The robust distributed ledger model for a multidimensional blockchain security analysis
Journal: Scientific and Technical Journal of Information Technologies, Mechanics and Optics (Vol.21, No. 2)Publication Date: 2021-04-20
Authors : Shilov I.M. Zakoldaev D.A.;
Page : 249-255
Keywords : blockchain; robust distributed ledger; multidimensional blockchain; universal composability framework; consensus mechanism; transactions; security proof;
Abstract
The paper considers the problem of constructing a model of the robust distributed ledger for security proof of a multidimensional blockchain. Several requirements for the model are imposed, among which most important are compatibility with existing models and presence of functionalities for external transactions. The authors present an approach to extending existing models based on the analysis of these solutions, their advantages and disadvantages. The model construction is based on universal composability framework. Two models are proposed: a model of the robust distributed ledger and a model of the search and verification protocol. These are meant to be used in security proofs for scaling and registration in a multidimensional blockchain. The proposed model of the robust distributed ledger is an extension of models used in security proofs for consensus mechanisms: proof of work and proof of stake. It duplicates their functions and additionally maintains external transactions. The model of the search and verification protocol implements ideal functionality used for external transaction verification. The results prove that the proposed model does not damage essential security parameters of the robust distributed ledger in presence of external transactions. The study confirms the compatibility of the proposed models with existing analogues implementing robust distributed ledgers. This fact allows using the universal composability theorem for constructing security proofs of multidimensional blockchain and search and verification protocol. The proposed method of extending existing models for security proofs can be used to create new models with additional functions not implemented for security proof of a multidimensional blockchain.
Other Latest Articles
- An analysis of the ways to reduce the vulnerability of networks based on the sequential removal of key elements
- Applying bagging in finding network traffic anomalies
- An information system for spatial visualization of prognostic and retrospective data on the probability of observing auroras
- Balanced Scorecard in Service Operation Scenario
- Detection of a small target object in blurry images affected by affine distortions
Last modified: 2021-04-20 19:55:02