Neural Fairness Blockchain Protocol Using an Elliptic Curves Lottery

被引:9
作者
Caldarola, Fabio [1 ]
D'Atri, Gianfranco [1 ]
Zanardo, Enrico [2 ]
机构
[1] Univ Calabria, Dept Math & Comp Sci, Cubo 31-A, I-87036 Arcavacata Di Rende, Italy
[2] Univ Nicosia, Dept Digital Innovat, 46 Makedonitissas Ave,POB 24005, CY-2417 Nicosia, Cyprus
关键词
blockchain; distributed consensus; neural networks; elliptic cryptographic curves; decentralized applications; tokens; machine learning; confidentiality preserving; cryptocurrencies; ALGORITHM;
D O I
10.3390/math10173040
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
To protect participants' confidentiality, blockchains can be outfitted with anonymization methods. Observations of the underlying network traffic can identify the author of a transaction request, although these mechanisms often only consider the abstraction layer of blockchains. Previous systems either give topological confidentiality that may be compromised by an attacker in control of a large number of nodes, or provide strong cryptographic confidentiality but are so inefficient as to be practically unusable. In addition, there is no flexible mechanism to swap confidentiality for efficiency in order to accommodate practical demands. We propose a novel approach, the neural fairness protocol, which is a blockchain-based distributed ledger secured using neural networks and machine learning algorithms, enabling permissionless participation in the process of transition validation while concurrently providing strong assurance about the correct functioning of the entire network. Using cryptography and a custom implementation of elliptic curves, the protocol is designed to ensure the confidentiality of each transaction phase and peer-to-peer data exchange.
引用
收藏
页数:20
相关论文
共 51 条
[1]   Towards bitcoin transaction anonymity with recurrent attack prevention [J].
Adu-Gyamfi, Daniel ;
Ansah, Albert Kofi Kwansah ;
Armah, Gabriel Kofi ;
Alornyo, Seth ;
Adom, Dominic Kwasi ;
Zhang, Fengli .
INTERNATIONAL JOURNAL OF SYSTEM ASSURANCE ENGINEERING AND MANAGEMENT, 2022, 13 (04) :1572-1588
[2]   On Proof-of-Accuracy Consensus Protocols [J].
Andres Aponte-Novoa, Fredy ;
Villanueva-Polanco, Ricardo .
MATHEMATICS, 2022, 10 (14)
[3]  
[Anonymous], 2013, Financial Cryptography and Data Security, DOI [DOI 10.1007/978-3-642-39884-14, DOI 10.1007/978-3-642-39884-1]
[4]  
Back A., 2002, Hashcash-a denial of service counter-measure
[5]   Contextualizing Consensus Protocols in Blockchain: A Short Survey [J].
Bashar, Golam ;
Hill, Graham ;
Singha, Subroto ;
Marella, Praneeth ;
Dagher, Gaby G. ;
Xiao, Jidong .
2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, :190-195
[6]  
Begicheva A., 2018, FAIR PROOF STAKE TEC
[7]  
Bellini E., 2019, P 3 INT C NUMERICAL, VVolume 11973, P343, DOI [10.1007/978-3-030-39081-5_30, DOI 10.1007/978-3-030-39081-5_30]
[8]  
Brown D.R.L., 2010, Standards for efficient cryptography sec 2: recommended elliptic curve domain parameters
[9]   Bulletproofs: Short Proofs for Confidential Transactions and More [J].
Bunz, Benedikt ;
Bootle, Jonathan ;
Boneh, Dan ;
Poelstra, Andrew ;
Wuille, Pieter ;
Maxwell, Greg .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :315-334
[10]   Combinatorics on n-sets: Arithmetic Properties and Numerical Results [J].
Caldarola, Fabio ;
D'Atri, Gianfranco ;
Pellegrini, Marco .
NUMERICAL COMPUTATIONS: THEORY AND ALGORITHMS, PT I, 2020, 11973 :389-401