Weiquan Ni, Jiawen Kang, C. Maple, Zehui Xiong, Alia Asheralieva
{"title":"具有轻量级块验证器的快速安全联盟区块链","authors":"Weiquan Ni, Jiawen Kang, C. Maple, Zehui Xiong, Alia Asheralieva","doi":"10.1109/BCCA53669.2021.9656989","DOIUrl":null,"url":null,"abstract":"Due to advantages of moderate cost and easy deployment, consortium blockchains have been widely adopted in various commercial services and industrial applications. Nevertheless, because of limited number of miners, consortium blockchains are vulnerable to collusion attacks incurred by compromised block verifiers, i.e., miners verifying new blocks. To address this issue, edge devices acting as lightweight nodes can be recruited as lightweight block verifiers (LBVs) to verify the blocks together with typical miners. This increases the number of block verifiers, thereby enhancing blockchain security, but may result in a larger block verification delay. To tackle this dilemma, in this paper, we propose a computing resource management scheme to maximize the system utility related to users’ satisfaction with the blockchain services, which aims at jointly optimizing computing resources of miners and LBVs. We prove the existence and uniqueness of the optimal set of strategies of miners and LBVs, and then exploit Karush-Kuhn-Tucker (KKT) conditions to find these strategies. The numerical results demonstrate that, compared with existing schemes, the proposed scheme achieves secure block verification by involving LBVs with optimized block verification delay.","PeriodicalId":202582,"journal":{"name":"2021 Third International Conference on Blockchain Computing and Applications (BCCA)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-11-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fast and Secure Consortium Blockchains with Lightweight Block Verifiers\",\"authors\":\"Weiquan Ni, Jiawen Kang, C. Maple, Zehui Xiong, Alia Asheralieva\",\"doi\":\"10.1109/BCCA53669.2021.9656989\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Due to advantages of moderate cost and easy deployment, consortium blockchains have been widely adopted in various commercial services and industrial applications. Nevertheless, because of limited number of miners, consortium blockchains are vulnerable to collusion attacks incurred by compromised block verifiers, i.e., miners verifying new blocks. To address this issue, edge devices acting as lightweight nodes can be recruited as lightweight block verifiers (LBVs) to verify the blocks together with typical miners. This increases the number of block verifiers, thereby enhancing blockchain security, but may result in a larger block verification delay. To tackle this dilemma, in this paper, we propose a computing resource management scheme to maximize the system utility related to users’ satisfaction with the blockchain services, which aims at jointly optimizing computing resources of miners and LBVs. We prove the existence and uniqueness of the optimal set of strategies of miners and LBVs, and then exploit Karush-Kuhn-Tucker (KKT) conditions to find these strategies. The numerical results demonstrate that, compared with existing schemes, the proposed scheme achieves secure block verification by involving LBVs with optimized block verification delay.\",\"PeriodicalId\":202582,\"journal\":{\"name\":\"2021 Third International Conference on Blockchain Computing and Applications (BCCA)\",\"volume\":\"44 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-11-15\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 Third International Conference on Blockchain Computing and Applications (BCCA)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/BCCA53669.2021.9656989\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 Third International Conference on Blockchain Computing and Applications (BCCA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/BCCA53669.2021.9656989","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Fast and Secure Consortium Blockchains with Lightweight Block Verifiers
Due to advantages of moderate cost and easy deployment, consortium blockchains have been widely adopted in various commercial services and industrial applications. Nevertheless, because of limited number of miners, consortium blockchains are vulnerable to collusion attacks incurred by compromised block verifiers, i.e., miners verifying new blocks. To address this issue, edge devices acting as lightweight nodes can be recruited as lightweight block verifiers (LBVs) to verify the blocks together with typical miners. This increases the number of block verifiers, thereby enhancing blockchain security, but may result in a larger block verification delay. To tackle this dilemma, in this paper, we propose a computing resource management scheme to maximize the system utility related to users’ satisfaction with the blockchain services, which aims at jointly optimizing computing resources of miners and LBVs. We prove the existence and uniqueness of the optimal set of strategies of miners and LBVs, and then exploit Karush-Kuhn-Tucker (KKT) conditions to find these strategies. The numerical results demonstrate that, compared with existing schemes, the proposed scheme achieves secure block verification by involving LBVs with optimized block verification delay.