Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (74)

Search Parameters:
Keywords = proof of work (PoW)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 1195 KiB  
Article
Private Blockchain-Driven Digital Evidence Management Systems: A Collaborative Mining and NFT-Based Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Information 2025, 16(7), 616; https://doi.org/10.3390/info16070616 - 17 Jul 2025
Viewed by 317
Abstract
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain [...] Read more.
Secure Digital Evidence Management Systems (DEMSs) ae crucial for law enforcement agencies, because traditional systems are prone to tampering and unauthorised access. Blockchain technology, particularly private blockchains, offers a solution by providing a centralised and tamper-proof system. This study proposes a private blockchain using Proof of Work (PoW) to securely manage digital evidence. Miners are assigned specific nonce ranges to accelerate the mining process, called collaborative mining, to enhance the scalability challenges in DEMSs. Transaction data includes digital evidence to generate a Non-Fungible Token (NFT). Miners use NFTs to solve the puzzle according to the assigned difficulty level d, so as to generate a hash using SHA-256 and add it to the ledger. Users can verify the integrity and authenticity of records by re-generating the hash and comparing it with the one stored in the ledger. Our results show that the data was verified with 100% precision. The mining time was 2.5 s, and the nonce iterations were as high as 80×103 for d=5. This approach improves the scalability and integrity of digital evidence management by reducing the overall mining time. Full article
(This article belongs to the Special Issue Blockchain and AI: Innovations and Applications in ICT)
Show Figures

Figure 1

42 pages, 6696 KiB  
Article
Design, Implementation and Practical Energy-Efficiency Evaluation of a Blockchain Based Academic Credential Verification System for Low-Power Nodes
by Gabriel Fernández-Blanco, Iván Froiz-Míguez, Paula Fraga-Lamas and Tiago M. Fernández-Caramés
Appl. Sci. 2025, 15(12), 6596; https://doi.org/10.3390/app15126596 - 12 Jun 2025
Viewed by 563
Abstract
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a [...] Read more.
The educational system manages extensive documentation and paperwork, which can lead to human errors and sometimes abuse or fraud, such as the falsification of diplomas, certificates or other credentials. In fact, in recent years, multiple cases of fraud have been detected, representing a significant cost to society, since fraud harms the trustworthiness of certificates and academic institutions. To tackle such an issue, this article proposes a solution aimed at recording and verifying academic records through a decentralized application that is supported by a smart contract deployed in the Ethereum blockchain and by a decentralized storage system based on Inter-Planetary File System (IPFS). The proposed solution is evaluated in terms of performance and energy efficiency, comparing the results obtained with a traditional Proof-of-Work (PoW) consensus protocol and the new Proof-of-Authority (PoA) protocol. The results shown in this paper indicate that the latter is clearly greener and demands less CPU load. Moreover, this article compares the performance of a traditional computer and two Single-Board Computers (SBCs) (a Raspberry Pi 4 and an Orange Pi One), showing that is possible to make use of the latter low-power devices to implement blockchain nodes but at the cost of higher response latency. Furthermore, the impact of Ethereum gas limit is evaluated, demonstrating its significant influence on the blockchain network performance. Thus, this article provides guidelines, useful practical evaluations and key findings that will help the next generation of green blockchain developers and researchers. Full article
Show Figures

