Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220400200-12.doi: 10.11896/jsjkx.220400200

• Information Security • Previous Articles     Next Articles

Overview of Blockchain Consensus Algorithms

TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi   

  1. School of Software,Nanchang Hangkong University,Nanchang 330063,China
  • Online:2023-06-10 Published:2023-06-12
  • About author:TAN Pengliu,born in 1975,Ph.D,associate professor,is a member of China Computer Federation.His main research interests include blockchain,cyber-physical system,intelligent medical care,etc.
  • Supported by:
    National Natural Science Foundation of China(61961029)and Key Research Plan of Jiangxi Province Department of Science and Technology(20171ACE50025).

Abstract: Consensus algorithm not only maintains the stability and security of distributed system,but also is the key technology in the development direction of blockchain.With the rapid development of blockchain technology,the research of consensus algorithm has attracted more and more attention and favor of researchers.Nowadays,choosing an appropriate consensus algorithm in different application scenarios is a selective problem that researchers have to face.Starting from the types of service object nodes,this paper classifies the consensus algorithm into three categories:public chain,alliance chain and private chain.Based on these three categories,this paper expounds the basic principles of some mainstream and some new blockchain consensus algorithms,a total of 9 consensus algorithms,and evaluates the performance of these 9 consensus algorithms from three aspects:decentralization,security and scalability.This paper also analyzes and summarizes the advantages and disadvantages of the relevant algorithms,and gives the relevant directions to optimize the blockchain consensus algorithm for researchers’ research and reference,so as to promote the steady development of blockchain consensus algorithm.

Key words: Blockchain, Consensus algorithm, Public chain, Alliance chain, Private chain, Advantages and disadvantages

CLC Number: 

