Yizhong Liu, Jianwei Liu, Yiming Hei, W. Tan, Qianhong Wu
{"title":"无随机性分片区块链的安全分片重构协议","authors":"Yizhong Liu, Jianwei Liu, Yiming Hei, W. Tan, Qianhong Wu","doi":"10.1109/TrustCom50675.2020.00135","DOIUrl":null,"url":null,"abstract":"In permissionless blockchains, due to the corruption attack of an adversary, nodes participating the protocol need to be updated regularly. In the process of node selection and committee reconfiguration, there may exist some problems. First, a complicated secure randomness generation protocol is in need. Besides, an adversary might obtain a mining puzzle in advance and start mining in ahead of honest nodes. Moreover, an adversary usually has an advantage of network delay. In order to solve the above problems, we conduct the following research. Firstly, we propose a PoW solution withhold attack against PoW-based member selection methods. An adversary might withhold his mining results in an epoch to obtain the mining puzzle of the next epoch in advance of honest nodes. Secondly, a secure shard reconfiguration protocol is designed, which does not rely on any complicated randomness generation protocol. Our shard reconfiguration protocol is proved rigorously to be secure, which means that in each selected committee, the honest node fraction exceeds a predefined target value. Thirdly, we implement our shard reconfiguration protocol. By carefully setting related system parameters, our protocol could be applied easily to most sharding blockchains. To our best knowledge, the shard reconfiguration protocol proposed in this paper is the first protocol that could safely implement node selection and committee reconfiguration of a sharding blockchain without using a secure randomness, which greatly reduces the communication and time overhead caused by the generation of a randomness.","PeriodicalId":221956,"journal":{"name":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"3","resultStr":"{\"title\":\"A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness\",\"authors\":\"Yizhong Liu, Jianwei Liu, Yiming Hei, W. Tan, Qianhong Wu\",\"doi\":\"10.1109/TrustCom50675.2020.00135\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In permissionless blockchains, due to the corruption attack of an adversary, nodes participating the protocol need to be updated regularly. In the process of node selection and committee reconfiguration, there may exist some problems. First, a complicated secure randomness generation protocol is in need. Besides, an adversary might obtain a mining puzzle in advance and start mining in ahead of honest nodes. Moreover, an adversary usually has an advantage of network delay. In order to solve the above problems, we conduct the following research. Firstly, we propose a PoW solution withhold attack against PoW-based member selection methods. An adversary might withhold his mining results in an epoch to obtain the mining puzzle of the next epoch in advance of honest nodes. Secondly, a secure shard reconfiguration protocol is designed, which does not rely on any complicated randomness generation protocol. Our shard reconfiguration protocol is proved rigorously to be secure, which means that in each selected committee, the honest node fraction exceeds a predefined target value. Thirdly, we implement our shard reconfiguration protocol. By carefully setting related system parameters, our protocol could be applied easily to most sharding blockchains. To our best knowledge, the shard reconfiguration protocol proposed in this paper is the first protocol that could safely implement node selection and committee reconfiguration of a sharding blockchain without using a secure randomness, which greatly reduces the communication and time overhead caused by the generation of a randomness.\",\"PeriodicalId\":221956,\"journal\":{\"name\":\"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"volume\":\"1 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"3\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/TrustCom50675.2020.00135\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/TrustCom50675.2020.00135","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Secure Shard Reconfiguration Protocol for Sharding Blockchains Without a Randomness
In permissionless blockchains, due to the corruption attack of an adversary, nodes participating the protocol need to be updated regularly. In the process of node selection and committee reconfiguration, there may exist some problems. First, a complicated secure randomness generation protocol is in need. Besides, an adversary might obtain a mining puzzle in advance and start mining in ahead of honest nodes. Moreover, an adversary usually has an advantage of network delay. In order to solve the above problems, we conduct the following research. Firstly, we propose a PoW solution withhold attack against PoW-based member selection methods. An adversary might withhold his mining results in an epoch to obtain the mining puzzle of the next epoch in advance of honest nodes. Secondly, a secure shard reconfiguration protocol is designed, which does not rely on any complicated randomness generation protocol. Our shard reconfiguration protocol is proved rigorously to be secure, which means that in each selected committee, the honest node fraction exceeds a predefined target value. Thirdly, we implement our shard reconfiguration protocol. By carefully setting related system parameters, our protocol could be applied easily to most sharding blockchains. To our best knowledge, the shard reconfiguration protocol proposed in this paper is the first protocol that could safely implement node selection and committee reconfiguration of a sharding blockchain without using a secure randomness, which greatly reduces the communication and time overhead caused by the generation of a randomness.