2.793

                    2018影響因子

                    (CJCR)

                    • 中文核心
                    • EI
                    • 中國科技核心
                    • Scopus
                    • CSCD
                    • 英國科學文摘

                    留言板

                    尊敬的讀者、作者、審稿人, 關于本刊的投稿、審稿、編輯和出版的任何問題, 您可以本頁添加留言。我們將盡快給您答復。謝謝您的支持!

                    姓名
                    郵箱
                    手機號碼
                    標題
                    留言內容
                    驗證碼

                    Hyperledger Fabric共識機制優化方案

                    孟吳同 張大偉

                    孟吳同, 張大偉. Hyperledger Fabric共識機制優化方案. 自動化學報, 2020, 46(x): 1?14 doi: 10.16383/j.aas.c190516
                    引用本文: 孟吳同, 張大偉. Hyperledger Fabric共識機制優化方案. 自動化學報, 2020, 46(x): 1?14 doi: 10.16383/j.aas.c190516
                    Meng Wu-Tong, Zhang Da-Wei. Optimization scheme for hyperledger fabric consensus mechanism. Acta Automatica Sinica, 2020, 46(x): 1?14 doi: 10.16383/j.aas.c190516
                    Citation: Meng Wu-Tong, Zhang Da-Wei. Optimization scheme for hyperledger fabric consensus mechanism. Acta Automatica Sinica, 2020, 46(x): 1?14 doi: 10.16383/j.aas.c190516

                    Hyperledger Fabric共識機制優化方案

                    doi: 10.16383/j.aas.c190516
                    基金項目: 國家留學基金(201807095023)資助
                    詳細信息
                      作者簡介:

                      孟吳同:北京交通大學碩士研究生. 2017年獲得河北大學網絡工程學士學位. 主要研究方向為區塊鏈.E-mail: mengwt@bjtu.edu.cn

                      張大偉:北京交通大學計算機與信息技術學院副教授. 2004年于北京航空航天大學獲得通信與信息系統專業博士學位. 主要研究方向為區塊鏈, 安全協議, 可信計算. 本文通信作者.E-mail: dwzhang@bjtu.edu.cn

                    Optimization Scheme for Hyperledger Fabric Consensus Mechanism

                    Funds: Supported by China Scholarship Council (201807095023)
                    • 摘要: 針對Hyperledger Fabric使用固定背書節點處理交易所帶來的安全風險和性能瓶頸問題, 提出了一種非交互、可驗證的隨機化背書節點優化方案. 基于“背書-排序-驗證”的Hyperledger Fabric共識模型, 引入背書節點候選集, 使用可驗證隨機函數隨機抽取背書節點進行交易背書, 實現了可驗證情況下背書節點的非交互式隨機選取和背書過程的并行處理. 分析和實驗表明, 優化后的共識機制具有更高的安全性和更快的交易處理速度.
                    • 圖  1  Hyperledger Fabric共識機制示意圖

                      Fig.  1  Diagrammatic sketch of hyperledger fabric consensus mechanism parameters

                      圖  2  優化后的Hyperledger Fabric共識機制

                      Fig.  2  Diagrammatic sketch of optimized hyperledger fabric consensus mechanism

                      圖  3  敵手攻擊成功的概率

                      Fig.  3  Probability of successful enemy attack consensus mechanism

                      圖  4  實驗網絡拓撲圖

                      Fig.  4  Network topology of experiment

                      圖  5  原有方案與優化方案交易時間對比

                      Fig.  5  The comparison of transaction time between original scheme and optimized scheme

                      圖  6  原有方案與優化方案交易延遲對比

                      Fig.  6  The comparison of transaction delay between original scheme and optimized scheme

                      圖  7  原有方案與優化方案交易成本對比

                      Fig.  7  The comparison of transaction delay between original plan and optimization scheme

                      表  1  優化方案與其他共識機制的對比

                      Table  1  Comparison of optimization schemes with other consensus mechanisms

                      共識機制 VRF的作用 共識原理 資源消耗 容錯能力
                      Algorand 出塊節點的選取 VRF+PBFT $3f+1$
                      Definity 出塊節點的選取 VRF+PoS 較高 $2f+1$
                      Ouroboros Praos 出塊節點的選取 VRF+PoS 較高 $2f+1$
                      優化方案 背書節點的選取 VRF+背書+排序+驗證 F($m,t$)
                      下載: 導出CSV

                      表  2  無背書節點情況發生次數

                      Table  2  Frequency of nonoccurence of endorsing peer

                      交易次數 敵手成功次數 攻擊成功概率
                      原始方案 1000 1000 100%
                      優化方案 100000 686 6.86%
                      下載: 導出CSV

