Skip to main content
Top

2020 | OriginalPaper | Chapter

Chain of Antichains: An Efficient and Secure Distributed Ledger

Authors : Jinwook Lee, Paul Moon Sub Choi

Published in: Blockchain Technology for Smart Cities

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Since the inception of blockchain and Bitcoin (Nakamoto, Bitcoin: A peer-to-peer electronic cash system (2008) [18]), a decentralized-distributed ledger system and its associated cryptocurrency, respectively, the world has witnessed a slew of newer adaptations and applications. Although the original distributed ledger technology of blockchain is deemed secure and decentralized, the confirmation of transactions is inefficient by design. Recently adopted, some distributed ledgers based on a directed acyclic graph validate transactions efficiently without the physically and environmentally costly building process of blocks (Lerner, Dagcoin: a crytocurrency without blocks (2015) [17]). However, centrally-controlled confirmation against the odds of multiple validation disqualifies that newer system as a decentralized-distributed ledger. In this regard, we introduce an innovative distributed ledger system by reconstructing a chain of antichains based on a given partially ordered pool of transactions. Each antichain contains distinct nodes whose approved transactions are recursively validated by subsequently augmenting nodes. The boxer node closes the box and keeps the hash of all transactions confirmed by the box-genesis node. Designation of boxers and box-geneses is conditionally randomized for decentralization. The boxes are serially concatenated with recursive confirmation without incurring the cost of box generation. Rewards are paid to the contributing nodes of the ecosystem whose trust is built on the doubly-secure protocol of confirmation. A value-preserving medium of payment is among numerous practical applications discussed herein.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
A lightweight node (or light client) only references the full node’s copy with less required memory capacity and processing power.
 
2
Since the mining process (i.e., solving a partial hash inversion problem) is not required in this system, prohibitive computing equipment is not necessary for the full node, which only requires sufficient data storage capacity.
 
3
See Sect. 4 for the discussions and models of boxdollar.
 
4
See Sect. 2.4.3 for more details of the incentive system.
 
5
A rapid succession of the multiple transactions using different addresses is a typical way to attack the system. More details are discussed in Sect. 2.4.1.
 
