ABSTRACT
The goal of this paper is to clarify common misconceptions regarding the blockchain technology, and pointing out some worrisome practices in the field of blockchain technology. We first provide a brief introduction of the blockchain technology, highlighting its design principle, nuts and bolts, and the most fundamental innovation of the technology. Next, we elaborate on a key concept regarding data immutability. In particular, it is a mistake to equate blockchain to data immutability. Data immutability can only be achieved in large-scale public blockchains where the cost becomes an insurmountable barrier for any attempt to change the data recorded in the blockchain. The third topic we discuss is the differences between public, private, and consortium blockchains. We caution the use of private and consortium blockchains. The last topic we argue is regarding blockchain consensus. Because the proof of work (PoW) consensus algorithm has obvious drawbacks on energy consumption, many alternative algorithms have been proposed. We single out two most egregious wrong practices: (1) selecting a small set of validators for reaching consensus, and (2) adopting traditional distributed consensus.
- Elham Akbari, Qing Wu, Wenbing Zhao, Hamid R Arabnia, and Mary Qu Yang. 2017. From Blockchain to Internet-Based Voting. In Proceedings of the International Conference on Computational Science and Computational Intelligence (CSCI). IEEE, Las Vegas, NV, 218–221.Google ScholarCross Ref
- Elham Akbari, Wenbing Zhao, Shunkun Yang, and Xiong Lou. 2020. The impact of block parameters on the throughput and security of blockchains. In Proceedings of the 2020 International Conference on Blockchain Technology. ACM, New York, NY, 13–18.Google ScholarDigital Library
- Andreas M Antonopoulos. 2017. Mastering bitcoin: Programming the open blockchain. O’Reilly Media, Inc., Sebastopol, CA.Google Scholar
- Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. 2016. Cryptocurrencies without proof of work. In International conference on financial cryptography and data security. Springer, Barbados, 142–157.Google ScholarCross Ref
- Vitalik Buterin 2013. Ethereum white paper. https://ethereum.org/en/whitepaper/.Google Scholar
- Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. (2017).Google Scholar
- Miguel Castro and Barbara Liskov. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Transactions on Computer Systems (TOCS) 20, 4 (2002), 398–461.Google ScholarDigital Library
- Quynh Dang. 2015. Secure Hash Stadard. https://doi.org/10.6028/NIST.FIPS.180-4 Federal Inf. Process. Stds.Google ScholarCross Ref
- Michael J Fischer, Nancy A Lynch, and Michael S Paterson. 1985. Impossibility of distributed consensus with one faulty process. Journal of the ACM (JACM) 32, 2 (1985), 374–382.Google ScholarDigital Library
- Darrel Hankerson, Alfred J Menezes, and Scott Vanstone. 2006. Guide to elliptic curve cryptography. Springer Science & Business Media, Berlin.Google ScholarDigital Library
- Don Johnson, Alfred Menezes, and Scott Vanstone. 2001. The elliptic curve digital signature algorithm (ECDSA). International journal of information security 1, 1 (2001), 36–63.Google ScholarDigital Library
- Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A provably secure proof-of-stake blockchain protocol. In Annual International Cryptology Conference. Springer, Berlin, 357–388.Google ScholarCross Ref
- Leslie Lamport 2001. Paxos made simple. ACM Sigact News 32, 4 (2001), 18–25.Google Scholar
- Ralph C Merkle. 1987. A digital signature based on a conventional encryption function. In Conference on the theory and application of cryptographic techniques. Springer-Verlag, Berlin, 369–378.Google Scholar
- Louise E Moser, Yair Amir, P Michael Melliar-Smith, and Deborah A Agarwal. 1994. Extended virtual synchrony. In 14th International Conference on Distributed Computing Systems. IEEE, Poznan, Poland, 56–65.Google ScholarCross Ref
