2021
DOI: 10.1109/tla.2021.9448552
|View full text |Cite
|
Sign up to set email alerts
|

Cluster-Based Classification of Blockchain Consensus Algorithms

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
8

Relationship

3
5

Authors

Journals

citations
Cited by 11 publications
(12 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…In addition to the security risks posed against distributed ledgers, such as 51% attack [ 54 ] against blockchain based on mining [ 55 , 56 ], as well as emerging threats as cryptojacking [ 57 ], there are other risks directly against smart contracts. The distributed and immutable characteristics of a smart contract in a blockchain had consequences when faults in them caused economic impacts in multiple cases [ 45 , 58 ].…”
Section: Smart Contracts Securitymentioning
confidence: 99%
“…In addition to the security risks posed against distributed ledgers, such as 51% attack [ 54 ] against blockchain based on mining [ 55 , 56 ], as well as emerging threats as cryptojacking [ 57 ], there are other risks directly against smart contracts. The distributed and immutable characteristics of a smart contract in a blockchain had consequences when faults in them caused economic impacts in multiple cases [ 45 , 58 ].…”
Section: Smart Contracts Securitymentioning
confidence: 99%
“…Examples of these protocols are proof of burn [24], proof of space [25], proof-of-QoS (PoQ) [26], and a fair selection protocol [27]. These and other consensus protocols are presented in [16].…”
Section: Other Kinds Of Proof-based Consensus Algorithmsmentioning
confidence: 99%
“…Following a similar approach as in [16], we carried out a qualitative comparison between our proposed protocol and the following proof-based consensus protocols: Pure PoW [38], Cuckoo hash function-based PoW [39], Prime number finding-based PoW [23], Double puzzles-based PoW [40], Non-outsourceable puzzles [41], Bitcoin-NG [42], GHOST strategy [43], Generalized PoW [44], Pure PoS (Nextcoin) [45], State of the block-based PoS [19], PoS by coin flipping from many nodes [46], Delegated PoS [47], Coin age-based PoW difficulty re-designation (Ppcoin) [20], Stake-based PoW difficulty re-designation (Blackcoin) [21], Coin age with an exponential decay function [48], Combining PoW and PoS to append blocks sequentially [49], with difficulty adjustment [50], Proof of activity [51], Puzzles designed for human PoW [22], Proof of burn [24], Proof of space [25], Proof of elapsed time [52], Proof of luck [53], Multichain [54]; and the following Vote-based consensus protocols: Hyperledger with practical Byzantine fault tolerance [55], Symbiont, R3 Corda with BFT-SMaRt [56,57], Iroha with Sumeragi [58,59], Ripple [60], Stellar [61], Quorum with Raft [62], Chain [63].…”
Section: Comparison With Other Approachesmentioning
confidence: 99%
See 1 more Smart Citation
“…Cryptojacking is an illegal and unauthorized mining activity on the victim’s computer, using the computational power of the victim’s computer to extract cryptocurrencies, which generates large computational consumption, reducing the computational efficiency of the victim’s computer. Moreover, this attack may be used by a powerful attacker to increment their computationally power, posing a risk to any blockchain based on mining [ 1 , 2 , 3 , 4 , 5 , 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%