skip to main content
10.1145/3498851.3499007acmconferencesArticle/Chapter ViewAbstractPublication PageswiConference Proceedingsconference-collections
research-article

Proof of Importance: A Consensus Algorithm for Importance Based on Dynamic Authorization

Published: 11 April 2022 Publication History

Abstract

Proof of stake consensus algorithm (PoS) has the advantage of not requiring arithmetic power, however, the higher the stake, the more likely the node will get the right to account. As a result, the accounting nodes are highly deterministic and the rich get richer, once the node with the highest equity fails to account for the block properly. The rest of the nodes have to compete again for accounting rights, and the probability of system stagnation will increase sharply. To address these two shortcomings, a consensus algorithm based on dynamic delegation of proof of importance (DPoI) is proposed.The algorithm introduces an importance assessment scheme that calculates the importance ivlaue (iValue) of nodes in each round based on nodes aValue, iTrade, Ltime and Credit.Finally, the Fibonacci series is used to divide nodes with similar iValue into a group, and the group draws on the DPoS voting strategy ranking to act as alternative nodes, thus forming a disaster recovery scheme to effectively avoid system stagnation, which effectively enhances the security and stability of the blockchain system. The experimental results show that the speed of DPoI block out is about 6 times faster than PoI, which significantly improves the block out speed.

References

[1]
[1]Yong Yuan,and Feiyue.Wang, 2016. Blockchain: the state of the art and future trends. Acta Automatica Sinica.
[2]
[2]Mingxiao D. Xiaofeng M. Zhe, Z. Xiangwei, W. and Qijun, C.2017.A review on consensus algorithm of blockchain,(2017)2567-2572.
[3]
[3]Yong Yuan., NI, X.C., ZENG, S.,2018. et al.:The development status and outlook of blockchain consensus algorithm[J]. Journal of Automation,(2018) 044(011):2011-2022
[4]
[4]Xu,F., Yang,G.W., Ju,D.P.,2004. Design of Distributed Storage System on Peer-to-Peer Structure based on Peer-to-Peer [J]. Journal of Software,(2004), 15(002):268-277
[5]
[5]Nakamoto S, 2009. :Bitcoin: A Peer-to-Peer Electronic Cash System.
[6]
[6]Shao Q.F. Jin C. Q. and Zhang Z. ect, 2018. Blockchain technology: architecture and progress[J]. Chinese Journal of Computers.
[7]
[7]Castro M. Liskov B., 2002. Practical Byzantine Fault Tolerance and Proactive Recovery[J]. Acm Transactions on Computer Systems, (2002), 20(4): 398-461.
[8]
[8]Garay J., Kiayias A., Leonardos N.,2015. The Bitcoin Backbone Protocol: Analysis and Applications[J]. Springer Berlin Heidelberg.
[9]
[9]Eyal I., The Miner’s Dilemma[J]. Computer Science, (2014)89-103.
[10]
[10]Li D.Q., 2007. Denial of Service Attacks [M]. Electronic Industry Press,(2007)
[11]
[11]July 2015 flood attack In: Bitcoin Wiki.x.https://en.bitcoin.it/wiki/July_2015_flood_attack.
[12]
[12]Sapirshtein A., Sompolinsky Y. and Zohar A, 2016.Optimal selfish mining strategies in bitcoin. In: Proc. of the Financial Crypto.
[13]
[13]Zhou C.Z.,1993. The Fibonacci-Lucas sequence and its applications [M]. Hunan Science and Technology Press.
[14]
[14]Larimer D.,2018.Delegated proof-of-stake consensus.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology
December 2021
541 pages
ISBN:9781450391870
DOI:10.1145/3498851
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 April 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. Credit
  3. DPoS
  4. Fibonacci grouping
  5. Proof of Importance

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

WI-IAT '21
Sponsor:
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence
December 14 - 17, 2021
VIC, Melbourne, Australia

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)25
  • Downloads (Last 6 weeks)2
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media