2022
DOI: 10.3390/math10142504
|View full text |Cite
|
Sign up to set email alerts
|

On Proof-of-Accuracy Consensus Protocols

Abstract: Consensus protocols are a fundamental part of any blockchain; although several protocols have been in operation for several years, they still have drawbacks. For instance, some may be susceptible to a 51% attack, also known as a majority attack, which may suppose a high risk to the trustworthiness of the blockchains. Although this attack is theoretically possible, executing it in practice is often regarded as arduous because of the premise that, with sufficiently active members, it is not ’straightforward’ to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6

Relationship

2
4

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 38 publications
0
2
0
Order By: Relevance
“…In addition to the security risks posed against distributed ledgers, such as 51% attack [ 54 ] against blockchain based on mining [ 55 , 56 ], as well as emerging threats as cryptojacking [ 57 ], there are other risks directly against smart contracts. The distributed and immutable characteristics of a smart contract in a blockchain had consequences when faults in them caused economic impacts in multiple cases [ 45 , 58 ].…”
Section: Smart Contracts Securitymentioning
confidence: 99%
“…In addition to the security risks posed against distributed ledgers, such as 51% attack [ 54 ] against blockchain based on mining [ 55 , 56 ], as well as emerging threats as cryptojacking [ 57 ], there are other risks directly against smart contracts. The distributed and immutable characteristics of a smart contract in a blockchain had consequences when faults in them caused economic impacts in multiple cases [ 45 , 58 ].…”
Section: Smart Contracts Securitymentioning
confidence: 99%
“…When all trustworthy nodes have an equal chance of making the final board, there is a fair consensus [29]. A proof-of-accuracy procedure was introduced, and a protocol was suggested by the author in [30]. The suggested protocol contains several aspects, such as coordinator selection, secret generation, part generation and distribution in the network, and participant competition to discover the shares to reconstruct the secret.…”
Section: Legacy Evolutions: Existing View and Emerging Technical Chal...mentioning
confidence: 99%
“…Cryptojacking is an illegal and unauthorized mining activity on the victim’s computer, using the computational power of the victim’s computer to extract cryptocurrencies, which generates large computational consumption, reducing the computational efficiency of the victim’s computer. Moreover, this attack may be used by a powerful attacker to increment their computationally power, posing a risk to any blockchain based on mining [ 1 , 2 , 3 , 4 , 5 , 6 , 7 ].…”
Section: Introductionmentioning
confidence: 99%