Proof of Trust: Mechanism of Trust Degree Based on Dynamic Authorization
Author:
Affiliation:

Fund Project:

National Natural Science Foundation of China (61472139); National Key Research and Development Plan Task of China (2016YFA0502300)

  • Article
  • | |
  • Metrics
  • |
  • Reference [33]
  • |
  • Related [20]
  • | | |
  • Comments
    Abstract:

    A trust degree mechanism based on dynamic authorization, proof of trust (PoT), is proposed in this study. Based on the mechanism, problems such as nothing-at-the-stake and bribe attack in the existing block generation strategies are fixed. There are two types of nodes in the network:miners and stakeholders. The trust degree is given according to the behavior of the node participating in the creation of a block. Once a node becomes a stakeholder of the network, it entrusts the block by signing its private key to the block. Finally, the blocks with trust degree compete with each other to be accepted as a legal extension of the blockchain. The cost of attacks against bribe attacks and common stake accumulation attacks, and the system's response to attacks is also analyzed. Simulation results show that the PoT mechanism can defend more efficiently against nothing-at-the-stake attack, bribe attack, and stake accumulation attack compared to proof of stake.

    Reference
    [1] Nakamoto S. Bitcoin:A peer-to-peer electronic cash system. 2008.
    [2] Buterin V. A next-generation smart contract and decentralized application platform. White Paper, 2014.
    [3] King S, Nadal S. Ppcoin:Peer-to-peer crypto-currency with proof-of-stake. Self-Published Paper, 2012.
    [4] Poon J, Dryja T. The bitcoin lightning network:Scalable off-chain instant payments. 2016. URL:https://lightning.network/lightning-network-paper.pdf
    [5] Cachin C. Architecture of the hyperledgerblockchain fabric. In:Proc. of the Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 2016.
    [6] Yuan Y, Wang FY. Blockchain:The state of the art and future trends. Acta Automatica Sinica, 2016,42(4):481-494(in Chinese with English abstract).[doi:10.16383/j.aas.2016.c160158]
    [7] Zyskind G, Nathan O. Decentralizing privacy:Using blockchain to protect personal data. In:Proc. of the 2015 IEEE Security and Privacy Workshops (SPW). IEEE, 2015. 180-184.
    [8] July 2015 flood attack In:Bitcoin Wiki. 2015. https://en.bitcoin.it/wiki/July_2015_flood_attack
    [9] Int'l Energy Agency. World energy statistics 2017. 2017. https://www.iea.org/publications/freepublications/publication/KeyWorld 2017.pdf
    [10] de Vries A. Bitcoin's growing energy problem. Joule, 2018,2(5):801-805.
    [11] Hanke T. AsicBoost-A speedup for bitcoin mining. 2016.
    [12] Eyal I. The miner's dilemma. Computer Science, 2014. 89-103.
    [13] Sapirshtein A, Sompolinsky Y, Zohar A. Optimal selfish mining strategies in bitcoin. In:Proc. of the Financial Crypto 2016. 2016.
    [14] Vasin P. Blackcoin's proof-of-stake protocol v2. 2014. https://blackcoin.org/blackcoin-pos-protocol-v2-whitepaper.pdf
    [15] Bentov I, Gabizon A, Mizrahi A. Cryptocurrencies without proof of work. In:Proc. of the Int'l Conf. on Financial Cryptography and Data Security. Berlin, Heidelberg:Springer-Verlag, 2016. 142-157.
    [16] Larimer D. Delegated proof-of-stake consensus. 2018.
    [17] Bentov I, Lee C, Mizrahi A, et al. Proof of activity:Extending bitcoin's proof of work via proof of stake[extended abstract]. Performance Evaluation Review, 2014,42(3):34-37.
    [18] Buchman E. Tendermint:Byzantine fault tolerance in the age of blockchains[Ph.D. Thesis]. 2016.
    [19] Buterin V, Griffith V. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437, 2017.
    [20] ENIGMA. A private, secure and untraceable transaction system for cloakcoin. 2018. URL:https://www.cloakcoin.com/user/themes/g5_cloak/resources/CloakCoin_Whitepaper_v2.1.pdf
    [21] Novacoin-Proof of stake[EB/OL]. 2014. URL:https://github.com/novacoin-project/novacoin/wiki/Proof-of-stake
    [22] Pike D, Nosker P, Boehm D, Grisham D, Woods S, Marston J. Proof-of-Stake-Time whitepaper. 2017. URL:https://www.vericoin.info/downloads/VeriCoinPoSTWhitePaper10May2015.pdf
    [23] Kiayias A, Russell A, David B, et al. Ouroboros:A provably secure proof-of-stake blockchain protocol. In:Proc. of the Int'l Cryptology Conf. Cham:Springer-Verlag, 2017. 357-388.
    [24] Kanwal M, Kanwal M, Kanwal M, et al. Proof of luck:An efficient blockchain consensus protocol. In:Proc. of the Workshop on System Software for Trusted Execution. ACM Press, 2016.
    [25] Dziembowski S, Faust S, Kolmogorov V, Pietrzak K. Proofs of space. In:Gennaro R, Robshaw M, eds. Proc. of the CRYPTO 2015. LNCS 9216, Heidelberg:Springer-Verlag, 2015. 585-605.[doi:10.1007/978-3-662-48000-729]
    [26] Moran T, Orlov I. Proofs of space-time and rational proofs of storage. IACR Cryptology ePrint Archive, 2016.
    [27] P4Titan. Slimcoin:A peer-to-peer crypto-currencywith proof-of-burn. 2014. https://www.chainwhy.com/upload/default/20180703/4ae7cee40462e7951f508b28dd1d9936.pdf
    [28] Beikverdi A. NEM technical reference. 2018. https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf
    [29] Poelstra A. Distributed consensus from proof of stake is impossible. 2015. https://download.wpsoftware.net/bitcoin/pos.pdf
    [30] Buterin V. On stake. 2014. https://blog.ethereum.org/2014/07/05/stake/
    [31] Hardin G. The tragedy of the commons. Science, 1968,162(3859):1243-1248.[doi:10.1126/science.162.3859.1243]
    附中文参考文献:
    [6] 袁勇,王飞跃.区块链技术发展现状与展望.自动化学报,2016,42(4):481-494.[doi:10.16383/j.aas.2016.c160158]
    Cited by
    Comments
    Comments
    分享到微博
    Submit
Get Citation

黄建华,夏旭,李忠诚,李建华,郑红.基于动态授权的信任度证明机制.软件学报,2019,30(9):2593-2607

Copy
Share
Article Metrics
  • Abstract:4688
  • PDF: 6617
  • HTML: 3510
  • Cited by: 0
History
  • Received:June 09,2018
  • Revised:August 28,2018
  • Online: April 11,2019
You are the first2033305Visitors
Copyright: Institute of Software, Chinese Academy of Sciences Beijing ICP No. 05046678-4
Address:4# South Fourth Street, Zhong Guan Cun, Beijing 100190,Postal Code:100190
Phone:010-62562563 Fax:010-62562533 Email:jos@iscas.ac.cn
Technical Support:Beijing Qinyun Technology Development Co., Ltd.

Beijing Public Network Security No. 11040202500063