Figure 1

32 pages, 694 KiB  
Article
Preserving Whistleblower Anonymity Through Zero-Knowledge Proofs and Private Blockchain: A Secure Digital Evidence Management Framework
by Butrus Mbimbi, David Murray and Michael Wilson
Blockchains 2025, 3(2), 7; https://doi.org/10.3390/blockchains3020007 - 17 Apr 2025
Viewed by 2258
Abstract
This research presents a novel framework and experimental results that combine zero-knowledge proofs (ZKPs) with private blockchain technology to safeguard whistleblower privacy while ensuring secure digital evidence submission and verification. For example, whistleblowers involved in corporate fraud cases can submit sensitive financial records [...] Read more.
This research presents a novel framework and experimental results that combine zero-knowledge proofs (ZKPs) with private blockchain technology to safeguard whistleblower privacy while ensuring secure digital evidence submission and verification. For example, whistleblowers involved in corporate fraud cases can submit sensitive financial records anonymously while maintaining the credibility of the evidence. The proposed framework introduces several key innovations, including a private blockchain implementation utilising proof-of-work (PoW) consensus to ensure immutable storage and thorough scrutiny of submitted evidence, with mining difficulty dynamically aligned to the sensitivity of the data. It also features an adaptive difficulty mechanism that automatically adjusts computational requirements based on the sensitivity of the evidence, providing tailored protection levels. In addition, a unique two-phase validation process is incorporated, which generates a digital signature from the evidence alongside random challenges, significantly improving security and authenticity. The integration of ZKPs enables iterative hash-based verification between parties (Prover and Verifier) while maintaining the complete privacy of the source data. This research investigates the whistleblower’s niche in traditional digital evidence management systems (DEMSs), prioritising privacy without compromising evidence integrity. Experimental results demonstrate the framework’s effectiveness in preserving anonymity while assuring the authenticity of the evidence, making it useful for judicial systems and organisations handling sensitive disclosures. This paper signifies notable progress in secure whistleblowing systems, offering a way to juggle transparency with informant confidentiality. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains 2025)
Show Figures

Figure 1

26 pages, 6981 KiB  
Article
A Hybrid Blockchain Solution for Electric Vehicle Energy Trading: Balancing Proof of Work and Proof of Stake
by Sid-Ali Amamra
Energies 2025, 18(7), 1840; https://doi.org/10.3390/en18071840 - 5 Apr 2025
Viewed by 699
Abstract
This research presents an innovative blockchain-based solution for the charging and energy trading of electric vehicles (EVs). By combining the strengths of two prominent consensus mechanisms, Proof of Work (PoW) and Proof of Stake (PoS), the proposed system balances security, decentralization, and energy [...] Read more.
This research presents an innovative blockchain-based solution for the charging and energy trading of electric vehicles (EVs). By combining the strengths of two prominent consensus mechanisms, Proof of Work (PoW) and Proof of Stake (PoS), the proposed system balances security, decentralization, and energy efficiency. PoW secures the blockchain, while PoS enhances energy efficiency and scalability, key factors in meeting the growing demand for EV infrastructure. The system’s decentralized nature allows for EV owners, charging stations, and stakeholders to interact and transact transparently, without relying on centralized entities. The research conducts a comprehensive simulation to assess the performance of the proposed hybrid blockchain model, demonstrating significant improvements in cost-effectiveness, scalability, and energy management. Additionally, dynamic pricing mechanisms within the blockchain enable real-time energy trading, optimizing charging times and balancing grid demand efficiently. Through the use of smart contracts, automated pricing adjustments, and incentive-driven user behaviors, the proposed system paves the way for more sustainable, cost-effective, and efficient energy solutions in the future. Full article
Show Figures

