of secure
robust storage and guaranteed computation, thus bringing many advantages, including
a more flexible trust model in comparison with traditional infrastructure. We proposed a
layered consortium blockchain architecture and surveyed the pertinent technologies in each
layer. Furthermore, the challenges in consortium blockchain itself and building consortium
blockchain-enabled decentralized applications are discussed, and the potential research
directions are also sketched.
Author Contributions: Conceptualization, X.C. and S.H.; methodology, X.C., S.H. and Y.Z.; investiga-
tion, X.C. and S.H.; writing—original draft preparation, X.C. and S.H.; writing—review and editing,
X.C., S.H., Y.Z. and C.Q.W.; supervision, S.H., L.S. and C.Q.W.; funding acquisition, S.H., L.S. and
C.Q.W. All authors have read and agreed to the published version of the manuscript.
Funding: This research was funded by National Key R&D Project of China (No. 2023YFB3308400,
2023YFB3308500, and 2023YFB3308600). Songlin He is also supported in part by NSFC (No. 62302403),
the Fundamental Research Funds for the Central Universities (No. A0920502052301-186), and the
Cryptography 2024, 8, 12 17 of 25
New Interdisciplinary Cultivation Fund (No. YH15001124322133) with Southwest Jiaotong University,
Sichuan, China.
Data Availability Statement: The data is collected from the sources: Elsevier’s Library, IEEE Xplore,
Multidisciplinary Digital Publishing Institute (MDPI), ACM Digital Library, and Springer.
Conflicts of Interest: The authors declare no conflicts of interest.
Abbreviations
The following abbreviations are used in this manuscript:
Defi Decentralized Finance
IoT Internet of Things
UC Universal Composability
MPC Multi-Party Computation
SMR State Machine Replication
CFT Crash Fault Tolerance
PBFT Practical Byzantine Fault Tolerance
UTXO Unspent Transaction Output
RTGS Real-Time Gross Settlement
PoW Proof of Work
PoS Proof of Stake
EVM Ethereum Virtual Mahine
DAPP Decentralization Application
TEE Trusted Execution Environment
P.P.T. Probabilistic Polynomial Time
ECDSA Elliptic Curve Digital Signature Algorithm
EU-CMA Unforgeability Under Chosen Message Attack
DAG Directed Acyclic Graphs
SPNs Stochastic Petri Nets
M2M Machine to Machine
PHRs Personal Health Records
IPFS InterPlanetary File System
ZKP Zero-Knowledge Proof
SCM Supply Chain Management
SPOF Single Point of Failure
References
1. Yadav, S.P.; Agrawal, K.K.; Bhati, B.S.; Al-Turjman, F.; Mostarda, L. Blockchain-based cryptocurrency regulation: An overview.
Comput. Econ. 2022, 59, 1659–1675. [CrossRef]
2. Li, X.; Jiang, P.; Chen, T.; Luo, X.; Wen, Q. A survey on the security of blockchain systems. Future Gener. Comput. Syst. 2020,
107, 841–853. [CrossRef]
3. Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Available online: https://bitcoin.org/bitcoin.pdf (accessed
on 6 February 2024).
4. Garay, J.; Kiayias, A.; Leonardos, N. The bitcoin backbone protocol: Analysis and applications. In Proceedings of the Annual
International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26–30 April 2015; Springer:
Berlin/Heidelberg, Germany, 2015; pp. 281–310.
5. Wood, G. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 2014, 151, 1–32.
6. Werner, S.; Perez, D.; Gudgeon, L.; Klages-Mundt, A.; Harz, D.; Knottenbelt, W. SoK: Decentralized finance (defi). In Proceedings
of the 4th ACM Conference on Advances in Financial Technologies, New York, NY, USA, 19–21 September 2022; pp. 30–46.
7. He, S.; Tang, Q.; Wu, C.Q.; Shen, X. Decentralizing IoT management systems using blockchain for censorship resistance. IEEE
Trans. Ind. Inform. 2019, 16, 715–727. [CrossRef]
8. He, S.; Ficke, E.; Pritom, M.M.A.; Chen, H.; Tang, Q.; Chen, Q.; Pendleton, M.; Njilla, L.; Xu, S. Blockchain-based automated and
robust cyber security management. J. Parallel Distrib. Comput. 2022, 163, 62–82. [CrossRef]
9. He, S.; Lu, Y.; Tang, Q.; Wang, G.; Wu, C.Q. Blockchain-based P2P content delivery with monetary incentivization and fairness
guarantee. IEEE Trans. Parallel Distrib. Syst. 2022, 34, 746–765. [CrossRef]
10. Merlo, V.; Pio, G.; Giusto, F.; Bilancia, M. On the exploitation of the blockchain technology in the healthcare sector: A systematic
review. Expert Syst. Appl. 2023, 213, 118897. [CrossRef]
11. Ullah, Z.; Naeem, M.; Coronato, A.; Ribino, P.; De Pietro, G. Blockchain applications in sustainable smart cities. Sustain. Cities Soc.
2023, 97, 104697. [CrossRef]
Cryptography 2024, 8, 12 18 of 25
12. Huynh-The, T.; Gadekallu, T.R.; Wang, W.; Yenduri, G.; Ranaweera, P.; Pham, Q.V.; da Costa, D.B.; Liyanage, M. Blockchain for
the metaverse: A Review. Future Gener. Comput. Syst. 2023, 143, 401–419. [CrossRef]
13. Lin, Y.; Gao, Z.; Tu, Y.; Du, H.; Niyato, D.; Kang, J.; Yang, H. A blockchain-based semantic exchange framework for web 3.0
toward participatory economy. IEEE Commun. Mag. 2023, 61, 94–100. [CrossRef]
14. Zhang, R.; Xue, R.; Liu, L. Security and privacy on blockchain. ACM Comput. Surv. 2019, 52, 1–34. [CrossRef]
15. Leng, J.; Zhou, M.; Zhao, J.L.; Huang, Y.; Bian, Y. Blockchain security: A survey of techniques and research directions. IEEE Trans.
Serv. Comput. 2020, 15, 2490–2510. [CrossRef]
16. Kosba, A.; Miller, A.; Shi, E.; Wen, Z.; Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving
smart contracts. In Proceedings of the IEEE Symposium on Security and Privacy, San Jose, CA, USA, 22–26 May 2016; pp. 839–858.
17. Kiayias, A.; Zhou, H.S.; Zikas, V. Fair and robust multi-party computation using a global transaction ledger. In Proceedings of
the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, 8–12
May 2016; Springer: Berlin/Heidelberg, Germany, 2016; pp. 705–734.
18. Juels, A.; Kosba, A.; Shi, E. The ring of gyges: Investigating the future of criminal smart contracts. In Proceedings of the ACM
SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; pp. 283–295.
19. Canetti, R.; Dodis, Y.; Pass, R.; Walfish, S. Universally composable security with global setup. In Proceedings of the 4th Theory of
Cryptography Conference, Amsterdam, The Netherlands, 21–24 February 2007; Springer: Berlin/Heidelberg, Germany, 2007;
pp. 61–85.
