2020
DOI: 10.48550/arxiv.2001.07091
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Blockchain Consensus Algorithms: A Survey

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 14 publications
(19 citation statements)
references
References 0 publications
1
18
0
Order By: Relevance
“…Accountability is achieved either directly by immediately proving that a node behaved in a dishonest way, or indirectly by inferring possible malicious behavior using side information at some later stage; trust management schemes can be used to expose long-term malicious trends that are difficult to distinguish at any given time if considered independently. Our work complements the reports by Cachin [3], Xiao [4], Zheng [5], Wu [6], Salimitari [7], Lao [8], and Ferdous [9], by considerably extending the number of blockchain platforms and consensus protocols that are studied, by providing quantitative information about their performance (i.e. throughput and latency) instead of qualitative information that is given in all works (thus, allowing to easily consider issues related to scalability), and by evaluating their suitability for IoT applications also taking into account their resilience to adversarial faults.…”
Section: Introductionsupporting
confidence: 86%
“…Accountability is achieved either directly by immediately proving that a node behaved in a dishonest way, or indirectly by inferring possible malicious behavior using side information at some later stage; trust management schemes can be used to expose long-term malicious trends that are difficult to distinguish at any given time if considered independently. Our work complements the reports by Cachin [3], Xiao [4], Zheng [5], Wu [6], Salimitari [7], Lao [8], and Ferdous [9], by considerably extending the number of blockchain platforms and consensus protocols that are studied, by providing quantitative information about their performance (i.e. throughput and latency) instead of qualitative information that is given in all works (thus, allowing to easily consider issues related to scalability), and by evaluating their suitability for IoT applications also taking into account their resilience to adversarial faults.…”
Section: Introductionsupporting
confidence: 86%
“…These assumptions eventually influence the characteristics of the consensus protocol. In fact, most Blockchain Technology applications typically roll out their corresponding consensus algorithm to fit the specific use case for the Technology [8], [9], [10].…”
Section: Consensus Algorithmsmentioning
confidence: 99%
“…There are mainly three types of consensus mechanisms used by various public blockchains. They are Proof of Work (PoW), Proof of Stake (PoS), and Delegated Proof of Stake (DPoS) [17].…”
Section: Blockchainmentioning
confidence: 99%
“…SHA256 is another cryptographic (hashing) algorithm widely used in most blockchain systems for generating the hash of transactions and blocks. Other popular hash algorithms are Ethash, SCrypt, X11, Equihash, RIPEMD160 [17]. Although these hash functions are secure for classical computers, quantum computers will be able to break many security features of those algorithms.…”
Section: A Cryptographic Algorithm Vulnerabilitiesmentioning
confidence: 99%