TP-PBFT: A Scalable PBFT Based On Threshold Proxy Signature For Iot-Blockchain Applications
TP-PBFT: A Scalable PBFT Based On Threshold Proxy Signature For Iot-Blockchain Applications
This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Abstract—Consensus protocol is one of the core technologies [15]–[17], healthcare [18]–[21], etc. The integration of the
of IoT-blockchain applications, which is used to ensure the con- IoT and blockchain has attracted widespread attention and
sistency of data between terminal devices that do not trust each demonstrated significant potential. Zhang et al. [21] applied
other. Practical Byzantine Fault Tolerance (PBFT) is a typical
consensus algorithm. Due to its advantages of low computational the IoT-blockchain technology to the field of healthcare,
power and complexity, PBFT is deemed more suitable for IoT- and proposed a blockchain-based hierarchical data sharing
blockchain applications. PBFT can tolerate 1/3 faulty nodes in a framework (BHDSF) to address the challenges of data privacy,
blockchain network, which can be malicious or unresponsive. integrity, and secure sharing. Kamruzzaman et al. [22] focused
In this work, if a node does not respond to messages from on delineating the impact and potential of blockchain, IoT, and
other nodes, it can be regarded as an offline node. Therefore,
when more than a third of the nodes go offline, the blockchain fog computing on healthcare services in the context of smart
network breaks down. However, in IoT applications, this situation cities. Considering the importance of data security under the
is likely to occur and greatly limits the security and stability of background of data explosion, Tchagna et al. [23] proposed a
IoT-blockchain networks. In order to solve the above problem, blockchain method to guarantee the security of data in the IoT
we propose a novel threshold proxy signature-based PBFT (TP- architecture. With continuous technological advancements and
PBFT) consensus for IoT-blockchain applications. We construct
a new threshold proxy signature scheme that enables the proxy expanding application scenarios, IoT-blockchain applications
signers to sign messages on behalf of the offline nodes. In are expected to play an increasingly important role in the
addition, we design a “two-step clustering” method to construct a future, driving digital transformation and intelligent upgrading
double-layer architecture that improves the scalability of PBFT. across various industries.
Meanwhile, a reputation mechanism is introduced to evaluate the In the IoT scenarios, terminal devices can directly access
quality of the nodes. The experimental results show that our TP-
PBFT consensus protocol can reach consensus when the number source data, which solves the problem that blockchain can only
of offline nodes more than 1/3. guarantee the security of on-chain data but cannot guarantee
its authenticity. The blockchain has characteristics such as
Index Terms—Internet of Things (IoT), blockchain, PBFT
consensus protocol, threshold proxy signature decentralization, anti-tampering, and data traceability, which
effectively address issues related to data access, collaboration,
management, security, and credibility in the IoT. In IoT-
I. I NTRODUCTION blockchain applications, terminal nodes collect data through
Authorized
Copyrightlicensed use limited
(c) 2022 IEEE. to: Personal
Indian Institute
use ofofTechnology (ISM)isDhanbad.
this material Downloaded
permitted. However,onpermission
January 17,2024 at 11:16:44
to use UTC from
this material forIEEE
any Xplore. Restrictionsmust
other purposes apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
be obtained from the IEEE by sending a request to [email protected].
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
TABLE I
C OMPARISON OF EXISTING LITERATURE WITH THE PROPOSED SCHEME
it is able to achieve a correct decision as long as the number adopted in small networks [37], [42]. But this feature conflicts
of faulty nodes is fewer than 1/3 of the all participating with the massive terminal nodes in IoT applications [25]. In
nodes [32]. Faulty nodes may have malicious behavior such recent years, scholars have given some solutions for the scala-
as intentionally sending error messages or abstaining from bility and tolerability of PBFT in IoT-blockchain applications.