20. Cheng, R.; Zhang, F.; Kos, J.; He, W.; Hynes, N.; Johnson, N.; Juels, A.; Miller, A.; Song, D. Ekiden: A platform for confidentiality-
preserving,trustworthy,and performant smart contracts. In Proceedings of the 2019 IEEE European Symposium on Security and
Privacy, Stockholm, Sweden, 17–19 June 2019; pp. 185–200.
21. Schneider, F.B. Implementing fault-tolerant services using the state machine approach: A tutorial. ACM Comput. Surv. 1990,
22, 299–319. [CrossRef]
22. Baudet, M.; Ching, A.; Chursin, A.; Danezis, G.; Garillot, F.; Li, Z.; Malkhi, D.; Naor, O.; Perelman, D.; Sonnino, A. State Machine
Replication in the Libra Blockchain; The Libra Assn. Tech. Report; The Diem Association: Geneva, Switzerland, 2019.
23. Bessani, A.; Alchieri, E.; Sousa, J.; Oliveira, A.; Pedone, F. From byzantine replication to blockchain: Consensus is only the
beginning. In Proceedings of the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks,
Valencia, Spain, 29 June–2 July 2020; pp. 424–436.
24. Castro, M.; Liskov, B. Practical byzantine fault tolerance. In Proceedings of the Third Symposium on Operating Systems Design
and Implementation, New Orleans, LA, USA, 22–25 February 1999; pp. 173–186.
25. Cowling, J.; Myers, D.; Liskov, B.; Rodrigues, R.; Shrira, L. HQ replication: A hybrid quorum protocol for byzantine fault
tolerance. In Proceedings of the 7th Symposium on Operating Systems Design and Implementation, Seattle, WA, USA, 6–8
November 2006; pp. 177–190.
26. Kotla, R.; Alvisi, L.; Dahlin, M.; Clement, A.; Wong, E. Zyzzyva: Speculative byzantine fault tolerance. In Proceedings of the 21st
ACM SIGOPS Symposium on Operating Systems Principles, Stevenson, WA, USA, 14–17 October 2007; pp. 45–58.
27. Veronese, G.S.; Correia, M.; Bessani, A.N.; Lung, L.C. Spin one’s wheels? Byzantine fault tolerance with a spinning primary. In
Proceedings of the 28th International Symposium on Reliable Distributed Systems, Niagara Falls, NY, USA, 27–30 September
2009; pp. 135–144.
28. Amir, Y.; Coan, B.; Kirsch, J.; Lane, J. Prime: Byzantine replication under attack. IEEE Trans. Dependable Secur. Comput. 2010,
8, 564–577. [CrossRef]
29. Veronese, G.S.; Correia, M.; Bessani, A.N.; Lung, L.C.; Verissimo, P. Efficient byzantine fault-tolerance. IEEE Trans. Comput. 2011,
62, 16–30. [CrossRef]
30. Aublin, P.L.; Mokhtar, S.B.; Quéma, V. RBFT: Redundant byzantine fault tolerance. In Proceedings of the 33rd International
Conference on Distributed Computing Systems, Philadelphia, PA, USA, 8–11 July 2013; pp. 297–306.
31. Sankar, L.S.; Sindhu, M.; Sethumadhavan, M. Survey of consensus protocols on blockchain applications. In Proceedings of the 4th
International Conference on Advanced Computing and Communication Systems, Coimbatore, India, 6–7 January 2017; pp. 1–5.
32. Li, W.; Feng, C.; Zhang, L.; Xu, H.; Cao, B.; Imran, M.A. A scalable multi-layer PBFT consensus for blockchain. IEEE Trans.
Parallel Distrib. Syst. 2020, 32, 1146–1160. [CrossRef]
33. Wang, R.; Ye, K.; Meng, T.; Xu, C.Z. Performance evaluation on blockchain systems: A case study on Ethereum, Fabric, Sawtooth
and Fisco-Bcos. In Proceedings of the Services Computing—SCC 2020, Honolulu, HI, USA, 18–20 September 2020; Springer:
Berlin/Heidelberg, Germany, 2020; pp. 120–134.
34. Belchior, R.; Vasconcelos, A.; Guerreiro, S.; Correia, M. A survey on blockchain interoperability: Past, present, and future trends.
ACM Comput. Surv. (CSUR) 2021, 54, 1–41. [CrossRef]
35. 101 Blockchains. Hyperledger vs. Corda vs. Ethereum: The Ultimate Comparison. 2021. Available online: https://10
1blockchains.com/hyperledger-vs-corda-r3-vs-ethereum/ (accessed on 6 February 2024).
36. Li, H.; Chen, Y.; Shi, X.; Bai, X.; Mo, N.; Li, W.; Guo, R.; Wang, Z.; Sun, Y. FISCO-BCOS: An enterprise-grade permissioned
blockchain system with high-performance. In Proceedings of the International Conference for High Performance Computing,
Networking, Storage and Analysis, Denver, CO, USA, 12–17 November 2023; pp. 1–17.
37. Capocasale, V.; Gotta, D.; Perboli, G. Comparative analysis of permissioned blockchain frameworks for industrial applications.
Blockchain Res. Appl. 2023, 4, 100113. [CrossRef]
Cryptography 2024, 8, 12 19 of 25
38. Sharma, A.; Schuhknecht, F.M.; Agrawal, D.; Dittrich, J. Blurring the lines between blockchains and database systems: The case of
hyperledger fabric. In Proceedings of the International Conference on Management of Data, Amsterdam, The Netherlands, 30
June–5 July 2019; pp. 105–122.
39. Chacko, J.A.; Mayer, R.; Jacobsen, H.A. Why do my blockchain transactions fail? a study of hyperledger fabric. In Proceedings of
the 2021 International Conference on Management of Data, Virtual, 20–25 June 2021; pp. 221–234.
40. Wang, J.; Wang, S.; Zhang, Q.; Deng, Y. A two-layer consortium blockchain with transaction privacy protection based on sharding
technology. J. Inf. Secur. Appl. 2023, 74, 103452. [CrossRef]
41. Wu, X.; Jiang, W.; Song, M.; Jia, Z.; Qin, J. An efficient sharding consensus algorithm for consortium chains. Sci. Rep. 2023, 13, 20.
[CrossRef] [PubMed]
42. Tao, S.; Li, T.; Zhuo, Y.; Bai, F.; Chi, Z. GT-NRSM: Efficient and scalable sharding consensus mechanism for consortium blockchain.
J. Supercomput. 2023, 79, 20041–20075.
43. Zheng, P.; Xu, Q.; Zheng, Z.; Zhou, Z.; Yan, Y.; Zhang, H. Meepo: Multiple execution environments per organization in sharded
consortium blockchain. IEEE J. Sel. Areas Commun. 2022, 40, 3562–3574. [CrossRef]
44. Zhou, Z.; Qiu, Z.; Yu, Q.; Chen, H. A dynamic sharding protocol design for consortium blockchains. In Proceedings of the 2020
IEEE International Conference on Big Data (Big Data), Atlanta, GA, USA, 10–13 December 2020.