Literature
1.
go back to reference Baird L (2016) Hashgraph consensus: fair, fast, byzantine fault tolerance. Swirlds tech report TR-2016-01 Baird L (2016) Hashgraph consensus: fair, fast, byzantine fault tolerance. Swirlds tech report TR-2016-01
2.
go back to reference Bowers NL Jr, Gerber HU, Hickman JC, Jones DA, Nesbitt CJ (1997) Actuarial Mathematics. The society of Actuaries, Schaumburg, IllinoisMATH Bowers NL Jr, Gerber HU, Hickman JC, Jones DA, Nesbitt CJ (1997) Actuarial Mathematics. The society of Actuaries, Schaumburg, IllinoisMATH
4.
go back to reference Dickson DCM (1995) A review of Panjer’s recursion formula and its applications. Brit Act J 1(1):107–124CrossRef Dickson DCM (1995) A review of Panjer’s recursion formula and its applications. Brit Act J 1(1):107–124CrossRef
6.
7.
go back to reference Fulkerson DR (1956) A note on Dilworth’s theorem for partially ordered sets. Proc Amer Math Soc 7:701MathSciNetMATH Fulkerson DR (1956) A note on Dilworth’s theorem for partially ordered sets. Proc Amer Math Soc 7:701MathSciNetMATH
8.
go back to reference Goodhart CAE (1989) Money, information and uncertainty, 2nd edn. Macmillan, LondonCrossRef Goodhart CAE (1989) Money, information and uncertainty, 2nd edn. Macmillan, LondonCrossRef
9.
go back to reference Greene C, Kleitman D (1976) The structure of Sperner \(k\)-family. J Comb Theory Ser A 20:80–88CrossRef Greene C, Kleitman D (1976) The structure of Sperner \(k\)-family. J Comb Theory Ser A 20:80–88CrossRef
10.
go back to reference Greenwood M, Yule GU (1920) An inquiry into the nature of frequency distributions representative of multiple happenings with particular reference to the occurrence of multiple attacks of disease or of repeated accidents. J R Stat Soc 83(2):255–279CrossRef Greenwood M, Yule GU (1920) An inquiry into the nature of frequency distributions representative of multiple happenings with particular reference to the occurrence of multiple attacks of disease or of repeated accidents. J R Stat Soc 83(2):255–279CrossRef
13.
go back to reference Kindleberger CP (2015) A financial history of Western Europe. Routledge Kindleberger CP (2015) A financial history of Western Europe. Routledge
14.
go back to reference Lee J (2017) Computing the probability of union in the \(n\)-dimensional Euclidean space for application of the multivariate quantile: \(p\)-level efficient points. Oper Res Lett 45:242–247MathSciNetCrossRef Lee J (2017) Computing the probability of union in the \(n\)-dimensional Euclidean space for application of the multivariate quantile: \(p\)-level efficient points. Oper Res Lett 45:242–247MathSciNetCrossRef
15.
go back to reference Lee J, Kim J, Prékopa A (2017) Extreme value estimation for a function of a random sample using binomial moment scheme and Boolean functions of events. Discrete Appl Math 219(11):210–218MathSciNetCrossRef Lee J, Kim J, Prékopa A (2017) Extreme value estimation for a function of a random sample using binomial moment scheme and Boolean functions of events. Discrete Appl Math 219(11):210–218MathSciNetCrossRef
20.
go back to reference Panjer H (1981) Recursive evaluation of a family of compound distributions. AST IN Bulletin 12:21–26MathSciNet Panjer H (1981) Recursive evaluation of a family of compound distributions. AST IN Bulletin 12:21–26MathSciNet
21.
go back to reference Panjer H, Lutek B (1983) Practical aspects of stop-loss calculations. Insur Math Econ 1:159–177MATH Panjer H, Lutek B (1983) Practical aspects of stop-loss calculations. Insur Math Econ 1:159–177MATH
22.
go back to reference Panjer H, Willmot GE (1986) Computational aspects of recursive evaluation of compound distributions. Insur Math Econ 5 113–116 Panjer H, Willmot GE (1986) Computational aspects of recursive evaluation of compound distributions. Insur Math Econ 5 113–116
23.
go back to reference Pflug GCH (2000) Some remarks on the value-at-risk and conditional value at risk. Prob Constrained Optim 272–281 Pflug GCH (2000) Some remarks on the value-at-risk and conditional value at risk. Prob Constrained Optim 272–281
24.
go back to reference Pflug GCH (1996) Optimization of stochastic models—the interface between simulation and optimization. Kluwer Academic Publishers Pflug GCH (1996) Optimization of stochastic models—the interface between simulation and optimization. Kluwer Academic Publishers
26.
go back to reference Prékopa A (1995) Stochastic programming. Kluwer Academic Publishers Prékopa A (1995) Stochastic programming. Kluwer Academic Publishers
27.
go back to reference Prékopa A (2003) Probabilistic programming. In: Ruszczyński A, Shapiro A (eds) Hand books in operations research and management science, vol 10, pp 267–351 Prékopa A (2003) Probabilistic programming. In: Ruszczyński A, Shapiro A (eds) Hand books in operations research and management science, vol 10, pp 267–351
29.
go back to reference Shapiro A, Dentcheva D, Ruszczyński A (2009) Lectures on stochastic programming: modeling and theory. SIAM and MPS, PhiladelphiaCrossRef Shapiro A, Dentcheva D, Ruszczyński A (2009) Lectures on stochastic programming: modeling and theory. SIAM and MPS, PhiladelphiaCrossRef
30.
go back to reference Smith A (1776) An inquiry into the wealth of nations. W. Strahan and T. Cadell, London Smith A (1776) An inquiry into the wealth of nations. W. Strahan and T. Cadell, London
31.
go back to reference Uryasev S, Rockafellar RT (2000) Optimization of conditional value at risk. J Risk 2:21–41CrossRef Uryasev S, Rockafellar RT (2000) Optimization of conditional value at risk. J Risk 2:21–41CrossRef
Metadata
Title
Chain of Antichains: An Efficient and Secure Distributed Ledger
Authors
Jinwook Lee
Paul Moon Sub Choi
Copyright Year
2020
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-15-2205-5_2

Premium Partner