Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version)

2Citations
Citations of this article
8Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Blockchains, that are essentially distributed public ledgers, are extremely popular nowadays and are being used for many applications. One of the more common uses is for crypto-currencies, where they serve as a structure to store all the transactions publicly, securely, and hopefully irreversibly. Blockchains can be permissionless, where everyone can join and potentially contribute the blockchain, and permissioned, where only a few members (usually, much less than a permissionless blockchain) can push new transactions to the chain. While both approaches have their advantages and disadvantages, we will focus on a weakness of permissioned blockchains. The known boundary on the number of faulty participants − up to f for$$3f+1$$ participants − may be surpassed, causing the BFT algorithm to fail. A situation where a malicious adversary compromises/corrupts enough nodes to harm the blockchain may lead to the complete corruption of the ledger and even to the destruction of ledger copies the nodes hold. We will suggest a solution for the reconstruction of the blockchain in the event of such an attack. Our solution will include a mandatory publication of additional information by the private users when submitting transactions and will require them to store their transaction history. We will present a technique, using verifiable secret sharing (VSS), that will make our solution trust-less, immediate and per-user independent. Our technique will prevent the private user from lying, by making such an act enable the possible exposure of the user’s secret key.

Cite

CITATION STYLE

APA

Dolev, S., & Liber, M. (2020). Toward Self-stabilizing Blockchain, Reconstructing Totally Erased Blockchain (Preliminary Version). In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 12161 LNCS, pp. 175–192). Springer. https://doi.org/10.1007/978-3-030-49785-9_12

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free