45. Qi, X.; Zhang, Z.; Jin, C.; Zhou, A. BFT-Store: Storage partition for permissioned blockchain via erasure coding. In Proceedings of
the 2020 IEEE 36th International Conference on Data Engineering (ICDE), Dallas, TX, USA, 20–24 April 2020.
46. Farahat, I.S.; Aladrousy, W.; Elhoseny, M.; Elmougy, S.; Tolba, A.E. Secure medical blockchain model. Information 2023, 14, 80.
[CrossRef]
47. Soundarapandian, K.; Ambrose, A.K. Lossless data compression and blockchain-assisted aggregation for overlapped-clusters
sensor networks. Wirel. Pers. Commun. Int. J. 2023, 131, 1313–1337. [CrossRef]
48. Yu, B.; Li, X.; Zhao, H. PoW-BC: A PoW consensus protocol based on block compression. KSII Trans. Internet Inf. Syst. 2021, 15, 4.
49. Liu, L.; Liu, X.; Wan, J. Design of updating encryption algorithm for privacy big data based on consortium blockchain technology.
J. Math. 2022, 2022, 7138173. [CrossRef]
50. Zhou, E.; Hong, Z.; Xiao, Y.; Zhao, D.; Pei, Q.; Guo, S.; Akerkar, R. MSTDB: A hybrid storage-empowered scalable semantic
blockchain database. IEEE Trans. Knowl. Data Eng. 2023, 35, 8228–8244. [CrossRef]
51. Chen, X.; Lin, S.; Yu, N. Bitcoin blockchain compression algorithm for blank node synchronization. In Proceedings of the 2019
11th International Conference on Wireless Communications and Signal Processing (WCSP), Xi’an, China, 23–25 October 2019.
52. Shafarenko, A. Indexing structures for the PLS blockchain. Cybersecurity 2022, 5, 19. [CrossRef]
53. He, S.; Sun, T.; Tang, Q.; Wu, C.; Lipka, N.; Wigington, C.; Jain, R. Secure and efficient agreement signing atop blockchain and
decentralized identity. In Proceedings of the International Conference on Blockchain and Trustworthy Systems, Chengdu, China,
4–5 August 2022; Springer: Berlin/Heidelberg, Germany, 2022; pp. 3–17.
54. Androulaki, E.; Barger, A.; Bortnikov, V.; Cachin, C.; Christidis, K.; De Caro, A.; Enyeart, D.; Ferris, C.; Laventman, G.; Manevich,
Y.; et al. Hyperledger Fabric: A distributed operating system for permissioned blockchains. In Proceedings of the Thirteenth
EuroSys Conference, EuroSys ’18, Porto, Portugal, 23–26 April 2018; Association for Computing Machinery: New York, NY,
USA, 2018.
55. Javaid, H.; Hu, C.; Brebner, G. Optimizing validation phase of hyperledger fabric. In Proceedings of the 2019 IEEE 27th
International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS),
Rennes, France, 21–25 October 2019; pp. 269–275.
56. Kwon, M.; Yu, H. Performance improvement of ordering and endorsement phase in hyperledger fabric. In Proceedings of the
2019 Sixth International Conference on Internet of Things: Systems, Management and Security (IOTSMS), Granada, Spain, 22–25
October 2019; pp. 428–432.
57. Nakaike, T.; Zhang, Q.; Ueda, Y.; Inagaki, T.; Ohara, M. Hyperledger fabric performance characterization and optimization using
goleveldb benchmark. In Proceedings of the International Conference on Blockchain and Cryptocurrency (ICBC), Toronto, ON,
Canada, 2–6 May 2020; pp. 1–9.
58. Kang, H.; Dai, T.; Jean-Louis, N.; Tao, S.; Gu, X. Fabzk: Supporting privacy-preserving, auditable smart contracts in hyperledger
fabric. In Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN),
Portland, OR, USA, 24–27 June 2019; pp. 543–555.
59. Graf, M.; Küsters, R.; Rausch, D. Accountability in a permissioned blockchain: Formal analysis of hyperledger fabric. In
Proceedings of the European Symposium on Security and Privacy (EuroS&P), Genoa, Italy, 7–11 September 2020; pp. 236–255.
60. Dharani, J.; Sundarakantham, K.; Singh, K. A privacy-preserving framework for endorsement process in hyperledger fabric.
Comput. Secur. 2022, 116, 102637.
61. Bu, G.; Haouara, R.; Nguyen, T.S.L.; Potop-Butucaru, M. Cross hyperledger fabric transactions. In Proceedings of the 3rd
Workshop on Cryptocurrencies and Blockchains for Distributed Systems, London, UK, 25 September 2020; pp. 35–40.
62. Kuzlu, M.; Pipattanasomporn, M.; Gurses, L.; Rahman, S. Performance analysis of a hyperledger fabric blockchain framework:
Throughput, latency and scalability. In Proceedings of the 2019 IEEE International Conference on Blockchain (Blockchain),
Atlanta, GA, USA, 14–17 July 2019; pp. 536–540.
Cryptography 2024, 8, 12 20 of 25
63. Shuaib, M.; Hassan, N.H.; Usman, S.; Alam, S.; Bakar, N.A.A.; Maarop, N. Performance evaluation of DLT systems based on
hyper ledger fabric. In Proceedings of the 4th International Conference on Smart Sensors and Application (ICSSA), Kuala
Lumpur, Malaysia, 26–28 July 2022; pp. 70–75.
64. Kushwaha, S.S.; Joshi, S.; Singh, D.; Kaur, M.; Lee, H.N. Systematic review of security vulnerabilities in ethereum blockchain
smart contract. IEEE Access 2022, 10, 6605–6621. [CrossRef]
65. Atzei, N.; Bartoletti, M.; Cimoli, T. A survey of attacks on ethereum smart contracts (sok). In Proceedings of the the European
Joint Conferences on Theory and Practice of Software, Uppsala, Sweden, 22–29 April 2017; Springer: Berlin/Heidelberg, Germany,
2017; pp. 164–186.
66. Hildenbrandt, E.; Saxena, M.; Rodrigues, N.; Zhu, X.; Daian, P.; Guth, D.; Moore, B.; Park, D.; Zhang, Y.; Stefanescu, A.; et al.
Kevm: A complete formal semantics of the ethereum virtual machine. In Proceedings of the 31st Computer Security Foundations
Symposium, Oxford, UK, 9–12 July 2018; pp. 204–217.
67. Zheng, P.; Jiang, Z.; Wu, J.; Zheng, Z. Blockchain-based decentralized application: A survey. IEEE Open J. Comput. Soc. 2023, 4,
121–133. [CrossRef]
68. Zhang, H.; Jin, C.; Cui, H. A method to predict the performance and storage of executing contract for ethereum consortium-
blockchain. In Proceedings of the International Conference on Blockchain, Seattle, WA, USA, 25–30 June 2018; Springer:
Berlin/Heidelberg, Germany, 2018; pp. 63–74.
69. Rouhani, S.; Deters, R. Performance analysis of ethereum transactions in private blockchain. In Proceedings of the International
Conference on Software Engineering and Service Science (ICSESS), Beijing, China, 24–26 November 2017; pp. 70–74.
70. Mao, D.; Hao, Z.; Wang, F.; Li, H. Novel automatic food trading system using consortium blockchain. Arab. J. Sci. Eng. 2019,
44, 3439–3455. [CrossRef]
71. Al-Shaibani, H.; Lasla, N.; Abdallah, M. Consortium blockchain-based decentralized stock exchange platform. IEEE Access 2020,
8, 123711–123725. [CrossRef]
72. Li, Z.; Hao, J.; Liu, J.; Wang, H.; Xian, M. An IoT-applicable access control model under double-layer blockchain. IEEE Trans.
Circuits Syst. II Express Briefs 2020, 68, 2102–2106. [CrossRef]
73. Brown, R.; Carlyle, J.; Grigg, I.; Hearn, M. Corda: An introduction. R3 CEV 2016, 1, 14.
74. R3. R3’s Corda Partner Network Grows to over 60 Companies Including Hewlett Packard Enterprise. 2017. Avail-
able online: https://r3.com/press-media/r3s-corda-partner-network-grows-to-over-60-companies-including-hewlett-packard-
enterprise-intel-and-microsoft/ (accessed on 29 December 2023).
75. Graf, M.; Rausch, D.; Ronge, V.; Egger, C.; Küsters, R.; Schröder, D. A security framework for distributed ledgers. In Proceedings
of the ACM SIGSAC Conference on Computer and Communications Security, Virtual, 15–19 November 2021; pp. 1043–1064.
76. DLT Magazine. An in-Depth Guide to Corda: Exploring Its Features and Benefits. 2023. Available online: https://distributed-
ledger.tech/articles/an-in-depth-guide-to-corda-exploring-its-features-and-benefits/ (accessed on 5 February 2024).
77. 4IRE. Why Choose Corda for Your Project? 2021. Available online: https://4irelabs.com/articles/why-choose-corda-for-your-
project/ (accessed on 7 February 2024).
78. ConsenSys. Build on Quorum, the Complete Open Source Blockchain Platform for Business. 2021. Available online:
https://consensys.io/quorum/ (accessed on 27 December 2023).
79. ConsenSys. ConsenSys GoQuorum. 2023. Available online: https://docs.goquorum.consensys.io/ (accessed on 29 December 2023).
80. Hyperledger Besu Community. Hyperledger Besu Ethereum Client. 2023. Available online: https://besu.hyperledger.org/
(accessed on 29 December 2023).
81. Mazzoni, M.; Corradi, A.; Di Nicola, V. Performance evaluation of permissioned blockchains for financial applications: The
ConsenSys Quorum case study. Blockchain Res. Appl. 2022, 3, 100026. [CrossRef]
82. Armknecht, F.; Karame, G.O.; Mandal, A.; Youssef, F.; Zenner, E. Ripple: Overview and outlook. In Proceedings of the Interna-
tional Conference on Trust and Trustworthy Computing, Heraklion, Greece, 24–26 August 2015; Springer: Berlin/Heidelberg,
Germany, 2015; pp. 163–180.
83. Amores-Sesar, I.; Cachin, C.; Mićić, J. Security analysis of ripple consensus. arXiv 2020, arXiv:2011.14816.
84. De Rossi, L.M.; Abbatemarco, N.; Salviotti, G. Towards a comprehensive blockchain architecture continuum. In Proceedings of
the 52nd Hawaii International Conference on System Sciences, Maui, HI, USA, 8–11 January 2019; Volume 6, pp. 4605–4614.
85. Pandey, S.; Ojha, G.; Shrestha, B.; Kumar, R. BlockSIM: A practical simulation tool for optimal network design, stability and
planning. In Proceedings of the 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Seoul, Republic
of Korea, 14–17 May 2019.
86. R3. Performance Benchmarking Results. Available online: https://docs.r3.com/en/platform/corda/4.8/enterprise/performance-
testing/performance-results.html (accessed on 7 February 2024).
87. Baliga, A.; Solanki, N.; Verekar, S.; Pednekar, A.; Kamat, P.; Chatterjee, S. Performance characterization of hyperledger fabric. In
Proceedings of the Crypto Valley Conference on Blockchain Technology (CVCBT), Zug, Switzerland, 20–22 June 2018; pp. 65–74.
88. Han, R.; Gramoli, V.; Xu, X. Evaluating blockchains for IoT. In Proceedings of the 2018 9th IFIP International Conference on New
Technologies, Mobility and Security (NTMS), Paris, France, 26–28 February 2018.
89. Li, X.; Zhao, B.; Yang, G.; Xiang, T.; Weng, J.; Deng, R.H. A survey of secure computation using trusted execution Environments.
arXiv 2023, arXiv:2302.12150.
Cryptography 2024, 8, 12 21 of 25
90. Bentov, I.; Ji, Y.; Zhang, F.; Breidenbach, L.; Daian, P.; Juels, A. Tesseract: Real-time cryptocurrency exchange using trusted
hardware. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, London, UK, 11–15
November 2019; pp. 1521–1538.
91. Costan, V.; Devadas, S. Intel SGX Explained; Cryptology ePrint Archive: Cambridge, MA, USA, 2016.
92. Futral, W.; Greene, J.; Futral, W.; Greene, J. Fundamental principles of intel® txt. In Intel® Trusted Execution Technology for Server
Platforms: A Guide to More Secure Datacenters; Springer: Berlin/Heidelberg, Germany, 2013; pp. 15–36.
93. Pinto, S.; Santos, N. Demystifying arm trustzone: A comprehensive survey. ACM Comput. Surv. 2019, 51, 1–36. [CrossRef]
94. Zhao, S.; Li, M.; Zhangyz, Y.; Lin, Z. Vsgx: Virtualizing sgx enclaves on amd sev. In Proceedings of the Symposium on Security
and Privacy, San Francisco, CA, USA, 27 July 2022; pp. 321–336.
95. Costan, V.; Lebedev, I.; Devadas, S. Sanctum: Minimal hardware extensions for strong software isolation. In Proceedings of the
25th USENIX Security Symposium, Austin, TX, USA, 10–12 August 2016; pp. 857–874.
96. Lee, D.; Kohlbrenner, D.; Shinde, S.; Asanović, K.; Song, D. Keystone: An open framework for architecting trusted execution
environments. In Proceedings of the 15th European Conference on Computer Systems, Heraklion Greece, 27–30 April 2020;
pp. 1–16.
97. Pass, R.; Shi, E.; Tramer, F. Formal abstractions for attested execution secure processors. In Proceedings of the 36th Annual
International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, 30 April–4 May 2017;
Springer: Berlin/Heidelberg, Germany, 2017; pp. 260–289.
98. Fei, S.; Yan, Z.; Ding, W.; Xie, H. Security vulnerabilities of SGX and countermeasures: A survey. ACM Comput. Surv. 2021,
54, 1–36. [CrossRef]
99. Choi, J.I.; Butler, K.R. Secure multiparty computation and trusted hardware: Examining adoption challenges and opportunities.
Secur. Commun. Netw. 2019, 2019, 1368905. [CrossRef]
100. Sasy, S.; Gorbunov, S.; Fletcher, C.W. ZeroTrace: Oblivious memory primitives from Intel SGX. In Proceedings of the Annual
Network and Distributed System Security Symposium (NDSS), San Diego, CA, USA, 18–21 February 2018.
