计算机科学 ›› 2022, Vol. 49 ›› Issue (10): 297-309.doi: 10.11896/jsjkx.210800227

• 信息安全 • 上一篇    下一篇

基于信誉的区块链分片共识方案

王梦楠1, 黄建华1, 邵兴辉1, 麦勇2   

  1. 1 华东理工大学信息科学与工程学院 上海 200237
    2 华东理工大学商学院 上海 200237
  • 收稿日期:2021-08-25 修回日期:2022-03-01 出版日期:2022-10-15 发布日期:2022-10-13
  • 通讯作者: 黄建华(jhhuang@ecust.edu.cn)
  • 作者简介:(mnwang0105@163.com)
  • 基金资助:
    国家自然科学基金(61472139)

Reputation-based Blockchain Sharding Consensus Scheme

WANG Meng-nan1, HUANG Jian-hua1, SHAO Xing-hui1, MAI Yong2   

  1. 1 School of Information Science and Engineering,East China University of Science and Technology,Shanghai 200237,China
    2 School of Business,East China University of Science and Technology,Shanghai 200237,China
  • Received:2021-08-25 Revised:2022-03-01 Online:2022-10-15 Published:2022-10-13
  • About author:WANG Meng-nan,born in 1996,master,is a member of China Computer Federation.Her main research interests include blockchain and so on.
    HUANG Jian-hua,born in 1963,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include computer networks,information security and blockchain.
  • Supported by:
    National Natural Science Foundation of China(61472139).

摘要: 分片是一种解决区块链扩容问题的技术,但是分片可能会导致恶意节点更容易集中在单个分片内,从而阻碍整个系统的安全运行。文中提出了一种基于信誉的区块链分片共识协议,通过建立信誉机制来衡量节点行为,促使节点遵循协议,并通过基于信誉等级的分片方法来减小各分片节点信誉等级分布的差异,防止恶意节点集中在单一分片进行作恶。提出一种验证链和记录链相结合的双链模型,该模型通过交易信息的差异化存储,在扩展区块链存储容量的同时提高了区块链的安全性。将投票份额与节点信誉相关联,同时差异化节点承诺,提出了基于信誉的快速拜占庭容错共识算法,使诚实节点更快达成共识,并减小恶意节点的影响。安全性分析表明,RCBSP能够保证分片内节点分布的合理性和共识过程的安全性,防止双花攻击、无利害关系攻击。实验结果表明,RBSCP在保证安全性的前提下,能够做到低分区时延、低共识时延和高吞吐量。

关键词: 区块链, 分片, 信誉机制, 双链模型, 共识协议

Abstract: Sharding is a technology that solves the problem of blockchain capacity expansion.However,sharding may make it ea-sier for malicious nodes to be concentrated in a single shard,thus hindering the safe operation of the entire system.This paper proposes a reputation-based sharding consensus protocol(RBSCP),which establishes a reputation mechanism to measure node behavior and encourage nodes to follow the protocol.The reputation level-based sharding method reduces the difference in the reputation level distribution in different shards,so as to prevent malicious nodes from concentrating on a single shard to do evil.A double-chain model combining verification chain and record chain is proposed.Through the differentiated storage of transactions,the storage capacity of the blockchain is expanded while the security of the blockchain is improved.By associating the vo-ting shares with the node reputation and differentiating the node commitments,a reputation-based fast Byzantine fault tolerance(RFBFT) algorithm is proposed,which enables honest nodes to reach consensus faster and reduces the impact of malicious nodes.Security analysis shows that RBSCP can guarantee the rationality of node distribution in shards and the security of consensus process,and prevent double spend attack and nothing at stake attack.Experimental results show that RBSCP can achieve low sharding latency,low consensus latency and high throughput under the premise of ensuring security.

Key words: Blockchain, Sharding, Reputation mechanism, Double-chain model, Consensus protocol

中图分类号: 

