计算机科学 ›› 2023, Vol. 50 ›› Issue (6A): 220400200-12.doi: 10.11896/jsjkx.220400200

• 信息安全 • 上一篇    下一篇

区块链共识算法综述

谭朋柳, 王润庶, 曾文豪, 王诗堃, 邹雯诗   

  1. 南昌航空大学软件学院 南昌 330063
  • 出版日期:2023-06-10 发布日期:2023-06-12
  • 通讯作者: 谭朋柳(pltan@nchu.edu.cn)
  • 基金资助:
    国家自然科学基金(61961029);江西省科技厅重点研发计划(20171ACE50025)

Overview of Blockchain Consensus Algorithms

TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi   

  1. School of Software,Nanchang Hangkong University,Nanchang 330063,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:TAN Pengliu,born in 1975,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include blockchain,cyber-physical system,intelligent medical care,etc.
  • Supported by:
    National Natural Science Foundation of China(61961029)and Key Research Plan of Jiangxi Province Department of Science and Technology(20171ACE50025).

摘要: 共识算法维持着分布式系统的稳定和安全,同时又是发展区块链方向的关键技术。随着区块链技术快速发展,共识算法的研究也越来越受到研究人员的重视和青睐。现如今,在不同应用场景下选择合适的共识算法是研究人员所要面对的一个选择性难题。主要从服务对象节点种类出发,把共识算法归类为公有链、联盟链和私有链这3个大分类。在这3个大分类的基础之上,分别阐述了现在主流的和一些新的区块链共识算法的基本原理,共列举了9种共识算法,并从去中心化、安全性和可扩容性这3个方面对这9种共识算法进行性能评估。并且对相关算法进行了优缺点的分析总结,给出了优化区块链共识算法的相关方向,以供研究人员研究和参考,从而促进区块链共识算法的稳步发展。

关键词: 区块链, 共识算法, 公有链, 联盟链, 私有链, 优缺点

Abstract: Consensus algorithm not only maintains the stability and security of distributed system,but also is the key technology in the development direction of blockchain.With the rapid development of blockchain technology,the research of consensus algorithm has attracted more and more attention and favor of researchers.Nowadays,choosing an appropriate consensus algorithm in different application scenarios is a selective problem that researchers have to face.Starting from the types of service object nodes,this paper classifies the consensus algorithm into three categories:public chain,alliance chain and private chain.Based on these three categories,this paper expounds the basic principles of some mainstream and some new blockchain consensus algorithms,a total of 9 consensus algorithms,and evaluates the performance of these 9 consensus algorithms from three aspects:decentralization,security and scalability.This paper also analyzes and summarizes the advantages and disadvantages of the relevant algorithms,and gives the relevant directions to optimize the blockchain consensus algorithm for researchers’ research and reference,so as to promote the steady development of blockchain consensus algorithm.

Key words: Blockchain, Consensus algorithm, Public chain, Alliance chain, Private chain, Advantages and disadvantages

中图分类号: 

