Skip to main content

Proof of Activity Consensus Algorithm Based on Credit Reward Mechanism

  • Conference paper
  • First Online:
Web Information Systems and Applications (WISA 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12432))

Included in the following conference series:

Abstract

Proof of Activity (PoA) is a key algorithm to reach consensus among nodes. In current PoA, N online representative nodes are only used to create one transaction block, and the probability of creating a block by malicious nodes cannot be controlled, which leads to a serious waste of computing power. An improved algorithm proposed in this paper introduces credit reward mechanism to replenish the missing trust in current PoA. It also can control the probability that the node obtains the right of creating block head and trading block according to the credit value and set up the reward and punishment scheme according to the proportion of credit value, which decrease the cost of good node generating block with increasing credit value and increase the cost of malicious node creating block significantly. The algorithm uses Byzantine fault tolerant idea and follow-the-Satoshi mechanism to select representative nodes through multi-level selection and set different workload for the nodes at different levels, by which the probability of malicious nodes creating transaction blocks is reduced effectively. The experimental results show that the number of transaction blocks in a block header in CPoA is 1.75 times increase than PoA. The reward and punishment scheme can achieve the purpose of dealing with malicious nodes quickly. When the proportion of malicious nodes increased from 30% to 70%, the average decline rate of their overall credit value increased about 1.7 times, which reduces the probability of malicious nodes creating blocks, increases the cost of malicious nodes creating blocks, and enhances the stability of the system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Yuan, Y., Wang, F.Y.: Blockchain: the state of the art and future trends. Acta Autom. Sin. 42(4), 481–494 (2016). https://doi.org/10.16383/j.aas.2016.c160158. (in Chinese)

    Article  Google Scholar 

  2. Qian, W.N., Shao, Q.F., Zhu, Y.C., et al.: Research problems and methods in blockchain and trusted data management. J. Softw. 29(1), 150–159 (2018). https://doi.org/10.13328/j.cnki.jos.005434. (in Chinese)

    Article  Google Scholar 

  3. Han, X., Yuan, Y., Wang, F.Y.: Security problems on blockchain: the state of the art and future trends. Acta Automatica Sin. 45(1), 206–225 (2019). https://doi.org/10.16383/j.aas.c180710. (in Chinese)

    Article  Google Scholar 

  4. Shao, Q.F., Jin, C.Q., Zhang, Z., et al.: Blockchain: architecture and research progress. J. Softw. 41(5), 969–988 (2018). https://doi.org/10.11897/SP.J.1016.2018.00969. (in Chinese)

    Article  Google Scholar 

  5. Xue, S., Zhao, X., Li, X., Zhang, G., Xing, C.: A trusted system framework for electronic records management based on blockchain. In: Ni, W., Wang, X., Song, W., Li, Y. (eds.) WISA 2019. LNCS, vol. 11817, pp. 548–559. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30952-7_55

    Chapter  Google Scholar 

  6. Zhang, Y., Li, X., Fan, J., Nie, T., Yu, G.: A blockchain based secure e-commerce transaction system. In: Ni, W., Wang, X., Song, W., Li, Y. (eds.) WISA 2019. LNCS, vol. 11817, pp. 560–566. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30952-7_56

    Chapter  Google Scholar 

  7. Nakamoto, S.: Bitcoin: a peer-to-peer electronic Cash system. White Paper (2008). https://bitcoin.org/bitcoin.pdf

  8. Vries, A.D.: Bitcoin’s growing energy problem. Joule 2(5), 801–805 (2018). https://doi.org/10.1016/j.joule.2018.04.016

    Article  Google Scholar 

  9. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical surveys on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016). https://doi.org/10.1109/COMST.2016.2535718

    Article  Google Scholar 

  10. Shen, X., Pei, Q.Q., Liu, X.F.: Survey of block chain. Chin. J. Network Inf. Secur. 2(11), 11–20 (2016). https://doi.org/10.11959/j.issn.2096-109x.2016.00107. (in Chinese)

    Article  Google Scholar 

  11. King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake. White Paper (2012)

    Google Scholar 

  12. He, P., Yu, G., Zhang, Y.F., et al.: Survey on blockchain technology and its application prospect. Comput. Sci. 44(4), 1–7 (2017). (in Chinese)

    Google Scholar 

  13. Houy, N.: It will cost you nothing to ‘kill’a proof-of-stake crypto-currency. Soc. Sci. Electr. Publ. 34(2), 1038–1044 (2014). https://doi.org/10.2139/ssrn.2393940

    Article  MathSciNet  Google Scholar 

  14. Bentov, I., Lee, C., Mizrahi, A., et al.: Proof of activity: extending bitcoin’s proof of work via proof of stake. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34–37 (2014)

    Article  Google Scholar 

  15. Fan, J., Yi, L.T., Shu, J.W.: Research on the technologies of Byzantine system. J. Softw. 24(6), 1346–1360 (2013). https://doi.org/10.3724/SP.J.1001.2013.04395. (in Chinese)

    Article  Google Scholar 

  16. Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. Acm Trans. Comput. Syst. 20(4), 398–461 (2002). https://doi.org/10.1145/571637.571640

    Article  Google Scholar 

  17. Eyal, I., Gencer, A. E., Sirer, E.G., et al.: Bitcoin-NG: A scalable blockchain protocol. Computer Science. In: 13th USENIX Symposium on Networked Systems Design and Implementation, pp. 45–59. USENIX Association (2016)

    Google Scholar 

  18. Huang, J.H., Xia, X., Li, Z.C., et al.: Proof of trust: mechanism of trust degree based on dynamic authorization. J. Softw. 30(9), 2593–2607 (2019). https://doi.org/10.13328/j.cnki.jos.005772. (in Chinese)

    Article  Google Scholar 

  19. Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Network Secur. 19(5), 653–659 (2017). https://doi.org/10.6633/IJNS.201709.19(5).01

    Article  Google Scholar 

  20. Zhu, L.H., Gao, F., Shen, M., et al.: Survey on privacy preserving techniques for blockchain technology. J. Comput. Res. Dev. 54(10), 2170–2186 (2017). https://doi.org/10.7544/issn1000-1239.2017.20170471. (in Chinese)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chenguang Jin .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Wang, D., Jin, C., Li, H., Perkowski, M. (2020). Proof of Activity Consensus Algorithm Based on Credit Reward Mechanism. In: Wang, G., Lin, X., Hendler, J., Song, W., Xu, Z., Liu, G. (eds) Web Information Systems and Applications. WISA 2020. Lecture Notes in Computer Science(), vol 12432. Springer, Cham. https://doi.org/10.1007/978-3-030-60029-7_55

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60029-7_55

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60028-0

  • Online ISBN: 978-3-030-60029-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics