Skip to main content

Linear Scalability from Sharding and PoS

  • Conference paper
  • First Online:
Algorithms and Architectures for Parallel Processing (ICA3PP 2020)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 12452))

  • 1727 Accesses

Abstract

Scalability is one of the most important problems in blockchain and has been the focus of both industry practitioners and academic researchers since Bitcoin was born. The blockchain has insufficient ability in handling large-scale concurrent transactions. The more transactions that are processed in the network, the more scalability problems appear in the network. Compared to the transaction throughput achieved by the electronic payment channels of mature development, the limitation is magnified. In this paper, we propose a novel consensus mechanism from sharding and Proof-of-Stake (PoS)—a scalable blockchain model that supports high concurrency, and achieve the linear expansion of transaction processing scale while ensuring security in order to prove the feasibility of the proposal. The proposal views the blocks in the network as two levels, namely, intermediate transition blocks (i.e., middle blocks) and final confirmation blocks (i.e., final blocks), and takes epoch as the basic unit of the consensus mechanism operation cycle. An epoch is a recursive process for each cycle of the consensus mechanism operation. Each epoch is equipped with four types of interactions, namely, node sharding, transaction sharding, internal consensus, and final block generation, and thereby determines the network status via main chain and shard chains. Given n nodes in the network, we construct one Validity group and \(p-1\) Regular groups (each one contains n/p nodes). The regular groups create transition blocks according to the transaction pool; the validity group extracts information from the transition blocks created by the regular groups, generates and sends final confirmation blocks to the main chain. PoS consensus is exploited to ensure that adversaries are not able to launch attacks on specific shards (neither transaction nor node shards). We also describe how to re-group the nodes in and add new node to the network. We provide the security analysis under several standard attack models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Nakamoto, S., Bitcoin, A.: A peer-to-peer electronic cash system (2008)

    Google Scholar 

  2. Fernández-Caramés, T.M., Fraga-Lamas, P.: A review on the use of blockchain for the Internet of things. IEEE Access 6, 32979–33001 (2018)

    Article  Google Scholar 

  3. Shao, Z., Xue, C., Zhuge, Q., Qiu, M., Xiao, B., Sha, E.H.-M.: Security protection and checking for embedded system integration against buffer overflow attacks via hardware/software. IEEE Trans. Comput. 55(4), 443–453 (2006)

    Article  Google Scholar 

  4. Tian, Z., Li, M., Qiu, M., Sun, Y., Shen, Su: Block-DEF: a secure digital evidence framework using blockchain. Inf. Sci. 491, 151–165 (2019)

    Article  Google Scholar 

  5. Bocek, T., Rodrigues, B.B., Strasser, T., Stiller, B.: Blockchains everywhere–a use-case of blockchains in the pharma supply-chain. In: Proceeding of IFIP/IEEE Symposium on Integrated Network Service Manage. (IM), pp. 772–777, May 2017

    Google Scholar 

  6. Murdoch, J.S., Anderson, J.: Verified by visa and mastercard securecode: or, how not to design authentication. In: Financial Cryptography, pp. 336–342 (2010)

    Google Scholar 

  7. Eyal, I., Gencer, A.E., Renesse, R.V.: Bitcoin-NG: a scalable blockchain protocol. In: Usenix Conference on Networked Systems Design & Implementation, pp. 45–59 (2016)

    Google Scholar 

  8. Kiayias, A., Russell, A., David, B., Oliynykov, R.: Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Katz, J., Shacham, H. (eds.) CRYPTO 2017. LNCS, vol. 10401, pp. 357–388. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-63688-7_12

    Chapter  Google Scholar 

  9. King, S., Nadal, S.: PPCoin: peer-to-peer crypto-currency with proof-of-stake. Self–published Paper, 19 August 2012

    Google Scholar 

  10. Tosh, D., et al.: CloudPoS: a proof-of-stake consensus design for blockchain integrated cloud. In: IEEE 11th International Conference on Cloud Computing (CLOUD), pp. 302–309 (2018)

    Google Scholar 

  11. Bentov, I., Gabizon, A., Mizrahi, A.: Cryptocurrencies without proof of work. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 142–157. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_10

    Chapter  Google Scholar 

  12. Peifang, N., Hongda, L., Meng, X., Pan, D.: UniqueChain: a fast, provably secure proof-of-stake based blockchain protocol in the open setting. IACR Cryptol. ePrint Arch. 2019, 456 (2019)

    Google Scholar 

  13. Bartoletti, M., Lande, S., Podda, A.S.: A proof-of-stake protocol for consensus on bitcoin subchains. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 568–584. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-70278-0_36

