Back to Search
Start Over
A Survey of Consortium Blockchain and Its Applications.
- Source :
-
Cryptography (2410-387X) . Jun2024, Vol. 8 Issue 2, p12. 25p. - Publication Year :
- 2024
-
Abstract
- Blockchain is a revolutionary technology that has reshaped the trust model among mutually distrustful peers in a distributed network. While blockchain is well-known for its initial usage in a public manner, such as the cryptocurrency of Bitcoin, consortium blockchain, which requires authentication of all involved participants, has also been widely adopted in various domains. Nevertheless, there is a lack of comprehensive study of consortium blockchain in terms of its architecture design, consensus mechanisms, comparative performance, etc. In this study, we aim to fill this gap by surveying the most popular consortium blockchain platforms and assessing their core designs in a layered fashion. Particularly, Byzantine fault tolerant (BFT) state machine replication (SMR) is introduced to act as a basic computational model of consortium blockchain. Then the consortium blockchain is split into the hardware layer, layer-0 (network layer), layer-I (data layer, consensus layer and contract layer), layer-II protocols, and application layer. Each layer is presented with closely related discussion and analysis. Furthermore, with the extraction of the core functionalities, i.e., robust storage and guaranteed execution, that a consortium blockchain can provide, several typical consortium blockchain-empowered decentralized application scenarios are introduced. With these thorough studies and analyses, this work aims to systematize the knowledge dispersed in the consortium blockchain, highlight the unsolved challenges, and also indicate the propitious avenues of future work. [ABSTRACT FROM AUTHOR]
Details
- Language :
- English
- ISSN :
- 2410387X
- Volume :
- 8
- Issue :
- 2
- Database :
- Academic Search Index
- Journal :
- Cryptography (2410-387X)
- Publication Type :
- Academic Journal
- Accession number :
- 178157061
- Full Text :
- https://doi.org/10.3390/cryptography8020012