A Survey of Distributed Consensus Protocols for Blockchain Networks

作者: Yang Xiao , Y. Thomas Hou , Wenjing Lou , Ning Zhang

DOI: 10.1109/COMST.2020.2969706

关键词:

摘要: Since the inception of Bitcoin, cryptocurrencies and underlying blockchain technology have attracted an increasing interest from both academia industry. Among various core components, consensus protocol is defining behind security performance blockchain. From incremental modifications Nakamoto to innovative alternative mechanisms, many protocols been proposed improve network itself or accommodate other specific application needs. In this survey, we present a comprehensive review analysis on state-of-the-art protocols. To facilitate discussion our analysis, first introduce key definitions relevant results in classic theory fault tolerance which help lay foundation for further discussion. We identify five components protocol, namely, block proposal, validation, information propagation, finalization, incentive mechanism. A wide spectrum are then carefully reviewed accompanied by algorithmic abstractions vulnerability analyses. The surveyed analyzed using five-component framework compared with respect different metrics. These analyses comparisons provide us new insights fundamental differences proposals terms their suitable scenarios, assumptions, expected tolerance, scalability, drawbacks trade-offs. believe survey will developers researchers view process designing future

参考文章(102)
Juan Garay, Aggelos Kiayias, Nikos Leonardos, The Bitcoin Backbone Protocol: Analysis and Applications theory and application of cryptographic techniques. pp. 281- 310 ,(2015) , 10.1007/978-3-662-46803-6_10
R. Canetti, Universally composable security: a new paradigm for cryptographic protocols international conference on cluster computing. pp. 136- 145 ,(2001) , 10.1109/SFCS.2001.959888
Ayelet Sapirshtein, Yonatan Sompolinsky, Aviv Zohar, Optimal Selfish Mining Strategies in Bitcoin Financial Cryptography and Data Security. pp. 515- 532 ,(2017) , 10.1007/978-3-662-54970-4_30
Barbara Liskov, James Cowling, Viewstamped Replication Revisited ,(2012)
Victor Shoup, Rosario Gennaro, Securing threshold cryptosystems against chosen ciphertext attack theory and application of cryptographic techniques. pp. 1- 16 ,(1998) , 10.1007/BFB0054113
Ralph C. Merkle, A Digital Signature Based on a Conventional Encryption Function international cryptology conference. pp. 369- 378 ,(1987) , 10.1007/3-540-48184-2_32
Mike Dahlin, Edmund Wong, Allen Clement, Mirco Marchetti, Lorenzo Alvisi, Making Byzantine fault tolerant systems tolerate Byzantine faults networked systems design and implementation. pp. 153- 168 ,(2009)
Christian Decker, Jochen Seidel, Roger Wattenhofer, Bitcoin meets strong consistency international conference of distributed computing and networking. pp. 13- ,(2016) , 10.1145/2833312.2833321
Christian Cachin, Klaus Kursawe, Frank Petzold, Victor Shoup, None, Secure and Efficient Asynchronous Broadcast Protocols international cryptology conference. ,vol. 2139, pp. 524- 541 ,(2001) , 10.1007/3-540-44647-8_31