Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 6/2022

01-09-2022

Scaling proof-of-authority protocol to improve performance and security

Authors: Xiaohua Wu, Jinpeng Chang, Hongji Ling, Xueqi Feng

Published in: Peer-to-Peer Networking and Applications | Issue 6/2022

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Following the widespread application of blockchain, a variety of consensus protocols have been proposed recently for different scenarios. Proof of Authority (PoA) is a newly proposed Byzantine Fault Tolerant (BFT) consensus protocol for permissioned blockchains. It relies on a set of trusted nodes to generate blocks and adopts the longest-chain rule to reach consensus. However, the protocol suffers from performance and security issues due to its simple design. This paper proposes CoPoA, a novel proof-of-authority protocol that aims to improve performance and security. In terms of performance, we allow all authority nodes to generate blocks concurrently and process all types of blocks to improve throughput and feedback their blockchain information to the rest of the nodes on time to provide fast confirmation. In terms of security, we select the leader by a random number and set a tight confirmation boundary to protect the protocol from attack. We make a theoretical analysis to prove the safety and liveness properties of the protocol and demonstrate its performance through a prototype implementation and multiple tests. In our experiments, when the number of authority nodes is 9, CoPoA achieves 2x throughput improvement and 5x latency reduction compared to the original PoA protocol.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 21260 Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 21260
2.
go back to reference Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652CrossRef Lashkari B, Musilek P (2021) A comprehensive review of blockchain consensus mechanisms. IEEE Access 9:43620–43652CrossRef
3.
go back to reference Bhushan B, Sinha P, Sagayam KM, Andrew J (2021) Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Comput Electr Eng 90:106897 Bhushan B, Sinha P, Sagayam KM, Andrew J (2021) Untangling blockchain technology: A survey on state of the art, security threats, privacy services, applications and future research directions. Comput Electr Eng 90:106897
4.
go back to reference Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR, Maddikunta PKR, Fang F, Pathirana PN (2022) A survey on blockchain for big data: approaches, opportunities, and future directions. Future Gener Comput Syst Deepa N, Pham QV, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR, Maddikunta PKR, Fang F, Pathirana PN (2022) A survey on blockchain for big data: approaches, opportunities, and future directions. Future Gener Comput Syst
5.
go back to reference Chen Y, Lu Y, Bulysheva L, Kataev MY (2022) Applications of blockchain in industry 4.0: A review. Inf Syst Front 1–15 Chen Y, Lu Y, Bulysheva L, Kataev MY (2022) Applications of blockchain in industry 4.0: A review. Inf Syst Front 1–15
6.
go back to reference Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys & Tutorials 22(2), 1432–1465CrossRef Xiao Y, Zhang N, Lou W, Hou YT (2020) A survey of distributed consensus protocols for blockchain networks. IEEE Communications Surveys & Tutorials 22(2), 1432–1465CrossRef
7.
go back to reference Rebello GAF, Camilo GF, Guimarães LC, de Souza LAC, Thomaz GA, Duarte OC (2021) A security and performance analysis of proof-based consensus protocols. Ann Telecommun 1–21 Rebello GAF, Camilo GF, Guimarães LC, de Souza LAC, Thomaz GA, Duarte OC (2021) A security and performance analysis of proof-based consensus protocols. Ann Telecommun 1–21
8.
go back to reference King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19(1) King S, Nadal S (2012) Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19(1)
10.
go back to reference Dhillon V, Metcalf D, Hooper M (2017) The hyperledger project. In: Blockchain enabled applications, Springer, pp 139–149 Dhillon V, Metcalf D, Hooper M (2017) The hyperledger project. In: Blockchain enabled applications, Springer, pp 139–149
11.
go back to reference De Angelis S, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2018) Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain De Angelis S, Aniello L, Baldoni R, Lombardi F, Margheri A, Sassone V (2018) Pbft vs proof-of-authority: Applying the cap theorem to permissioned blockchain
12.
go back to reference Ekparinya P, Gramoli V, Jourjon G (2020) The attack of the clones against proof-of-authority. In: Network and Distributed Systems Security (NDSS) Symposium Ekparinya P, Gramoli V, Jourjon G (2020) The attack of the clones against proof-of-authority. In: Network and Distributed Systems Security (NDSS) Symposium
13.
go back to reference Boneh D, Bonneau J, Bünz B, Fisch B (2018) Verifiable delay functions. In: Annual international cryptology conference, Springer, pp 757–788 Boneh D, Bonneau J, Bünz B, Fisch B (2018) Verifiable delay functions. In: Annual international cryptology conference, Springer, pp 757–788
14.
go back to reference Wesolowski B (2019) Efficient verifiable delay functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 379–407 Wesolowski B (2019) Efficient verifiable delay functions. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, pp 379–407
