Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

An Algorithm to Avoid Costless Attacks in Blockchain Consensus

A blockchain and algorithm technology, applied in the blockchain field, can solve problems such as malicious node attacks, long-range attacks, and data inconsistencies, and achieve the effect of strengthening certainty and improving processing performance

Inactive Publication Date: 2021-08-13
三亚京牛数字科技有限公司
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] It leads to forks in the entire network; at the same time, there are still a certain number of malicious nodes in the network. On any fork, there are miners who can produce blocks at no cost. At the same time, they will also face several common Possibility of long-range attacks
[0007] The bifurcation leads to inconsistency in the data saved by each node user, resulting in inconsistent and confusing information on the entire network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An Algorithm to Avoid Costless Attacks in Blockchain Consensus
  • An Algorithm to Avoid Costless Attacks in Blockchain Consensus
  • An Algorithm to Avoid Costless Attacks in Blockchain Consensus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to make the purpose, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be clearly and completely described below in conjunction with specific embodiments of the present invention and corresponding drawings.

[0024] In the description of the present invention, the certification center (CA—Certificate Authority), as an authoritative, reliable, and impartial third-party organization, is specially responsible for issuing and managing the digital certificates required by all entities participating in transactions on the chain. As an authority, it manages keys effectively, issues certificates to prove the validity of keys, and links public keys with certain entities (consumers, merchants, banks). It is responsible for generating, distributing and managing the digital certificates required by all parties involved in the exchange of information on the Internet, and is therefore at the heart of secur...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an algorithm for avoiding costless attacks in block chain consensus, including the following steps: node users detect the current block main chain; block miners produce the current block on the block main chain; other miners Waiting for a block generation period, waiting for the current block miner to produce the current block on the block main chain; other miners do not find the current block miner to produce the current block on the block main chain after the end of a single block production cycle, then all nodes The user re-selects the block miner of the backup block, and after waiting for one or more block generation cycles, the new block miner generates a backup block on the block main chain; before the next block of the backup block is generated, the backup The block miner of the next block of the block detects the current block main chain, that is, the fork of the block containing the block number with the largest value; if the fork where the backup block is located is the block main chain, the The fork where the block is located; if the fork where the backup block is located is not the main chain of the block, continue to produce blocks on the main chain of the block.

Description

technical field [0001] The invention relates to the technical field of block chains, in particular to an algorithm for avoiding costless attacks in block chain consensus. Background technique [0002] In a distributed network, due to the many nodes in the network and the inevitable communication delay in the network, nodes may experience complex situations such as downtime, failure, failure, etc., for example, the following situations: [0003] When a block of height r is produced, the block miner should be ID_Target r =Q r mod N, pity ID_Target r Due to network delay or malicious reservation of blocks by miners, the whole network fails to perceive the blocks in time. After waiting for the λ time period, the [0004] ID λ =hash(ID||λ||Sig r-1 ) [0005] miners will generate blocks, and at this time the network may face two forks. [0006] It leads to forks in the entire network; at the same time, there are still a certain number of malicious nodes in the network. On a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06G06Q20/38
Inventor 张亮周可曹辉宁周海汉
Owner 三亚京牛数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products