浏览全部资源
扫码关注微信
1. 贵州大学公共大数据国家重点实验室,贵州 贵阳 550025
2. 贵州大学计算机科学与技术学院,贵州 贵阳 550025
3. 贵州大学密码学与数据安全研究所,贵州 贵阳 550025
4. 贵州省密码学与区块链技术特色重点实验室,贵州 贵阳 550025
5. 新加坡管理大学计算机与信息系统学院,新加坡 188065
6. 福建师范大学计算机与网络空间安全学院,福建 福州 350117
[ "田有亮(1982– ),男,贵州盘县人,博士,贵州大学教授、博士生导师,主要研究方向为算法博弈论、密码学与安全协议、大数据安全与隐私保护等" ]
[ "袁延森(1998– ),男,河南南阳人,贵州大学硕士生,主要研究方向为区块链技术、共识算法等" ]
[ "高鸿峰(1975- ),男,贵州遵义人,贵州大学副教授、硕士生导师,主要研究方向为网络与信息安全" ]
[ "杨旸(1984- ),女,湖北随州人,新加坡管理大学在站博士后,福州大学教授、博士生导师,主要研究方向为区块链、密文搜索、大数据安全等" ]
[ "熊金波(1981- ),男,湖南益阳人,博士,福建师范大学教授、博士生导师,主要研究方向为大数据安全与隐私保护、区块链技术、安全深度学习" ]
网络出版日期:2022-12,
纸质出版日期:2022-12-25
移动端阅览
田有亮, 袁延森, 高鸿峰, 等. 基于激励相容的权益分散共识算法[J]. 通信学报, 2022,43(12):101-112.
Youliang TIAN, Yansen YUAN, Hongfeng GAO, et al. Equity decentralized consensus algorithm based on incentive compatibility[J]. Journal on communications, 2022, 43(12): 101-112.
田有亮, 袁延森, 高鸿峰, 等. 基于激励相容的权益分散共识算法[J]. 通信学报, 2022,43(12):101-112. DOI: 10.11959/j.issn.1000-436x.2022232.
Youliang TIAN, Yansen YUAN, Hongfeng GAO, et al. Equity decentralized consensus algorithm based on incentive compatibility[J]. Journal on communications, 2022, 43(12): 101-112. DOI: 10.11959/j.issn.1000-436x.2022232.
PoW共识算法被证明是激励不相容的,存在高奖励差异下的算力中心化和极端情况下的分叉收敛速度较慢等问题。基于此,提出了一种基于激励相容的 SSPoW 共识算法。通过引入局部解来计算区块链的聚合算力,利用算力的显性量化加快分叉收敛速度,从而满足区块链的一致性。通过改进奖励方案实现激励相容,减少因高奖励差异导致的算力中心化问题。仿真结果证明,所提算法能有效削减奖励差异,并且效率高于传统 PoW 共识算法,对提高系统安全性和共识效率有积极意义。
The PoW consensus algorithm has been proved to be incentive incompatible
existing computing centralization under high reward differences and slow convergence of forks in extreme cases.Based on this
an incentive-compatiblebased consensus algorithm SSPoW was proposed.By introducing local solutions to calculate the computing power aggregated on the block chain
the explicit quantification of computing power was used to speed up the convergence of the fork
thus satisfying the consistency of the blockchain.Incentive compatibility was achieved by improving the reward scheme
which reduced the problem of computing centralization caused by high reward differences.Simulation results prove that the proposed algorithm could effectively reduce the reward differences and is more efficient than the traditional PoW consensus algorithm
which has positive implications for improving system security and consensus efficiency.
沈鑫 , 裴庆祺 , 刘雪峰 . 区块链技术综述 [J ] . 网络与信息安全学报 , 2016 , 2 ( 11 ): 11 - 20 .
SHEN X , PEI Q Q , LIU X F . Survey of block chain [J ] . Chinese Journal of Network and Information Security , 2016 , 2 ( 11 ): 11 - 20 .
XIAO Y , ZHANG N , LOU W J , et al . A survey of distributed consensus protocols for blockchain networks [J ] . IEEE Communications Surveys & Tutorials , 2020 , 22 ( 2 ): 1432 - 1465 .
刘懿中 , 刘建伟 , 张宗洋 , 等 . 区块链共识机制研究综述 [J ] . 密码学报 , 2019 , 6 ( 4 ): 395 - 432 .
