Abstract
Proof of Activity (PoA) is a key algorithm to reach consensus among nodes. In current PoA, N online representative nodes are only used to create one transaction block, and the probability of creating a block by malicious nodes cannot be controlled, which leads to a serious waste of computing power. An improved algorithm proposed in this paper introduces credit reward mechanism to replenish the missing trust in current PoA. It also can control the probability that the node obtains the right of creating block head and trading block according to the credit value and set up the reward and punishment scheme according to the proportion of credit value, which decrease the cost of good node generating block with increasing credit value and increase the cost of malicious node creating block significantly. The algorithm uses Byzantine fault tolerant idea and follow-the-Satoshi mechanism to select representative nodes through multi-level selection and set different workload for the nodes at different levels, by which the probability of malicious nodes creating transaction blocks is reduced effectively. The experimental results show that the number of transaction blocks in a block header in CPoA is 1.75 times increase than PoA. The reward and punishment scheme can achieve the purpose of dealing with malicious nodes quickly. When the proportion of malicious nodes increased from 30% to 70%, the average decline rate of their overall credit value increased about 1.7 times, which reduces the probability of malicious nodes creating blocks, increases the cost of malicious nodes creating blocks, and enhances the stability of the system.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Yuan, Y., Wang, F.Y.: Blockchain: the state of the art and future trends. Acta Autom. Sin. 42(4), 481–494 (2016). https://doi.org/10.16383/j.aas.2016.c160158. (in Chinese)
Qian, W.N., Shao, Q.F., Zhu, Y.C., et al.: Research problems and methods in blockchain and trusted data management. J. Softw. 29(1), 150–159 (2018). https://doi.org/10.13328/j.cnki.jos.005434. (in Chinese)
Han, X., Yuan, Y., Wang, F.Y.: Security problems on blockchain: the state of the art and future trends. Acta Automatica Sin. 45(1), 206–225 (2019). https://doi.org/10.16383/j.aas.c180710. (in Chinese)
Shao, Q.F., Jin, C.Q., Zhang, Z., et al.: Blockchain: architecture and research progress. J. Softw. 41(5), 969–988 (2018). https://doi.org/10.11897/SP.J.1016.2018.00969. (in Chinese)
Xue, S., Zhao, X., Li, X., Zhang, G., Xing, C.: A trusted system framework for electronic records management based on blockchain. In: Ni, W., Wang, X., Song, W., Li, Y. (eds.) WISA 2019. LNCS, vol. 11817, pp. 548–559. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30952-7_55
Zhang, Y., Li, X., Fan, J., Nie, T., Yu, G.: A blockchain based secure e-commerce transaction system. In: Ni, W., Wang, X., Song, W., Li, Y. (eds.) WISA 2019. LNCS, vol. 11817, pp. 560–566. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-30952-7_56
Nakamoto, S.: Bitcoin: a peer-to-peer electronic Cash system. White Paper (2008). https://bitcoin.org/bitcoin.pdf
Vries, A.D.: Bitcoin’s growing energy problem. Joule 2(5), 801–805 (2018). https://doi.org/10.1016/j.joule.2018.04.016
Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical surveys on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18(3), 2084–2123 (2016). https://doi.org/10.1109/COMST.2016.2535718
Shen, X., Pei, Q.Q., Liu, X.F.: Survey of block chain. Chin. J. Network Inf. Secur. 2(11), 11–20 (2016). https://doi.org/10.11959/j.issn.2096-109x.2016.00107. (in Chinese)
King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake. White Paper (2012)
He, P., Yu, G., Zhang, Y.F., et al.: Survey on blockchain technology and its application prospect. Comput. Sci. 44(4), 1–7 (2017). (in Chinese)
Houy, N.: It will cost you nothing to ‘kill’a proof-of-stake crypto-currency. Soc. Sci. Electr. Publ. 34(2), 1038–1044 (2014). https://doi.org/10.2139/ssrn.2393940
Bentov, I., Lee, C., Mizrahi, A., et al.: Proof of activity: extending bitcoin’s proof of work via proof of stake. ACM SIGMETRICS Perform. Eval. Rev. 42(3), 34–37 (2014)
Fan, J., Yi, L.T., Shu, J.W.: Research on the technologies of Byzantine system. J. Softw. 24(6), 1346–1360 (2013). https://doi.org/10.3724/SP.J.1001.2013.04395. (in Chinese)
Castro, M., Liskov, B.: Practical byzantine fault tolerance and proactive recovery. Acm Trans. Comput. Syst. 20(4), 398–461 (2002). https://doi.org/10.1145/571637.571640
Eyal, I., Gencer, A. E., Sirer, E.G., et al.: Bitcoin-NG: A scalable blockchain protocol. Computer Science. In: 13th USENIX Symposium on Networked Systems Design and Implementation, pp. 45–59. USENIX Association (2016)
Huang, J.H., Xia, X., Li, Z.C., et al.: Proof of trust: mechanism of trust degree based on dynamic authorization. J. Softw. 30(9), 2593–2607 (2019). https://doi.org/10.13328/j.cnki.jos.005772. (in Chinese)
Lin, I.C., Liao, T.C.: A survey of blockchain security issues and challenges. Int. J. Network Secur. 19(5), 653–659 (2017). https://doi.org/10.6633/IJNS.201709.19(5).01
Zhu, L.H., Gao, F., Shen, M., et al.: Survey on privacy preserving techniques for blockchain technology. J. Comput. Res. Dev. 54(10), 2170–2186 (2017). https://doi.org/10.7544/issn1000-1239.2017.20170471. (in Chinese)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Wang, D., Jin, C., Li, H., Perkowski, M. (2020). Proof of Activity Consensus Algorithm Based on Credit Reward Mechanism. In: Wang, G., Lin, X., Hendler, J., Song, W., Xu, Z., Liu, G. (eds) Web Information Systems and Applications. WISA 2020. Lecture Notes in Computer Science(), vol 12432. Springer, Cham. https://doi.org/10.1007/978-3-030-60029-7_55
Download citation
DOI: https://doi.org/10.1007/978-3-030-60029-7_55
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60028-0
Online ISBN: 978-3-030-60029-7
eBook Packages: Computer ScienceComputer Science (R0)