101. Bellare, M.; Fischlin, M.; Goldwasser, S.; Micali, S. Identification protocols secure against reset attacks. In Proceedings of the
International Conference on the Theory and Application of Cryptographic Techniques, Innsbruck, Austria, 6–10 May 2001;
Springer: Berlin/Heidelberg, Germany, 2001; pp. 495–511.
102. Fleischer, F.; Busch, M.; Kuhrt, P. Memory corruption attacks within Android TEEs: A case study based on OP-TEE. In Proceedings
of the 15th International Conference on Availability, Reliability and Security, Virtual, 25–28 August 2020; pp. 1–9.
103. Cerdeira, D.; Santos, N.; Fonseca, P.; Pinto, S. Sok: Understanding the prevailing security vulnerabilities in trustzone-assisted tee
systems. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP), San Francisco, CA, USA, 18–21 May 2020;
pp. 1416–1432.
104. Ghaniyoun, M.; Barber, K.; Xiao, Y.; Zhang, Y.; Teodorescu, R. TEESec: Pre-Silicon Vulnerability Discovery for Trusted Execution
Environments. In Proceedings of the 50th Annual International Symposium on Computer Architecture, Orlando, FL, USA, 17–21
June 2023; pp. 1–15.
105. Decker, C.; Wattenhofer, R. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P 2013 Proceedings,
Trento, Italy, 9–11 September 2013; pp. 1–10.
106. Gervais, A.; Karame, G.O.; Wüst, K.; Glykantzis, V.; Ritzdorf, H.; Capkun, S. On the security and performance of proof of work
blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, Vienna, Austria, 24–28
October 2016; pp. 3–16.
107. Gervais, A.; Capkun, S.; Karame, G.O.; Gruber, D. On the privacy provisions of bloom filters in lightweight bitcoin clients. In
Proceedings of the 30th Annual Computer Security Applications Conference, New Orleans, LA, USA, 8–12 December 2014;
pp. 326–335.
108. Manevich, Y.; Barger, A.; Tock, Y. Service discovery for hyperledger fabric. In Proceedings of the 12th ACM International
Conference on Distributed and Event-Based Systems, Hamilton, New Zealand, 25–29 June 2018; pp. 226–229.
109. Gudgeon, L.; Moreno-Sanchez, P.; Roos, S.; McCorry, P.; Gervais, A. Sok: Layer-two blockchain protocols. In Proceedings of
the Financial Cryptography and Data Security, Kota Kinabalu, Malaysia, 10–14 February 2020; Springer: Berlin/Heidelberg,
Germany, 2020; pp. 201–226.
110. Basha, S.J.; Veesam, V.S.; Ammannamma, T.; Navudu, S.; Subrahmanyam, M. Security enhancement of digital signatures
for blockchain using EdDSA algorithm. In Proceedings of the 3rd International Conference on Intelligent Communication
Technologies and Virtual Mobile Networks, Tirunelveli, India, 4–6 February 2021; pp. 274–278.
111. Aumasson, J.P.; Hamelink, A.; Shlomovits, O. A Survey of ECDSA Threshold Signing; Cryptology ePrint Archive: Cambridge, MA,
USA, 2020.
112. Canetti, R.; Jain, A.; Scafuro, A. Practical UC security with a global random oracle. In Proceedings of the ACM SIGSAC
Conference on Computer and Communications Security, Scottsdale, AR, USA, 3–7 November 2014.
113. Pervez, H.; Muneeb, M.; Irfan, M.U.; Haq, I.U. A comparative analysis of DAG-based blockchain architectures. In Proceedings of
the 12th International Conference on Open Source Systems and Technologies (ICOSST), Lahore, Pakistan, 19–21 December 2018.
114. Wu, H.Y.; Yang, X.; Yue, C.; Paik, H.Y.; Kanhere, S.S. Chain or DAG? Underlying data structures, architectures, topologies and
consensus in distributed ledger technology: A review, taxonomy and research issues. J. Syst. Archit. 2022, 131, 102720. [CrossRef]
115. Wang, Q.; Yu, J.; Chen, S.; Xiang, Y. Sok: Dag-based blockchain systems. ACM Comput. Surv. 2023, 55, 1–38. [CrossRef]
Cryptography 2024, 8, 12 22 of 25
116. Fan, C.; Ghaemi, S.; Khazaei, H.; Chen, Y.; Musilek, P. Performance analysis of the IOTA DAG-based distributed ledger. ACM
Trans. Model. Perform. Eval. Comput. Syst. 2021, 6, 1–20. [CrossRef]
117. Dziembowski, S.; Eckey, L.; Faust, S. Fairswap: How to fairly exchange digital goods. In Proceedings of the 2018 ACM SIGSAC
Conference on Computer and Communications Security, Toronto, ON, Canada, 15–19 October 2018; pp. 967–984.
118. Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of
the International Conference on Systems, Man, and Cybernetics, Banff, AB, Canada, 5–8 October 2017; pp. 2567–2572.
119. Nguyen, G.T.; Kim, K. A survey about consensus algorithms used in blockchain. J. Inf. Process. Syst. 2018, 14, 101–128.
120. Alsunaidi, S.J.; Alhaidari, F.A. A survey of consensus algorithms for blockchain technology. In Proceedings of the International
Conference on Computer and Information Sciences, Sakaka, Saudi Arabia, 3–4 April 2019; pp. 1–6.
121. Fu, X.; Wang, H.; Shi, P. A survey of blockchain consensus algorithms: Mechanism, design and applications. Sci. China Inf. Sci.
2020, 64, 121101. [CrossRef]
122. Wan, S.; Li, M.; Liu, G.; Wang, C. Recent advances in consensus protocols for blockchain: A survey. Wirel. Netw. 2020,
26, 5579–5593. [CrossRef]
123. Ferdous, M.S.; Chowdhury, M.J.M.; Hoque, M.A. A survey of consensus algorithms in public blockchain systems for crypto-
currencies. J. Netw. Comput. Appl. 2021, 182, 103035. [CrossRef]
124. Lashkari, B.; Musilek, P. A comprehensive review of blockchain consensus mechanisms. IEEE Access 2021, 9, 43620–43652.
[CrossRef]
125. Bouraga, S. A taxonomy of blockchain consensus protocols: A survey and classification framework. Expert Syst. Appl. 2021,
168, 114384. [CrossRef]
126. Guru, D.; Perumal, S.; Varadarajan, V. Approaches towards blockchain innovation: A survey and future directions. Electronics
2021, 10, 1219. [CrossRef]
127. Khan, M.; den Hartog, F.; Hu, J. A survey and ontology of blockchain consensus algorithms for resource-constrained IoT systems.
Sensors 2022, 22, 8188. [CrossRef] [PubMed]
128. Yao, W.; Deek, F.P.; Murimi, R.; Wang, G. SoK: A taxonomy for critical analysis of consensus mechanisms in consortium blockchain.
