Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220300100-7.doi: 10.11896/jsjkx.220300100

• Information Security • Previous Articles     Next Articles

Byzantine Fault Tolerant Consensus Algorithm Based on Traceable Ring Signature

TU Jun, JIA Dongli, WANG Jin   

  1. School of Information and Electrical Engineering,Hebei University of Engineering,Handan,Hebei 056038,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:TU Jun,born in 1996,postgraduate.His main research interests include blockchain and cryptography. JIA Dongli,born in 1972,Ph.D,asso-ciate professor.His main research in-terests include intelligent signal processing and so on.
  • Supported by:
    Science Technology Research Project of the Higher Eduction in Hebei Province(ZD2015087).

Abstract: The practical Byzantine fault tolerance(PBFT) consensus algorithm of alliance chain has the problems of weak privacy protection between nodes,static network structure,unreliable selection of master node and high communication overhead.A Byzantine fault-tolerant consensus algorithm(tracePBFT) based on traceable ring signature is proposed.Firstly,the nodes are randomly divided into primary domain nodes and secondary domain nodes,and different weights are given,and the primary domain node with high weight is selected as the primary node.Then,the ring signature is introduced in the preparation stage to protect the privacy of the node,and the node can select the reliable node through the weight,verify the signature and track the Byzantine node in the confirmation stage,and finally appropriately punish the Byzantine node.In this way,the selected master node is more reliable and reduce the communication overhead caused by changing the view due to the error of the master node.Experiments show that the tracePBFT algorithm is better than the traditional PBFT algorithm in communication complexity,security,throughput and so on.

Key words: Alliance chain, Practical Byzantine fault tolerant consensus algorithm, Traceable ring signature, Master node

CLC Number: 

  • TP301.6
[1]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].https://bitcoin.org/bitcoin.pdf,2008.
[2]ZHANG A,BAI X Y.Overview of Research and Practice ofBlockchain Privacy Protection[J].Journal of Software,2020,31(5):1406-1434.
[3]HAN X,YUAN Y,WANG F Y.Blockchain Security Issues:Research Status and Prospect[J].Acta Automatica Sinica,2019,45(1):206-225.
[4]XIA Q,DOU W,GUO K W,et al.Overview of Blockchain Consensus Agreements[J].Journal of Softwar,2021,32(2):277-299.
[5]ZHENG M,WANG H,LIU H,et al.Survey on Consensus Algorithms of Blckchain[J].Netinfo Security,2019,19(7):8-24.
[6]LAMPOR T L,SHOSTAK R,PEASE M.The Byzantine gene-rals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[7]WANG W B,HONG D T,HU P Z.A Survey on Consensus Mechanisms and Mining Management in Blockchain Network[J].IEEE Access,2019,7:22328-22370.
[8]GAN J,QIANG L I,CHEN Z,et al.Improvement of blockchain practical Byzantine fault tolerance consensus algorithm[J].Journal of Computer Applications,2019,26:45-55.
[9]HAO X,YU L.Dynamic Practical Byzantine Fault Tolerance[C]//2018 IEEE Conference on CNS.2018:1-8.
[10]HAN S C,ZHU X R,ZHANG X X.A secure and efficient decentralized conditional anonymous payment system based on blockchain[J].Journal of the Internet of Things,2020,4(2):18-25.
[11]TANG H,LIU S,JIU Y H,et al.Improvement of Practical Byzantine Fault Tolerance Algorithm[J/OL].Computer Enginee-ring and Application.https://kns.cnki.net/kcms/detail/11.2127.TP.20210927.2052.010.html.
[12]FANG Y B,ZHOU C M,LI S,et al.Improvement of Practical Byzantine Fault Tolerance Algorithm in Alliance Chain[J].Computer Engineering and Applications,2022,58(3):135-142.
[13]WANG R H,XIN C Y,XU Q Q,et al.Byzantine Fault-tolerant Algorithm with Supervision Mechanism[J].Computer Enginee-ring and Applications,2021,57(18):142-148.
[14]FANG Y,DENG J Q,CONG L H,et al.An Improved PBFT Blockchain Consensus Algorithm Based on Ring Signaturg[J].Computer Engineering,2019,45(11):32-36.
[15]ZHANG L S.Research on Blockchain Consensus AlgorithmBased on Byzantine Fault Tolerance Algorithm[D].Chengdu:University of Electronic Science and Technology,2020.
[16]CASTRO M,LISKOV B.Proctical Byzantine fault Tolerance[C]//Operating Systems Design and Implementation(OSDI).New Orleans,1999:173-186.
[17]RIVEST R L,SHAMIR A,TAUMAN Y How to leak a secret[C]//International Conference on the Theory and Application of Cryptology and Information Security.2001:552-565.
[18]LIN C,HE D,HUANG X,et al.DCAP:a secure and efficient decentralized conditional anonymous payment system based on blockchain[J].IEEE Trans.Inf.Forens.Secur.,2020(15):2440-2452.
[19]LI X F,MEI Y R,GONG J.A blockchain privacy protection scheme based on ring signature[J].IEEE Access,2020,8:76765-76772.
[20]MA L M,ZHANG W,LIU X Y.Research and Design of A Secure Wireless Body Area Network Medical Information management system[J].Netinfo Security,2019(5):38-46.
[21]YU R W.ZHOU B X,WANG L,et al.Research on Zero Know-ledge Location Proof Method Based on Blockchain[J].Journal of Electronics and Information,2020,42(9):2142-2149.
[22]KUZLU M,PIPATTANASOMPORN M,GURSESL.Perfor-mance Analysis of a Hypereldger Fabric Blockchain Framework:Throughput,Latency and Scalability[C]//Proceedings of the 2019 2nd IEEE International Conference on Blockchain.Piscataway:IEEE,2019:536-540.
[1] TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi. Overview of Blockchain Consensus Algorithms [J]. Computer Science, 2023, 50(6A): 220400200-12.
[2] YUAN Hao-nan, WANG Rui-jin, ZHENG Bo-wen, WU Bang-yan. Design and Implementation of Cross-chain Trusted EMR Sharing System Based on Fabric [J]. Computer Science, 2022, 49(6A): 490-495.
[3] LI Su, SONG Bao-yan, LI Dong, WANG Jun-lu. Composite Blockchain Associated Event Tracing Method for Financial Activities [J]. Computer Science, 2022, 49(3): 346-353.
[4] QIAN Guang-ming, YI Chao. Real Time Wireless Connection Scheme for Multi-nodes [J]. Computer Science, 2021, 48(11A): 446-451.
[5] WU Jing, LU Xia-Liang, REN Li-Yong, HOU Meng Shu (College of Computer Science & Engineering, UESTC of China, Chengdu 610054). [J]. Computer Science, 2006, 33(4): 58-61.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!