Abstract
To enhance the scalability of blockchain ledger structure, researchers have abandoned the traditional single-chain structure and used the structure of Directed Acyclic Graph (DAG) to achieve high-concurrency processing of transactions. The DAG-based ledger requires a specific topological structure and block sorting rules to ensure the temporality and security of the ledger structure. This paper proposes a hybrid protocol called Mainstay with a double-layer structure, including the DAG-Ledger layer and the NC-Chain layer. The DAG-Ledger layer uses PHANTOM structure to confirm the transaction block order; the NC-Chain uses dynamic committee elections, voting, and fast verification to form a blockchain similar to the Nakamoto style, and each block of the NC-Chain requires committee members to calculate the Verifiable Delay Function (VDF) to generate a quorum certificate(QC), which can ensure the stability and security of the DAG-Ledger layer ledger sequence. By experimental comparison, we conclude that the Mainstay protocol can effectively reduce the probability of malicious attackers successfully attacking the ledger structure.











Similar content being viewed by others
Data Availability
No datasets were generated or analysed during the current study.
Code availability
Due to copyright issues, the code is currently not publicly available.
References
Garay JA, Kiayias A, Leonardos N (2015) The bitcoin backbone protocol: Analysis and applications. In: EUROCRYPT 2015, Part II, vol 9057, pp 281–310. Springer
Churyumov A (2016) Byteball: A decentralized system for storage and transfer of value. https://obyte.org/Byteball.pdf
Sompolinsky Y, Zohar A (2016) Spectre: A fast and scalable cryptocurrency protocol. ePrint 2016. (1159)
Sompolinsky Y, Zohar A (2020) Phantom, GHOSTDAG
Baird L (2016) The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. Technical Report 1, Swirlds Inc
LeMahieu C (2018) Nano: A feeless distributed cryptocurrency network. https://nano.org/en/whitepaper
Chen T-Y et al (2018) Dexon: A highly scalable, decentralized dag-based consensus algorithm. arXiv:1811.07525
Zhou T et al (2019) Dlattice: A permission-less blockchain based on dpos-ba-dag consensus for data tokenization. IEEE Access 7:39273–39287
Bagaria V et al (2019) Prism: Deconstructing the blockchain to approach physical limits. In: Proceedings of the 2019 ACM SIGSAC conference on computer and communications security, pp 585–602
Sompolinsky Y et al (2015) Secure high-rate transaction processing in bitcoin. In: Proceedings of the 19th international conference on financial cryptography and data security, pp 507–527. Springer
Lewenberg Y et al (2015) Inclusive block chain protocols. In: Proceedings of the 18th international conference on financial cryptography and data security, pp 528–547. Springer
Li C et al (2018) Scaling Nakamoto Consensus to thousands of transactions per second. https://arxiv.org/pdf/1805.03870.pdf
Gupta H et al (2019) Cdag: A serialized blockdag for permissioned blockchain. arXiv:1910.08547
Tang S et al (2020) Bracing a transaction dag with a backbone chain. In: ePrint
Wang Q, Yu J, Chen S et al (2020) Sok: Diving into dag-based blockchain systems. arXiv:2012.06128
Sompolinsky Y, Sutton M (2022) The dag knight protocol: A parameterless generalization of nakamoto consensus. Cryptology ePrint Archive
Bentov I et al (2017) Tortoise and hares consensus: The meshcash framework for incentive-compatible, scalable. In: Proceedings of the 22nd ACM SIGSAC conference on computer and communications security, pp 1247–1260
Birmpas G et al (2020) Fairness and efficiency in dag-based cryptocurrencies. In: FC
Boneh D, Bonneau J, Bünz B, Fisch B (2018) Verifiable delay functions. In: Annual international cryptology conference, pp 757–788. Springer
Funding
Not applicable.
Author information
Authors and Affiliations
Contributions
Liu: Liangxin Liu was responsible for the drafting and revision of the content of the manuscript, as well as the experimental design and data analysis. Du: Zhiqiang Du provided in-depth thinking and innovative direction for research and made a significant intellectual contribution to the theoretical development and protocol design. Huang: Muhong Huang provided professional technical guidance and advice in this research and played a crucial role in the drafting of the manuscript and modification of the content. Fu: Yanfang Fu also participated in drafting the manuscript and reviewing the content. She approved the final version of the publication, including the references. Zhang: Wendong Zhang was responsible for the revision of the content of the manuscript, statistics of experimental data and visualization of experimental results in this study.
Corresponding author
Ethics declarations
Competing interests
The authors declare no competing interests.
Ethics approval
Not applicable.
Consent to participate
Not applicable.
Consent for publication
Not applicable.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
This article is part of the Topical Collection: 3 - Track on Blockchain Guest Editor: Haojin Zhu
Rights and permissions
Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.
About this article
Cite this article
Liu, L., Du, Z., Fu, Y. et al. Mainstay: A hybrid protocol ensuring ledger temporality and security. Peer-to-Peer Netw. Appl. 17, 3948–3963 (2024). https://doi.org/10.1007/s12083-024-01797-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-024-01797-6