skip to main content
10.1145/3152824.3152825acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmiddlewareConference Proceedingsconference-collections
research-article

EPBC: <u>E</u>fficient <u>P</u>ublic <u>B</u>lockchain <u>C</u>lient for lightweight users

Published: 11 December 2017 Publication History

Abstract

Public blockchains provide a decentralized method for storing transaction data and have many applications in different sectors. In order for a user to track transactions, a simple method is that every user keeps a local copy of the entire public ledger. Since the size of a ledger keeps growing, this method becomes increasingly less practical, especially for lightweight users such as IoT devices and smartphones. In order to deal with this problem, there have been some proposals. However, existing solutions either achieve a limited storage reduction (e.g., simple payment verification), or rely on some strong security assumption (e.g., the use of trusted server). We propose EPBC, a novel and efficient transaction verification scheme for public ledgers, which only requires lightweight users to store a small amount of data that is independent of the size of the blockchain. We analyze EPBC's performance and security, and discuss its integration with existing public ledger systems. Experimental results confirm that EPBC is practical for lightweight users.

References

[1]
Giuseppe Ateniese, Randal Burns, Reza Curtmola, Joseph Herring, Lea Kissner, Zachary Peterson, and Dawn Song. 2007. Provable Data Possession at Untrusted Stores. In Proceedings of the 2007 ACM Conference on Computer and Communications Security -CCS 2007. ACM, 598--609.
[2]
Niko Barić and Birgit Pfitzmann. 1997. Collision-free accumulators and fail-stop signature schemes without trees. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 480--494.
[3]
Josh Benaloh and Michael De Mare. 1993. One-way accumulators: A decentralized alternative to digital signatures. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 274--285.
[4]
Patrick Billingsley. 1969. On the central limit theorem for the prime divisor function. Amer. Math. Monthly (1969), 132--139.
[5]
Bryan Bishop. 2015. Review of Bitcoin Scaling Proposals. In Scaling Bitcoin Workshop Phase, Vol. 1.
[6]
Dan Boneh and Matthew Franklin. 1997. Efficient generation of shared RSA keys. In Advances in Cryptology-CRYPTO'97. Springer, 425.
[7]
Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. white paper (2014).
[8]
Certivox Ltd. {n. d.}. MIRACL Cryptographic Library. ({n. d.}). https://libraries.docs.miracl.com/miracl-user-manual/about
[9]
Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and Smart Contracts for the Internet of Things. IEEE Access (2016).
[10]
Clifford Cocks. 1997. Split knowledge generation of RSA parameters. In IMA International Conference on Cryptography and Coding. Springer, 89--95.
[11]
Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, et al. 2016. On scaling decentralized blockchains. In International Conference on Financial Cryptography and Data Security. Springer, 106--125.
[12]
John Douceur. 2002. The sybil attack. Peer-to-peer Systems (2002), 251--260.
[13]
Paul Erdös and Mark Kac. 1940. The Gaussian law of errors in the theory of additive number theoretic functions. American Journal of Mathematics 62, 1 (1940), 738--742.
[14]
Geekbench. 2017. Geekbench Browser. (2017). https://browser.geekbench.com/
[15]
Arthur Gervais, Srdjan Capkun, Ghassan O Karame, and Damian Gruber. 2014. On the privacy provisions of bloom filters in lightweight bitcoin clients. In Proceedings of the 30th Annual Computer Security Applications Conference. ACM, 326--335.
[16]
Arthur Gervais, Ghassan O Karame, Karl Wüst, Vasileios Glykantzis, Hubert Ritzdorf, and Srdjan Capkun. 2016. On the security and performance of proof of work blockchains. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. ACM, 3--16.
[17]
Michael T Goodrich, Roberto Tamassia, and Jasminka Hasić. 2002. An efficient dynamic and distributed cryptographic accumulator. In International Conference on Information Security. Springer, 372--388.
[18]
Mike Hearn and Matt Corallo. 2012. BIP 37: Connection Bloom filtering. (2012). https://github.com/bitcoin/bips/blob/master/bip-0037. mediawiki
[19]
Loi Luu, Viswesh Narayanan, Kunal Baweja, Chaodong Zheng, Seth Gilbert, and Prateek Saxena. 2015. SCP: a computationally-scalable Byzantine consensus protocol for blockchains. Technical Report. Cryptology ePrint Archive, Report 2015/1168.
[20]
Ian Miers, Christina Garman, Matthew Green, and Aviel D Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Security and Privacy (SP), 2013 IEEE Symposium on. IEEE, 397--411.
[21]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).
[22]
Gene Tsudik and Shouhuai Xu. 2003. Accumulating Composites and Improved Group Signing. In Advances in Cryptology - ASIACRYPT 2003. 269--286.
[23]
Marko Vukolić. 2015. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112--125.
[24]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014).
[25]
Qingji Zheng and Shouhuai Xu. 2011. Fair and dynamic proofs of retrievability. In First ACM Conference on Data and Application Security and Privacy, CODASPY 2011. 237--248.