IEEE Access 2023, 11, 79572–79587. [CrossRef]
129. Guru, A.; Abhishek, M.; Mohanta, B.K.; Mohapatra, H.; Al-Turjman, F.; Altrjman, C.; Yadav, A. A survey on consensus protocols
and attacks on blockchain technology. Appl. Sci. 2023, 13, 2604. [CrossRef]
130. De Morais, A.M.; Lins, F.A.A.; Rosa, N.S. Survey on integration of consensus mechanisms in IoT-based blockchains. JUCS J.
Univers. Comput. Sci. 2023, 29, 1139–1160. [CrossRef]
131. Luo, H.; Yu, H.; Luo, J. PRAFT and RPBFT: A class of blockchain consensus algorithm and their applications in electric vehicles
charging scenarios for V2G networks. Internet Things Cyber-Phys. Syst. 2023, 3, 61–70. [CrossRef]
132. Ahmad, A.; Saad, M.; Kim, J.; Nyang, D.; Mohaisen, D. Performance evaluation of consensus protocols in blockchain-based audit
systems. In Proceedings of the 2021 International Conference on Information Networking (ICOIN), Jeju Island, Republic of Korea,
13–16 January 2021.
133. Bentov, I.; Lee, C.; Mizrahi, A.; Rosenfeld, M. Proof of Activity: Extending bitcoin’s proof of work via proof of stake [Extended
Abstract]y. SIGMETRICS Perform. Eval. Rev. 2014, 42, 34–37. [CrossRef]
134. Song, H.; Zhu, N.; Xue, R.; He, J.; Zhang, K.; Wang, J. Proof-of-Contribution consensus mechanism for blockchain and its
application in intellectual property protection. Inf. Process. Manag. 2021, 58, 102507. [CrossRef]
135. BitShares. Delegated Proof of Stake (DPOS). Available online: https://how.bitshares.works/en/master/technology/dpos.html
(accessed on 6 February 2024).
136. Yao, W.; Ye, J.; Murimi, R.; Wang, G. A survey on consortium blockchain consensus mechanisms. arXiv 2021, arXiv:2102.12058.
137. Han, R.; Shapiro, G.; Gramoli, V.; Xu, X. On the performance of distributed ledgers for internet of things. Internet Things 2020,
10, 100087. [CrossRef]
138. Miller, A.; Xia, Y.; Croman, K.; Shi, E.; Song, D. The honey badger of BFT protocols. In Proceedings of the 2016 ACM SIGSAC
Conference on Computer and Communications Security, Vienna, Austria, 24–28 October 2016; Association for Computing
Machinery: New York, NY, USA, 2016; pp. 31–42.
139. Guo, B.; Lu, Z.; Tang, Q.; Xu, J.; Zhang, Z. Dumbo: Faster asynchronous BFT protocols. In Proceedings of the 2020 ACM SIGSAC
Conference on Computer and Communications Security, Virtual, 9–13 November 2020; Association for Computing Machinery:
New York, NY, USA, 2020.
140. Zhang, F.; Cecchetti, E.; Croman, K.; Juels, A.; Shi, E. Town crier: An authenticated data feed for smart contracts. In Proceedings
of the ACM SIGSAC Conference on Computer and Communications Security (CCS), Vienna, Austria, 24–28 October 2016;
pp. 270–282.
141. Kiayias, A.; Russell, A.; David, B.; Oliynykov, R. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Proceedings
of the Annual International Cryptology Conference, Santa Barbara, CA, USA, 20–24 August 2017; Springer: Berlin/Heidelberg,
Germany, 2017; pp. 357–388.
142. Kokoris-Kogias, E.; Jovanovic, P.; Gasser, L.; Gailly, N.; Syta, E.; Ford, B. Omniledger: A secure, scale-out, decentralized ledger via
sharding. In Proceedings of the Symposium on Security and Privacy, San Francisco, CA, USA, 20–24 May 2018; pp. 583–598.
143. Gangwal, A.; Gangavalli, H.R.; Thirupathi, A. A survey of Layer-two blockchain protocols. J. Netw. Comput. Appl. 2023,
209, 103539. [CrossRef]
Cryptography 2024, 8, 12 23 of 25
144. Miller, A.; Bentov, I.; Bakshi, S.; Kumaresan, R.; McCorry, P. Sprites and state channels: Payment networks that go faster than
lightning. In Proceedings of the International Conference on Financial Cryptography and Data Security, Frigate Bay, St. Kitts and
Nevis, 18–22 February 2019; Springer: Berlin/Heidelberg, Germany, 2019; pp. 508–526.
145. Decker, C.; Wattenhofer, R. A fast and scalable payment network with bitcoin duplex micropayment channels. In Proceedings of
the Symposium on Self-Stabilizing Systems, Edmonton, AB, Canada, 18–21 August 2015; Springer: Berlin/Heidelberg, Germany,
2015; pp. 3–18.
146. Dziembowski, S.; Eckey, L.; Faust, S.; Malinowski, D. Perun: Virtual payment hubs over cryptocurrencies. In Proceedings of the
Symposium on Security and Privacy (SP), San Francisco, CA, USA, 19–23 May 2019; pp. 106–123.
147. Khalil, R.; Zamyatin, A.; Felley, G.; Moreno-Sanchez, P.; Gervais, A. Commit-Chains: Secure, Scalable Off-Chain Payments; Cryptology
ePrint Archive: Cambridge, MA, USA, 2018.
148. Dziembowski, S.; Fabiański, G.; Faust, S.; Riahi, S. Lower Bounds for Off-Chain Protocols: Exploring the Limits of Plasma; Cryptology
ePrint Archive: Cambridge, MA, USA, 2020.
149. Zhou, Q.; Huang, H.; Zheng, Z.; Bian, J. Solutions to scalability of blockchain: A survey. IEEE Access 2020, 8, 16440–16455.
[CrossRef]
150. Kalodner, H.; Goldfeder, S.; Chen, X.; Weinberg, S.M.; Felten, E.W. Arbitrum: Scalable, private smart contracts. In Proceedings of
the 27th USENIX Security Symposium, Baltimore, MD, USA, 15–17 August 2018; pp. 1353–1370.
151. Sukhwani, H.; Martínez, J.M.; Chang, X.; Trivedi, K.S.; Rindos, A. Performance modeling of PBFT consensus process for
permissioned blockchain network (hyperledger fabric). In Proceedings of the 36th Symposium on Reliable Distributed Systems
(SRDS), Hong Kong, China, 26–29 September 2017; pp. 253–255.
152. Xu, X.; Sun, G.; Luo, L.; Cao, H.; Yu, H.; Vasilakos, A.V. Latency performance modeling and analysis for hyperledger fabric
blockchain network. Inf. Process. Manag. 2021, 58, 102436. [CrossRef]
153. Meng, T.; Zhao, Y.; Wolter, K.; Xu, C.Z. On consortium blockchain consistency: A queueing network model approach. IEEE Trans.
Parallel Distrib. Syst. 2021, 32, 1369–1382. [CrossRef]
154. Memon, R.A.; Li, J.P.; Ahmed, J. Simulation model for blockchain systems using queuing theory. Electronics 2019, 8, 234.
[CrossRef]
155. Yuan, P.; Zheng, K.; Xiong, X.; Zhang, K.; Lei, L. Performance modeling and analysis of a Hyperledger-based system using GSPN.