Figure 1

27 pages, 1376 KiB  
Article
Proof-of-Friendship Consensus Mechanism for Resilient Blockchain Technology
by Jims Marchang, Rengaprasad Srikanth, Solan Keishing and Indranee Kashyap
Electronics 2025, 14(6), 1153; https://doi.org/10.3390/electronics14061153 - 14 Mar 2025
Viewed by 945
Abstract
Traditional blockchain consensus mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), face significant challenges related to the centralisation of validators and miners, environmental impact, and trustworthiness. While PoW is highly secure, it is energy-intensive, and PoS tends to favour [...] Read more.
Traditional blockchain consensus mechanisms, such as Proof of Work (PoW) and Proof of Stake (PoS), face significant challenges related to the centralisation of validators and miners, environmental impact, and trustworthiness. While PoW is highly secure, it is energy-intensive, and PoS tends to favour wealthy stakeholders, leading to validator centralisation. Existing mechanisms lack fairness, and the aspect of sustainability is not considered. Moreover, it fails to address social trust dynamics within validator selection. To bridge this research gap, this paper proposes Proof of Friendship (PoF)—a novel consensus mechanism that leverages social trust by improving decentralisation, enhancing fairness and sustainability among the validators. Unlike traditional methods that rely solely on computational power or financial stakes, PoF integrates friendship-based trust scores with geo-location diversity, transaction reliability, and sustainable energy adoption. By incorporating a trust graph, where validators are selected based on their verified relationships within the network, PoF mitigates the risks of Sybil attacks, promotes community-driven decentralisation, and enhances the resilience of the blockchain against adversarial manipulation. This research introduces the formal model of PoF, evaluates its security, decentralisation, and sustainability trade-offs, and demonstrates its effectiveness compared to existing consensus mechanisms. Our investigation and results indicate that PoF achieves higher decentralisation, improved trustworthiness, reduced validator monopolisation, and enhanced sustainability while maintaining strong network security. This study opens new avenues for socially aware blockchain governance, making consensus mechanisms more equitable, efficient, and environmentally responsible. This consensus mechanism demonstrates a holistic approach to modern blockchain design, addressing key challenges in trust, performance, and sustainability. The mechanism is tested theoretically and experimentally to validate its robustness and functionality. Processing latency (PL), network latency (NL) [transaction size/network speed], synchronisation delays (SDs), and cumulative delay per transaction are 85 ms, 172 ms, 1802 ms, [PL + NL + SD] 2059 ms, respectively. Full article
(This article belongs to the Special Issue Recent Advances in Information Security and Data Privacy)
Show Figures

Figure 1

24 pages, 7291 KiB  
Article
Piranha Foraging Optimization Algorithm with Deep Learning Enabled Fault Detection in Blockchain-Assisted Sustainable IoT Environment
by Haitham Assiri
Sustainability 2025, 17(4), 1362; https://doi.org/10.3390/su17041362 - 7 Feb 2025
Cited by 1 | Viewed by 1086
Abstract
As the acceptance of Internet of Things (IoT) systems quickens, guaranteeing their sustainability and reliability poses an important challenge. Faults in IoT systems can result in resource inefficiency, high energy consumption, reduced security, and operational downtime, obstructing sustainability goals. Thus, blockchain (BC) technology, [...] Read more.
As the acceptance of Internet of Things (IoT) systems quickens, guaranteeing their sustainability and reliability poses an important challenge. Faults in IoT systems can result in resource inefficiency, high energy consumption, reduced security, and operational downtime, obstructing sustainability goals. Thus, blockchain (BC) technology, known for its decentralized and distributed characteristics, can offer significant solutions in IoT networks. BC technology provides several benefits, such as traceability, immutability, confidentiality, tamper proofing, data integrity, and privacy, without utilizing a third party. Recently, several consensus algorithms, including ripple, proof of stake (PoS), proof of work (PoW), and practical Byzantine fault tolerance (PBFT), have been developed to enhance BC efficiency. Combining fault detection algorithms and BC technology can result in a more reliable and secure IoT environment. Thus, this study presents a sustainable BC-Driven Edge Verification with a Consensus Approach-enabled Optimal Deep Learning (BCEVCA-ODL) approach for fault recognition in sustainable IoT environments. The proposed BCEVCA-ODL technique incorporates the merits of the BC, IoT, and DL techniques to enhance IoT networks’ security, trustworthiness, and efficacy. IoT devices have a substantial level of decentralized decision-making capacity in BC technology to achieve a consensus on the accomplishment of intrablock transactions. A stacked sparse autoencoder (SSAE) model is employed to detect faults in IoT networks. Lastly, the Piranha Foraging Optimization Algorithm (PFOA) approach is used for optimum hyperparameter tuning of the SSAE approach, which assists in enhancing the fault recognition rate. A wide range of simulations was accomplished to highlight the efficacy of the BCEVCA-ODL technique. The BCEVCA-ODL technique achieved a superior FDA value of 100% at a fault probability of 0.00, outperforming the other evaluated methods. The proposed work highlights the significance of embedding sustainability into IoT systems, underlining how advanced fault detection can provide environmental and operational benefits. The experimental outcomes pave the way for greener IoT technologies that support global sustainability initiatives. Full article
Show Figures

