Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security

Dana Yang, Sol Jeon, Inshil Doh, Kijoon Chae

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

4 Scopus citations

Abstract

Many systems have been built for transactions without a central manager by introducing blockchain in various fields such as industry, public sector, and trading economy. The blockchain system is also contributing to the advancement of technology to enable reliable transactions in distributed networks like P2P or D2D. Consensus algorithm for each operating environment is used to verify whether a transaction is valid. Transactions are verified generally with Proof-of-work (PoW) in public blockchain and Practice Byzantine Fault Tolerance (PBFT) in private blockchain. The PBFT is only available to a group of limited participants and is used for small groups. However, these small groups can be compromised by the collusion of malicious users, making it impossible to trade or forge. In addition, the blockchain does not define any security structure on users, devices, transaction history accessibility, etc., which causes issues with system permission. Therefore, this paper analyzes the problem of the conventional blockchain in terms of participant-collusion, authentication, and confidentiality, and proposes a Randomly Elected Blockchain (REBC) to solve each problem. In the first participant-collusion, the private blockchain enables the system to operate without any cost for verification. Thereby solving the problem of grouping nodes for malicious collusion, the proposed mechanism is to randomly elect the nodes in the unit group, and then conduct consensus algorithms. Besides, many participants are able to participate in the consensus experiment without degraded performance. In the second problem, a smart manager system provides authentication of users and devices. The solution to the third problem related to confidentiality is to analyze the current RSA encryption method and supplement it with a proxy re-encryption method.

Original languageEnglish
Title of host publication22nd International Conference on Advanced Communications Technology
Subtitle of host publicationDigital Security Global Agenda for Safe Society, ICACT 2020 - Proceeding
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages159-165
Number of pages7
ISBN (Electronic)9791188428045
DOIs
StatePublished - Feb 2020
Event22nd International Conference on Advanced Communications Technology, ICACT 2020 - Pyeongchang, Korea, Republic of
Duration: 16 Feb 202019 Feb 2020

Publication series

NameInternational Conference on Advanced Communication Technology, ICACT
Volume2020
ISSN (Print)1738-9445

Conference

Conference22nd International Conference on Advanced Communications Technology, ICACT 2020
Country/TerritoryKorea, Republic of
CityPyeongchang
Period16/02/2019/02/20

Bibliographical note

Publisher Copyright:
© 2020 Global IT Research Institute - GIRI.

Keywords

  • authentication
  • collusion
  • consensus algorithm
  • private blockchain
  • proxy re-encryption

Fingerprint

Dive into the research topics of 'Randomly Elected Blockchain System based on Grouping Verifiers for Efficiency and Security'. Together they form a unique fingerprint.

Cite this