Comput. Commun. 2020, 153, 117–124. [CrossRef]
156. Sukhwani, H.; Wang, N.; Trivedi, K.S.; Rindos, A. Performance modeling of hyperledger fabric (permissioned blockchain
network). In Proceedings of the 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA),
Cambridge, MA, USA, 1–3 November 2018; pp. 1–8.
157. Papadis, N.; Borst, S.; Walid, A.; Grissa, M.; Tassiulas, L. Stochastic models and wide-area network measurements for blockchain
design and analysis. In Proceedings of the IEEE INFOCOM 2018-IEEE Conference on Computer Communications, Honolulu, HI,
USA, 16–19 April 2018; pp. 2546–2554.
158. Li, M.; Wang, Y.; Ma, S.; Liu, C.; Huo, D.; Wang, Y.; Xu, Z. Auto-tuning with reinforcement learning for permissioned blockchain
systems. Proc. VLDB Endow. 2023, 16, 1000–1012. [CrossRef]
159. Atlam, H.F.; Wills, G.B. Technical aspects of blockchain and IoT. In Advances in Computers; Elsevier: Amsterdam, The Netherlands,
2019; Volume 115, pp. 1–39.
160. Mathur, S.; Kalla, A.; Gür, G.; Bohra, M.K.; Liyanage, M. A Survey on Role of Blockchain for IoT: Applications and Technical
Aspects. Comput. Netw. 2023, 227, 109726. [CrossRef]
161. Rathee, G.; Sharma, A.; Saini, H.; Kumar, R.; Iqbal, R. A hybrid framework for multimedia data processing in IoT-healthcare
using blockchain technology. Multimed. Tools Appl. 2020, 79, 9711–9733. [CrossRef]
162. Lahbib, A.; Toumi, K.; Laouiti, A.; Laube, A.; Martin, S. Blockchain based trust management mechanism for IoT. In Proceedings of
the 2019 IEEE Wireless Communications and Networking Conference (WCNC), Marrakesh, Morocco, 15–18 April 2019; pp. 1–8.
163. Kumar, R.; Sharma, R. Leveraging blockchain for ensuring trust in IoT: A survey. Comput. Inf. Sci. 2022, 34, 8599–8622. [CrossRef]
164. Maram, D.; Malvai, H.; Zhang, F.; Jean-Louis, N.; Frolov, A.; Kell, T.; Lobban, T.; Moy, C.; Juels, A.; Miller, A. Candid: Can-do
decentralized identity with legacy compatibility, sybil-resistance, and accountability. In Proceedings of the Symposium on
Security and Privacy (SP), San Francisco, CA, USA, 24–27 May 2021; pp. 1348–1366.
165. Reyna, A.; Martín, C.; Chen, J.; Soler, E.; Díaz, M. On blockchain and its integration with IoT. Challenges and opportunities.
Future Gener. Comput. Syst. 2018, 88, 173–190. [CrossRef]
166. Thakker, J.; Chang, I.; Park, Y. Secure data management in internet-of-things based on blockchain. In Proceedings of the
International Conference on Consumer Electronics (ICCE), Las Vegas, NV, USA, 23 March 2020; pp. 1–5.
167. Wang, Y.; Zhang, A.; Zhang, P.; Qu, Y.; Yu, S. Security-aware and privacy-preserving personal health record sharing using
consortium blockchain. IEEE Internet Things J. 2021, 9, 12014–12028. [CrossRef]
168. Zhang, A.; Lin, X. Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain. J. Med
Syst. 2018, 42, 140. [CrossRef]
169. Ni, W.; Huang, X.; Zhang, J.; Yu, R. Healchain: A decentralized data management system for mobile healthcare using consortium
blockchain. In Proceedings of the Chinese Control Conference (CCC), Guangzhou, China, 27–30 July 2019; pp. 6333–6338.
170. Du, M.; Chen, Q.; Chen, J.; Ma, X. An optimized consortium blockchain for medical information sharing. IEEE Trans. Eng. Manag.
2020, 68, 1677–1689. [CrossRef]
Cryptography 2024, 8, 12 24 of 25
171. Jabbar, S.; Lloyd, H.; Hammoudeh, M.; Adebisi, B.; Raza, U. Blockchain-enabled supply chain: Analysis, challenges, and future
directions. Multimed. Syst. 2021, 27, 787–806. [CrossRef]
172. Nguyen, H.; Do, L. The Adoption of Blockchain in Food Retail Supply Chain: Case: IBM Food Trust Blockchain and the Food
Retail Supply Chain in Malta 2018. Bachelor’s Thesis, Lahti University of Applied Science, Lahti, Finland, 2018.
173. Bajwa, N.; Prewett, K.; Shavers, C.L. Is your supply chain ready to embrace blockchain? J. Corp. Account. Financ. 2020, 31, 54–64.
[CrossRef]
174. Monrat, A.A.; Schelén, O.; Andersson, K. A survey of blockchain from the perspectives of applications, challenges, and
opportunities. IEEE Access 2019, 7, 117134–117151. [CrossRef]
175. Ahram, T.; Sargolzaei, A.; Sargolzaei, S.; Daniels, J.; Amaba, B. Blockchain technology innovations. In Proceedings of the 2017
IEEE Technology & Engineering Management Conference (TEMSCON), Santa Clara, CA, USA, 8–10 June 2017.
176. Lin, W.; Huang, X.; Fang, H.; Wang, V.; Hua, Y.; Wang, J.; Yin, H.; Yi, D.; Yau, L. Blockchain technology in current agricultural
systems: From techniques to applications. IEEE Access 2020, 8, 143920–143937. [CrossRef]
177. Yang, H.; Xiong, S.; Frimpong, S.A.; Zhang, M. A consortium blockchain-based agricultural machinery scheduling system.
Sensors 2020, 20, 2643. [CrossRef] [PubMed]
178. Guo, J.; Cengiz, K.; Tomar, R. An IOT and blockchain approach for food traceability system in agriculture. Scalable Comput. Pract.
Exp. 2021, 22, 127–137. [CrossRef]
179. Salah, K.; Nizamuddin, N.; Jayaraman, R.; Omar, M. Blockchain-based soybean traceability in agricultural supply chain. IEEE
Access 2019, 7, 73295–73305. [CrossRef]
180. Borah, M.D.; Naik, V.B.; Patgiri, R.; Bhargav, A.; Phukan, B.; Basani, S.G. Supply chain management in agriculture using
blockchain and IoT. Adv. Appl. Blockchain Technol. 2020, 60, 227–242.
181. Eluubek kyzy, I.; Song, H.; Vajdi, A.; Wang, Y.; Zhou, J. Blockchain for consortium: A practical paradigm in agricultural supply
chain system. Expert Syst. Appl. 2021, 184, 115425. [CrossRef]
182. Yadav, V.S.; Singh, A. A systematic literature review of blockchain technology in agriculture. In Proceedings of the International
Conference on Industrial Engineering and Operations Management, Pilsen, Czech Republic, 23–26 July 2019; IEOM Society
International: Southfield, MI, USA, 2019; pp. 973–981.