Figure 1

23 pages, 613 KiB  
Article
PROACTION: Profitable Transactions Selection Greedy Algorithm in Rational Proof-of-Work Mining
by Mariano Basile, Giovanni Nardini, Pericle Perazzo and Gianluca Dini
Blockchains 2025, 3(1), 2; https://doi.org/10.3390/blockchains3010002 - 22 Jan 2025
Cited by 1 | Viewed by 1552
Abstract
Despite the many consensus algorithms being used in blockchains, proof of work (PoW) is still the most common nowadays. The state-of-the-art mining strategy for PoW-based blockchain protocols consists of including as many transactions as possible in a block to maximize the block reward. [...] Read more.
Despite the many consensus algorithms being used in blockchains, proof of work (PoW) is still the most common nowadays. The state-of-the-art mining strategy for PoW-based blockchain protocols consists of including as many transactions as possible in a block to maximize the block reward. Unfortunately, this strategy maximizes the block orphaning probability too. Recently, we proposed a rational mining strategy aimed at carefully balancing the trade-off between the block reward and the risk of block orphaning. In this work, we present PROACTION, a PROfitable transACTions selectION greedy algorithm that implements such a strategy. We evaluate the algorithm both analytically and experimentally on Bitcoin by assuming a variable random percentage of winning miners adopting PROACTION. Experiments show that when executing PROACTION, miners gain higher long-term rewards than when using the state-of-the-art strategy. The gain is in the order of the block orphaning probability. This result is particularly relevant for those PoW-based blockchain protocols in which such a probability is significant. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

19 pages, 415 KiB  
Article
Wireless May Benefit Blockchain
by Seungmo Kim and Junsung Choi
Appl. Sci. 2025, 15(1), 334; https://doi.org/10.3390/app15010334 - 31 Dec 2024
Viewed by 880
Abstract
Wireless technologies now take every part of one’s everyday life. As such, it will be no longer a surprise if a blockchain system is composed of wirelessly connected nodes. However, wireless communication is known for its inherent unreliability caused by noise, interference, limited [...] Read more.
Wireless technologies now take every part of one’s everyday life. As such, it will be no longer a surprise if a blockchain system is composed of wirelessly connected nodes. However, wireless communication is known for its inherent unreliability caused by noise, interference, limited bandwidth, etc. Motivated by this fundamental problem, this paper investigates the impact of wireless communications on the performance of three representative consensus mechanisms, viz., proof of work (PoW), proof of stake (PoS), and proof of coverage (PoC). It features a comprehensive analytical framework that mathematically derives metrics quantifying the scalability and the level of decentralization of the three consensus mechanisms, constituting a key contribution of this work. The paper then proceeds to present extensive simulation results as a means to confirm the underpinning theoretical findings. Overall, we emphasize that the framework’s holisticity will allow it to be applied to diverse consensus mechanisms. Full article
(This article belongs to the Topic Innovation, Communication and Engineering)
Show Figures

