Why This Matters

Distributed ledger systems require both consensus mechanisms to achieve agreement on shared state and security protocols to protect against attacks. Understanding the range of available mechanisms is critical for selecting appropriate approaches for different application domains. This comprehensive survey enables informed decision-making about consensus and security technologies for DLT systems.

What We Did

This paper presents a chapter on consensus mechanisms and information security technologies used in distributed ledger technology (DLT). The work surveys Byzantine consensus, non-Byzantine consensus mechanisms, and cryptographic security protocols including proof-of-work, proof-of-stake, and various other consensus approaches used in public and permissioned blockchains.

Key Results

The paper provides detailed analysis of consensus mechanisms across public blockchains (Bitcoin, Ethereum, Litecoin) and permissioned systems. Results characterize tradeoffs in decentralization, scalability, randomness, and resilience to attacks. The work systematically evaluates consensus approaches for Byzantine and non-Byzantine failure models.

Full Abstract

Cite This Paper

@inbook{Zhang2019,
  author = {Zhang, Peng and Schmidt, Douglas C. and White, Jules and Dubey, Abhishek},
  pages = {181--209},
  publisher = {Oreilly},
  title = {Chapter Seven - Consensus mechanisms and information security technologies},
  year = {2019},
  volume = {115},
  abstract = {Distributed Ledger Technology (DLT) helps maintain and distribute predefined types of information and data in a decentralized manner. It removes the reliance on a third-party intermediary, while securing information exchange and creating shared truth via transaction records that are hard to tamper with. The successful operation of DLT stems largely from two computer science technologies: consensus mechanisms and information security protocols. Consensus mechanisms, such as Proof of Work (PoW) and Raft, ensure that the DLT network collectively agrees on contents stored in the ledger. Information security protocols, such as encryption and hashing, protect data integrity and safeguard data against unauthorized access. The most popular incarnation of DLT has been used in cryptocurrencies, such as Bitcoin and Ethereum, through public blockchains, which requires the application of more robust consensus protocols across the entire network. An example is PoW, which has been employed by Bitcoin, but which is also highly energy inefficient. Other forms of DLT include consortium and private blockchains where networks are configured within federated entities or a single organization, in which case less energy intensive consensus protocols (such as Raft) would suffice. This chapter surveys existing consensus mechanisms and information security technologies used in DLT.},
  bibsource = {dblp computer science bibliography, https://dblp.org},
  biburl = {https://dblp.org/rec/bib/journals/ac/0034SWD19},
  booktitle = {Advances in Computers},
  contribution = {colab},
  doi = {10.1016/bs.adcom.2019.05.001},
  file = {:Zhang2019-Chapter_Seven-Consensus_mechanisms_and_information_security_technologies.pdf:PDF},
  keywords = {consensus mechanisms, blockchain, distributed ledgers, security protocols, proof-of-work, proof-of-stake},
  project = {cps-blockchains},
  tag = {decentralization},
  timestamp = {Tue, 12 Nov 2019 00:00:00 +0100},
  url = {https://doi.org/10.1016/bs.adcom.2019.05.001}
}
Quick Info
Year 2019
Keywords
consensus mechanisms blockchain distributed ledgers security protocols proof-of-work proof-of-stake
Research Areas
Explainable AI
Search Tags

Chapter, Seven, Consensus, mechanisms, information, security, technologies, consensus mechanisms, blockchain, distributed ledgers, security protocols, proof-of-work, proof-of-stake, Explainable AI, 2019, Zhang, Schmidt, White, Dubey