Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 332-339.doi: 10.11896/JsJkx.191100189

• Information Security • Previous Articles     Next Articles

Comparative Research of Blockchain Consensus Algorithm

LU Ge-hao, XIE Li-hong and LI Xi-yu   

  1. School of Software,Yunnan University,Kunming 650500,China
  • Published:2020-07-07
  • About author:LU Ge-hao, born in 1977, Ph.D, asso-ciate professor.His main research inte-rests include blockchain and artificial intelligence.
  • Supported by:
    This work was supported by the MaJor Science and Technology ProJects of Yunnan Province(2019ZE005).

Abstract: The consensus algorithm is the most important part of blockchain system,which directly affects the blockchain system’s efficiency,security and stability.According to different business scenarios,how researchers and developers choose or design an appropriate consensus algorithm is a big problem for the implementation of blockchain applications at the present stage.Based on the problem of Byzantine generals,this paper proposes the conditions that the consensus algorithm should meet in the design.Then,this paper divides the consensus algorithms into CFT consensus algorithm and BFT consensus algorithm according to the fault-tolerance type,describes the basic principles of the nine consensus algorithms in detail,and compares them from five aspects:fault-tolerance,performance efficiency,degree of decentralization,resource consumption and scale of use,and summarizes their advantages and disadvantages.It is expected to help researchers and developers select or design consensus algorithms and promote the application and evolution of block chain consensus algorithms.

Key words: Consensus algorithm, Blockchain, Fault-tolerance, Compared, Advantages and disadvantages

CLC Number: 

