2020
DOI: 10.1109/tem.2020.2981286
|View full text |Cite
|
Sign up to set email alerts
|

PREStO: A Systematic Framework for Blockchain Consensus Protocols

Abstract: The rapid evolution of the blockchain community has brought together stakeholders from fundamentally different backgrounds: cryptographers, protocol designers, software developers, startup entrepreneurs, corporate executives and investors, academics of various disciplines, and end users. The result is a diverse ecosystem, presently exemplified by the development of a wide range of different blockchain protocols. This raises questions for policy and decision makers: How do different protocols compare? What are … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 36 publications
(24 citation statements)
references
References 151 publications
0
24
0
Order By: Relevance
“…6 While most of them are opportunistic, who manage to get extra revenues by leveraging the defects of consensus mechanism. 7,8 The classical attacks include selfish mining attacks (SM) and block withhold attacks (BWH). Fortunately, such attacks can hardly sponsored in real blockchain systems due to the requirement of majority power controlled by the attackers.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…6 While most of them are opportunistic, who manage to get extra revenues by leveraging the defects of consensus mechanism. 7,8 The classical attacks include selfish mining attacks (SM) and block withhold attacks (BWH). Fortunately, such attacks can hardly sponsored in real blockchain systems due to the requirement of majority power controlled by the attackers.…”
Section: Introductionmentioning
confidence: 99%
“…Furthermore, mining pools, oriented by some organizations, come into being for the sake of revenues maximization 6 . While most of them are opportunistic, who manage to get extra revenues by leveraging the defects of consensus mechanism 7,8 . The classical attacks include selfish mining attacks (SM) and block withhold attacks (BWH).…”
Section: Introductionmentioning
confidence: 99%
“…The PoS based on coinage comes out to be a better alternative to PoW used by earlier Bitcoin implementation due to sound security provisions provided at low transaction fees by this hybrid design, as demonstrated by King et al [20]. To enhance communication among the Blockchain network partners, the PREStO systematic framework has been created [17]. The paper designed a BLOCKBENCH system for the study of private Blockchain performance.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Besides, it benefits the wealthy, as a miner's likelihood for block mining is linear concerning the computing capabilities owned by that miner. Therefore, another consensus mechanism, PoS, has been proposed [17]. Pseudocode for typical PoW is shown in Fig.…”
Section: A Proof Of Work (Pow)mentioning
confidence: 99%
“…It aims to make compromising blockchains a difficult task for a potential attacker [13]. The consensus algorithm is a mechanism for reaching agreement between network users, each of whom is interested only in personal gain and has no reason to trust all other participants [14,15]. In other words, it is the way which the network nodes use to reach agreement on the order and composition of the stored data about the transactions they make.…”
Section: Blockchain Technology Was Created In 2008 By Satoshimentioning
confidence: 99%