15.
go back to reference Shi E (2019) Analysis of deterministic longest-chain protocols. In: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), IEEE, pp 122–12213 Shi E (2019) Analysis of deterministic longest-chain protocols. In: 2019 IEEE 32nd Computer Security Foundations Symposium (CSF), IEEE, pp 122–12213
16.
go back to reference Samuel CN, Glock S, Verdier F, Guitton-Ouhamou P (2021) Choice of ethereum clients for private blockchain: Assessment from proof of authority perspective. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, pp 1–5 Samuel CN, Glock S, Verdier F, Guitton-Ouhamou P (2021) Choice of ethereum clients for private blockchain: Assessment from proof of authority perspective. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, pp 1–5
17.
go back to reference Alrubei S, Ball E, Rigelsford J (2021) Securing iot-blockchain applications through honesty-based distributed proof of authority consensus algorithm. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp 1–7 Alrubei S, Ball E, Rigelsford J (2021) Securing iot-blockchain applications through honesty-based distributed proof of authority consensus algorithm. In: 2021 International Conference on Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), IEEE, pp 1–7
18.
go back to reference Yang J, Dai J, Gooi HB, Nguyen H, Paudel A (2022) A proof-of-authority blockchain based distributed control system for islanded microgrids. IEEE Transactions on Industrial Informatics Yang J, Dai J, Gooi HB, Nguyen H, Paudel A (2022) A proof-of-authority blockchain based distributed control system for islanded microgrids. IEEE Transactions on Industrial Informatics
19.
go back to reference Pass R, Shi E (2017) Fruitchains: A fair blockchain. In: Proceedings of the ACM symposium on principles of distributed computing, pp 315–324 Pass R, Shi E (2017) Fruitchains: A fair blockchain. In: Proceedings of the ACM symposium on principles of distributed computing, pp 315–324
20.
go back to reference Martino W, Quaintance M, Popejoy S (2018) Chainweb: A proof-of-work parallel-chain architecture for massive throughput. Chainweb Whitepaper 19 Martino W, Quaintance M, Popejoy S (2018) Chainweb: A proof-of-work parallel-chain architecture for massive throughput. Chainweb Whitepaper 19
21.
go back to reference Bagaria V, Kannan S, Tse D, Fanti G, Viswanath P (2019) Prism: Deconstructing the blockchain to approach physical limits. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 585–602 Bagaria V, Kannan S, Tse D, Fanti G, Viswanath P (2019) Prism: Deconstructing the blockchain to approach physical limits. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp 585–602
22.
go back to reference Yu H, Nikolić I, Hou R, Saxena P (2020) Ohie: Blockchain scaling made simple. In: 2020 IEEE Symposium on Security and Privacy (SP), IEEE, pp 90–105 Yu H, Nikolić I, Hou R, Saxena P (2020) Ohie: Blockchain scaling made simple. In: 2020 IEEE Symposium on Security and Privacy (SP), IEEE, pp 90–105
23.
go back to reference Stathakopoulou C, David T, Pavlovic M, Vukolić M (2021) Mir-bft: High-throughput robust bft for decentralized networks. arXiv preprint arXiv:190605552v3 Stathakopoulou C, David T, Pavlovic M, Vukolić M (2021) Mir-bft: High-throughput robust bft for decentralized networks. arXiv preprint arXiv:​190605552v3
24.
go back to reference Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OsDI 99:173–186 Castro M, Liskov B et al (1999) Practical byzantine fault tolerance. OsDI 99:173–186
25.
go back to reference Crain T, Natoli C, Gramoli V (2021) Red belly: A secure, fair and scalable open blockchain. In: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, pp 466–483 Crain T, Natoli C, Gramoli V (2021) Red belly: A secure, fair and scalable open blockchain. In: 2021 IEEE Symposium on Security and Privacy (SP), IEEE, pp 466–483
26.
go back to reference Hu K, Guo K, Tang Q, Zhang Z, Cheng H, Zhao Z (2021) Leopard: Scaling bft without sacrificing efficiency. arXiv preprint arXiv:210608114 Hu K, Guo K, Tang Q, Zhang Z, Cheng H, Zhao Z (2021) Leopard: Scaling bft without sacrificing efficiency. arXiv preprint arXiv:​210608114
27.
go back to reference Dwork C, Lynch N, Stockmeyer L (1988) Consensus in the presence of partial synchrony. Journal of the ACM (JACM) 35(2):288–323MathSciNetCrossRef Dwork C, Lynch N, Stockmeyer L (1988) Consensus in the presence of partial synchrony. Journal of the ACM (JACM) 35(2):288–323MathSciNetCrossRef
28.
go back to reference Bernstein DJ, Duif N, Lange T, Schwabe P, Yang BY (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77–89CrossRefMATH Bernstein DJ, Duif N, Lange T, Schwabe P, Yang BY (2012) High-speed high-security signatures. J Cryptogr Eng 2(2):77–89CrossRefMATH
29.
go back to reference NIST U (2001) Descriptions of sha-256, sha-384 and sha-512 NIST U (2001) Descriptions of sha-256, sha-384 and sha-512
Metadata
Title
Scaling proof-of-authority protocol to improve performance and security
Authors
Xiaohua Wu
Jinpeng Chang
Hongji Ling
Xueqi Feng
Publication date
01-09-2022
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 6/2022
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-022-01371-y

Other articles of this Issue 6/2022

Peer-to-Peer Networking and Applications 6/2022 Go to the issue

Premium Partner