Cited By

View all
  • (2024)A Game Theoretical Analysis of Non-linear Blockchain SystemDistributed Ledger Technologies: Research and Practice10.1145/36071953:1(1-24)Online publication date: 18-Mar-2024
  • (2024)A General Blockchain-Based Automatic Audit Scheme For Proofs Of RetrievabilityThe Computer Journal10.1093/comjnl/bxae00167:6(2219-2229)Online publication date: 27-Jan-2024
  • (2023)Review and Development of a Scalable Lightweight Blockchain Integrated Model (LightBlock) for IoT ApplicationsElectronics10.3390/electronics1204102512:4(1025)Online publication date: 18-Feb-2023
  • Show More Cited By

Index Terms

  1. EPBC: Efficient Public Blockchain Client for lightweight users

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      SERIAL '17: Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers
      December 2017
      40 pages
      ISBN:9781450351737
      DOI:10.1145/3152824
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 11 December 2017

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. accumulator
      2. blockchain
      3. light weight client

      Qualifiers

      • Research-article

      Funding Sources

      • U.S. Department of Homeland Security

      Conference

      Middleware '17
      Middleware '17: 18th International Middleware Conference
      December 11 - 15, 2017
      Nevada, Las Vegas

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)6
      • Downloads (Last 6 weeks)1
      Reflects downloads up to 19 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)A Game Theoretical Analysis of Non-linear Blockchain SystemDistributed Ledger Technologies: Research and Practice10.1145/36071953:1(1-24)Online publication date: 18-Mar-2024
      • (2024)A General Blockchain-Based Automatic Audit Scheme For Proofs Of RetrievabilityThe Computer Journal10.1093/comjnl/bxae00167:6(2219-2229)Online publication date: 27-Jan-2024
      • (2023)Review and Development of a Scalable Lightweight Blockchain Integrated Model (LightBlock) for IoT ApplicationsElectronics10.3390/electronics1204102512:4(1025)Online publication date: 18-Feb-2023
      • (2023)Lightweight blockchain solutions: Taxonomy, research progress, and comprehensive reviewInternet of Things10.1016/j.iot.2023.10098424(100984)Online publication date: Dec-2023
      • (2021)A Game Theoretical Analysis of Non-Linear Blockchain SystemProceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3463952.3463995(323-331)Online publication date: 3-May-2021
      • (2021)A Game Theoretical Analysis of Non-Linear Blockchain SystemProceedings of the 20th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3461017.3461059(323-331)Online publication date: 3-May-2021
      • (2021)BLWN: Blockchain-Based Lightweight Simplified Payment Verification in IoT-Assisted e-HealthcareIEEE Systems Journal10.1109/JSYST.2020.296861415:1(134-145)Online publication date: Mar-2021
      • (2021)LOPE: A Low‐Overhead Payment Verification Method for BlockchainsChinese Journal of Electronics10.1049/cje.2021.02.00830:2(349-358)Online publication date: Mar-2021
      • (2020)Generic Superlight Client for Permissionless BlockchainsComputer Security – ESORICS 202010.1007/978-3-030-59013-0_35(713-733)Online publication date: 13-Sep-2020
      • (2020)Coded Merkle Tree: Solving Data Availability Attacks in BlockchainsFinancial Cryptography and Data Security10.1007/978-3-030-51280-4_8(114-134)Online publication date: 18-Jul-2020

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media