Skip to main navigation Skip to search Skip to main content

A secure shard reconfiguration protocol for sharding blockchains without a randomness

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In permissionless blockchains, due to the corruption attack of an adversary, nodes participating the protocol need to be updated regularly. In the process of node selection and committee reconfiguration, there may exist some problems. First, a complicated secure randomness generation protocol is in need. Besides, an adversary might obtain a mining puzzle in advance and start mining in ahead of honest nodes. Moreover, an adversary usually has an advantage of network delay. In order to solve the above problems, we conduct the following research. Firstly, we propose a PoW solution withhold attack against PoW-based member selection methods. An adversary might withhold his mining results in an epoch to obtain the mining puzzle of the next epoch in advance of honest nodes. Secondly, a secure shard reconfiguration protocol is designed, which does not rely on any complicated randomness generation protocol. Our shard reconfiguration protocol is proved rigorously to be secure, which means that in each selected committee, the honest node fraction exceeds a predefined target value. Thirdly, we implement our shard reconfiguration protocol. By carefully setting related system parameters, our protocol could be applied easily to most sharding blockchains. To our best knowledge, the shard reconfiguration protocol proposed in this paper is the first protocol that could safely implement node selection and committee reconfiguration of a sharding blockchain without using a secure randomness, which greatly reduces the communication and time overhead caused by the generation of a randomness.

Original languageEnglish
Title of host publicationProceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
EditorsGuojun Wang, Ryan Ko, Md Zakirul Alam Bhuiyan, Yi Pan
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages1012-1019
Number of pages8
ISBN (Electronic)9781665403924
DOIs
StatePublished - Dec 2020
Event19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020 - Guangzhou, China
Duration: 29 Dec 20201 Jan 2021

Publication series

NameProceedings - 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020

Conference

Conference19th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020
Country/TerritoryChina
CityGuangzhou
Period29/12/201/01/21

Keywords

  • Byzantine fault tolerance
  • Mining
  • Shard reconfiguration
  • Sharding blockchain

Fingerprint

Dive into the research topics of 'A secure shard reconfiguration protocol for sharding blockchains without a randomness'. Together they form a unique fingerprint.

Cite this