计算机科学 ›› 2023, Vol. 50 ›› Issue (6A): 220400200-12.doi: 10.11896/jsjkx.220400200
谭朋柳, 王润庶, 曾文豪, 王诗堃, 邹雯诗
TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi
摘要: 共识算法维持着分布式系统的稳定和安全,同时又是发展区块链方向的关键技术。随着区块链技术快速发展,共识算法的研究也越来越受到研究人员的重视和青睐。现如今,在不同应用场景下选择合适的共识算法是研究人员所要面对的一个选择性难题。主要从服务对象节点种类出发,把共识算法归类为公有链、联盟链和私有链这3个大分类。在这3个大分类的基础之上,分别阐述了现在主流的和一些新的区块链共识算法的基本原理,共列举了9种共识算法,并从去中心化、安全性和可扩容性这3个方面对这9种共识算法进行性能评估。并且对相关算法进行了优缺点的分析总结,给出了优化区块链共识算法的相关方向,以供研究人员研究和参考,从而促进区块链共识算法的稳步发展。
中图分类号:
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].http://bitcoin.org/bitcoin.pdf. [2]The global economy is in its weakest period in a decade,but bitcoin is quietly brewing the next bull market?[EB/OL].https://baijiahao.baidu.com/s?id=1648083421346579310&wfr=spider&for=pc. [3]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and progress[J].Chinese Journal of Computers,2018,41(5):969-988. [4]ZHU L,YU H,ZHAN S X,et al.Research on high performance alliance blockchain Technology[J].Journal of Software.2019,30(6):17. [5]CHEN W L,ZHENG Z B.Blockchain data analysis:status,trends and challenges[J].Journal of Computer Research and Development,2018,55(9):1853-1870. [6]Blockchain for financial services[EB/OL].https://www.ibm.com/blockchain/industries/financial-services. [7]Ant chain[EB/OL].https://antchain.antgroup.com/. [8]Blockchain for Supply Chain-IBM Blockchain[EB/OL].https://www.ibm.com/blockchain/supply-chain. [9]Home-GBA Global[EB/OL].https://www.gbaglobal.org/. [10]State of the DApps-Ranking the Best Ethereum DApps[EB/OL].https://www.stateofthedapps.com/zh/rankings/platform/ethereum. [11]YUAN Y,WANG F.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica.2016,42(4):481-494. [12]OLSEN P,BORIT M.The components of a food traceabilitysystem[J].Trends in Food Science & Technology.2018,77:143-149. [13]YUAN Y,WANG F.Blockchain and Cryptocurrencies:Model,Techniques,and Applications[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems.2018,48(9):1421-1428. [14]LIU A D,DU X H,WANG N,et al Blockchain technology and its research progress in the field of information security[J].Journal of Software.2018,29(7):2092-2115. [15]DWORK C,NAOR M.Pricing via Processing or CombattingJunk Mail[M]//Berlin:Springer,2001:139-147. [16]BACK A.Hashcash-a denial of service counter-measure[EB/OL].https://sites.cs.ucsb.edu/~rich/class/old.cs290/papers/hascash2.pdf. [17]WANG M,DUAN M,ZHU J.Research on the Security Criteria of Hash Functions in the Blockchain[C]//Proceedings of the 2nd ACM Workshop on Blockchains,Cryptocurrencies,and Contracts.ACM,2018:47-55. [18]ZHENG W,ZHENG Z,CHEN X,et al.NutBaaS:A Blockchai-nas-a-Service Platform[J].IEEE Access.2019,7:134422-134433. [19]KING S,NADAL S.Ppcoin:Peer-to-peer crypto-currency withproof-of-stake[EB/OL].https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf. [20]VASIN P.Blackcoin’s proof-of-stake protocol v2[J/OL].https://blackcoin.co/blackcoin-pos-protocol-v2-whitepaper.pdf. [21]YANG F,ZHOU W,WU Q,et al.Delegated Proof of StakeWith Downgrade:A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism[J].IEEE Access.2019,7:118541-118555. [22]CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM transactions on computer systems.2002,20(4):398-461. [23]GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems.2020,107:760-769. [24]GUETA G G,ABRAHAM I,GROSSMAN S,et al.Sbft:a sca-lable and decentralized trust infrastructure[C]//IEEE.2019:568-580. [25]GAO S,YU T,ZHU J,et al.T-PBFT:An EigenTrust-basedpractical Byzantine fault tolerance consensus algorithm[J].ChinaCommunications,2019,16(12):111-123. [26]KAMVAR S D,SCHLOSSER M T,GARCIA-MOLINA H.TheEigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International Conference on World Wide Web.ACM.2003:640-651. [27]DU M,CHEN Q,MA X.MBFT:A New Consensus Algorithm for Consortium Blockchain[J].IEEE Access.2020,8:87665-87675. [28]LAMPORT L.Paxos made simple[J].ACM Sigact News.2001,32(4):18-25. [29]ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm(extended version)[C]//Proceeding of USENIX Annual Technical Conference.2014:19-20. [30]WU Y,ZHONG S.Research on block chain consensus algorithm raft[J].Netinfo Security.2021,21(6):36-44. [31]MCCORRY P,HEILMAN E,MILLER A.Atomically Tradingwith Roger:Gambling on the Success of a Hardfork[M]//Data Privacy Management,Cryptocurrencies and Blockchain Techno-logy.Cham:Springer International Publishing,2017:334-353. [32]DOUCEUR J R.The sybil attack[C]//Peer-to-Peer Systems.Berlin:Springer,2002:251-260. [33]NAIR P R,DORAI D R.Evaluation of Performance and Security of Proof of Work and Proof of Stake using Blockchain[C]//2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks(ICICV).IEEE.2021:279-283. [34]DOULIGERIS C,MITROKOTSA A.DDoS attacks and defense mechanisms:classification and state-of-the-art[J].Computer Networks,2004,44(5):643-666. [35]HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse attacks on bitcoin’s peer-to-peer network[C]//24th USENIX Security Symposium(USENIX Security’15).2015:129-144. [36]ZHENZHEN J.Various possibilities around the “ImpossibleTriangle” of blockchain[EB/OL].http://www.ccw.com.cn/channel/blockchain/2019-04-03/6967.html. [37]ZHANG P Y,SONG J.Research Progress on efficiency optimization of blockchain consensus algorithm[J].Computer Science,2020,47(12):296-303. |
|