skip to main content
10.1145/3282278.3282283acmconferencesArticle/Chapter ViewAbstractPublication PagessensysConference Proceedingsconference-collections
research-article

RDV: An Alternative To Proof-of-Work And A Real Decentralized Consensus For Blockchain

Published:04 November 2018Publication History

ABSTRACT

A blockchain is a decentralized ledger where all transactions are recorded. For having a reliable blockchain and double-spending prevention, we need a decentralized consensus and agreement on a blockchain. Bitcoin uses proof-of-work (PoW). It is a cryptographic puzzle that is difficult to solve but easy to verify. However, because of significant latency of proof-of-work for transactions confirmation, this consensus mechanism is vulnerable against double-spending. On the other hand, PoW consumes a significant amount of energy that by growing the network, it becomes a major problematic of this consensus mechanism. In this paper, we introduce an alternative to PoW, because of all its major problems and security issues that may lead to collapsing decentralization of the blockchain, while a full decentralized system is the main purpose of using blockchain technology. The approach we introduce is based on a distributed voting process and called "RDV: Register, Deposit, Vote". Since in RDV algorithm, there is no mining process, so it is appropriate for low-level energy devices and Internet of Things (IoT).

References

  1. Nakamoto, Satoshi. "Bitcoin: A peer-to-peer electronic cash system." Consulted 1.2012 (2008): 28Google ScholarGoogle Scholar
  2. Bonneau, Joseph, et al. "Sok: Research perspectives and challenges for bitcoin and cryptocurrencies." 2015 IEEE Symposium on Security and Privacy. IEEE, 2015 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Bamert, Tobias, et al. "Have a snack, pay with Bitcoins." Peer-to-Peer Computing (P2P), 2013 IEEE Thirteenth International Conference on. IEEE, 2013Google ScholarGoogle Scholar
  4. G. O. Karame, E. Androulaki, S. Capkun, Double-spending fast payments in bitcoin, in: Proceedings of the ACM conference on Computer and communications security, 2012, pp. 906--917. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Eyal, Ittay. "The miner's dilemma." Security and Privacy (SP), 2015 IEEE Symposium on. IEEE, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Eyal, Ittay, and Emin Gün Sirer. "Majority is not enough: Bitcoin mining is vulnerable." Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014. 436--454Google ScholarGoogle Scholar
  7. Solat, Siamak, and Maria Potop-Butucaru. "Brief announcement: Zeroblock: Time stamp-free prevention of block-withholding attack in bitcoin." International Symposium on Stabilization, Safety, and Security of Distributed Systems. Springer, Cham, 2017Google ScholarGoogle Scholar
  8. Heilman, Ethan. "One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner." (2014)Google ScholarGoogle Scholar
  9. Heilman, Ethan. "One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner." International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014.Google ScholarGoogle Scholar
  10. Kroll, Joshua A., Ian C. Davey, and Edward W. Felten. "The economics of Bitcoin mining, or Bitcoin in the presence of adversaries." Proceedings of WEIS. Vol. 2013. 2013Google ScholarGoogle Scholar
  11. Luu, Loi, et al. "On power splitting games in distributed computation: The case of bitcoin pooled mining." Computer Security Foundations Symposium (CSF), 2015 IEEE 28th. IEEE, 2015 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Bahack, Lear. "Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)." arXiv preprint arXiv:1312.7013 (2013)Google ScholarGoogle Scholar
  13. de Vries, Alex. "Bitcoin's Growing Energy Problem." Joule 2.5 (2018): 801--805Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. RDV: An Alternative To Proof-of-Work And A Real Decentralized Consensus For Blockchain

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          BlockSys '18: Proceedings of the 1st Workshop on Blockchain-enabled Networked Sensor Systems
          November 2018
          38 pages
          ISBN:9781450360500
          DOI:10.1145/3282278

          Copyright © 2018 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 November 2018

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article
          • Research
          • Refereed limited

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader