Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security 2016
DOI: 10.1145/2976749.2978389
|View full text |Cite
|
Sign up to set email alerts
|

A Secure Sharding Protocol For Open Blockchains

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
613
0
7

Year Published

2016
2016
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 994 publications
(621 citation statements)
references
References 27 publications
1
613
0
7
Order By: Relevance
“…To achieve security in this setting, known consensus protocols rely on proofs-of-work to defeat Sybil attacks, and pay an enormous price in terms of throughput and latency, e.g., Bitcoin commits transactions every ∼ 10 min, and its throughput limited by 7 tx/sec even when the current block size is maximized. Several recent works have suggested the promising idea of leveraging either a slower, external blockchain such as Bitcoin or economic "proof-of-stake" assumptions involving the underlying currency itself [32,32,35,37] to bootstrap faster BFT protocols, by selecting a random committee to perform BFT in every different epoch. These approaches promise to achieve the best of both worlds, security in an open enrollment, decentralized network, and the throughput and response time matching classical BFT protocols.…”
Section: Suggested Deployment Scenariosmentioning
confidence: 99%
“…To achieve security in this setting, known consensus protocols rely on proofs-of-work to defeat Sybil attacks, and pay an enormous price in terms of throughput and latency, e.g., Bitcoin commits transactions every ∼ 10 min, and its throughput limited by 7 tx/sec even when the current block size is maximized. Several recent works have suggested the promising idea of leveraging either a slower, external blockchain such as Bitcoin or economic "proof-of-stake" assumptions involving the underlying currency itself [32,32,35,37] to bootstrap faster BFT protocols, by selecting a random committee to perform BFT in every different epoch. These approaches promise to achieve the best of both worlds, security in an open enrollment, decentralized network, and the throughput and response time matching classical BFT protocols.…”
Section: Suggested Deployment Scenariosmentioning
confidence: 99%
“…Another approach [9][10][11] is known to be used in database control systems -horizontal scaling of data storage (sharding). In this approach it is proposed to divide data stored in blockchain between several nodes.…”
Section: Review Of Literaturementioning
confidence: 99%
“…A Merkle tree in our case allows all hashes of all data elements in an event to be stored in a single hash value (the Merkle root) (Luu et al 2015). Furthermore, it allows for a simple proof of the existence of a data element in the tree (Luu et al 2015;Merkle 1987).…”
Section: The Data Elements In Events and Their Merkle Treesmentioning
confidence: 99%