                      表  3  無背書節點情況發生次數

                      Table  3  Frequency of nonoccurence of endorsing peer

                      交易次數 是否使用計時重傳 無背書節點情況發生次數
                      1000 2
                      100000 17
                      1000 0
                      100000 0
                      下載: 導出CSV

                      表  4  可驗證隨機函數各部分算法運行時間

                      Table  4  Running time of each part of the vrf algorithm

                      算法 次數 總時間(ms) 平均時間(ms)
                      生成密鑰 10000 2878.3546 0.2878
                      生成隨機數和證明 10000 10395.3927 1.0395
                      驗證隨機數和證明 10000 12874.6190 1.2875
                      下載: 導出CSV
                      360彩票
                    • [1] Nakamoto S. Bitcoin: a peer-to-peer electronic cash system[Online], available: https://bitcoin.org/bitcoin.pdf, December 17, 2019
                      [2] 劉敖迪, 杜學繪, 王娜, 李少卓. 區塊鏈技術及其在信息安全領域的研究進展. 軟件學報, 2018, 29(7): 2092?2115

                      2 Liu Ao-Di, Du Xue-Hui, Wang Na, Li Shao-Zhuo. Research progress of blockchain technology and its application in information security. Journal of Software, 2018, 29(7): 2092?2115
                      [3] 韓璇, 袁勇, 王飛躍. 區塊鏈安全問題:研究現狀與展望. 自動化學報, 2019, 45(1): 206?225

                      3 Han Xuan, Yuan Yong, Wang Fei-Yue. Security problems on blockchain: the state of the art and future trends. Acta Automatica Sinica, 2019, 45(1): 206?225
                      [4] 4 Nguyen G T, Kim K. A survey about consensus algorithms used in blockchain. Journal of Information Processing Systems, 2018, 14(1): 101?128
                      [5] Elli A, Artem B, Vita B, Christian C, Konstantinos C, Angelo D. Hyperledger Fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference. Porto, Portugal: ACM, 2018. 30
                      [6] Vukoli? M. Rethinking permissioned blockchains. In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts. Abu Dhabi, United Arab Emirates: ACM, 2017. 3−7
                      [7] Bessani A, Sousa J, Vukoli? M. A byzantine fault-tolerant ordering service for the Hyperledger Fabric blockchain platform. In: Proceedings of The Workshop on Scalable & Resilient Infrastructures for Distributed Ledgers. Luxembourg City, Luxembourg: IEEE, 2018. 51−58
                      [8] 袁勇, 王飛躍. 區塊鏈技術發展現狀與展望. 自動化學報, 2016, 42(4): 481?494

                      8 Yuan Yong, Wang Fei-Yue. Blockchain: The state of the art and future trends. Acta Automatica Sinica, 2016, 42(4): 481?494
                      [9] Bach L M, Mihaljevic B, Zagar M. Comparative analysis of blockchain consensus algorithms In: Proceedings of 2018 41st International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO). Opatija, Croatia: IEEE, 2018. 1545−1550
                      [10] 10 Lamport L, Shostak R, Pease M. The byzantine generals problem. Acm Transactions on Programming Languages & Systems, 1982, 4(3): 382?401
                      [11] 11 Lamport L. Paxos made simple. ACM Sigact News, 2001, 32(4): 18?25
                      [12] Ongaro D, Ousterhout J. In search of an understandable consensus algorithm. In: Proceedings of Usenix Conference on Usenix Technical Conference. Philadelphia, PA, USA: ACM, 2014. 305−319
                      [13] 范捷, 易樂天, 舒繼武. 拜占庭系統技術研究綜述. 軟件學報, 2013, 24(6): 1346?1360

                      13 Fan Jie, Yi Le-Tian, Shu Ji-Wu. Research on the technologies of byzantine system. Journal of Software, 2013, 24(6): 1346?1360
                      [14] Castro M, Liskov B. Practical byzantine fault tolerance. In: Proceedings of the third Symposium on Operating Systems Design and Implementation. New Orleans, Louisiana, USA: OSDI, 1999.173−186
                      [15] 袁勇, 倪曉春, 曾帥, 王飛躍. 區塊鏈共識算法的發展現狀與展望. 自動化學報, 2018, 44(11): 2011?2022