  • TP301
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].http://bitcoin.org/bitcoin.pdf.
[2]The global economy is in its weakest period in a decade,but bitcoin is quietly brewing the next bull market?[EB/OL].https://baijiahao.baidu.com/s?id=1648083421346579310&wfr=spider&for=pc.
[3]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and progress[J].Chinese Journal of Computers,2018,41(5):969-988.
[4]ZHU L,YU H,ZHAN S X,et al.Research on high performance alliance blockchain Technology[J].Journal of Software.2019,30(6):17.
[5]CHEN W L,ZHENG Z B.Blockchain data analysis:status,trends and challenges[J].Journal of Computer Research and Development,2018,55(9):1853-1870.
[6]Blockchain for financial services[EB/OL].https://www.ibm.com/blockchain/industries/financial-services.
[7]Ant chain[EB/OL].https://antchain.antgroup.com/.
[8]Blockchain for Supply Chain-IBM Blockchain[EB/OL].https://www.ibm.com/blockchain/supply-chain.
[9]Home-GBA Global[EB/OL].https://www.gbaglobal.org/.
[10]State of the DApps-Ranking the Best Ethereum DApps[EB/OL].https://www.stateofthedapps.com/zh/rankings/platform/ethereum.
[11]YUAN Y,WANG F.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica.2016,42(4):481-494.
[12]OLSEN P,BORIT M.The components of a food traceabilitysystem[J].Trends in Food Science & Technology.2018,77:143-149.
[13]YUAN Y,WANG F.Blockchain and Cryptocurrencies:Model,Techniques,and Applications[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems.2018,48(9):1421-1428.
[14]LIU A D,DU X H,WANG N,et al Blockchain technology and its research progress in the field of information security[J].Journal of Software.2018,29(7):2092-2115.
[15]DWORK C,NAOR M.Pricing via Processing or CombattingJunk Mail[M]//Berlin:Springer,2001:139-147.
[16]BACK A.Hashcash-a denial of service counter-measure[EB/OL].https://sites.cs.ucsb.edu/~rich/class/old.cs290/papers/hascash2.pdf.
[17]WANG M,DUAN M,ZHU J.Research on the Security Criteria of Hash Functions in the Blockchain[C]//Proceedings of the 2nd ACM Workshop on Blockchains,Cryptocurrencies,and Contracts.ACM,2018:47-55.
[18]ZHENG W,ZHENG Z,CHEN X,et al.NutBaaS:A Blockchai-nas-a-Service Platform[J].IEEE Access.2019,7:134422-134433.
[19]KING S,NADAL S.Ppcoin:Peer-to-peer crypto-currency withproof-of-stake[EB/OL].https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf.
[20]VASIN P.Blackcoin’s proof-of-stake protocol v2[J/OL].https://blackcoin.co/blackcoin-pos-protocol-v2-whitepaper.pdf.
[21]YANG F,ZHOU W,WU Q,et al.Delegated Proof of StakeWith Downgrade:A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism[J].IEEE Access.2019,7:118541-118555.
[22]CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM transactions on computer systems.2002,20(4):398-461.
[23]GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems.2020,107:760-769.
[24]GUETA G G,ABRAHAM I,GROSSMAN S,et al.Sbft:a sca-lable and decentralized trust infrastructure[C]//IEEE.2019:568-580.
[25]GAO S,YU T,ZHU J,et al.T-PBFT:An EigenTrust-basedpractical Byzantine fault tolerance consensus algorithm[J].ChinaCommunications,2019,16(12):111-123.
[26]KAMVAR S D,SCHLOSSER M T,GARCIA-MOLINA H.TheEigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International Conference on World Wide Web.ACM.2003:640-651.
[27]DU M,CHEN Q,MA X.MBFT:A New Consensus Algorithm for Consortium Blockchain[J].IEEE Access.2020,8:87665-87675.
[28]LAMPORT L.Paxos made simple[J].ACM Sigact News.2001,32(4):18-25.
[29]ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm(extended version)[C]//Proceeding of USENIX Annual Technical Conference.2014:19-20.
[30]WU Y,ZHONG S.Research on block chain consensus algorithm raft[J].Netinfo Security.2021,21(6):36-44.
[31]MCCORRY P,HEILMAN E,MILLER A.Atomically Tradingwith Roger:Gambling on the Success of a Hardfork[M]//Data Privacy Management,Cryptocurrencies and Blockchain Techno-logy.Cham:Springer International Publishing,2017:334-353.
[32]DOUCEUR J R.The sybil attack[C]//Peer-to-Peer Systems.Berlin:Springer,2002:251-260.
[33]NAIR P R,DORAI D R.Evaluation of Performance and Security of Proof of Work and Proof of Stake using Blockchain[C]//2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks(ICICV).IEEE.2021:279-283.
[34]DOULIGERIS C,MITROKOTSA A.DDoS attacks and defense mechanisms:classification and state-of-the-art[J].Computer Networks,2004,44(5):643-666.
[35]HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse attacks on bitcoin’s peer-to-peer network[C]//24th USENIX Security Symposium(USENIX Security’15).2015:129-144.
[36]ZHENZHEN J.Various possibilities around the “ImpossibleTriangle” of blockchain[EB/OL].http://www.ccw.com.cn/channel/blockchain/2019-04-03/6967.html.
[37]ZHANG P Y,SONG J.Research Progress on efficiency optimization of blockchain consensus algorithm[J].Computer Science,2020,47(12):296-303.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!