Skip to main content

Advertisement

Log in

Mainstay: A hybrid protocol ensuring ledger temporality and security

  • Published:
Peer-to-Peer Networking and Applications Aims and scope Submit manuscript

Abstract

To enhance the scalability of blockchain ledger structure, researchers have abandoned the traditional single-chain structure and used the structure of Directed Acyclic Graph (DAG) to achieve high-concurrency processing of transactions. The DAG-based ledger requires a specific topological structure and block sorting rules to ensure the temporality and security of the ledger structure. This paper proposes a hybrid protocol called Mainstay with a double-layer structure, including the DAG-Ledger layer and the NC-Chain layer. The DAG-Ledger layer uses PHANTOM structure to confirm the transaction block order; the NC-Chain uses dynamic committee elections, voting, and fast verification to form a blockchain similar to the Nakamoto style, and each block of the NC-Chain requires committee members to calculate the Verifiable Delay Function (VDF) to generate a quorum certificate(QC), which can ensure the stability and security of the DAG-Ledger layer ledger sequence. By experimental comparison, we conclude that the Mainstay protocol can effectively reduce the probability of malicious attackers successfully attacking the ledger structure.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Algorithm 1
Algorithm 2
Algorithm 3
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Data Availability

No datasets were generated or analysed during the current study.

Code availability

Due to copyright issues, the code is currently not publicly available.

References

  1. Garay JA, Kiayias A, Leonardos N (2015) The bitcoin backbone protocol: Analysis and applications. In: EUROCRYPT 2015, Part II, vol 9057, pp 281–310. Springer

  2. Churyumov A (2016) Byteball: A decentralized system for storage and transfer of value. https://obyte.org/Byteball.pdf

  3. Sompolinsky Y, Zohar A (2016) Spectre: A fast and scalable cryptocurrency protocol. ePrint 2016. (1159)

  4. Sompolinsky Y, Zohar A (2020) Phantom, GHOSTDAG

  5. Baird L (2016) The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Technical Report 1, Swirlds Inc

  6. LeMahieu C (2018) Nano: A feeless distributed cryptocurrency network. https://nano.org/en/whitepaper

  7. Chen T-Y et al (2018) Dexon: A highly scalable, decentralized dag-based consensus algorithm. arXiv:1811.07525

  8. Zhou T et al (2019) Dlattice: A permission-less blockchain based on dpos-ba-dag consensus for data tokenization. IEEE Access 7:39273–39287

  9. Bagaria V et al (2019) Prism: Deconstructing the blockchain to approach physical limits. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp 585–602

  10. Sompolinsky Y et al (2015) Secure high-rate transaction processing in bitcoin. In: Proceedings of the 19th international conference on financial cryptography and data security, pp 507–527. Springer

  11. Lewenberg Y et al (2015) Inclusive block chain protocols. In: Proceedings of the 18th international conference on financial cryptography and data security, pp 528–547. Springer

  12. Li C et al (2018) Scaling Nakamoto Consensus to thousands of transactions per second. https://arxiv.org/pdf/1805.03870.pdf

  13. Gupta H et al (2019) Cdag: A serialized blockdag for permissioned blockchain. arXiv:1910.08547

  14. Tang S et al (2020) Bracing a transaction dag with a backbone chain. In: ePrint

  15. Wang Q, Yu J, Chen S et al (2020) Sok: Diving into dag-based blockchain systems. arXiv:2012.06128

  16. Sompolinsky Y, Sutton M (2022) The dag knight protocol: A parameterless generalization of nakamoto consensus. Cryptology ePrint Archive

  17. Bentov I et al (2017) Tortoise and hares consensus: The meshcash framework for incentive-compatible, scalable. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1247–1260

  18. Birmpas G et al (2020) Fairness and efficiency in dag-based cryptocurrencies. In: FC

  19. Boneh D, Bonneau J, Bünz B, Fisch B (2018) Verifiable delay functions. In: Annual international cryptology conference, pp 757–788. Springer

Download references

Funding

Not applicable.

Author information

Authors and Affiliations

Authors

Contributions

Liu: Liangxin Liu was responsible for the drafting and revision of the content of the manuscript, as well as the experimental design and data analysis. Du: Zhiqiang Du provided in-depth thinking and innovative direction for research and made a significant intellectual contribution to the theoretical development and protocol design. Huang: Muhong Huang provided professional technical guidance and advice in this research and played a crucial role in the drafting of the manuscript and modification of the content. Fu: Yanfang Fu also participated in drafting the manuscript and reviewing the content. She approved the final version of the publication, including the references. Zhang: Wendong Zhang was responsible for the revision of the content of the manuscript, statistics of experimental data and visualization of experimental results in this study.

Corresponding author

Correspondence to Yanfang Fu.

Ethics declarations

Competing interests

The authors declare no competing interests.

Ethics approval

Not applicable.

Consent to participate

Not applicable.

Consent for publication

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

This article is part of the Topical Collection: 3 - Track on Blockchain Guest Editor: Haojin Zhu

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, L., Du, Z., Fu, Y. et al. Mainstay: A hybrid protocol ensuring ledger temporality and security. Peer-to-Peer Netw. Appl. 17, 3948–3963 (2024). https://doi.org/10.1007/s12083-024-01797-6

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12083-024-01797-6

Keywords