A Secure Sharding Protocol For Open Blockchains
Citations
245 citations
238 citations
237 citations
Cites background from "A Secure Sharding Protocol For Open..."
...There are a lot of ongoing research working on it [14], [15], [28], [29], [30], and two most studied mechanisms to solve the scalability problem are Sharding [31], [32] and sidechains [33]....
[...]
...to solve the scalability problem are Sharding [31], [32] and...
[...]
228 citations
Cites background from "A Secure Sharding Protocol For Open..."
...However, sharding permissionless blockchains with byzantine adversaries is challenging and tackled by only a few recent systems [18, 85, 95]....
[...]
...A better approach to is to form a special committee that offers directory services to new committee members [95]....
[...]
...One approach is to randomly map nodes to committees [85, 95]....
[...]
...Decentralized networks need to incentivize nodes for active participation in different operations such as consensus [84, 85, 95], information propagation [16, 21, 28], and executing smart contracts [18, 136]....
[...]
...Elastico [95] ✗ PoW ✓ Full swap ✓✗ Internal O(n(2)) Dynamic (Random) ! ! ✗ 33% 16 blocks in 110s 5 ✓ 110s for 16 blocks 5 Real...
[...]
226 citations
References
5,208 citations
4,901 citations
[...]
4,816 citations
"A Secure Sharding Protocol For Open..." refers background in this paper
...In the worst case, we can assume that each committee has 3c/2 members, of which at most 1/3 of them are malicious....
[...]
4,340 citations
3,562 citations
"A Secure Sharding Protocol For Open..." refers background or methods in this paper
...Here we provide an intuition why this works....
[...]
...The second goal is to compare ELASTICO to other related consensus protocols including Bitcoin [1], Bitcoin-NG [9] and PBFT [13]....
[...]
...Our scalability experiments on Amazon EC2 with up to 1, 600 nodes confirm ELASTICO’s theoretical scaling properties....
[...]
...At its core, ELASTICO scales up the agreement throughput near linearly with the computational power of the network and tolerates byzantine adversaries which controls up to one-forth computation capacity, in the partially synchronous network....
[...]