CFP last date
20 February 2025
Reseach Article

Blockchain Architecture and Consensus Mechanisms: Challenges, Innovations, and Future Trends

Published on January 2025 by Nancy Sethi
International Conference on Artificial Intelligence and Data Science Applications - 2023
Control System labs
ICAIDSC2023 - Number 3
January 2025
Authors: Nancy Sethi
10.5120/icaidsc202423

Nancy Sethi . Blockchain Architecture and Consensus Mechanisms: Challenges, Innovations, and Future Trends. International Conference on Artificial Intelligence and Data Science Applications - 2023. ICAIDSC2023, 3 (January 2025), 28-35. DOI=10.5120/icaidsc202423

@article{ 10.5120/icaidsc202423,
author = { Nancy Sethi },
title = { Blockchain Architecture and Consensus Mechanisms: Challenges, Innovations, and Future Trends },
journal = { International Conference on Artificial Intelligence and Data Science Applications - 2023 },
issue_date = { January 2025 },
volume = { ICAIDSC2023 },
number = { 3 },
month = { January },
year = { 2025 },
issn = 0975-8887,
pages = { 28-35 },
numpages = 8,
url = { /proceedings/icaidsc2023/number3/blockchain-architecture-and-consensus-mechanisms-challenges-innovations-and-future-trends/ },
doi = { 10.5120/icaidsc202423 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 International Conference on Artificial Intelligence and Data Science Applications - 2023
%A Nancy Sethi
%T Blockchain Architecture and Consensus Mechanisms: Challenges, Innovations, and Future Trends
%J International Conference on Artificial Intelligence and Data Science Applications - 2023
%@ 0975-8887
%V ICAIDSC2023
%N 3
%P 28-35
%D 2025
%I International Journal of Computer Applications
Abstract

Bitcoin's underlying era, blockchain, has attracted quite a few interests recently. Blockchain acts as an immutable ledger that permits decentralized transaction processing. A growing number of industries, consisting of monetary offerings, reputation management, and the internet of things (IoT), are relying on blockchain technology. Blockchain era still faces several boundaries, inclusive of scalability and security problems that want to be addressed. This paper presents an intensive introduction to blockchain technology. First, we provide a brief creation to blockchain architecture earlier than contrasting some not unusual consensus methods utilized in diverse blockchains. We also in short evaluate the technical difficulties and recent advances. We additionally define capability blockchain traits for the destiny.

