Anti-adaptive attack alliance chain consensus method based on Byzantine fault tolerance

A Byzantine and self-adaptive technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., can solve problems such as destroying system activity, and achieve the effect of ensuring system activity, low latency, and improving scalability

Active Publication Date: 2019-09-27
西安周盘汇通科技有限公司
View PDF7 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This article calculates the hash value corresponding to each consensus node to be selected based on the private key, sequence number, current view number and the hash value corresponding to the block generated in the previous round of consensu

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described in detail below in combination with specific embodiments.

[0022] Anonymous leader selection step: select a potential proposer PP from all consensus nodes in the alliance chain network; the identity of the potential proposer PP is hidden before the proposal;

[0023] Proposal step: the potential proposer PP builds a proposal block, and broadcasts it to the alliance chain network after signing; the potential proposer PP is exposed after the proposal and degenerates into a common consensus node;

[0024] Voting step: The consensus node verifies the received proposal block, including the signature verification of the potential proposer PP, the verification of the transaction content in the proposal block, and the identity verification of the potential proposer PP; and then performs a threshold-based signature on the proposal block voting, and the voting results are broadcast in the alliance chain network;

[0025] Confirmat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

An anti-adaptive attack alliance chain consensus method based on Byzantine fault tolerance comprises the following steps: constructing an anonymous sorting master selection algorithm based on ring signatures, and selecting a potential proposor PP from all consensus nodes in an alliance chain network in a concealed manner; enabling a potential proposor PP to construct a proposal block, sign the proposal block and broadcast the proposal block to the alliance chain network; enabling the consensus node to verify the received proposal block, vote the proposal block passing the verification based on a threshold signature, and broadcast a voting result in the alliance chain network; if a consensus node receives a legal threshold signature of the proposal block within a predetermined time, enabling the proposal block to complete the consensus; and enabling all nodes in the alliance chain network to store the blocks completing the consensus. The method has the advantages that the system overhead is reduced, the expandability is improved, the safety is higher, the system activity can be effectively ensured before and after proposal, and the support is provided for a high-availability Byzantine system.

Description

technical field [0001] The invention relates to a Byzantine fault-tolerant consensus method of an alliance chain network. Background technique [0002] Blockchain is a trustless distributed ledger system. Its concept originated from the article "Bitcoin: A Peer-to-Peer Electronic Cash System" published by Satoshi Nakamoto in the cryptography mail group in 2008. A decentralized infrastructure constructed by the fusion of various technologies such as symmetric encryption, consensus algorithm, and P2P protocol. As the core technology of the blockchain, the consensus algorithm can realize the distributed consistency of data in a network lacking central control, and plays an important role in maintaining the stable operation of the system and the mutual trust of nodes. [0003] The Byzantine Fault Tolerant Consensus Algorithm is a general scheme for distributed systems to apply replication technology to solve Byzantine errors. Its proposal nodes have core functions such as initi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
CPCH04L9/3255H04L9/3236H04L2209/463H04L9/50
Inventor 张文芳孙海锋王小敏
Owner 西安周盘汇通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products