Computer Science ›› 2026, Vol. 53 ›› Issue (1): 331-340.doi: 10.11896/jsjkx.241100053

• Information Security • Previous Articles     Next Articles

PBFT Consensus Algorithm Based on Bayesian Theory

PAN Yanyang, YANG Binhao, JI Qingge   

  1. School of Computer Science and Engineering, Sun Yat-sen University, Guangzhou 510006, China
  • Received:2024-11-07 Revised:2025-02-26 Published:2026-01-08
  • About author:PAN Yanyang,born in 2000,postgra-duate.His main research interests include blockchain and distributed system consensus algorithm optimization.
    JI Qingge,born in 1966,Ph.D,associate professor,master supervisor,is a senior member of CCF(No.07014S).His main research interests include computer graphics,virtual reality,computer vision,computer simulation and blockchain.

Abstract: Consensus algorithm is a method to ensure that all nodes in the blockchain network reach a consensus,such as PoW and PoS.The consensus mechanism affects the performance of the blockchain system.In order to solve the problems of low throughput and long delay of existing blockchain consensus algorithms,this paper improves the PBFT algorithm in blockchain,introduces a dynamic trust model based on Bayes theory,changes the trust of nodes in the consensus round through the node trust mechanism,and conducts group operations according to the trust degree.In addition to ensuring the stability of PBFT,the system scalability is improved,and the joining and exiting mechanism of network nodes is perfected,so that the network scalability is improved.Through experimental tests,compared with traditional PBFT algorithms,the improved algorithm has a 25% improvement in throughput,and the delay is only half of that of PBFT when the number of nodes reaches 50.These two indicators also have a 20%~30% improvement compared with HotStuff algorithm and Paxos algorithm.

Key words: Blockchain, Consensus algorithm, Byzantine fault-tolerant, Trust model, Bayesian theory

CLC Number: 

