Paper
8 April 2024 An efficient consensus algorithm based on proxy signature of SM2
Yaning Du, Haibo Yi, Yujun Zhang, Xiaomeng Hu
Author Affiliations +
Proceedings Volume 13090, International Conference on Computer Application and Information Security (ICCAIS 2023); 130902L (2024) https://doi.org/10.1117/12.3026135
Event: International Conference on Computer Application and Information Security (ICCAIS 2023), 2023, Wuhan, China
Abstract
Blockchain technology is a distributed ledger technology that can be employed to safeguard user privacy and ensure the integrity of data, thereby enhancing information security. Traditional algorithms, such as Raft, have been criticized for their limited ability to provide sufficient Byzantine Fault Tolerance (BFT) and vote splitting in this context. To overcome these issues, PS-Raft relies on three key innovations. Firstly, it limits the number of potential Candidates by carefully selecting nodes based on their communication conditions. Secondly, it utilizes an SM2-based proxy signature algorithm to verify the legitimacy of Candidate and Leader identities. Lastly, during term replacement and log replication, it ensures the honesty of Leader by verifying log data. We conducted a local cluster simulation that compared the performance of PS-Raft and Raft consensus algorithms. The results of experiment demonstrate that PS-Raft effectively screens and defends against Byzantine nodes while maintaining comparable overall performance to Raft. This improves hardware and time efficiency for Byzantine nodes attempting to implement such attacks. Furthermore, the PS-Raft algorithm significantly reduces the election time and resolves the problem of vote splitting.
(2024) Published by SPIE. Downloading of the abstract is permitted for personal use only.
Yaning Du, Haibo Yi, Yujun Zhang, and Xiaomeng Hu "An efficient consensus algorithm based on proxy signature of SM2", Proc. SPIE 13090, International Conference on Computer Application and Information Security (ICCAIS 2023), 130902L (8 April 2024); https://doi.org/10.1117/12.3026135
Advertisement
Advertisement
RIGHTS & PERMISSIONS
Get copyright permission  Get copyright permission on Copyright Marketplace
KEYWORDS
Blockchain

Evolutionary algorithms

Network security

Tolerancing

Resistance

Algorithm development

Computer simulations

Back to Top