Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 241000174-6.doi: 10.11896/jsjkx.241000174

• Information Security • Previous Articles     Next Articles

P-DAG:An Efficient and Secure Blockchain System Based on Parallel Chain

JIANG Lingyun, LIU Guanhao, YANG Jinglin, XU Jia   

  1. School of Computer Science,Nanjing University of Posts and Telecommunications,Nanjing 210003,China
  • Online:2025-11-15 Published:2025-11-10
  • Supported by:
    National Natural Science Foundation of China(62372250) and Research Foundation of Jiangsu for 333 High Level Talents Training Project(BRA2020065).

Abstract: Although blockchain systems based on tree structures leverage the concurrency of tree graphs to significantly improve throughput,they still face numerous security challenges that need to be addressed.In response to the issue where such tree-based blockchain systems are vulnerable to liveness attacks,leading to a failure in ledger state convergence,a scalable and highly secure blockchain system called P-DAG(Parallel-Directed Acyclic Graph) is proposed,featuring high throughput and low confirmation latency.This system adopts a ledger structure with multiple parallel chains and decouples block creation from the process of adding blocks to the chain,thus distributing the computational power of malicious nodes to enhance the overall security of the system.By utilizing the randomness and uniform distribution properties of hash values,a hash-based random weight assignment mechanism is designed to reduce the convergence time of each chain and the block confirmation latency.Theoretical analysis and simulation experiments show that P-DAG achieves throughput similar to Conflux,but reduces ledger convergence time by approximately 50% and block confirmation latency by about 30% compared to Conflux.

Key words: Blockchain, Parallel chain, Directed acyclic graph, Liveness attack, Ledger convergence

CLC Number: 

  • TP309
[1]LI P,MIYAZAKI T,ZHOU W.Secure balance planning of off-blockchain payment channel networks[C]//IEEE INFOCOM 2020-IEEE Conference on Computer Communications.IEEE,2020:1728-1737.
[2]ZHANG X,QIAN C.Toward Aggregated Payment ChannelNetworks[J].IEEE/ACM Transactions on Networking,2024,32(5):4333-4348.
[3]HUANG H,PENG X,ZHAN J,et al.Brokerchain:A cross-shard blockchain protocol for account/balance-based state sharding[C]//IEEE INFOCOM 2022-IEEE Conference on Computer Communications.IEEE,2022:1968-1977.
[4]ZHANG Y,PAN S,YU J.Txallo:Dynamic transaction allocation in sharded blockchain systems[C]//2023 IEEE 39th International Conference on Data Engineering(ICDE).IEEE,2023:721-733.
[5]YONATAN S,AVIV Z.Secure highrate transaction processing in bitcoin[C]//International Conference on Financial Cryptography and Data Security.Springer,2015:507-527.
[6]LI C,LI P,ZHOU D,et al.A decentralized blockchain with high throughput and fast confirmation[C]//2020 {USENIX} Annual Technical Conference({USENIX}{ATC} 20).2020:515-528.
[7]XIANG F U,WANG H,SHI P,et al.Teegraph:trusted execution environment and directed acyclic graph-based consensus algorithm for IoT blockchains [J].Science China(Information Sciences),2022,65(3):269-271.
[8]YU H,NIKOLIĆ I,HOU R,et al.Ohie:Blockchain scaling made simple[C]//2020 IEEE Symposium on Security and Privacy(SP).IEEE,2020:90-105.
[9]CHEN C,CHEN X,FANG Z.Tips:Transaction inclusion protocol with signaling in dag-based blockchain[J].IEEE Journal on Selected Areas in Communications,2022,40(12):3685-3701.
[10]HE J,WANG G,ZHANG G,et al.Consensus mechanism design based on structured directed acyclic graphs[J].Blockchain:Research and Applications,2021,2(1):29-40.
[11]CHERNOFF H.A Measure of the Asymptotic Efficiency for Tests of a Hypothesis Based on the Sum of Observations[J].Annals of Mathematical Statistics,1952,23:493-509.
[12]HOEFFDING W.On the Distribution of the Number of Successes in Independent Trials[J].Annals of Mathematical Statistics,1956,27:713-721.
[1] ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375.
[2] FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392.
[3] ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8.
[4] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
[5] YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361.
[6] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[7] DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365.
[8] CAO Yongsheng. Optimal Scheduling Algorithm for Electric Vehicle Charging and Discharging in Q-Learning Based Consortium Blockchain Framework [J]. Computer Science, 2025, 52(11A): 241200015-5.
[9] AI Yuan, LI Jiahao, ZHAO Yitao, HU Kai. Optimization of Blockchain Dynamic Sharding and Cross-shard Transaction Protocol Based on Greedy Strategy [J]. Computer Science, 2025, 52(11A): 250100133-8.
[10] CHANG Ningyuan, HUANG Ting, ZHANG Huang. Demand Response Scheme for Low Voltage Users Based on Light Weight Blockchains [J]. Computer Science, 2025, 52(11A): 250200125-8.
[11] FANG Zhipeng, LI Xiaoyu. Using Ring Blind Signature+Arbitration Authentication Mixed Coin Scheme [J]. Computer Science, 2025, 52(11): 390-397.
[12] LIU Zhanghui, LIN Zhexu, CHEN Hanlin, MA Xinjian, CHEN Xing. Data Trusted Sharing Scheme Based on Consortium Blockchain [J]. Computer Science, 2025, 52(11): 398-407.
[13] ZHOU Kai, CHEN Fu, LU Tianyuan, CAO Huaihu. Review of Blockchain Consensus Algorithm [J]. Computer Science, 2025, 52(11): 255-269.
[14] WU Moxun, PENG Zeshun, YU Minghe, LI Xiaohua, DONG Xiaomei, NIE Tiezheng, YU Ge. Approach for Lightweight Verifiable Data Management Based on Blockchains [J]. Computer Science, 2025, 52(10): 348-356.
[15] WANG Dong, LI Xiaoruo, ZHU Bingnan. Transaction Granularity Modifiable Consortium Blockchain Scheme Based on Dual Merkel Trees Block Structure [J]. Computer Science, 2024, 51(9): 408-415.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!