References
  1. “State of blockchain q1 2016: Blockchain funding overtakes bitcoin,” 2016. [Online]. Available: http://www.coindesk.com/ state-of-blockchain-q1-2016/
  2. S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008. [Online]. Available: https://bitcoin.org/bitcoin.pdf
  3. G. W. Peters, E. Panayi, and A. Chapelle, “Trends in crypto-currencies and blockchain technologies: A monetary theory and regulation perspective,” 2015. [Online]. Available: http://dx.doi.org/10.2139/ssrn. 2646618
  4. G. Foroglou and A.-L. Tsilidou, “Further applications of the blockchain,” 2015.
  5. A. Kosba, A. Miller, E. Shi, Z. Wen, and C. Papamanthou, “Hawk: The blockchain model of cryptography and privacy-preserving smart contracts,” in Proceedings of IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2016, pp. 839–858.
  6. B. W. Akins, J. L. Chapman, and J. M. Gordon, “A whole new world: Income tax considerations of the bitcoin economy,” 2013. [Online]. Available: https://ssrn.com/abstract=2394738
  7. Y. Zhang and J. Wen, “An IoT electric business model based on the protocol of bitcoin,” in Proceedings of 18th International Conference on Intelligence in Next Generation Networks (ICIN), Paris, France, 2015, pp. 184–191.
  8. M. Sharples and J. Domingue, “The blockchain and kudos: A distributed system for educational record, reputation and reward,” in Proceedings of 11th European Conference on Technology Enhanced Learning (EC-TEL 2015), Lyon, France, 2015, pp. 490–496.
  9. C. Noyes, “Bitav: Fast anti-malware by distributed blockchain consensus and feedforward scanning,” arXiv preprint arXiv:1601.01405, 2016.
  10. I. Eyal and E. G. Sirer, “Majority is not enough: Bitcoin mining is vulnerable,” in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 436– 454.
  11. A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in bitcoin p2p network,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2014, pp. 15–29.
  12. F. Tschorsch and B. Scheuermann, “Bitcoin and beyond: A technical survey on decentralized digital currencies,” IEEE Communications Sur- veys Tutorials, vol. 18, no. 3, pp. 2084–2123, 2016.
  13. NRI, “Survey on blockchain technologies and related services,” Tech. Rep., 2015. [Online]. Available: http://www.meti.go.jp/english/press/ 2016/pdf/0531 01f.pdf
  14. D. Lee Kuo Chuen, Ed., Handbook of Digital Currency, 1st ed. Elsevier, 2015. [Online]. Available: http://EconPapers.repec.org/RePEc: eee:monogr:9780128021170
  15. V. Buterin, “A next-generation smart contract and decentralized appli- cation platform,” white paper, 2014.
  16. D. Johnson, A. Menezes, and S. Vanstone, “The elliptic curve digital signature algorithm (ecdsa),” International Journal of Information Security, vol. 1, no. 1, pp. 36–63, 2001.
  17. V. Buterin, “On public and private blockchains,” 2015. [Online]. Available: https://blog.ethereum.org/2015/08/07/ on-public-and-private-blockchains/
  18. “Hyperledger project,” 2015. [Online]. Available: https://www. hyperledger.org/
  19. “Consortium chain development.” [Online]. Available: https://github. com/Ethereum/wiki/wiki/Consortium-Chain-Development
  20. L. Lamport, R. Shostak, and M. Pease, “The byzantine general’s problem,” ACM Transactions on Programming Languages and Systems (TOPLAS), vol. 4, no. 3, pp. 382–401, 1982.
  21. S. King and S. Nadal, “Ppcoin: Peer-to-peer crypto-currency with proof- of-stake,” Self-Published Paper, August, vol. 19, 2012.
  22. “Bit shares - share in the decentralized exchange.” [Online]. Available: https://bitshares.org/
  23. D. Schwartz, N. Youngs, and A. Britto, “The ripple protocol consensus algorithm,” Ripple Labs Inc White Paper, vol. 5, 2014.
  24. J. Kwon, “Tendermint: Consensus without mining,” URL http://tendermint. com/docs/tendermint v04. pdf, 2014.
  25. S. King, “Primecoin: Cryptocurrency with prime number proof-of- work,” July 7th, 2013.
  26. P. Vasin, “Blackcoins proof-of-stake protocol v2,” 2014. [Online]. Avail- able: https://blackcoin.co/blackcoin-pos-protocol-v2-whitepaper.pdf
  27. G. Wood, “Ethereum: A secure decentralized generalized transaction ledger,” Ethereum Project Yellow Paper, 2014.
  28. V. Zamfir, “Introducing Casper the friendly ghost,” Ethereum Blog URL: https://blog. Ethereum. org/2015/08/01/introducing-Casper- friendly-ghost, 2015.
  29. C. Miguel and L. Barbara, “Practical byzantine fault tolerance,” in Proceedings of the Third Symposium on Operating Systems Design and Implementation, vol. 99, New Orleans, USA, 1999, pp. 173–186.