183. Torky, M.; Hassanein, A.E. Integrating blockchain and the internet of things in precision agriculture: Analysis, opportunities, and
challenges. Comput. Electron. Agric. 2020, 178, 105476. [CrossRef]
184. Mollah, M.B.; Zhao, J.; Niyato, D.; Lam, K.Y.; Zhang, X.; Ghias, A.M.; Koh, L.H.; Yang, L. Blockchain for future smart grid: A
comprehensive survey. IEEE Internet Things J. 2020, 8, 18–43. [CrossRef]
185. Agung, A.A.G.; Handayani, R. Blockchain for smart grid. J. King Saud Univ.-Comput. Inf. Sci. 2022, 34, 666–675. [CrossRef]
186. Alladi, T.; Chamola, V.; Rodrigues, J.J.; Kozlov, S.A. Blockchain in smart grids: A review on different use cases. Sensors 2019,
19, 4862. [CrossRef]
187. Fan, M.; Zhang, X. Consortium blockchain based data aggregation and regulation mechanism for smart grid. IEEE Access 2019,
7, 35929–35940. [CrossRef]
188. Wu, Z.; Liang, Y.; Kang, J.; Yu, R.; He, Z. Secure data storage and sharing system based on consortium blockchain in smart grid.
J. Comput. Appl. 2017, 37, 2742.
189. Aggarwal, S.; Kumar, N. A consortium blockchain-based energy trading for demand response management in vehicle-to-grid.
IEEE Trans. Veh. Technol. 2021, 70, 9480–9494. [CrossRef]
190. Zheng, D.; Deng, K.; Zhang, Y.; Zhao, J.; Zheng, X.; Ma, X. Smart grid power trading based on consortium blockchain in Internet
of Things. In Proceedings of the International Conference on Algorithms and Architectures for Parallel Processing, Guangzhou,
China, 15–17 November 2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 453–459.
191. Gai, K.; Wu, Y.; Zhu, L.; Qiu, M.; Shen, M. Privacy-preserving energy trading using consortium blockchain in smart grid. IEEE
Trans. Ind. Inform. 2019, 15, 3548–3558. [CrossRef]
192. Mengelkamp, E.; Notheisen, B.; Beer, C.; Dauer, D.; Weinhardt, C. A blockchain-based smart grid: Towards sustainable local
energy markets. Comput. Sci. Res. Dev. 2018, 33, 207–214. [CrossRef]
193. Bera, B.; Saha, S.; Das, A.K.; Vasilakos, A.V. Designing blockchain-based access control protocol in IoT-enabled smart-grid system.
IEEE Internet Things J. 2020, 8, 5744–5761. [CrossRef]
194. He, S. Towards Practicalization of Blockchain-Based Decentralized Applications. Ph.D. Thesis, New Jersey Institute of Technology,
Newark, NJ, USA, 2022.
195. Kim, J. Blockchain technology and its applications: Case studies. J. Syst. Manag. Sci. 2020, 10, 83–93.
196. Wang, H.; Li, H.; Smahi, A.; Xiao, M.; Li, S.Y.R. GBT-CHAIN: A System Framework for Solving the General Trilemma in
Permissioned Blockchains. In Distributed Ledger Technologies: Research and Practice; ACM: New York, NY, USA, 2023.
197. Papadis, N. Stochastic Modeling and Optimization of Blockchain Networks. Ph.D. Thesis, Yale University, New Haven, CT,
USA, 2023.
198. Guo, Z.; Qin, B.; Guan, Z.; Wang, Y.; Zheng, H.; Wu, Q. A High-Efficiency and Incentive-Compatible Peer-to-Peer Energy Trading
Mechanism. IEEE Trans. Smart Grid 2023, 15, 1075–1088. [CrossRef]
199. Katz, J.; Lindell, Y. Introduction to Modern Cryptography: Principles and Protocols; Chapman and Hall/CRC: Boca Raton, FL,
USA, 2007.
Cryptography 2024, 8, 12 25 of 25
200. Badertscher, C.; Ciampi, M.; Kiayias, A. Agile cryptography: A universally composable approach. In Proceedings of the Theory
of Cryptography Conference, Taipei, Taiwan, 29 November 29–2 December 2023; Springer: Berlin/Heidelberg, Germany, 2023;
pp. 480–509.
201. Karanjai, R.; Collier, R.; Gao, Z.; Chen, L.; Fan, X.; Suh, T.; Shi, W.; Xu, L. Decentralized Translator of Trust: Supporting
Heterogeneous TEE for Critical Infrastructure Protection. In Proceedings of the 5th ACM International Symposium on Blockchain
and Secure Critical Infrastructure, Melbourne, VIC, Australia, 10–14 July 2023; pp. 85–94.
202. Andreina, S.; Bohli, J.M.; Karame, G.O.; Li, W.; Marson, G.A. Pots: A secure proof of tee-stake for permissionless blockchains.
IEEE Trans. Serv. Comput. 2020, 15, 2173–2187. [CrossRef]
203. Li, R.; Wang, Q.; Wang, Q.; Galindo, D.; Ryan, M. SoK: TEE-assisted confidential smart contract. arXiv 2022, arXiv:2203.08548.
204. Xie, H.; Zheng, J.; He, T.; Wei, S.; Hu, C. TEBDS: A Trusted Execution Environment-and-Blockchain-supported IoT data sharing
system. Future Gener. Comput. Syst. 2023, 140, 321–330. [CrossRef]
205. Gencer, A.E.; Basu, S.; Eyal, I.; Van Renesse, R.; Sirer, E.G. Decentralization in bitcoin and ethereum networks. In Proceedings of
the the 22nd International Conference on Financial Cryptography and Data Security, Nieuwpoort, Curaçao, 26 February–2 March
2018; Springer: Berlin/Heidelberg, Germany, 2018; pp. 439–457.
206. Fernandez-Carames, T.M.; Fraga-Lamas, P. Towards post-quantum blockchain: A review on blockchain cryptography resistant to
quantum computing attacks. IEEE Access 2020, 8, 21091–21116. [CrossRef]
207. Gao, Y.; Chen, X.; Chen, Y.; Sun, Y.; Niu, X.; Yang, Y. A secure cryptocurrency scheme based on post-quantum blockchain. IEEE
Access 2018, 6, 27205–27213. [CrossRef]
208. Chen, J.; Gan, W.; Hu, M.; Chen, C.M. On the construction of a post-quantum blockchain for smart city. J. Inf. Secur. Appl. 2021,
58, 102780. [CrossRef]
209. Saha, R.; Kumar, G.; Devgun, T.; Buchanan, W.; Thomas, R.; Alazab, M.; Kim, T.; Rodrigues, J. A blockchain framework in
post-quantum decentralization. IEEE Trans. Serv. Comput. 2021, 16, 1–12. [CrossRef]
210. Acay, C.; Recto, R.; Gancher, J.; Myers, A.C.; Shi, E. Viaduct: An extensible, optimizing compiler for secure distributed programs.
In Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation,
Virtual, 20–25 June 2021; pp. 740–755.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual
author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to
people or property resulting from any ideas, methods, instructions or products referred to in the content.