                      15 Yuan Yong, Ni Xiao-Chun, Zeng Shuai, Wang Fei-Yue. Blockchain consensus algorithms: the state of the art and future trends. Acta Automatica Sinica, 2018, 44(11): 2011?2022
                      [16] Bentov I, Lee C, Mizrahi A, Rosenfeld M. Proof of activity: extending bitcoin's proof of work via proof of stake.[Online], available: http://eprint.iacr.org/2014/452, December 16, 2019
                      [17] S. King and S. Nadal. PPCoin: peer-to-peer crypto-currency with proofof-stake(whitepaper), available: https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf, December 17, 2019
                      [18] Li W, Andreina S, Bohli J M, Karame G. Securing proof-of-stake blockchain protocols. In: Proceedings of Cryptocurrencies and Blockchain Technology.Barcelona, Spain: Springer, 2017. 297−315
                      [19] Bitshares. Delegated proof of stake[Online], available: https://docs.bitshares.org/en/master/technology/dpos.html, December 17, 2019
                      [20] Silvio M, Salil V, Michael R. Verifiable random functions. In: 40th Annual Symposium on Foundations of Computer Science. New York, USA : IEEE, 1999. 120−130
                      [21] Abdalla M, Catalano D, Fiore D. Verifiable random functions from identity-based key encapsulation. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Cologne, Germany: Springer, 2009.554−571
                      [22] Gilad Y, Hemo R, Micali S, Vlachos G, Zeldovich K. Algorand: scaling byzantine agreements for cryptocurrencies. In: Proceedings of the 26th Symposium on Operating Systems Principles. Shanghai, China: ACM, 2017.51−68
                      [23] Hanke T, Movahedi M, Williams D. Dfinity technology overview series, consensus system. arXiv preprint arXiv: 2018, 1805.04548
                      [24] Boneh D, Boyen X. Short signatures without random oracles. In: Proceedings of International conference on the theory and applications of cryptographic techniques. Interlaken, Switzerland: Springer, 2004. 56−73
                      [25] Kiayias A, Russell A, David B, Oliynykov R. Ouroboros: a provably secure proof-of-stake blockchain protocol. In: Proceedings of Annual International Cryptology Conference. Paris, France: Springer, 2017.357−388
                      [26] David B, Ga?i P, Kiayias A, Russell A. Ouroboros Praos: an adaptively-secure, semi-synchronous proof-of-stake blockchain. In: Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Tel Aviv, Israel: Springer, 2018. 66−98.
                      [27] Hearn M. Corda: A distributed ledger[Online], available: https://docs.corda.net/releases/release-V3.1/-\\static/corda-technical-whitepaper.pdf, December 17, 2019
                      [28] Yamashita K, Nomura Y, Zhou E, Pi B, Jun S. Potential risks of Hyperledger Fabric smart contracts. In: Proceedings of 2019 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE). Hangzhou, China: IEEE, 2019. 1−10
                      [29] 29 Manevich Y, Barger A, Tock Y. Endorsement in Hyperledger Fabric via service discovery. IBM Journal of Research and Development, 2019, 63(2): 1?9
                      [30] Brandenburger M, Cachin C, Kapitza R, Sorniotti A. blockchain and trusted computing: problems, pitfalls, and a solution for Hyperledger Fabric. arXiv preprint arXiv, 2018, 1805.08541
                      [31] Sukhwani H, Wang N, Trivedi K S, Rindos A. performance modeling of Hyperledger Fabric (permissioned blockchain network). In: Proceedings of 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). Cambridge, MA, USA: IEEE, 2018.1−8
                      [32] Sukhwani H, Martínez J M, Chang X, Trivedi K, Rindos A. Performance modeling of pbft consensus process for permissioned blockchain network (hyperledger fabric).In: Proceedings of 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS). Hong Kong, China: IEEE, 2017. 253−255
                      [33] Baliga A, Solanki N, Verekar S, Pednekar A, Kamat P, Chatterjee S. Performance characterization of Hyperledger Fabric. In: Proceedings of 2018 Crypto Valley Conference on Blockchain Technology (CVCBT). Zug, Switzerland: IEEE, 2018. 65−74.
                      [34] Goldberg S, Reyzin L, Papadopoulos D, Vcelak J. Verifiable random functions (VRFs)[Online], available: https://datatracker.ietf.org/doc/draft-irtf-cfrg-vrf/, February 08, 2019
                      [35] Boneh D, Lynn B, Shacham H. Short signatures from the Weil pairing. In: Proceedings of International Conference on the Theory and Application of Cryptology and Information Security. Gold Coast, Australia: Springer, 2001. 514−532
                      [36] 36 Carter J L, Wegman M N. Universal classes of hash functions. Journal of computer and system sciences, 1979, 18(2): 143?154 doi: 10.1016/0022-0000(79)90044-8
                      [37] Nguyen T S L, Jourjon G, Potop-Butucaru M, Thai K L. Impact of network delays on Hyperledger Fabric. arXiv preprint arXiv: 2019. 1903.08856
                    • 加載中
                    計量
                    • 文章訪問數:  2365
                    • HTML全文瀏覽量:  1898
                    • 被引次數: 0
                    出版歷程
                    • 收稿日期:  2019-07-07
                    • 錄用日期:  2019-12-15
                    • 網絡出版日期:  2020-01-20

                    目錄

                      /

                      返回文章
                      返回