  30. D. Mazieres, “The stellar consensus protocol: A federated model for internet-level consensus,” Stellar Development Foundation, 2015. “Antshares digital assets for everyone,” 2016. [Online]. Available: https://www.antshares.org
  31. M. Vukolic´, “The quest for scalable blockchain fabric: Proof-of-work vs. bft replication,” in International Workshop on Open Problems in Network Security, Zurich, Switzerland, 2015, pp. 112–125.
  32. C. Decker, J. Seidel, and R. Wattenhofer, “Bitcoin meets strong con- sistency,” in Proceedings of the 17th International Conference on Dis- tributed Computing and Networking (ICDCN). Singapore, Singapore: ACM, 2016, p. 13.
  33. D. Kraft, “Difficulty control for blockchain-based consensus systems,” Peer-to-Peer Networking and Applications, vol. 9, no. 2, pp. 397–413, 2016.
  34. Y. Sompolinsky and A. Zohar, “Accelerating bitcoin’s transaction pro- cessing. fast money grows on trees, not chains.” IACR Cryptology ePrint Archive, vol. 2013, no. 881, 2013.
  35. A. Chepurnoy, M. Larangeira, and A. Ojiganov, “A prunable blockchain consensus protocol based on non-interactive proofs of past states retriev- ability,” arXiv preprint arXiv:1603.07926, 2016.
  36. J. Bruce, “The mini-blockchain scheme,” July 2014. [Online]. Available: http://cryptonite.info/files/mbc-scheme-rev3.pdf
  37. J. van den Hooff, M. F. Kaashoek, and N. Zeldovich, “Versum: Verifiable computations over large public logs,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA, 2014, pp. 1304–1316.
  38. I. Eyal, A. E. Gencer, E. G. Sirer, and R. Van Renesse, “Bitcoin- ng: A scalable blockchain protocol,” in Proceedings of 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), Santa Clara, CA, USA, 2016, pp. 45–59.
  39. S. Meiklejohn, M. Pomarole, G. Jordan, K. Levchenko, D. McCoy, G. M. Voelker, and S. Savage, “A fistful of bitcoins: Characterizing payments among men with no names,” in Proceedings of the 2013 Conference on Internet Measurement Conference (IMC’13), New York, NY, USA, 2013.
  40. J. Barcelo, “User privacy in the public bitcoin blockchain,” 2014.
  41. M. Mo¨ser, “Anonymity of bitcoin transactions: An analysis of mixing services,” in Proceedings of Munster Bitcoin Conference, Munster, Germany, 2013, pp. 17–18.
  42. J. Bonneau, A. Narayanan, A. Miller, J. Clark, J. A. Kroll, and E. W. Felten, “Mixcoin: Anonymity for bitcoin with accountable mixes,” in Proceedings of International Conference on Financial Cryptography and Data Security, Berlin, Heidelberg, 2014, pp. 486–504.
  43. G. Maxwell, “Coinjoin: Bitcoin privacy for the real world,” in Post on Bitcoin Forum, 2013.
  44. T. Ruffing, P. Moreno-Sanchez, and A. Kate, “Coinshuffle: Practical decentralized coin mixing for bitcoin,” in Proceedings of European Symposium on Research in Computer Security, Cham, 2014, pp. 345– 364.
  45. I. Miers, C. Garman, M. Green, and A. D. Rubin, “Zerocoin: Anonymous distributed e-cash from bitcoin,” in Proceedings of IEEE Symposium Security and Privacy (SP), Berkeley, CA, USA, 2013, pp. 397–411.
  46. E. B. Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza, “Zerocash: Decentralized anonymous payments from bitcoin,” in Proceedings of 2014 IEEE Symposium on Security and Privacy (SP), San Jose, CA, USA, 2014, pp. 459–474.
  47. K. Nayak, S. Kumar, A. Miller, and E. Shi, “Stubborn mining: Generaliz- ing selfish mining and combining with an eclipse attack,” in Proceedings of 2016 IEEE European Symposium on Security and Privacy (EuroS&P), Saarbrucken, Germany, 2016, pp. 305–320.
  48. A. Sapirshtein, Y. Sompolinsky, and A. Zohar, “Optimal selfish mining strategies in bitcoin,” arXiv preprint arXiv:1507.06183, 2015.
  49. S. Billah, “One weird trick to stop selfish miners: Fresh bitcoins, a solution for the honest miner,” 2015.
  50. S. Solat and M. Potop-Butucaru, “ZeroBlock: Timestamp-Free Prevention of Block-Withholding Attack in Bitcoin,” Sorbonne Universities, UPMC University of Paris 6, Technical Report, May 2016. [Online]. Available: https://hal.archives-ouvertes.fr/hal-01310088
  51. “Crypto-currency market capitalizations,” 2017. [Online]. Available: https://coinmarketcap.com
  52. “The biggest mining pools.” [Online]. Available: https: //bitcoinworldwide.com/mining/pools/
  53. N. Szabo, “The idea of smart contracts,” 1997.
Index Terms

Computer Science
Information Sciences

Keywords

Scalability decentralization consensus and blockchain