    Chapter  Google Scholar 

  14. Chepurnoy, A., Duong, T., Fan, L., Zhou, H.: TwinsCoin: a cryptocurrency via proof-of-work and proof-of-stake. IACR Cryptol. ePrint Arch. 2017, 232 (2017)

    Google Scholar 

  15. Badertscher, C., Gazi, P., Kiayias, A., Russell, A., Zikas, V., Ouroboros genesis: composable proof-of-stake blockchains with dynamic availability. In: ACM Conference on Computer and Communications Security, pp. 913–930 (2018)

    Google Scholar 

  16. Gazi, P., Kiayias, A., Russell, A.: Stake-bleeding attacks on proof-of-stake blockchains. In: CVCBT, pp. 85–92 (2018)

    Google Scholar 

  17. Luu, L., et al.: A secure sharding protocol for open blockchains. In: ACM Sigsac Conference on Computer & Communications Security, pp. 17–30 (2016)

    Google Scholar 

  18. Fidelman, Z.: A generic sharding scheme for blockchain protocols. CoRR abs/1909.01162 (2019)

    Google Scholar 

  19. Dang, H., Dinh, T., Loghin, D., Chang, E., Lin, Q., Ooi, B.: Towards scaling blockchain systems via sharding. In: SIGMOD Conference, pp. 123–140 (2019)

    Google Scholar 

  20. Tong, W., Dong, X., Shen, Y., Jiang, X.: A hierarchical sharding protocol for multi-domain IoT blockchains. In: ICC, pp. 1–6 (2019)

    Google Scholar 

  21. Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106–125. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_8

    Chapter  Google Scholar 

  22. Vaidya, K.: Decoding the enigma of Bitcoin Mining - Part I: Mechanism. https://medium.com/all-things-ledger/decoding-the-enigma-of-bitcoin-mining-f8b2697bc4e2/

  23. Buterin, V.: A Proof of Stake Design Philosophy. https://medium.com/@VitalikButerin/a-proof-of-stake-design-philosophy-506585978d51/

  24. Lam, W.: Attack-prevention and damage-control investments in cybersecurity. Inf. Econ. Policy 37, 42–51 (2016)

    Article  Google Scholar 

  25. Asfia, U., Kamuni, V., Sutavani, S., Sheikh, A., Wagh, S., Singh, N.M.: A blockchain construct for energy trading against sybil attacks. In: MED, pp. 422–427 (2019)

    Google Scholar 

  26. Andy, W.: Directed Acyclic Graph: the Future of Blockchain Development. https://www.coinspeaker.com/directed-acyclic-graph-blockchain/

  27. Khan, N., State, R.: International Congress on Blockchain and Applications. Lightning Network: A Comparative Review of Transaction Fees and Data Analysis, pp. 11–18. Springer, Berlin (2019)

    Google Scholar 

  28. Guo, J., Gai, K., Zhu, L., Zhang, Z.: An approach of secure two-way-pegged multi-sidechain. In: Wen, S., Zomaya, A., Yang, L.T. (eds.) ICA3PP 2019. LNCS, vol. 11945, pp. 551–564. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-38961-1_47

    Chapter  Google Scholar 

  29. Back, A., et al.: Enabling blockchain innovations with pegged sidechains. http://www.opensciencereview.com/papers/ 123/enablingblockchain-innovations-with-pegged-sidechains

  30. Luu, L., et al.: A secure sharding protocol for open blockchains. In: ACM Conference on Computer and Communications Security, pp. 17–30 (2016)

    Google Scholar 

  31. Qiu, H., Noura, H., Qiu, M., Ming, Z., Memmi, G.: A user-centric data protection method for cloud storage based on invertible DWT. IEEE Trans. Cloud Comput. 1–12 (2019). https://doi.org/10.1109/TCC.2019.2911679

Download references

Acknowledgement

The work was supported by the National Natural Science Foundation of China (Grant Nos. 61971192, 6191101004) and the National Cryptography Development Fund (Grant No. MMJJ20180106).

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Xiangxue Li or Haifeng Qian .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yang, C., Li, X., Li, J., Qian, H. (2020). Linear Scalability from Sharding and PoS. In: Qiu, M. (eds) Algorithms and Architectures for Parallel Processing. ICA3PP 2020. Lecture Notes in Computer Science(), vol 12452. Springer, Cham. https://doi.org/10.1007/978-3-030-60245-1_37

Download citation

Publish with us

Policies and ethics