A block chain consensus method based on credibility evaluation

A blockchain and trustworthy technology, applied in encryption devices with shift registers/memory, user identity/authority verification, payment systems, etc., and can solve problems such as weak asymmetric encryption algorithms, ByzCoin consensus attacks, attacks, etc. , to achieve the effect of improving transaction throughput, ensuring randomness, and ensuring fairness

Active Publication Date: 2019-06-28
BEIJING UNIV OF TECH
View PDF10 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, if the current leader is malicious and does not generate microblocks, although the system can detect it, there is no other penalty to prevent it from becoming the leader again, so ByzCoin still suffers from consensus attacks
[0005] Existing Bitcoin variants based on current proof-of-work rely on the assumption that an attacker cannot have more than 33% or 51% of the computing power, however, as Bitcoin attacks increase in complexity, such as lightning attacks, Attackers can attack by leasing the computing power of miners, and these Bitcoin variant systems will be attacked
Moreover, the asymmetric encryption algorithm used in Bitcoin technology may become more and more vulnerable with the development of mathematics, cryptography and computer technology.
Taking the current supercomputer as an example, it takes about 2^48 years to generate a hash collision of the Bitcoin SHA256 hash algorithm. However, with the development of new computer technologies such as quantum computers in the future, the new technology may have certain advantages for this hash algorithm. cracking ability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A block chain consensus method based on credibility evaluation
  • A block chain consensus method based on credibility evaluation
  • A block chain consensus method based on credibility evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0014] The present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0015] Concept introduction:

[0016] System round time: the time from one leader to the next.

[0017] Key block: The key block is used to determine the leader and mine using the POW consensus mechanism. In a secret key block, Prev keyblock hash is the hash value of the previous key block, Nonce is a random number, PK is the public key of the miner, R is the trust value, K sig is Prev keyblock hash, Nonce, PK, R The hash value of , Sig keyblock agreement is the consensus-verified signature of this key block. Consensus group members verify the key block by checking the validity of K sig.

[0018] Microblock: A microblock is a simple block that is verified every few seconds. Microblocks include verified historical transactions. To prevent double spending, each microblock is proposed to the consensus group before being accepted, and if the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a block chain consensus method based on credibility assessment. According to the method, a weighted voting consensus based on trust values is adopted, and a consensus group isdynamically and randomly formed according to trust value ranking. Member of each consensus group has a voting weight in direct proportion to a trust value of the consensus group, and the trust valueis determined by long-time accumulated comprehensive performance. Therefore, only honest nodes show long-time normality and regularity, and can become one member of the consensus group. A miner in theconsensus group is randomly selected as a leader, the leader can generate a micro-block to pack the transaction, other nodes consensus the micro-block, and a round of work is finished. The method hasthree improvements: firstly, a novel leader and consensus group creation method is invented to ensure the randomness and fairness of selection; And secondly, a trust value calculation mode is createdbased on long-time accumulated comprehensive performance. And thirdly, a consensus algorithm based on the improved raft is created, and the throughput can be increased.

Description

technical field [0001] This patent belongs to the field of blockchain consensus algorithm technology, and studies a consensus protocol based on node credibility; it aims to improve the security of the consensus algorithm and solve the attack problem caused by computing power. Background technique [0002] At present, many blockchain systems based on computing power are designed to improve the defense against computing power attacks. There are mainly two blockchain systems related to them, namely Bitcoin-NG and ByzCoin. [0003] Bitcoin-NG proposes a very important concept. The proof of work of Bitcoin has two purposes, one is to elect a new leader, and the other is to add new blocks to the chain. To increase the throughput of transactions, BitCoin-NG uses the process of mining "key blocks" only to select new leaders, and new leaders submit "micro-blocks" containing transactions. Microblocks do not require proof-of-work, which makes BitCoin-NG more efficient than traditional...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q20/38G06Q20/06H04L9/06H04L9/32
Inventor 王冠张文月陈建中周珺
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products