A Consortium Chain Consensus Method Against Adaptive Attacks Based on Byzantine Fault Tolerance

A Byzantine and consensus technology, applied in the field of Byzantine fault-tolerant consensus, can solve problems such as destroying system activity, and achieve the effects of ensuring system activity, improving scalability, and high robustness

Active Publication Date: 2021-08-03
西安周盘汇通科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This article calculates the hash value corresponding to each consensus node to be selected based on the private key, sequence number, current view number and the hash value corresponding to the block generated in the previous round of consensus process on each consensus node to be selected , so as to screen out the only proposer, but the identity of the proposer is exposed before the proposal, and the adversary can easily launch targeted adaptive attacks and destroy system activity

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in combination with specific embodiments.

[0024] Anonymous leader selection step: select a potential proposer PP from all consensus nodes in the alliance chain network; the identity of the potential proposer PP is hidden before the proposal;

[0025] Proposal step: the potential proposer PP builds a proposal block, and broadcasts it to the alliance chain network after signing; the potential proposer PP is exposed after the proposal and degenerates into a common consensus node;

[0026] Voting step: The consensus node verifies the received proposal block, including the signature verification of the potential proposer PP, the verification of the transaction content in the proposal block, and the identity verification of the potential proposer PP; and then performs a threshold-based signature on the proposal block voting, and the voting results are broadcast in the alliance chain network;

[0027] Confirmat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A Byzantine fault-tolerant anti-adaptive attack alliance chain consensus method, the steps are: construct an anonymous sorting master selection algorithm based on ring signatures, and secretly select a potential proposer PP from all consensus nodes in the alliance chain network; potential proposers PP builds a proposal block, signs it and broadcasts it to the alliance chain network; the consensus node verifies the received proposal block, and votes on the verified proposal block based on the threshold signature, and the voting result is broadcast in the alliance chain network ; If a consensus node receives a legal threshold signature for the proposed block within the predetermined time, the proposed block completes the consensus; all nodes in the alliance chain network save the above-mentioned consensus-completed block. While reducing system overhead and improving scalability, this method has high security. It can effectively ensure system activity before and after the proposal, and provide support for high-availability Byzantine systems.

Description

technical field [0001] The invention relates to a Byzantine fault-tolerant consensus method of an alliance chain network. Background technique [0002] Blockchain is a trustless distributed ledger system. Its concept originated from the article "Bitcoin: A Peer-to-Peer Electronic Cash System" published by Satoshi Nakamoto in the cryptography mail group in 2008. A decentralized infrastructure constructed by the fusion of various technologies such as symmetric encryption, consensus algorithm, and P2P protocol. As the core technology of the blockchain, the consensus algorithm can realize the distributed consistency of data in a network lacking central control, and plays an important role in maintaining the stable operation of the system and the mutual trust of nodes. [0003] The Byzantine Fault Tolerant Consensus Algorithm is a general scheme for distributed systems to apply replication technology to solve Byzantine errors. Its proposal nodes have core functions such as initi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
CPCH04L9/3255H04L9/3236H04L2209/463H04L9/50
Inventor 张文芳孙海锋王小敏
Owner 西安周盘汇通科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products