  • TP301
[1] AMSDEN Z,ARORA R,et al.The Libra Blockchain .
[2] LI M N.Analyzing Intellectual Structure of Related Topics to Blockchain and Bitcoin:From Co-citation Clustering and Bibliographic Coupling Perspectives.Acta Automatica Sinica,2017,43(9):1509-1519.
[3] ZENG S,NI X.A Bibliometric Analysis of Blockchain Research//2018 IEEE Intelligent Vehicles Symposium (IV).Changshu,2018:102-107.
[4] DABBAGH M,SOOKHAK M,SAFA N S.The Evolution ofBlockchain:A Bibliometric Study.IEEE Access,2019,7:19212-19221.
[5] REN M,TANG H B,SI X M,et al.Survey of ApplicationsBased on Blockchain in Government Department.Computer Science,2018(2):1-7.
[6] People’s Daily.During the 18th collective study session of the Political Bureau of the CPC Central Committee,xi Jinping stressed that blockchain should be regarded as an important breakthrough in independent innovation of core technologies and accelerate the innovation and development of blockchain technologies and industries .
[7] Baidu baike.Blockchain .区块链/13465666.
[8] China blockchain technology and industrial development BBS.China’s white paper on blockchain technology and application development (2016) .
[9] LAMPORT L.The Byzantine Generals Problem.Acm Transactions on Programming Languages & Systems,1982,4(3):382-401.
[10] FISCHER M J,LYNCH N A,PATERSON M S.Impossibility of distributed consensus with one faulty process.Journal of the ACM,1985,32(2):374-382.
[11] YUAN Y,NI X C,ZENG S,et al.Blockchain Consensus Algorithms:The State of the Art and Future Trends.Journal of automation,2018,44(11):93-104.
[12] LAMPORT L.Paxos made simple.ACM SIGACT News,2001,32(4):51-58.
[13] ONGARO D,OUSTERHOUTJ K.In search of an understandable consensus algorithm//USENIX Annual Technical Conference.2014:305-319.
[14] CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery.ACM Transactions on Computer Systems,2002,20(4):398-461.
[15] BACK A.Hashcash-A Denial of Service Counter-Measure.,2002-8-1.
[16] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System .,2008-11-8.
[17] Wikipedia.Proof-of-stake .
[18] KING S,NADAL S.PPCoin:Peer-to-Peer Crypto-Currency withProof-of-Stake.
[19] Delegated Proof-of-Stake Consensus .
[20] DANTHEMAN.DPOS Consensus Algorithm-The MissingWhite Paper.
[21] DWORK C,NAOR M.Pricing via Processing or CombattingJunk Mail//International Cryptology Conference on Advances in Cryptology.1993:139-147.
[22] Jcs47.How BFT SMaRt works..,2018-10-30.
[23] BESSANI A,SOUSA J,ALCHIERI E E P.State Machine Replication for the Masses with BFT-SMART//2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks.Atlanta,GA,2014:355-362.
[24] SOUSA J,BESSANI A.From Byzantine Consensus to BFTState Machine Replication:A Latency-Optimal Transformation//2012 Ninth European Dependable Computing Confe-rence.Sibiu,2012:37-48.
[25] 张铮文.一种用于区块链的拜占庭容错算法.
[26] NEO.
[27] SCHWARTZ D,YOUNGS N,BRITTO A.The Ripple Protocol Consensus Algorithm .,2013.
[28] ARMKNECHT F,KARAME G O,MANDAL A,et al.Ripple:Overview and Outlook//Trust and Trustworthy Computing.2015.
[29] Ripple.
[30] BURROWS M.The Chubby lock service for loosely-coupled distributed systems //ACM OSDI ’06 Proceedings of the 7th symposium on Operating systems design and implementation,2006,335-350.
[31] Ethereum White Paper.A Next-Generation Smart Contract and Decentralized Application Platform .
[32] VASINP.BlackCoin’s Proof-of-Stake Protocol v2 .,2014.
[33] ZHOU Y F.Evolution of Blockchain Core Technology-Consensus Mechanism Evolution (1).Computer Education,268(4):155-158.
[34] EOS.IO Technical White Paper v2.,2018-3-16.
[35] ZHANG Y,LI X H.The research and implementation of an improved blockchain’s consensus mechanism.Electronic Design Engineering,2018,26(1):38-42,47.
[36] TANG S P,YAN C.Research and improvement of block chain DPoS consensus mechanism.Modern Computer (Professional Edition),2019(6):11-14.
[37] HUANG J C,XU X H,WANG S C.Improved scheme of delegated proof of stake consensus mechanism.Computer Application,2019(7):2162-2167.
[38] Symbiont.
[39] NEOwhitepaper.
[40] Hyperledger.Hyperledger Whitepaper [EB/OL].,2017-6-21.
[41] JIAO Z Z.All sorts of possibilities around the impossible triangle of blockchain.
[1] ZHANG Yan-mei, LOU Yin-cheng. Deep Neural Network Based Ponzi Scheme Contract Detection Method [J]. Computer Science, 2021, 48(1): 273-279.
[2] SHAO Wei-hui, WANG Ning, HAN Chuan-feng, XU Wei-sheng. Integrated Emergency-Defense System Based on Blockchain [J]. Computer Science, 2021, 48(1): 287-294.
[3] LI Ying, YU Ya-xin, ZHANG Hong-yu, LI Zhen-guo. High Trusted Cloud Storage Model Based on TBchain Blockchain [J]. Computer Science, 2020, 47(9): 330-338.
[4] LIU Shuai, GAN Guo-hua, LIU Ming-xi, FANG Yong, WANG Shou-yang. Multi-subblock Incentive Consensus Mechanism Based on Topology and Distribution Mechanism [J]. Computer Science, 2020, 47(7): 268-277.
[5] LIN Xu-dan, BAO Shi-Jian, ZHAO Li-xin and ZHAO Chen-lin. Design and Performance Analysis of Automotive Supply Chain System Based on Hyperledger Fabric [J]. Computer Science, 2020, 47(6A): 546-551.
[6] WU Guang-fu, CHEN Ying, ZENG Xian-wen, HE Dao-Jing and LI Jiang-hua. Design and Analysis of Token Model Based on Blockchain Technology [J]. Computer Science, 2020, 47(6A): 603-608.
[7] ZHANG Qi-ming, LU Jian-hua, LI Shou-zhi and XU Jian-dong. Building Innovative Enterprise Customer Service Technology Platform Based on Blockchain [J]. Computer Science, 2020, 47(6A): 639-642.
[8] YE Shao-jie, WANG Xiao-yi, XU Cai-chao, SUN Jian-ling. BitXHub:Side-relay Chain Based Heterogeneous Blockchain Interoperable Platform [J]. Computer Science, 2020, 47(6): 294-302.
[9] CHENG Yu, LIU Wei, SUN Tong-xin, WEI Zhi-gang, DU Wei. Design of Fault-tolerant L1 Cache Architecture at Near-threshold Voltage [J]. Computer Science, 2020, 47(4): 42-49.
[10] XIE Ying-ying, SHI Jian, HUANG Shuo-kang, LEI Kai. Survey on Internet of Things Based on Named Data Networking Facing 5G [J]. Computer Science, 2020, 47(4): 217-225.
[11] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[12] FENG Tao, JIAO Ying, FANG Jun-li, TIAN Ye. Medical Health Data Security Model Based on Alliance Blockchain [J]. Computer Science, 2020, 47(4): 305-311.
[13] PAN Ji-fei,HUANG De-cai. Blockchain Dynamic Sharding Model Based on Jump Hash and Asynchronous Consensus Group [J]. Computer Science, 2020, 47(3): 273-280.
[14] LV Jian-fu,LAI Ying-xu,LIU Jing. Log Security Storage and Retrieval Based on Combination ofOn-chain and Off-chain [J]. Computer Science, 2020, 47(3): 298-303.
[15] ZHOU Chang,LU Hui-mei,XIANG Yong,WU Jing-bang. Survey on Application of Blockchain in VANET [J]. Computer Science, 2020, 47(2): 213-220.
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[2] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[3] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[4] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[5] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[6] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[7] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[8] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[9] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .
[10] WANG Zhen-chao, HOU Huan-huan and LIAN Rui. Path Optimization Scheme for Restraining Degree of Disorder in CMT[J]. Computer Science, 2018, 45(4): 122 -125 .