A Robust Byzantine Fault-tolerant Consensus Algorithm Against Adaptive Attack Based on Ring Signature and Threshold Signature

被引:0
|
作者
Sun H.-F. [1 ]
Zhang W.-F. [1 ]
Wang X.-M. [1 ]
Ma Z. [1 ]
Huang L.-F. [2 ]
Li X. [2 ]
机构
[1] School of Information Science and Technology, Southwest Jiaotong University, Chengdu
[2] Chengdu Third People's Hospital, Chengdu
来源
基金
中国国家自然科学基金;
关键词
adaptive attack; Blockchain; Byzantine fault tolerance; consensus algorithm; ring signature; threshold signature;
D O I
10.16383/j.aas.c200694
中图分类号
学科分类号
摘要
As the fundamental key technology of blockchain, consensus algorithms can resolve the consistency problem in the distributed system with decentralized decision-making authority. Fine-designed consensus algorithms can improve the robustness of system, but most of the schemes have the drawbacks of uncontrollable robustness, poor activity performance and insufficient scalability in the case of network failure or active attack scenarios. Given problems above, this paper proposes a robust Byzantine fault tolerance (RBFT) algorithm resistant to adaptive attacks. Using the ring signature with unconditional strong anonymity, the RBFT algorithm constructs an ordering and master-selecting algorithm to anonymously elect the proposer of every round of consensus, by which the attack object can be obscured from the adaptive attack. Meanwhile, by generating the threshold signature of the designated voters, the network is divided into a number of minimum connected networks to ensure consensus with low latency and high robustness. The analysis shows that by using the proposed RBFT algorithm, the system scalability can be improved, view change frequency and signature verification overhead can be reduced, at the same time the system activity can be effectively guaranteed. © 2023 Science Press. All rights reserved.
引用
收藏
页码:1471 / 1482
页数:11
相关论文
共 24 条
  • [1] Yuan Yong, Wang Fei-Yue, Blockchain: The state of the art and future trends, Acta Automatica Sinica, 42, 4, pp. 481-494, (2016)
  • [2] Nakamoto S., Bitcoin: A peer-to-peer electronic cash system, (2008)
  • [3] Yuan Yong, Ni Xiao-Chun, Zeng Shuai, Wang Fei-Yue, Blockchain consensus algorithms: The state of the art and future trends, Acta Automatica Sinica, 44, 11, pp. 2011-2022, (2018)
  • [4] Gervais A, Karame G O, Wust K, Glykantzis V, Ritzdorf H, Capkun S., On the security and performance of proof of work blockchains, Proceedings of the ACM SIGSAC Conference on Computer and Communications Security, pp. 3-16, (2016)
  • [5] Vasin P., Blackcoin's proof-of-stake protocol v2, (2014)
  • [6] Larimer D., Delegated proof-of-stake (DPOS), (2014)
  • [7] Lamport L, Shostak R, Pease M., The Byzantine generals problem, ACM Transactions on Programming Languages and Systems, 4, 3, (1982)
  • [8] Castro M, Liskov B., Practical byzantine fault tolerance, Proceedings of the 3rd Symposium on Operating Systems Design and Implementation, pp. 173-186, (1999)
  • [9] Kotla R, Alvisi L, Dahlin M, Clement A, Wong E., Zyzzyva: Speculative byzantine fault tolerance, ACM SIGOPS Operating Systems Review, 41, 6, (2007)
  • [10] Xu H, Long Y, Liu Z Q, Liu Z, Gu D W., Dynamic practical Byzantine fault tolerance, Proceedings of the IEEE Conference on Communications and Network Security (CNS), pp. 1-8, (2018)