Figure 1

21 pages, 4618 KiB  
Article
Towards an Optimized Blockchain-Based Secure Medical Prescription-Management System
by Imen Ahmed, Mariem Turki, Mouna Baklouti, Bouthaina Dammak and Amnah Alshahrani
Future Internet 2024, 16(7), 243; https://doi.org/10.3390/fi16070243 - 9 Jul 2024
Cited by 2 | Viewed by 1876
Abstract
This work introduces a blockchain-based secure medical prescription-management system seamlessly integrated with a dynamic Internet of Things (IoT) framework. Notably, this integration constitutes a pivotal challenge in the arena of resource-constrained IoT devices: energy consumption. The choice of a suitable blockchain consensus mechanism [...] Read more.
This work introduces a blockchain-based secure medical prescription-management system seamlessly integrated with a dynamic Internet of Things (IoT) framework. Notably, this integration constitutes a pivotal challenge in the arena of resource-constrained IoT devices: energy consumption. The choice of a suitable blockchain consensus mechanism emerges as the linchpin in surmounting this hurdle. Thus, this paper conducts a comprehensive comparison of energy consumption between two distinct consensus mechanisms: Proof of Work (PoW) and Quorum-based Byzantine fault tolerance (QBFT). Furthermore, an assessment of the most energy-efficient algorithm is performed across multiple networks and various parameters. This approach ensures the acquisition of reliable and statistically significant data, enabling meaningful conclusions to be drawn about the system’s performance in real-world scenarios. The experimental results show that, compared to the PoW, the QBFT consensus mechanism reduced the energy consumption by an average of 5%. This finding underscores the significant advantage of QBFT in addressing the energy consumption challenges posed by resource-constrained IoT devices. In addition to its inherent benefits of privacy and block time efficiency, the Quorum blockchain emerges as a more sustainable choice for IoT applications due to its lower power consumption. Full article
Show Figures

Figure 1

15 pages, 866 KiB  
Data Descriptor
Hardware Trojan Dataset of RISC-V and Web3 Generated with ChatGPT-4
by Victor Takashi Hayashi and Wilson Vicente Ruggiero
Data 2024, 9(6), 82; https://doi.org/10.3390/data9060082 - 19 Jun 2024
Cited by 3 | Viewed by 2779
Abstract
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V specifically has study cases of three [...] Read more.
Although hardware trojans impose a relevant threat to the hardware security of RISC-V and Web3 applications, existing datasets have a limited set of examples, as the most famous hardware trojan dataset TrustHub has 106 different trojans. RISC-V specifically has study cases of three and four different hardware trojans, and no research was found regarding Web3 hardware trojans in modules such as a hardware wallet. This research presents a dataset of 290 Verilog examples generated with ChatGPT-4 Large Language Model (LLM) based on 29 golden models and the TrustHub taxonomy. It is expected that this dataset supports future research endeavors regarding defense mechanisms against hardware trojans in RISC-V, hardware wallet, and hardware Proof of Work (PoW) miner. Full article
(This article belongs to the Section Information Systems and Data Management)
Show Figures

Figure 1

24 pages, 496 KiB  
Article
Proof of Fairness: Dynamic and Secure Consensus Protocol for Blockchain
by Abdulrahman Alamer and Basem Assiri
Electronics 2024, 13(6), 1056; https://doi.org/10.3390/electronics13061056 - 12 Mar 2024
Cited by 6 | Viewed by 1773
Abstract
Blockchain technology is a decentralized and secure paradigm for data processing, sharing, and storing. It relies on consensus protocol for all decisions, which focuses on computational and resource capability. For example, proof of work (PoW) and proof of stake (PoS) are the most [...] Read more.
Blockchain technology is a decentralized and secure paradigm for data processing, sharing, and storing. It relies on consensus protocol for all decisions, which focuses on computational and resource capability. For example, proof of work (PoW) and proof of stake (PoS) are the most famous consensus protocols that are currently used. However, these current consensus protocols are required to recruit a node with a high computational or a large amount of cryptocurrency to act as a miner node and to generate a new block. Unfortunately, these PoW and PoS protocols could be impractical for adoption in today’s technological fields, such as the Internet of Things and healthcare. In addition, these protocols are susceptible to flexibility, security, and fairness issues, as they are discussed in detail in this work. Therefore, this paper introduces a proof of fairness (PoF) as a dynamic and secure consensus protocol for enhancing the mining selection process. The selection of the miner node is influenced by numerous factors, including the time required to generate a block based on the transaction’s sensitivity. Firstly, a reverse auction mechanism is designed as an incentive mechanism to encourage all nodes to participate in the miner selection process. In a reverse auction, each node will draw its strategy based on its computational capability and claimed cost. Secondly, an expressive language is developed to categorize transaction types based on their sensitivity to processing time, ensuring compatibility with our miner selection process. Thirdly, a homomorphic concept is designed as a security and privacy scheme to protect the bidder’s data confidentiality. Finally, an extensive evaluation involving numerical analysis was carried out to assess the efficiency of the suggested PoF protocol, which confirms that the proposed PoF is dynamic and more efficient than current PoW and PoS consensus protocols. Full article
(This article belongs to the Special Issue Recent Advances in Blockchain Technology and Its Applications)
Show Figures

