Proof Of Online - Solution for BWA(Block Withholding Attack)- Proof Of Online is used as a supplement to the Block Withholding Attack (BWA), a type of 51% attack on the block chain.
- BWA (Block Withholding Attack) is a process that creates a longer malicious block in the off-line state and then invalidates the normal transaction.
- All PoW-based coins, including Bitcoin, are potentially at risk and therefore suggest a way to fundamentally block off-line block generation.
[Contents of technology]- The height % n == 0 block of the block chain (eg, every xxx00, xxx10, xxx20, ..., xxx90 when n = 10) is called a PoO block.
- Always include a signature signed by a particular signer, and the signature information is recorded by adding a VchBlockSig field to the header.
- A particular signer is an account owned by a foundation or organization that initially designs the block chain or operates the block chain, and is called a verifier.
- They sign the PoO block with the private key of the public address to provide that the block is synchronized to the network.
- All other nodes accept the block by confirming that the PoO block has been signed with the public address of the foundation.
- A node with a public key of a verifier is called a verifier node to distinguish it from an ordinary mining node.
- It records the verifier public key list operated by the Foundation like the SeedNode operation method in the program source, and the block addition operation for online certification grants authority only to the verifier node.
- With this logic, an attacker can only have fewer than the number of blocks defined by %n, so even if he seizes the network hash power, he can not get enough time to do a malicious double spending attack.
- The miners of all blocks can be identified as the corresponding block with the seed node operated by the foundation.
- For this reason, the name of this algorithm is called Proof Of Online.
[The way of operation]- In order to minimize the repulsion of existing miners, mining compensation for PoO block is limited to the commission of the transaction and the appropriate n value is set.
- In the case where all of the verifier nodes stop operating, if the block time is more than twice the normal block time, the nth block will also enable mining of general miners.
- If a verifier node is added or a transfer of authority is required, it is approved by a co-signature of more than a majority of verifiers, and the new verified verifier is managed in the client's internal database of each node
[Application of technology]- The PoO solution will be the first to be applied to the QCity Coin, and a detailed description of the technology will be replaced by the corresponding technical white paper.
- Qcity coin technical white paper : http://www.qcitycoin.org/img/qcitycoin_tech.pdf
[Notoce]We changed the subject of this post because there was a difference in views on 51% attack.