Untangling Blockchain: A Data Processing View of Blockchain Systems
Citations
2,813 citations
Cites background from "Untangling Blockchain: A Data Proce..."
...o compare to all (some prominent ones are Tendermint [14], Quorum [13], Chain Core [4], Multichain [12], Hyperledger Sawtooth [9], the Volt proposal [50], and more, see references in recent overviews [24, 30]). All platforms follow the order-execute architecture, as discussed in Section 2. As a representative example, take the Quorum platform [35], an enterprise-focused version of Ethereum. With its conse...
[...]
800 citations
Cites background from "Untangling Blockchain: A Data Proce..."
...Irrespective of the distance between the devices, the data generated by them can be easily stored on the blockchain in a secure manner [112]....
[...]
680 citations
Cites background from "Untangling Blockchain: A Data Proce..."
...However, due to the recent market frenzy about cryptocurrencies, most of the existing general reviews and surveys on blockchains emphasize narrowly the scenarios of using blockchain networks as the backbone technologies for cryptocurrencies, especially the market-dominant ones such as Bitcoin and Ethereum [2]–[4], [18]–[22]....
[...]
...In contrast, the Ethereum-like networks adopt a Kademlia-inspired protocol based on Distributed Hash Tables (DHTs) [28] for peer/route discovery5 through UDP connections....
[...]
...Due to the explosion of network-level hashrates (see Figure 7(a)), most of the practical blockchain networks, i.e., cryptocurrency networks, are nowadays dominated by the proxies of mining pools [67] Table III COMPARISON OF DIFFERENT POX SCHEMES FOR PERMISSIONLESS BLOCKCHAINS Puzzle Name Origin of Hardness (One-way Function) Designing Goal Implementation Description ZKP Properties Simulation of Random Function Features of Puzzle Design Network Realization Primitive proof of work [24], [87] Partial preimage search via exhaustive queries to the random oracle Sybil-proof Repeated queries to cryptographic hash function Yes Yes Single challenge Bitcoin [1], Litecoin [93] Proof of exercise [106] Matrix product Computation delegation Probabilistic verification N/A No Single challenge N/A Useful proof of work [85] K-orthogonal vector, 3SUM, all-pairs shortest path, etc. Computation delegation Non-interactiveness via Fiat-Shamir transformation Yes Yes Single challenge with sequential hash queries N/A Resource-efficient mining [101] N/A Computation delegation Guaranteed by TEE Yes Yes Trusted random oracle implemented by dedicated hardware N/A Proof of retrievability [111] Merkle proofs of file fragments in the Merkle tree Distributed storage Non-interactiveness via Fiat-Shamir transformation and random Merkle proofs Yes Conditional Two-stage challenge Permacoin [110], KopperCoin [71] Proof of space -time [37] The repeated proof of retrievability over time Decentralized storage market Repeated PoR Yes Conditional Two-stage challenge and repeated PoR over time Filecoin [37] Equihash [82] The generalized birthday problem ASIC resistance Time-space complexity trade-off in proof generation [82] Yes Yes Memory-hard ZCash [45] Ethash [115] Random path searching a random DAG ASIC resistance Repeated queries to cryptographic hash function Yes Yes Sequential, memoryhard puzzle Ethereum [36] Nnonoutsourceable scratch-off puzzle [83] Generalization of proof of retrievability Centralization resistance Random Merkle proof Yes Yes Two-stage challenge N/A Proof of space [117] Merkle proofs of a vertex subset in a random DAG Energy efficiency Random Merkle proof Yes Yes Two-stage challenge and measurement of proof quality SpaceMint [117] Proof of human work [103] Radom CAPTCHA puz- zle requiring human effort Useful work and energy efficiency CAPTCHA and PoW Yes Yes Human in the loop N/A (see Figure 12)....
[...]
...known as the Proof of Work (PoW) scheme [2], [3]....
[...]
...The virtual computer layer may adopt different levels of Turing-completeness for smart contract implementation, ranging from stateless circuits in Bitcoin [1] to fully Turingcomplete state machines in Ethereum [36] and HyperLedger Fabric [40]....
[...]
654 citations
570 citations
References
4,407 citations
3,697 citations
"Untangling Blockchain: A Data Proce..." refers background in this paper
..., [59], [60], can be employed (albeit not without major changes in the current design)....
[...]
3,562 citations
"Untangling Blockchain: A Data Proce..." refers background or methods in this paper
...Zab [21], Raft [22], Paxos [23], PBFT [17] are popular protocols that are in active use today....
[...]
...Under this model the overhead of concurrency control is much higher [17]....
[...]
...In contrast, the original PBFT protocol [17] is deterministic....
[...]
...PBFT-based Private Hyperledger uses the original PBFT [17]....
[...]
...These protocols, PBFT [17] being the prime example, are used in private settings because they assume authenticated nodes....
[...]
3,276 citations
"Untangling Blockchain: A Data Proce..." refers methods in this paper
...The WorkloadClient is based on the YCSB driver [91] which preloads each storage with a num-...
[...]
1,811 citations
"Untangling Blockchain: A Data Proce..." refers background or methods in this paper
...Using Raft, Quorum is able to make safe progress even when some authority nodes crash....
[...]
...Zab [21], Raft [22], Paxos [23], PBFT [17] are popular protocols that are in active use today....
[...]
...By delegating this check to an entity outside of the blockchain, Corda can justify using Raft for consensus....
[...]
...Kadena [30] proposes an extension to Raft that handles Byzantine failures....
[...]
...Quorum [37] employs Raft [22] as the consensus protocol among its authorities....
[...]