  • TP311
[1]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain technology:Architecture and progress[J].Journal of Computer Science,2018,41(5):969-988.
[2]BELOTTI M,BOZIC N,PUJOLLE G,et al.A vademecum on blockchain technologies:When,which and how[J].IEEE Communications Surveys Tutorials,2019,21(4):3796-3838.
[3]CHEN J,HE K,LI K,et al.Block chain extension technologypresent situation and prospect[J].Journal of Software,2024,35(2):828-851.
[4]WRIGHT C S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].https://nakamotoinstitute.org/library/bitcoin/.
[5]ZHAO Y,ZHANG M,PEI Z,et al.The effects of quantitative easing on bitcoin prices[J].Finance Research Letters,2023,57:104232.
[6]SI X M,CHEN W G.Chain blocks and digital currency techno-logy project introduction[J].Journal of Software,2019,30(6):1575-1576.
[7]AGBO C C,MAHMOUD Q H,EKLUND J M.Blockchain technology in healthcare:A systematic review[J].Healthcare,2019,7(2):56.
[8]TSE D,ZHANG B,YANG Y,et al.Blockchain application in food supply information security[C]//2017 IEEE International Conference on Industrial Engineering and Engineering Management(IEEM).IEEE,2017:1357-1361.
[9]XU Z,LIANG W,LI K C,et al.A blockchain-based roadsideunit-assisted authentication and key agreement protocol for internet of vehicles[J].Journal of Parallel and Distributed Computing,2021,149:29-39.
[10]BOURAGA S.A taxonomy of blockchain consensus protocols:A survey and classification framework[J].Expert Systems with Applications,2021,168:114384.
[11]CASTRO M,LISKOV B.Practical byzantine fault tolerance[C]//OSDI.1999:173-186.
[12]GUPTA S,RAHNAMA S,HELLINGS J,et al.ResilientDB:Global scale resilient blockchain fabric[C]//Proceedings of the VLDB Endowment.2020:868-883.
[13]KOKORIS-KOGIAS E,JOVANOVIC P,GASSER L,et al.Omniledger:A secure,scale-out,decentralized ledger via sharding[C]//2018 IEEE Symposium on Security and Privacy(SP).IEEE,2018:583-598.
[14]SYTA E,JOVANOVIC P,KOGIAS E K,et al.Scalable bias-resistant distributed randomness[C]//2017 IEEE Symposium on Security and Privacy(SP).IEEE,2017:444-460.
[15]MICALI S,RABIN M,VADHAN S.Verifiable random func-tions[C]//40th Annual Symposium on Foundations of Compu-ter Science.IEEE,1999:120-130.
[16]GUETA G G,ABRAHAM I,GROSSMAN S,et al.Sbft:A scalable and decentralized trust infrastructure[C]//2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN).IEEE,2019:568-580.
[17]YIN M,MALKHI D,REITER M K,et al.HotStuff:BFT Consensus in the Lens of Blockchain[J].arXiv:1803.05069,2018.
[18]XU G,BAI H,XING J,et al.SG-PBFT:A secure and highly efficient distributed blockchain pbft consensus algorithm for intelligent internet of vehicles[J].Journal of Parallel and Distributed Computing,2022,164:1-11.
[19]FENG L,ZHANG H,CHEN Y,et al.Scalable dynamic multi-agent practical byzantine fault-tolerant consensus in permissioned blockchain[J].Applied Sciences,2018,8(10):1919.
[20]ZHENG X,FENG W,HUANG M,et al.Optimization of pbft algorithm based on improved c4.5[J].Mathematical Problems in Engineering,2021,2021(1):5542078.
[21]LIU S,ZHANG R,LIU C,et al.Improvement of the PBFT algorithm based on grouping and reputation value voting[J].International Journal of Digital Crime and Forensics,2022,14(3):1-15.
[22]NEO white paper[EB/OL].http://docs.neo.org/en-us/.
[23]BERNARDO J M,SMITH A F.Bayesian theory:Vol.405[M].John Wiley & Sons,2009.
[24]WANG Y,VASSILEVA J.Bayesian network-based trust model[C]//Proceedings IEEE/WIC International Conference on Web Intelligence(WI 2003).IEEE,2003:372-378.
[25]MICALI S,RABIN M,VADHAN S.Verifiable random func-tions[C]//40th Annual Symposium on Foundations of Compu-ter Science.IEEE,1999:120-130.
[1] ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375.
[2] FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392.
[3] ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8.
[4] WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374.
[5] YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361.
[6] JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368.
[7] DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365.
[8] JIANG Lingyun, LIU Guanhao, YANG Jinglin, XU Jia. P-DAG:An Efficient and Secure Blockchain System Based on Parallel Chain [J]. Computer Science, 2025, 52(11A): 241000174-6.
[9] CAO Yongsheng. Optimal Scheduling Algorithm for Electric Vehicle Charging and Discharging in Q-Learning Based Consortium Blockchain Framework [J]. Computer Science, 2025, 52(11A): 241200015-5.
[10] AI Yuan, LI Jiahao, ZHAO Yitao, HU Kai. Optimization of Blockchain Dynamic Sharding and Cross-shard Transaction Protocol Based on Greedy Strategy [J]. Computer Science, 2025, 52(11A): 250100133-8.
[11] CHANG Ningyuan, HUANG Ting, ZHANG Huang. Demand Response Scheme for Low Voltage Users Based on Light Weight Blockchains [J]. Computer Science, 2025, 52(11A): 250200125-8.
[12] ZHOU Kai, CHEN Fu, LU Tianyuan, CAO Huaihu. Review of Blockchain Consensus Algorithm [J]. Computer Science, 2025, 52(11): 255-269.
[13] FANG Zhipeng, LI Xiaoyu. Using Ring Blind Signature+Arbitration Authentication Mixed Coin Scheme [J]. Computer Science, 2025, 52(11): 390-397.
[14] LIU Zhanghui, LIN Zhexu, CHEN Hanlin, MA Xinjian, CHEN Xing. Data Trusted Sharing Scheme Based on Consortium Blockchain [J]. Computer Science, 2025, 52(11): 398-407.
[15] WU Moxun, PENG Zeshun, YU Minghe, LI Xiaohua, DONG Xiaomei, NIE Tiezheng, YU Ge. Approach for Lightweight Verifiable Data Management Based on Blockchains [J]. Computer Science, 2025, 52(10): 348-356.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!