USE OF BLOCKCHAIN TECHNOLOGY FOR BUILDING A HIERARCHICAL STRUCTURE ON MOST STATE REGISTRIES FOR THE PURPOSE OF PROTECTION AGAINST FORGERY OF INFORMATION

M.S. Kondratenko

Èlektron. model. 2023, 45(3):43-56

https://doi.org/10.15407/emodel.45.03.043

ABSTRACT

The work deals with the problem of ensuring the security of information storage in various registers, including state ones. First of all, we focused on security against attacks aimed at changing information in the registry, which is a constant and real threat today. The method proposed by us to prevent such attacks on changing information in the registry is based on the use of results from a relatively new direction in the field of information technology – blockchain technology. We propose building a so-called cascade structure of registers on blockchains using one of the newest consensus protocols called Proof-of-Proof. Such a cascade structure of registers, with the correct parameters of its construction and use, provides all the properties of correct information storage, such as non-failure, immutability, sequence of placement in the register, and others. After formulating the basic idea of building a cascade registry, we present a list of problems that need to be solved so that the probability of success of a substitution information attack is negligibly small.

KEYWORDS

blockchain, state register, databases, consensus protocols, information protection.

REFERENCES

  1. Official website of the Ministry of Justice of Ukraine. Unified and state registers. https://minjust.gov.ua/m/str_22253
  2. Official website of the Parliament of Ukraine. The draft law "On public electronic registers". https://zakon.rada.gov.ua/laws/show/1907-20#Text
  3. Veriblock documentation. Proof-of-Proof and VeriBlock Blockchain Protocol Consensus Algorithm and Economic Incentivization Specifications. https://www.veriblock.org/wp-content/uploads/2019/06/Proof-of-Proof_and_VeriBlock_Blockchain_Protocol_Consensus_Algorithm_and_Economic_Incentivization_v1.0.pdf
  4. Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. https://bitcoin.org/bitcoin.pdf
  5. Back A. Hashcash - A Denial of Service Counter-Measure. http://hashcash.org/papers/hashcash.pdf
  6. Sompolinsky Y., Zohar A. Accelerating bitcoin's transaction processing: fast money grows on trees, not chains. IACR Cryptology ePrint Archive, 2013/881. https://eprint.iacr.org/2013/881
  7. Sompolinsky Y., Lewenberg Y., Zohar A. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive 2016/1159.
  8. Sompolinsky Y., Zohar A. Phantom. IACR Cryptology ePrint Archive, Report 2018/104. https://eprint.iacr.org/2018/104.pdf
  9. Popov S. The Tangle 2017, prizm.vip. https://pzm.space/prizm-whitepaper/
  10. Fitzi M., Gazi P., Kiayias A., Russell A. Parallel chains: Improving throughput and latency of blockchain protocols via parallel composition. Cryptology ePrint Archive, Report 2018/1119. https://eprint.iacr.org/2018/1119
  11. Pass R., Shi E. FruitChains: A fair blockchain. 36th ACMPODC, P. 315–324. ACM, July 2017.
    https://doi.org/10.1145/3087801.3087809
  12. Garoffolo A., Kaidalov D., Oliynykov R. Zendoo: a zk-SNARK verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. IEEE. Institute of Electrical and Electronic Engineers. https://ieeexplore.ieee.org/document/9355752
  13. Grunspan C., Pérez-Marco R. Double spend races. CoRR abs/1702.02867 (2017). http://arxiv.org/abs/1702.02867
  14. Kovalchuk, L., Kostanda, V., Marukhnenko, O., Pozhylenkov, O. Achieving Security in Proof-of-Proof Protocol with Non-Zero Synchronization Time. MDPI Open Access Journal. Mathematics, 2022. №10(14), 2422. 
    https://doi.org/10.3390/math10142422

Full text: PDF