Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Detection method for selfish mining behaviors on workproof mechanism block chain

A technology of proof mechanism and detection method, which is applied in the field of blockchain network, can solve the problems of wasting computing power, declining income of honest miners, increasing costs, etc.

Inactive Publication Date: 2020-09-18
UNIV OF ELECTRONICS SCI & TECH OF CHINA ZHONGSHAN INST
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] However, the above-mentioned method of reducing the advantage of selfish miners by increasing the difficulty of mining is a lose-lose method. Since this will increase the cost of mining for all miners at the same time, the income of honest miners will decrease, and computing power will be wasted.
At the same time, modifying the difficulty adjustment rules may also lead to unpredictable problems in other aspects. For example, the difficulty caused by "difficulty bombing" will increase exponentially with the increase of the height of the block, and finally the new block cannot be mined;

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Detection method for selfish mining behaviors on workproof mechanism block chain
  • Detection method for selfish mining behaviors on workproof mechanism block chain
  • Detection method for selfish mining behaviors on workproof mechanism block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with specific embodiments and with reference to the accompanying drawings. It should be understood that these descriptions are only exemplary and not intended to limit the scope of the present invention. In addition, in the following description, descriptions of well-known structures and technologies are omitted to avoid unnecessarily obscuring the concept of the present invention.

[0045] Such as figure 1 As shown, the detection method for selfish mining behavior on the blockchain of the proof-of-work mechanism proposed by the present invention includes the following specific steps:

[0046] S1. Monitor the status of the block announced by each miner in the blockchain;

[0047] S2. When it is monitored that miner A has announced a chain whose block height is at least two blocks higher than tha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a detection method for selfish mining behaviors on a workproof mechanism block chain. The detection method comprises the following specific steps: S1, monitoring the situationthat each miner publishes a block in the block chain; S2, when a suspicious block is monitored, respectively calculating the values of Sstate, Fstate and Hstate; S3, judging a size relationship amongthe values of the Sstate, the Fstate and the Hstate: if the Hstate is less than the Sstate or the Fstate is less than 0, determining that the monitored suspicious block is published by a selfish miner; S4, if the condition in S3 does not exist, calculating Asize / n and p, and if Asize / n is less than p, enabling the regional block to refuse to monitor the suspicious block, otherwise, enabling the regional block to receive the monitored suspicious block. According to the method, selfish mining behaviors in the block chain can be discovered directly through existing public information, the changeof a block chain difficulty adjustment scheme is not involved, and the income of honest miners is not influenced.

Description

Technical field [0001] The invention relates to the technical field of blockchain networks, in particular to a method for detecting selfish mining behaviors on a blockchain with a workload proof mechanism. Background technique [0002] The workload proof mechanism is a kind of consensus mechanism and is widely used in various blockchains. In the blockchain, certain network nodes will pack a certain number of transactions into blocks to obtain the revenue corresponding to the block. These nodes are called miners; in order to prove that they have the right to book a certain block, That is, the income of a certain block should belong to the miner; the miner will also pack its own workload into the corresponding block, and other miners will evaluate the workload. If most miners think it is effective, the block will be Accepted by the blockchain network, the miners who dig out the block get corresponding benefits; [0003] In a blockchain with a proof-of-work mechanism, the block gene...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q50/02G06F21/64
CPCG06F21/64G06Q50/02
Inventor 何怀文王贺立刘贵松李治浩
Owner UNIV OF ELECTRONICS SCI & TECH OF CHINA ZHONGSHAN INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products