  • TP309
[1]PUTZ B,PERNUL G.Detecting Blockchain Security Threats[C]//2020 IEEE International Conference on Blockchain(Blockchain).Rhodes,Greece,2020:313-320.
[2]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System [EB/OL].https://bitcoin.org/bitcoin.pdf.
[3]KING S,NADAL S M.PPcoin:Peer-to-peer crypto-currencywith proof-of-stake[EB/OL].https://www.semanticscholar.org/paper/PPCoin%3A-Peer-to-Peer-Crypto-Currency-with-King-Nadal/0db38d32069f3341d34c35085dc009a85ba13c13.
[4]CASTRO M,LISKOV B.Practical byzantine fault tolerance[C]//Proceedings of the 3rd Symposium on Operating Systems Design and Implementation(OSDI).New Orleans,1999:173-186.
[5]LUU L,NARAYANAN V,ZHENG C,et al.A Secure Sharding Protocol for Open Blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM,2016:17-30.
[6]THE ZILLIQA TEAM.The ZILLIQA Technical Whitepaper[EB/OL].https://docs.zilliqa.com/whitepaper.pdf.
[7]KOKORIS-KOGIAS E,JOVANOVIC P,GASSER L,et al.OmniLedger:A Secure,Scale-Out,Decentralized Ledger via Sharding[C]//2018 IEEE Symposium on Security and Privacy(SP).San Francisco,CA,2018:583-598.
[8]EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:A scalable Blockchain protocol[C]//Proceedings of 13th USENIX Symposium on Networked Systems Design and Implementation.Santa Clara,CA,USA,2016:45-59.
[9]MANNING D T,TAYLOR J E,WILEN J E.General Equili-brium Tragedy of the Commons[J].Environmental & Resource Economics,2018,69(4):1-27.
[10]LUO Y,CHEN Y,CHEN Q,et al.A new election algorithm for DPos consensus mechanism in blockchain[C]//2018 the 7th International Conference on Digital Home(ICDH).IEEE,2018:116-120.
[11]GUETA G G,ABRAHAM I,GROSSMAN S,et al.SBFT:A Scalable and Decentralized Trust Infrastructure[C]//2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN).Portland,OR,USA,2019:568-580.
[12]JIAN L,WENTING L.Scalable Byzantine Consensus via Hardware-Assisted Secret Sharing[J].IEEE Transactions on Computers,2019,68(1):139-151.
[13]JALALZAI M M,BUSCH C,RICHARD G G.Proteus:A Scalable BFT Consensus Protocol for Blockchains[C]//2019 IEEE International Conference on Blockchain(Blockchain).Atlanta,GA,USA,2019:308-313.
[14]GAO S.T-PBFT:An EigenTrust-Based Practical ByzantineFault Tolerance Consensus Algorithm[J].China Communications,2019,16(12):111-123.
[15]KAMVAR S D,SCHLOSSER M T,GARCIA-MOLINA H.The EigenTrust Algorithm for Reputation Management in P2P Networks[C]//Proceedings of the 12th International Conference on World Wide Web.2003:640-651.
[16]CHEN J,YAO S,YUAN Q,et al.Certchain:Public and efficient certificate audit based on blockchain for tls connections[C]//IEEE INFOCOM 2018-IEEE Conference on Computer Communications.IEEE,2018:2060-2068.
[17]KE W E,SUN R,CHEN C M,et al.Proof of X-repute blockchain consensus protocol for IoT systems[J].Computers & Security,2020,95:101871.
[18]LAO L,DAI X H,XIAO B,et al.G-PBFT:A location-based and scalable consensus protocol for IoT-blockchain applications[C]//IEEE International Parallel and Distributed Processing Symposium.Piscataway,NJ:IEEE Press,2020:664-673.
[19]CAI W J,JIANG W,XIE K,et al.Dynamic reputation-basedconsensus mechanism:Real-time transactions for energy blockchain[J].International Journal of Distributed Sensor Networks,2020,16(3):1-13.
[20]LEI K,ZHANG Q,XU L,et al.Reputation-Based ByzantineFault-Tolerance for Consortium Blockchain[C]//2018 IEEE 24th International Conference on Parallel and Distributed Systems(ICPADS).2018:604-611.
[21]ZAMANI M,MOVAHEDI M,RAYKOVA M.RapidChain:Scalingblockchain via full sharding[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:931-948.
