• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Wang Zuan, Tian Youliang, Yue Chaoyue, Zhang Duo. Consensus Mechanism Based on Threshold Cryptography Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2671-2683. DOI: 10.7544/issn1000-1239.2019.20190053
Citation: Wang Zuan, Tian Youliang, Yue Chaoyue, Zhang Duo. Consensus Mechanism Based on Threshold Cryptography Scheme[J]. Journal of Computer Research and Development, 2019, 56(12): 2671-2683. DOI: 10.7544/issn1000-1239.2019.20190053

Consensus Mechanism Based on Threshold Cryptography Scheme

More Information
  • Published Date: November 30, 2019
  • Aiming at the huge resource consumption, the bottleneck of the system performance and “tragedy of the commons” in the PoW(proof of work) consensus mechanism of bitcoin, we analyze the “tragedy of the commons” caused by only transaction fees rewarding in the later stage of the bitcoin system from the perspective of game theory and propose a consensus mechanism based on threshold cryptography (TCCM) in this paper. Firstly, the new consensus protocol introduces the idea of margin, and proposes a margin model based on threshold group signature theory. The model not only ensures the security of the margin, but also provides a guarantee for the node to honestly produce the block. Secondly, a bidding model of the right of accounting is also constructed using the idea of threshold encryption to generate a node that can produce the block. This model can guarantee the fairness of the bidding model environment and select the accounting node randomly. Then, a new incentive mechanism is redesigned based on the original block rewards so that more nodes can participate in the consensus process. Finally, the results of security and performance analysis show that TCCM not only effectively reduces the huge resource consumption, but also improves the transaction processing efficiency and makes the whole blockchain system more secure.
  • Related Articles

    [1]Sun Ying, Zhang Yuting, Zhuang Fuzhen, Zhu Hengshu, He Qing, Xiong Hui. Interpretable Salary Prediction Algorithm Based on Set Utility Marginal Contribution Learning[J]. Journal of Computer Research and Development, 2024, 61(5): 1276-1289. DOI: 10.7544/issn1000-1239.202330133
    [2]Zhang Yunjie, Zhang Xuan, Wang Xu, Ren Junmin, Tang Ziqi. A Qualitative Evaluation Approach for Requirement Change Technical Debt Based on Marginal Contribution[J]. Journal of Computer Research and Development, 2021, 58(1): 208-223. DOI: 10.7544/issn1000-1239.2021.20190459
    [3]Wu Liqiang, Yang Xiaoyuan, Zhang Minqing. Identity-Based Threshold Decryption Scheme from Lattices under the Standard Model[J]. Journal of Computer Research and Development, 2018, 55(10): 2164-2173. DOI: 10.7544/issn1000-1239.2018.20180446
    [4]Lu Yang and Li Jiguo. Efficient and Provably-Secure Certificate-Based Key Encapsulation Mechanism in the Standard Model[J]. Journal of Computer Research and Development, 2014, 51(7): 1497-1505.
    [5]Zhang Wenfang, Wang Xiaomin, He Dake. An Improved VCA Interaction Model for Virtual Enterprises Based on Threshold RSA Signature[J]. Journal of Computer Research and Development, 2012, 49(8): 1662-1667.
    [6]Long Yu, Xu Xian, Chen Kefei. Two Identity Based Threshold Cryptosystem with Reduced Trust in PKG[J]. Journal of Computer Research and Development, 2012, 49(5): 932-938.
    [7]Liu He, Zhang Xianghong, Liu Dayou, Li Yanjun, Yin Lijun. A Feature Selection Method Based on Maximal Marginal Relevance[J]. Journal of Computer Research and Development, 2012, 49(2): 354-360.
    [8]Fan Limin, Feng Dengguo, Zhou Yongbin. A Fuzzy-Based Randomness Evaluation Model for Block Cipher[J]. Journal of Computer Research and Development, 2008, 45(12): 2095-2101.
    [9]Peng Huaxi and Feng Dengguo. A Forward Secure Threshold Signature Scheme from Bilinear Pairing[J]. Journal of Computer Research and Development, 2007, 44(4): 574-580.
    [10]Ma Liang, Chen Qunxiu, and Cai Lianhong. An Improved Model for Adaptive Text Information Filtering[J]. Journal of Computer Research and Development, 2005, 42(1): 79-84.
  • Cited by

    Periodical cited type(8)

    1. 李晶,贾园园,张磊. MuSig多重签名的实用拜占庭容错共识算法. 计算机应用研究. 2025(02): 352-356 .
    2. 时小虎,姚鑫,孙延风,马德印. 基于贡献度和数据有效性检验的共识机制. 东北大学学报(自然科学版). 2024(02): 160-169+178 .
    3. 万林. 基于区块链技术的P2P网络分布式数字签名系统设计. 安徽水利水电职业技术学院学报. 2024(03): 43-48 .
    4. 唐淑敏,金瑜. 区块链中基于中国剩余定理投票方案的共识机制. 计算机应用. 2023(02): 458-466 .
    5. 张宝,田有亮,高胜. 基于博弈论抗共谋攻击的全局随机化共识算法. 网络与信息安全学报. 2022(04): 98-109 .
    6. 刘恒飞,张毅. 区块链技术及其应用. 福建电脑. 2021(01): 174-175 .
    7. 李杰,李雷孝,孔冬冬. 一种基于中文助记词的椭圆曲线密钥生成方案. 内蒙古工业大学学报(自然科学版). 2020(02): 128-135 .
    8. 张彭奕,宋杰. 区块链共识算法效能优化研究进展. 计算机科学. 2020(12): 296-303 .

    Other cited types(9)

Catalog

    Article views (1375) PDF downloads (677) Cited by(17)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return