  • TP301
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].http://bitcoin.org/bitcoin.pdf.
[2]The global economy is in its weakest period in a decade,but bitcoin is quietly brewing the next bull market?[EB/OL].https://baijiahao.baidu.com/s?id=1648083421346579310&wfr=spider&for=pc.
[3]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and progress[J].Chinese Journal of Computers,2018,41(5):969-988.
[4]ZHU L,YU H,ZHAN S X,et al.Research on high performance alliance blockchain Technology[J].Journal of Software.2019,30(6):17.
[5]CHEN W L,ZHENG Z B.Blockchain data analysis:status,trends and challenges[J].Journal of Computer Research and Development,2018,55(9):1853-1870.
[6]Blockchain for financial services[EB/OL].https://www.ibm.com/blockchain/industries/financial-services.
[7]Ant chain[EB/OL].https://antchain.antgroup.com/.
[8]Blockchain for Supply Chain-IBM Blockchain[EB/OL].https://www.ibm.com/blockchain/supply-chain.
[9]Home-GBA Global[EB/OL].https://www.gbaglobal.org/.
[10]State of the DApps-Ranking the Best Ethereum DApps[EB/OL].https://www.stateofthedapps.com/zh/rankings/platform/ethereum.
[11]YUAN Y,WANG F.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica.2016,42(4):481-494.
[12]OLSEN P,BORIT M.The components of a food traceabilitysystem[J].Trends in Food Science & Technology.2018,77:143-149.
[13]YUAN Y,WANG F.Blockchain and Cryptocurrencies:Model,Techniques,and Applications[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems.2018,48(9):1421-1428.
[14]LIU A D,DU X H,WANG N,et al Blockchain technology and its research progress in the field of information security[J].Journal of Software.2018,29(7):2092-2115.
[15]DWORK C,NAOR M.Pricing via Processing or CombattingJunk Mail[M]//Berlin:Springer,2001:139-147.
[16]BACK A.Hashcash-a denial of service counter-measure[EB/OL].https://sites.cs.ucsb.edu/~rich/class/old.cs290/papers/hascash2.pdf.
[17]WANG M,DUAN M,ZHU J.Research on the Security Criteria of Hash Functions in the Blockchain[C]//Proceedings of the 2nd ACM Workshop on Blockchains,Cryptocurrencies,and Contracts.ACM,2018:47-55.
[18]ZHENG W,ZHENG Z,CHEN X,et al.NutBaaS:A Blockchai-nas-a-Service Platform[J].IEEE Access.2019,7:134422-134433.
[19]KING S,NADAL S.Ppcoin:Peer-to-peer crypto-currency withproof-of-stake[EB/OL].https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf.
[20]VASIN P.Blackcoin’s proof-of-stake protocol v2[J/OL].https://blackcoin.co/blackcoin-pos-protocol-v2-whitepaper.pdf.
[21]YANG F,ZHOU W,WU Q,et al.Delegated Proof of StakeWith Downgrade:A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism[J].IEEE Access.2019,7:118541-118555.
[22]CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM transactions on computer systems.2002,20(4):398-461.
[23]GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems.2020,107:760-769.
[24]GUETA G G,ABRAHAM I,GROSSMAN S,et al.Sbft:a sca-lable and decentralized trust infrastructure[C]//IEEE.2019:568-580.
[25]GAO S,YU T,ZHU J,et al.T-PBFT:An EigenTrust-basedpractical Byzantine fault tolerance consensus algorithm[J].ChinaCommunications,2019,16(12):111-123.
[26]KAMVAR S D,SCHLOSSER M T,GARCIA-MOLINA H.TheEigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International Conference on World Wide Web.ACM.2003:640-651.
[27]DU M,CHEN Q,MA X.MBFT:A New Consensus Algorithm for Consortium Blockchain[J].IEEE Access.2020,8:87665-87675.
[28]LAMPORT L.Paxos made simple[J].ACM Sigact News.2001,32(4):18-25.
[29]ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm(extended version)[C]//Proceeding of USENIX Annual Technical Conference.2014:19-20.
[30]WU Y,ZHONG S.Research on block chain consensus algorithm raft[J].Netinfo Security.2021,21(6):36-44.
[31]MCCORRY P,HEILMAN E,MILLER A.Atomically Tradingwith Roger:Gambling on the Success of a Hardfork[M]//Data Privacy Management,Cryptocurrencies and Blockchain Techno-logy.Cham:Springer International Publishing,2017:334-353.
[32]DOUCEUR J R.The sybil attack[C]//Peer-to-Peer Systems.Berlin:Springer,2002:251-260.
[33]NAIR P R,DORAI D R.Evaluation of Performance and Security of Proof of Work and Proof of Stake using Blockchain[C]//2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks(ICICV).IEEE.2021:279-283.
[34]DOULIGERIS C,MITROKOTSA A.DDoS attacks and defense mechanisms:classification and state-of-the-art[J].Computer Networks,2004,44(5):643-666.
[35]HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse attacks on bitcoin’s peer-to-peer network[C]//24th USENIX Security Symposium(USENIX Security’15).2015:129-144.
[36]ZHENZHEN J.Various possibilities around the “ImpossibleTriangle” of blockchain[EB/OL].http://www.ccw.com.cn/channel/blockchain/2019-04-03/6967.html.
[37]ZHANG P Y,SONG J.Research Progress on efficiency optimization of blockchain consensus algorithm[J].Computer Science,2020,47(12):296-303.
[1] WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan. Blockchain-based Dual-branch Structure Expansion Model [J]. Computer Science, 2023, 50(8): 365-371.
[2] YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7.
[3] HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6.
[4] TU Jun, JIA Dongli, WANG Jin. Byzantine Fault Tolerant Consensus Algorithm Based on Traceable Ring Signature [J]. Computer Science, 2023, 50(6A): 220300100-7.
[5] LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9.
[6] PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6.
[7] XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312.
[8] LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329.
[9] ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347.
[10] LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322.
[11] LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333.
[12] CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350.
[13] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[14] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[15] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!