[22]WANG J,WANG H.Monoxide:Scale out blockchains withasynchronous consensus zones[C]//Proceedings of the 16th USENIX Symposium on Networked Systems Design and Implementation.2019:95-112.
[23]YUN J,GOH Y,CHUNG J M.Trust-Based Shard Distribution Scheme for Fault-Tolerant Shard Blockchain Networks[J].IEEE Access,2019(7):135164-135175.
[24]HUANG J H,XIA X,LI Z C,et al.Proof of Trust:Mechanism of Trust Degree Based on Dynamic Authorization[J].Journal of Software,2019,30(9):2593-2607.
[25]SABT M,ACHEMLAL M,BOUABDALLAH A.Trusted Execution Environment:What It is,and What It is Not[C]//2015 IEEE Trustcom/BigDataSE/ISPA.IEEE,2015:57-64.
[26]BENTOV I,LEE C,MIZRAHI A.Proof of activity:Extending Bitcoin's proof of work via proof of stake [J].SIGMETRICS Performance Evaluation Review,2014,42(3):34-37.
[27]ZHANG M W,CHEN M W,XIE H T.Weighted Dynamic and Verifiable Multi-Secret Sharing Scheme[J].Journal of Cryptologic Research,2016,3(3):229-237.
[28]HE B T.The proof and application of the Chinese remaindertheorem on k[x][J].Science Technology and Engineering,2010,10(24):5965-5966.
[1] 王子凯, 朱健, 张伯钧, 胡凯.
区块链与智能合约并行方法研究与实现
Research and Implementation of Parallel Method in Blockchain and Smart Contract
计算机科学, 2022, 49(9): 312-317. https://doi.org/10.11896/jsjkx.210800102
[2] 李博, 向海昀, 张宇翔, 廖浩德.
面向食品溯源场景的PBFT优化算法应用研究
Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios
计算机科学, 2022, 49(6A): 723-728. https://doi.org/10.11896/jsjkx.210800018
[3] 周航, 姜河, 赵琰, 解相朋.
适用于各单元共识交易的电力区块链系统优化调度研究
Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit
计算机科学, 2022, 49(6A): 771-776. https://doi.org/10.11896/jsjkx.210600241
[4] 傅丽玉, 陆歌皓, 吴义明, 罗娅玲.
区块链技术的研究及其发展综述
Overview of Research and Development of Blockchain Technology
计算机科学, 2022, 49(6A): 447-461. https://doi.org/10.11896/jsjkx.210600214
[5] 高健博, 张家硕, 李青山, 陈钟.
RegLang:一种面向监管的智能合约编程语言
RegLang:A Smart Contract Programming Language for Regulation
计算机科学, 2022, 49(6A): 462-468. https://doi.org/10.11896/jsjkx.210700016
[6] 毛典辉, 黄晖煜, 赵爽.
符合监管合规性的自动合成新闻检测方法研究
Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance
计算机科学, 2022, 49(6A): 523-530. https://doi.org/10.11896/jsjkx.210300083
[7] 王思明, 谭北海, 余荣.
面向6G可信可靠智能的区块链分片与激励机制
Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence
计算机科学, 2022, 49(6): 32-38. https://doi.org/10.11896/jsjkx.220400004
[8] 孙浩, 毛瀚宇, 张岩峰, 于戈, 徐石成, 何光宇.
区块链跨链技术发展及应用
Development and Application of Blockchain Cross-chain Technology
计算机科学, 2022, 49(5): 287-295. https://doi.org/10.11896/jsjkx.210800132
[9] 阳真, 黄松, 郑长友.
基于区块链与改进CP-ABE的众测知识产权保护技术研究
Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE
计算机科学, 2022, 49(5): 325-332. https://doi.org/10.11896/jsjkx.210900075
[10] 任畅, 赵洪, 蒋华.
一种量子安全拜占庭容错共识机制
Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism
计算机科学, 2022, 49(5): 333-340. https://doi.org/10.11896/jsjkx.210400154
[11] 冯了了, 丁滟, 刘坤林, 马科林, 常俊胜.
区块链BFT共识算法研究进展
Research Advance on BFT Consensus Algorithms
计算机科学, 2022, 49(4): 329-339. https://doi.org/10.11896/jsjkx.210700011
[12] 王鑫, 周泽宝, 余芸, 陈禹旭, 任昊文, 蒋一波, 孙凌云.
一种面向电能量数据的联邦学习可靠性激励机制
Reliable Incentive Mechanism for Federated Learning of Electric Metering Data
计算机科学, 2022, 49(3): 31-38. https://doi.org/10.11896/jsjkx.210700195
[13] 张潆藜, 马佳利, 刘子昂, 刘新, 周睿.
以太坊Solidity智能合约漏洞检测方法综述
Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts
计算机科学, 2022, 49(3): 52-61. https://doi.org/10.11896/jsjkx.210700004
[14] 杨昕宇, 彭长根, 杨辉, 丁红发.
基于演化博弈的理性拜占庭容错共识算法
Rational PBFT Consensus Algorithm with Evolutionary Game
计算机科学, 2022, 49(3): 360-370. https://doi.org/10.11896/jsjkx.210900110
[15] 刘明达, 拾以娟, 饶翔, 范磊.
一种分布式的隐私保护数据搜索方案
Distributed Privacy Protection Data Search Scheme
计算机科学, 2022, 49(10): 291-296. https://doi.org/10.11896/jsjkx.210900233
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!