Abstract
Blockchain is first introduced in Bitcoin and has good performance in cryptocurrencies. With the growth of chain, the height of blockchain in Bitcoin has reached five hundred thousand, and the entire capacity of chain is more than 500 GB. If a light node wants to verify a transaction, it has to spend nearly one week to download the data of whole chain with download rate of 1 MB/s, which seriously hinders the usage of blockchain. In order to resolve this problem, checkpoint is used to reduce the capacity of data, but this centralized scheme obviously violates the decentralization of blockchain. Other schemes are proposed will change the structure of blockchain may suffer the risk that adversary can fork a blockchain to cheat the light nodes. In this paper, we propose a novel blockchain architecture, which simplifies the verification in blockchain and is compatible with most consensus mechanism. We append backlinks in some blocks, such that blocks not only look like a chain but also like a binary tree. We also introduce a challenge mechanism for against the forking attack on light nodes.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nakomoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008). https://bitcoin.org/bitcoin.pdf
Majority attack. Bitcoin wiki. https://en.bitcoin.it/wiki/Majority_attack
Hashrate. Bitcoin wiki. https://en.bitcoin.it/wiki/Hash_per_second
King, S., Nadal, S.: Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published paper (2012)
Heilman, E., Kendler, A., Zohar, A., et al.: Eclipse attacks on bitcoin’s peer-to-peer network. In: 24th Security Symposium (Security 15), pp. 129–144 (2015)
Nikitin, K., Kokoris-Kogias, E., Jovanovic, P., et al.: CHAINIAC: proactive software-update transparency via collectively signed skipchains and verified builds. In: 26th Security Symposium (Security 17) (2017)
Kiayias, A., Andrew, M., Dionysis, Z.: Non-interactive proofs of proof-of-work. IACR Cryptology ePrint Archive 2017(963), 1–42 (2017)
Regnath, E., Sebastian S.: LeapChain: efficient blockchain verification for embedded IoT. In: Proceedings of the International Conference on Computer-Aided Design, ACM (2018)
Merkle, R.C.: Protocols for public key cryptosystems. In: 1980 IEEE Symposium on Security and Privacy, pp. 122–122. IEEE (1980)
Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal selfish mining strategies in bitcoin. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 515–532. Springer, Heidelberg (2017). https://doi.org/10.1007/978-3-662-54970-4_30
Eyal, I., Sirer, E.G.: Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61(7), 95–102 (2018)
Acknowledgments
This project was supported by National Key Research and Development Program of China “Research on new algorithms and new principles of electronic currency” (No. 2017YFB0802505).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Yu, J., Fan, L., Chen, G. (2020). A New Structure of Blockchain to Simplify the Verification. In: Zheng, Z., Dai, HN., Tang, M., Chen, X. (eds) Blockchain and Trustworthy Systems. BlockSys 2019. Communications in Computer and Information Science, vol 1156. Springer, Singapore. https://doi.org/10.1007/978-981-15-2777-7_3
Download citation
DOI: https://doi.org/10.1007/978-981-15-2777-7_3
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2776-0
Online ISBN: 978-981-15-2777-7
eBook Packages: Computer ScienceComputer Science (R0)