{"title":"How to improve blockchain for blogosphere?","authors":"Sergiusz Slawczyk, Olga Siedlecka-Lamch","doi":"10.1109/Informatics57926.2022.10083488","DOIUrl":null,"url":null,"abstract":"The article presents the impact of the problem of Byzantine generals on the blockchain-based network on the example of the decentralised blogosphere. The oral message algorithm's implementation was tested and compared to the signed message algorithm adapted to the blogosphere example. The work showed that the problem of the Byzantine generals poses a significant threat to the correct operation of the network. However, it has also been proven that, based on authentication methods, it is possible to implement an algorithm that allows for the detection of fraud attempts and an appropriate reaction without the need for many recursive calls. A further research direction was also proposed - adapting the above algorithm to situations where not all servers will receive complete information from other nodes.","PeriodicalId":101488,"journal":{"name":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 IEEE 16th International Scientific Conference on Informatics (Informatics)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/Informatics57926.2022.10083488","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The article presents the impact of the problem of Byzantine generals on the blockchain-based network on the example of the decentralised blogosphere. The oral message algorithm's implementation was tested and compared to the signed message algorithm adapted to the blogosphere example. The work showed that the problem of the Byzantine generals poses a significant threat to the correct operation of the network. However, it has also been proven that, based on authentication methods, it is possible to implement an algorithm that allows for the detection of fraud attempts and an appropriate reaction without the need for many recursive calls. A further research direction was also proposed - adapting the above algorithm to situations where not all servers will receive complete information from other nodes.