A Consortium Chain Consensus Method Against Adaptive Attacks Based on Byzantine Fault Tolerance
A Byzantine and consensus technology, applied in the field of Byzantine fault-tolerant consensus, can solve problems such as destroying system activity, and achieve the effects of ensuring system activity, improving scalability, and high robustness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Examples
Embodiment Construction
[0023] The present invention will be further described in detail below in combination with specific embodiments.
[0024] Anonymous leader selection step: select a potential proposer PP from all consensus nodes in the alliance chain network; the identity of the potential proposer PP is hidden before the proposal;
[0025] Proposal step: the potential proposer PP builds a proposal block, and broadcasts it to the alliance chain network after signing; the potential proposer PP is exposed after the proposal and degenerates into a common consensus node;
[0026] Voting step: The consensus node verifies the received proposal block, including the signature verification of the potential proposer PP, the verification of the transaction content in the proposal block, and the identity verification of the potential proposer PP; and then performs a threshold-based signature on the proposal block voting, and the voting results are broadcast in the alliance chain network;
[0027] Confirmat...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com