2019
DOI: 10.1109/access.2019.2956698
|View full text |Cite
|
Sign up to set email alerts
|

Proof-of-Search: Combining Blockchain Consensus Formation With Solving Optimization Problems

Abstract: This paper proposes a new decentralized consensus protocol for a blockchain.

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
5
2
2

Relationship

0
9

Authors

Journals

citations
Cited by 31 publications
(26 citation statements)
references
References 15 publications
0
26
0
Order By: Relevance
“…Due to majority control, attackers can spend tokens or coins multiple times (known as double spending). In this context, innovative consensus protocols were developed as Proof of Participation and Fees [490], Proof of Search [491], Proof of Accuracy [492], Proof of Sincerity [493], Proof of Learning [494], Proof of Benefit [495], Proof of Experience [496], Proof of Evaluation [497], and Proof of Adjourn [498], providing a strong protection that is independent of the hashing capability of attackers. Finally, the investigation of privacy concerns is necessary because protecting sensitive data despite the presence of transparent and open transactions within the public chain is extremely critical.…”
Section: ) Security Limitations and Possible Directionsmentioning
confidence: 99%
“…Due to majority control, attackers can spend tokens or coins multiple times (known as double spending). In this context, innovative consensus protocols were developed as Proof of Participation and Fees [490], Proof of Search [491], Proof of Accuracy [492], Proof of Sincerity [493], Proof of Learning [494], Proof of Benefit [495], Proof of Experience [496], Proof of Evaluation [497], and Proof of Adjourn [498], providing a strong protection that is independent of the hashing capability of attackers. Finally, the investigation of privacy concerns is necessary because protecting sensitive data despite the presence of transparent and open transactions within the public chain is extremely critical.…”
Section: ) Security Limitations and Possible Directionsmentioning
confidence: 99%
“…PoS uses the wasted power formed from PoW to calculate and give optimization solution for the Blockchain [ 73 ]. The PoS is designed to offer computational service within a grid computing infrastructure, which is suited for large networks like data centers.…”
Section: Investigating the Consensus Algorithm In Blockchain For Decentralizationmentioning
confidence: 99%
“…3) Proof-Of-Search (PoS): PoS uses the wasted power formed from PoW to calculate and give optimization solution for the Blockchain [66]. The PoS is designed to offer computational service within a grid computing infrastructure, which is suited for large networks like data centers.…”
Section: A Proof Based Consensus Algorithmmentioning
confidence: 99%