Figure 1

38 pages, 8249 KiB  
Article
Sustainable Optimizing Performance and Energy Efficiency in Proof of Work Blockchain: A Multilinear Regression Approach
by Meennapa Rukhiran, Songwut Boonsong and Paniti Netinant
Sustainability 2024, 16(4), 1519; https://doi.org/10.3390/su16041519 - 10 Feb 2024
Cited by 10 | Viewed by 4821
Abstract
The energy-intensive characteristics of the computations performed by graphics processing units (GPUs) in proof-of-work (PoW) blockchain technology are readily apparent. The optimization of GPU feature configuration is a complex subject that significantly impacts a system’s energy consumption and performance efficiency. The primary objectives [...] Read more.
The energy-intensive characteristics of the computations performed by graphics processing units (GPUs) in proof-of-work (PoW) blockchain technology are readily apparent. The optimization of GPU feature configuration is a complex subject that significantly impacts a system’s energy consumption and performance efficiency. The primary objectives of this study are to examine and improve the energy consumption characteristics of GPUs, which play a crucial role in the functioning of blockchains and the mining of cryptocurrencies. This study examines the complex relationship between GPU configurations and system architecture components and their effects on energy efficiency and sustainability. The methodology of this study conducts experiments involving various GPU models and mining software, evaluating their effectiveness across various configurations and environments. Multilinear regression analysis is used to study the complex relationships between critical performance indicators like power consumption, thermal dynamics, core speed, and hash rate and their effects on energy efficiency and performance. The results reveal that strategically adjusting GPU hardware, software, and configuration can preserve substantial energy while preserving computational efficiency. GPU core speed, temperature, core memory speed, ETASH algorithms, fan speed, and energy usage significantly affected the dependent computational-efficiency variable (p = 0.000 and R2 = 0.962) using multilinear regression analysis. GPU core speed, temperature, core memory speed, fan speed, and energy usage significantly affected efficient energy usage (p = 0.000 and R2 = 0.989). The contributions of this study offer practical recommendations for optimizing the feature configurations of GPUs to reduce energy consumption, mitigate the environmental impacts of blockchain operations, and contribute to the current research on performance in PoW blockchain applications. Full article
Show Figures

Figure 1

21 pages, 4706 KiB  
Review
Bitcoin and Renewable Energy Mining: A Survey
by Yusuke Tomatsu and Wenlin Han
Blockchains 2023, 1(2), 90-110; https://doi.org/10.3390/blockchains1020007 - 7 Dec 2023
Cited by 7 | Viewed by 3052
Abstract
Bitcoin, the most valuable and energy-consuming cryptocurrency, has recently been at the center of a heated debate over its environmental impact. This controversy has caught the public’s attention, prompting us to investigate the energy consumption of Bitcoin. In this paper, we have conducted [...] Read more.
Bitcoin, the most valuable and energy-consuming cryptocurrency, has recently been at the center of a heated debate over its environmental impact. This controversy has caught the public’s attention, prompting us to investigate the energy consumption of Bitcoin. In this paper, we have conducted a review of the literature on various aspects of Bitcoin mining, including its mechanisms, energy consumption, mining sites, and the potential for renewable energy use. Our findings reveal that the power consumption of Bitcoin is bound to increase with the continued adoption of the proof-of-work (PoW) consensus algorithm. Nonetheless, the growing availability of affordable renewable energy sources worldwide brings hope that Bitcoin mining will shift towards cleaner energy in the near future. Full article
(This article belongs to the Special Issue Feature Papers in Blockchains)
Show Figures

