Block chain block building method for Byzantine fault tolerant algorithm of quartic communication

A blockchain and sub-communication technology, applied in computing, instruments, payment systems, etc., can solve problems such as Byzantine errors, data inconsistencies, waste of resources, etc., and achieve increased block building speed, expanded usage scenarios, and improved verification speed Effect

Active Publication Date: 2017-02-22
ZEU CRYPTO NETWORKS INC
View PDF5 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Mining itself is a kind of meaningless calculation, which requires a lot of waste of resources. In the case of a li

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain block building method for Byzantine fault tolerant algorithm of quartic communication
  • Block chain block building method for Byzantine fault tolerant algorithm of quartic communication
  • Block chain block building method for Byzantine fault tolerant algorithm of quartic communication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0029] Assuming that there are 4 nodes (i.e. M=4) in the blockchain system, namely node A, node B, node C, and node D, when the method of the present invention is used to build a block, each node first maps the transaction to obtain a bitarray, such as figure 2 As shown, after getting the bitarray, the first communication is:

[0030] Node A: Map the received transaction to bitarray, get a bitarray and send it to nodes B, C, and D;

[0031]Node B: Map the received transaction to bitarray, get a bitarray and send it to nodes A, C, and D;

[0032] Node C: Map the received transaction to bitarray, get a bitarray and send it to nodes A, B, and D;

[0033] Node D: Map the received transaction to bitarray, get a bitarray and send it to nodes A, B, and C;

[0034] After the first communication, all nodes calculate the 2 / 3 intersection operation according to the obtained bitarray, and the operation result is recorded as ba, that is to say, if each bit has more than 2 / 3 of the bita...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a private block chain block building method for a Byzantine fault tolerant algorithm of quartic communication. The method comprises: (1) all nodes carrying out hash mapping on the received transactions to obtain a bitarray sent to all remaining nodes, and each node carrying out 2/3 AND operation on the received bitarray to obtain a bitarray corresponding to a transaction intersection of over 2/3 nodes; (2) a block building node obtaining a transaction set according to the bitarray for building a block, and submitting the block to the remaining nodes; (3) a node receiving the block completing verification by comparing self bitarray with the transaction set in the block, and sending a digital signature of the verification result to all the remaining nodes after verification; and (4) forwarding all vote signatures received by all nodes on the block in second vote so that each node receives votes of all the nodes, and collecting statistics on the votes to obtain a final result, thus determining whether to accept the block.

Description

technical field [0001] The invention relates to a block chain building method based on a consensus algorithm, in particular to a block chain building method using a Byzantine fault-tolerant algorithm of four communications. Background technique [0002] In the blockchain system, multiple nodes each maintain a blockchain. To ensure the consistency of data in all nodes, it is necessary to ensure that the blockchain maintained by each node is the same. With the rapid development of distributed applications such as e-commerce websites, the system may suffer more attacks, resulting in the existence of "traitor nodes" in the nodes. It is necessary to ensure that the system maintains normal operation under such circumstances, and loyal normal nodes The data remains consistent. In this case, the block building method based on the Byzantine algorithm is introduced. Critical services need to be tolerant not only of benign errors but also of Byzantine errors. Related content can be f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/06G06Q20/38
CPCG06Q20/065G06Q20/382G06Q20/3825
Inventor 邓恩艳
Owner ZEU CRYPTO NETWORKS INC
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products