The Impact of Block Parameters on the Throughput and Security of Blockchains

被引:9
作者
Akbari, Elham [1 ]
Zhao, Wenbing [1 ]
Yang, Shunkun [2 ]
Luo, Xiong [3 ]
机构
[1] Cleveland State Univ, 2121 Euclid Ave, Cleveland, OH 44115 USA
[2] Beihang Univ, Sch Reliabil & Syst Engn, 37 Xueyuan Rd, Beijing 100191, Peoples R China
[3] Univ Sci & Technol Beijing, Beijing Key Lab Knowledge Engn Mat Sci, 30 Xueyuan Rd, Beijing 100083, Peoples R China
来源
2020 2ND INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY (ICBCT 2020) | 2020年
基金
美国能源部; 中国国家自然科学基金;
关键词
Blockchain; Distributed consensus; Proof of work; Proof of stake; TRUSTWORTHY COORDINATION; FAULT-TOLERANCE;
D O I
10.1145/3390566.3391673
中图分类号
F8 [财政、金融];
学科分类号
0202 ;
摘要
It has been well recognized that traditional blockchains have limited throughput. It is intuitive to achieve higher throughput by increasing the block size and shortening the block interval. In this paper, we study the security implications on doing so, and define the boundary for acceptable block sizes and block intervals. We define the security of the blockchain in terms of the stale block rate in the network and carry out an empirical study using a blockchain simulator to find the optimal block parameters (i.e., size and interval). We show that it is possible to achieve sufficiently high throughput for a blockchain platform to be used for activities beyond cryptocurrency, such as state-level electronic voting.
引用
收藏
页码:13 / 18
页数:6
相关论文
共 25 条
[1]   From Blockchain to Internet-Based Voting [J].
Akbari, Elham ;
Wu, Qing ;
Zhao, Wenbing ;
Arabnia, Hamid R. ;
Yang, Mary Qu .
PROCEEDINGS 2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI), 2017, :218-221
[2]  
[Anonymous], Bitcoin: A Peer -to -Peer Electronic Cash System
[3]  
Antonopoulos A.M., 2014, Mastering Bitcoin: Unlocking Digital Cryptocurrencies
[4]  
Babi M, 2017, COMPUTERS, V6, DOI 10.3390/computers6020013
[5]   Practical byzantine fault tolerance and proactive recovery [J].
Castro, M ;
Liskov, B .
ACM TRANSACTIONS ON COMPUTER SYSTEMS, 2002, 20 (04) :398-461
[6]   Toward Trustworthy Coordination of Web Services Business Activities [J].
Chai, Hua ;
Zhang, Honglei ;
Zhao, Wenbing ;
Melliar-Smith, P. Michael ;
Moser, Louise E. .
IEEE TRANSACTIONS ON SERVICES COMPUTING, 2013, 6 (02) :276-288
[7]   A Novel Human Activity Recognition Scheme for Smart Health Using Multilayer Extreme Learning Machine [J].
Chen, Maojian ;
Li, Ying ;
Luo, Xiong ;
Wang, Weiping ;
Wang, Long ;
Zhao, Wenbing .
IEEE INTERNET OF THINGS JOURNAL, 2019, 6 (02) :1410-1418
[8]   Information Propagation in the Bitcoin Network [J].
Decker, Christian ;
Wattenhofert, Roger .
13TH IEEE INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P), 2013,
[9]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[10]   The Bitcoin Backbone Protocol: Analysis and Applications [J].
Garay, Juan ;
Kiayias, Aggelos ;
Leonardos, Nikos .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :281-310