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https://bitcoin.org/bitcoin.pdf.Google Scholar
- Johan Pouwelse, Paweł Garbacki, Dick Epema, and Henk Sips. 2005. The bittorrent p2p file-sharing system: Measurements and analysis. In International workshop on peer-to-peer systems. Springer, Berlin, 205–216.Google ScholarDigital Library
- Charles Rackoff and Daniel R Simon. 1991. Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack. In Annual International Cryptology Conference. Springer, Berlin, 433–444.Google Scholar
- Fabian Vogelsteller and Vitalik Buterin. 2015. EIP-20: Token Standard. https://eips.ethereum.org/EIPS/eip-20.Google Scholar
- Wenbo Wang, Dinh Thai Hoang, Peizhao Hu, Zehui Xiong, Dusit Niyato, Ping Wang, Yonggang Wen, and Dong In Kim. 2019. A survey on consensus mechanisms and mining strategy management in blockchain networks. IEEE Access 7(2019), 22328–22370.Google ScholarCross Ref
- Wenbing Zhao. 2016. Optimistic byzantine fault tolerance. International Journal of Parallel, Emergent and Distributed Systems 31, 3(2016), 254–267.Google ScholarDigital Library
- Wenbing Zhao. 2016. Performance optimization for state machine replication based on application semantics: a review. Journal of Systems and Software 112 (2016), 96–109.Google ScholarDigital Library
- Wenbing Zhao. 2021. From Traditional Fault Tolerance to Blockchain. John Wiley & Sons, Hoboken, NJ, USA.Google Scholar
- Wenbing Zhao, Congfeng Jiang, Honghao Gao, Shunkun Yang, and Xiong Luo. 2020. Blockchain-Enabled Cyber–Physical Systems: A Review. IEEE Internet of Things Journal 8, 6 (2020), 4023–4034.Google ScholarCross Ref
- Wenbing Zhao, Shunkun Yang, and Xiong Lou. 2020. Secure hierarchical processing and logging of sensing data and IoT events with blockchain. In Proceedings of the Int. Conf. on Blockchain Technology. ACM, New York, NY, 52–56.Google ScholarDigital Library
- Wenbing Zhao, Shunkun Yang, and Xiong Luo. 2019. On Consensus in Public Blockchains. In Proceedings of the 2019 International Conference on Blockchain Technology. ACM, New York, NY, 1–5.Google ScholarDigital Library
- Wenbing Zhao, Shunkun Yang, and Xiong Luo. 2020. On threat analysis of IoT-based systems: A survey. In Proceeding of the IEEE International Conference on Smart Internet of Things (SmartIoT). IEEE, Tianjian, China, 205–212.Google ScholarCross Ref
- Wenbing Zhao, Shunkun Yang, Xiong Luo, and Jiong Zhou. 2021. On PeerCoin Proof of Stake for Blockchain Consensus. In Proceedings of the 3rd International Conference on Blockchain Technology. ACM, New York, NY, 129–134.Google ScholarDigital Library
Recommendations
On PeerCoin Proof of Stake for Blockchain Consensus
ICBCT '21: Proceedings of the 2021 3rd International Conference on Blockchain TechnologyProof of Stake (PoS) has been talked about extensively as an alternative way of reaching consensus in blockchain systems. However, there are few publications on how PoS can be used to create new blocks in detail. The undisputed lead proponent for PoS is ...
On Consensus in Public Blockchains
ICBCT '19: Proceedings of the 2019 International Conference on Blockchain TechnologyIn this paper, we formulate the consensus problem and its solutions as seen in public blockchains and contrast them to those of the traditional distributed consensus. The Proof of Work (PoW) algorithm introduced in Bitcoin provides the first elegant and ...
Blockchain Technology in 5G Networks: Performance Comparison of Private and Public Blockchains
AbstractThe use of blockchain in 5G networks gives a number of opportunities to improve security, privacy, and quality of service. However, despite all its advantages, blockchain technology has a number of disadvantages associated with low performance and ...
Comments