Figure 1

18 pages, 3783 KiB  
Article
Less Is More: Understanding Network Bias in Proof-of-Work Blockchains
by Yifan Mao and Shaileshh Bojja Venkatakrishnan
Mathematics 2023, 11(23), 4741; https://doi.org/10.3390/math11234741 - 23 Nov 2023
Cited by 4 | Viewed by 1355
Abstract
Blockchains are becoming increasingly important in today’s Internet, enabling large-scale decentralized applications with strong security and transparency properties. In a blockchain system, participants maintain and update the server-side state of an application by appending data as blocks onto an immutable, distributed ledger through [...] Read more.
Blockchains are becoming increasingly important in today’s Internet, enabling large-scale decentralized applications with strong security and transparency properties. In a blockchain system, participants maintain and update the server-side state of an application by appending data as blocks onto an immutable, distributed ledger through a consensus protocol within a peer-to-peer network. There has been a significant increase in profit in mining blocks. For instance, Bitcoin miners currently receive over USD 200,000 per mined block. An essential determinant of these rewards is the time it takes to disseminate newly mined blocks across the network. This paper addresses the challenge of optimizing mining rewards by exploring topology design in a wide-area blockchain network utilizing a Proof-of-Work consensus protocol. We show that under low block times, the geographical location of a miner critically impacts the number of successful blocks mined by the miner. We also show that a miner may improve its success rate by increasing its connectivity to the network. However, contrary to the general wisdom that a faster network is always better for a miner, we show that increasing network connectivity (e.g., by adding more neighbors) is beneficial to a miner only up to a point after which the miner’s rewards degrade. This is because when a miner improves its connectivity, it inadvertently also aids other miners in increasing their connectivity. We also present a network-level collusion attack in which a miner can increase its block success rate by becoming part of a tightly connected cluster. Here too, we observe that the mining gains obtained increase with cluster size only up to a point, and decrease thereafter. Our findings highlight that the network topology is a key variable affecting miner performance in PoW blockchains that must not be overlooked. We demonstrate our observations via detailed simulations modeled using real-world measurement data. Full article
(This article belongs to the Special Issue Emerging Networks and Blockchain Technology)
Show Figures

Figure 1

21 pages, 1090 KiB  
Article
XOR Chain and Perfect Secrecy at the Dawn of the Quantum Era
by Luis Adrián Lizama-Pérez
Cryptography 2023, 7(4), 50; https://doi.org/10.3390/cryptography7040050 - 13 Oct 2023
Viewed by 3394
Abstract
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption. We provide perfect secrecy proof of the [...] Read more.
In this article, we present a new method that achieves Shannon’s perfect secrecy. To achieve this property, we will introduce the triple XOR cancellation rule. The approach has two execution modes: digital signature and data encryption. We provide perfect secrecy proof of the encryption method. Furthermore, based on our fundamental algorithm, we developed a new strategy for the blockchain system that does not require proof of work (PoW). However, it is a practical mechanism for connecting blocks to the chain. Due to the risk that quantum computers present for current cryptosystems based on prime factorization or discrete logarithm, we postulate that our method represents a promising alternative in the quantum era. We expect our work to have profound implications for the security of communications between mobile devices, the Internet of Things (IoT), and the blockchain. Full article
(This article belongs to the Special Issue Security and Encryption for IoT Devices and Networks)
Show Figures

Figure 1

Back to TopTop