Anti-adaptive attack alliance chain consensus method based on Byzantine fault tolerance
A Byzantine and self-adaptive technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as destroying system activity, and achieve the effect of ensuring system activity, low latency, and improving scalability
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0021] The present invention will be further described in detail below in combination with specific embodiments.
[0022] Anonymous leader selection step: select a potential proposer PP from all consensus nodes in the alliance chain network; the identity of the potential proposer PP is hidden before the proposal;
[0023] Proposal step: the potential proposer PP builds a proposal block, and broadcasts it to the alliance chain network after signing; the potential proposer PP is exposed after the proposal and degenerates into a common consensus node;
[0024] Voting step: The consensus node verifies the received proposal block, including the signature verification of the potential proposer PP, the verification of the transaction content in the proposal block, and the identity verification of the potential proposer PP; and then performs a threshold-based signature on the proposal block voting, and the voting results are broadcast in the alliance chain network;
[0025] Confirmat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com