Skip to main content

Blockchain Technology: Consensus Protocol Proof of Work and Proof of Stake

  • Conference paper
  • First Online:
Intelligent Computing and Applications

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 1172))

Abstract

The core technology used for many of the cryptocurrencies is blockchain. The extensive research attention has been received by the blockchain, a distributed ledger technology. The peer to peer network and the cryptography are playing a major role in blockchain technology. In addition to that, the consensus protocols are also playing an important role in the fundamentals of the blockchain technology. In blockchain systems, the security and the fault tolerance were guaranteed by the consensus protocols. There are two broad categories of the blockchain consensus protocols. They are Probabilistic finality consensus and the absolute finality consensus protocols. In this paper, the consensus protocols of the above two categories and the strengths and the weakness of blockchain types that could be applicable are presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. S. Nakamoto et al., Bitcoin: a peer-to-peer electronic cash system

    Google Scholar 

  2. V. Buterin, On public and private blockchains (2015). https://blog.ethereum.org/2015/08/07/on-public-and-private-blockchains/

  3. M. Swan, Blockchain: Blueprint for a New Economy (O’Reilly Media, Newton, MA, USA, 2015); A.M. Antonopoulos, Mastering Bitcoin: Unlocking Digital Cryptocurrencies (O’Reilly Media, Newton, MA, USA, 2014)

    Google Scholar 

  4. J. Fan, L.T. Yi, J.W. Shu, Research on the technologies of Byzantine system. J. Softw. 24(6), 1346–1360 (2013). Online available: http://www.jos.org.cn/1000-9825/4395.htm

  5. T.T.A. Dinh, R. Liu, M. Zhang, G. Chen, B.C. Ooi, J. Wang, ‘Untangling blockchain: a data processing view of blockchain systems’. IEEE Trans. Knowl. Data Eng. 30(7), 1366–1385 (2018)

    Article  Google Scholar 

  6. F. Tschorsch, B. Scheuermann, Bitcoin and beyond: A technical survey on decentralized digital currencies, IEEE Commun. Surv. Tuts. 18(3), 2084–2123 (2016). 3rd Quart

    Google Scholar 

  7. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, E.W. Felten, SoK: research perspectives and challenges for bitcoin and cryptocurrencies, in Proceedings of IEEE Symposium on Security and Privacy (San Jose, CA, USA, 2015), pp. 104–121

    Google Scholar 

  8. G. Wood, Ethereum: a secure decentralised generalised transaction ledger, Yellow paper (2015)

    Google Scholar 

  9. C. Natoli, V. Gramoli, The blockchain anomaly, in Proceedings of the 15th IEEE International Symposium on Network Computing and Applications, NCA’16 (2016), pp. 310–317

    Google Scholar 

  10. C. Natoli, V. Gramoli, The balance attack against proof-of-work blockchains: the R3 testbed as an example, Tech. Rep. 1765133 (2016)

    Google Scholar 

  11. A. Black, Hashcash-Adenial of service counter-measure, Tech. Rep. Cypherspace, (2002). URL http://www.hashcash.org/papers/hashcash.pdf

  12. Alyssa Hertig, What Is Ether? Coin Desk, 21 Apr (2017). https://www.coindesk.com/information/what-is-ether-ethereum-cryptocurrency

  13. F.B. Crane, Proof of work, proof of stake and the consensus debate. Cointelegraph, 20 Dec. 2014. https://www.cointelegraph.com/news/proof-of-work-proof-of-stake-and-the-consensus-debate

  14. M.A Alahmad, I. Al-shaikhli et al., Joux multicollisions attack in sponge construction, in The 6th International Conference on Security of Information and Networks (SIN), 2013 6th International Conference on, ACM (2013)

    Google Scholar 

  15. M.A Al-Ahmad, I.F. Alshaikhli, Broadview of cryptographic hash functions. Int. J. Comput. Sci. Issues 10(4), 239–246(2013)

    Google Scholar 

  16. S. Wu, D. Feng, W. Wu, J. Guo, L. Dong, J. Zou, (Pseudo) preimage attack on round-reduced Grøstl hash function and others, in Canteaut, vol. 9, pp. 127–145

    Google Scholar 

  17. X. Wang, H. Yu, Y.L. Yin, Efficient collision search attacks on SHA-0, in Advances in Cryptology–CRYPTO 2005 (Springer, Berlin, 2005)

    Google Scholar 

  18. Merkle tree URL https://en.wikipedia.org/wiki/merkletree

  19. J.R. Douceur, The Sybil Attack, in: International Workshop on Peer-to-Peer Systems (Springer, Berlin, 2002), pp. 251–260

    Google Scholar 

  20. Total cryptocurrency market cap hits new all-time high (2018). URL https://www.coindesk.com/150-billion-total-cryptocurrency-market-cap-hits-new-time-high. Accessed on 14 May 2018

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to B. Sriman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sriman, B., Ganesh Kumar, S., Shamili, P. (2021). Blockchain Technology: Consensus Protocol Proof of Work and Proof of Stake. In: Dash, S.S., Das, S., Panigrahi, B.K. (eds) Intelligent Computing and Applications. Advances in Intelligent Systems and Computing, vol 1172. Springer, Singapore. https://doi.org/10.1007/978-981-15-5566-4_34

Download citation

Publish with us

Policies and ethics