Computer Science ›› 2018, Vol. 45 ›› Issue (2): 53-56.doi: 10.11896/j.issn.1002-137X.2018.02.009

Special Issue: Block Chain Technology

Previous Articles     Next Articles

Optimization Scheme of Consensus Algorithm Based on Aggregation Signature

YUAN Chao, XU Mi-xue and SI Xue-ming   

  • Online:2018-02-15 Published:2018-11-13

Abstract: With the rise of Bitcoin,Ethernet,Hyperledger and so on,blockchain has been paid more and more attention.Blockchain is the product of many technologies,and the consensus algorithm is an important standard to adjudicate a blockchain system.The adopted consensus algorithm should be different from the blockchain system to another for the different features.Different consensus algorithms have their own advantages,but they also have shortcomings.Currently,efficiency problem is one of the main problems faced by the consensus algorithm in the blockchain.In order to improve the efficiency,the potential optimization scheme of the consensus algorithm in the blockchain was introduced.Then,the dBFT consensus algorithm commonly used in the alliance chain was taken as the research object,and through combining with the aggregation signature and the bilinear mapping technology,the consensus process was modified.At last,compared with the original scheme,the space complexity of the signature in blockchain system can be effectively reduced with the aggregated dBFT.

Key words: Blockchain,Consensus algorithm,Aggregation signature,Optimization,Bilinear pairings

[1] PEASE M,SHOSTAK R,LAMPORT L.Reaching Agreement in the Presence of Faults[J].Journal of the ACM,1980,7(2):228-234.
[2] LAMPORT,LESLIE,SHOSTAK,et al.Byzantine Generals Pro-blem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[3] FISCHER M.The Consensus Problem in Unreliable Distributed Systems (a Brief Survey)[C]∥International Fct-conference on Fundamentals of Computation Theory.1982:127-140.
[4] CHANDRA T,TOREG S.Unreliable Failure Detectors for Reliable Distributed Systems[J].Journal of the ACM,1996,43(2):225-267.
[5] SATOSHI N.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].
[6] Delegated Proof-of-Stake Consensus[EB/OL].
[7] BRASSAI S T,BAKO L,DAN S.FPGA Parallel Implementation of CMAC Type Neural Network with on Chip Learning[C]∥International Symposium on Applied Computation Intelligence and Informatics.2007:111-115 .
[8] DANEZIS G,MEIKLEJOHN S.Centrally Banked Cryptocur-rencies.
[9] 张铮文.一种用于区块链的拜占庭容错法[EB/OL].[2016-04-07]. 3b.pdf.
[10] CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]∥OSDI.1999:173-186.
[11] YANG T,KONG L B,HU J B,et al.Survey on Aggregate Signature and Its Applications[J].Journal of Computer Research and Development,2012,49(S2):192-199.(in Chinese) 杨涛,孔令波,胡建斌,等.聚合签名及其应用研究综述[J].计算机研究与发展,2012,49(S2):192-199
[12] ZHANG Y L,ZHOU D R,LI C Y,et al..Certificateless-based efficient aggregate signature scheme with universal designated verifier[J].Journal on Communications,2015,36(2):1-8.(in Chinese) 张玉磊,周冬瑞,李臣意,等.高效的无证书广义指定验证者聚合签名方案[J].通信学报,2015,36(2):1-8.
[13] SCHUBERT S.Simple BFT [EB/OL].
[14] SOXT E.Ethereum [M].Wiesbaden:Springer Fachmedien Wies-baden,2017.
[15] CHANDRAN N,GROTH J,SAHAI A.Ring signatures of sub-linear size without random oracles[C]∥International Collo-quium on Automata,Languages,and Programming.Springer,2007:423-434.
[16] ZHANG Y Q,WANG X F,LIU X F,et al.Survey on Cloud Computing Security[J].Journal of Software,2010,27(6):1328-1348.(in Chinese) 张玉清,王晓菲,刘雪峰,等.云计算环境安全综述[J].软件学报,2010,27(6):1328-1348.
[17] CASTRO M,LISKOV B.Practical Byzantine Fault Toleranceand Proactive Recovery[J].ACM Transactions on Computer Systems, 2002,20(4):398-461.
[18] YUAN Y,WANG F Y.Blockchain:The State of the Art and Future Trends[J].Acta Automatica Sinica,2016,2(4):481-494.(in Chinese) 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,2(4):481-494.
[19] CHEN H,WEI S M,ZHU C J,et al.Security CertificatelessAggregate Signature Scheme[J].Journal of Software,2015,26(5):1173-1180.(in Chinese) 陈虎,魏仕民,朱昌杰,等.安全的无证书聚合签名方案[J].软件学报,2015,26(5):1173-1180.
[20] LU H J,YU X Y,XIE Q.Provably Secure Certificateless Aggregate Signature with Constant Length[J].Journal of Shanghai Jiaotong University,2012,6(2):259-263.(in Chinese) 陆海军,于秀源,谢琪.可证安全的常数长度无证书聚合签名方案[J].上海交通大学学报,2012,6(2):259-263.

No related articles found!
Full text



No Suggested Reading articles found!