LIU Y Z , LIU J W , ZHANG Z Y , et al . Overview on blockchain consensus mechanisms [J ] . Journal of Cryptologic Research , 2019 , 6 ( 4 ): 395 - 432 .
DOUCEUR J R , . The sybil attack [C ] // Peer-to-Peer Systems . Berlin:Springer , 2002 : 251 - 260 .
EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2014 : 436 - 454 .
LEONARDOS N , LEONARDOS S , PILIOURAS G . Oceanic games:centralization risks and incentives in blockchain mining [C ] // Mathematical Research for Blockchain Economy . Berlin:Springer , 2020 : 183 - 199 .
EYAL I , . The miner’s dilemma [C ] // Proceedings of 2015 IEEE Symposium on Security and Privacy . Piscataway:IEEE Press , 2015 : 89 - 103 .
LI T , WANG Z J , YANG G Y , et al . Semi-selfish mining based on hidden Markov decision process [J ] . International Journal of Intelligent Systems , 2021 , 36 ( 7 ): 3596 - 3612 .
NEGY K A , RIZUN P R , SIRER E G . Selfish mining re-examined [C ] // International Conference on Financial Cryptography and Data Security . Berlin:Springer , 2020 : 61 - 78 .
BIAIS B , BISIÈRE C , BOUVARD M , et al . The blockchain folk theorem [J ] . The Review of Financial Studies , 2019 , 32 ( 5 ): 1662 - 1715 .
NEUDECKER T , HARTENSTEIN H . Short paper:an empirical analysis of blockchain Forks in bitcoin [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2019 : 84 - 92 .
LIAO K , KATZ J . Incentivizing blockchain Forks via whale transactions [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2017 : 264 - 279 .
HEILMAN E , . One weird trick to stop selfish miners:fresh bitcoins,a solution for the honest miner (poster abstract) [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2014 : 161 - 162 .
SOLAT S , POTOP-BUTUCARU M . Brief announcement:ZeroBlock:timestamp-free prevention of block-withholding attack in bitcoin [C ] // Stabilization,Safety,and Security of Distributed Systems . Berlin:Springer , 2017 : 356 - 360 .
SAAD M , NJILLA L , KAMHOUA C , et al . Countering selfish mining in blockchains [C ] // Proceedings of 2019 International Conference on Computing,Networking and Communications (ICNC) . Piscataway:IEEE Press , 2019 : 360 - 364 .
SZALACHOWSKI P , REIJSBERGEN D , HOMOLIAK I , et al . StrongChain:transparent and collaborative proof-of-work consensus [C ] // Proceedings of the 28th USENIX Security Symposium . Berkeley:USENIX Association , 2019 : 819 - 836 .
TSABARY I , EYAL I . The gap game [C ] // Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2018 : 713 - 728 .
BRÜNJES L , KIAYIAS A , KOUTSOUPIAS E , et al . Reward sharing schemes for stake pools [C ] // Proceedings of 2020 IEEE European Symposium on Security and Privacy (EuroS&P) . Piscataway:IEEE Press , 2020 : 256 - 275 .
BUTERIN V , REIJSBERGEN D , LEONARDOS S , et al . Incentives in Ethereum’s hybrid Casper protocol [J ] . International Journal of Network Management , 2020 , 30 ( 5 ): e2098 .
LIU B , QIN Y , CHU X W . Reducing Forks in the blockchain via probabilistic verification [C ] // Proceedings of 2019 IEEE 35th International Conference on Data Engineering Workshops . Piscataway:IEEE Press , 2019 : 13 - 18 .
SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin [C ] // Financial Cryptography and Data Security . Berlin:Springer , 2017 : 515 - 532 .
MIRKIN M , JI Y , PANG J , et al . BDoS:blockchain denial-of-service [C ] // Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security . New York:ACM Press , 2020 : 601 - 619 .
HU Q , WANG S L , CHENG X Z . A game theoretic analysis on block withholding attacks using the zero-determinant strategy [C ] // Proceedings of 2019 IEEE/ACM 27th International Symposium on Quality of Service (IWQoS) . Piscataway:IEEE Press , 2019 : 1 - 10 .
SHI H W , WANG S L , HU Q , et al . Fee-free pooled mining for countering pool-hopping attack in blockchain [J ] . IEEE Transactions on Dependable and Secure Computing , 2021 , 18 ( 4 ): 1580 - 1590 .
0
浏览量
520
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构