voting. In recent years, there have also been many studies on Li et al. [37] and Qushtom et al. [33] used the concept of
PBFT in IoT-blockchain applications [31]–[37]. Most of these hierarchical consensus to expand PBFT, which can reduce the
researches are aiming to improve the efficiency and scalability communication complexity between nodes and improve the
of PBFT. efficiency of consensus. Gan et al. [43], Xu et al. [44] and
Wang et al. [45] all use the K-medoids clustering algorithm
A. Related Works to improve the scalability of PBFT.
From the perspective of energy efficiency, Xu et al. [31]
The concept of consensus protocol has its roots in ad-
designed an efficient PBFT consensus protocol for energy
dressing the Byzantine Generals’ Problem [41], a theoretical
constrained IoT-blockchain applications. Feng et al. [46] pro-
scenario where a group of generals must coordinate their
posed designed a propagation-efficient protocol (NefSBFT),
actions to attack or retreat, but some may be traitors providing
which achieved fast propagation, low message complexity
conflicting information. With the advancement of technology,
and few resource consumption of travel hops and running
various consensus protocols emerge one after another. PBFT
nodes for complete protocol execution. Fu et al. [36] proposed
stands out among these protocols, addressing the Byzantine
an efficient and fault-tolerant blockchain consensus transform
Generals’ Problem by enhancing the efficiency of consensus.
(BCT) mechanism for IoT.
PBFT streamlines communication and reduces the required
Previous researches on PBFT usually assumed that nodes
validations, making it a robust choice for achieving agreement
are online for a long time and the network topology is static, so
in distributed networks. Its optimization contributes signif-
dynamic adjustment of nodes was not take into account. How-
icantly to the reliability and performance of decentralized
ever, with the continuous development of Internet technology,
technologies, showcasing a key advancement in the evolution
it has become a common demand for nodes to dynamically
of consensus protocols.
join or exit the system. Feng et al. [38] proposed a scalable
PBFT has a poor scalability and can only accommodate
and dynamic multi-agent hierarchical PBFT protocol (SDMA-
no more than 100 nodes in applications, thus it is typically
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
PBFT). This protocol introduced the concept of agent node, PBFT is generally suitable for static network topologies, which
which facilitates the entry and exit operation of consensus may not be feasible for IoT. IoT is a dynamic network, where
nodes in the blockchain system. Xu et al. [39] described a nodes may frequently join or leave. For PBFT, if a node wants
dynamic PBFT consensus protocol that allows nodes to join or to join or leave, the entire system must be stopped [39]. This
leave the network dynamically without interrupting the system, seems an impractical approach for IoT scenarios.
and defined a mechanism for eliminating malicious nodes to
improve the robustness of the system. Hu et al. [26] proposed C. Our Contributions
an IoT adaptive dynamic blockchain networking method based
In IoT-blockchain applications, in order to solve the problem
on discrete heartbeat signals to detect node status, thereby
of system breakdown caused by over 1/3 offline nodes, we first
preventing system paralysis caused by more than 1/3 of the
propose a consensus protocol (TP-PBFT) which can tolerate
nodes offline during the consensus process. Fan et al. [40]
more than one-third of consensus nodes temporarily offline.
proposed a dynamic random Byzantine fault tolerance (DR-
Meanwhile, we design a threshold proxy signature scheme
BFT) consensus protocol to solve the join and exit problems
to cooperatively issue a proxy signature on behalf of the
of the consensus nodes in IoT-blockchain applications. They
offline signers and propose a “two-step clustering” method to
pointed out that terminal devices are not always online, and the
improve the scalability of the consensus algorithm. Our main
nodes are dynamic in nature with the nodes joining or leaving
contributions are as follows.
the blockchain network frequently so that some devices may
be disconnected from the network. In Table 1, we present the • We propose a hybrid clustering method of “two-step
comparison of existing works with the protocol proposed in clustering” to construct a double-layer architecture of
this article. PBFT, which can improve the scalability of the consen-
In summary, compared with the previous double-layer con- sus algorithm. Compared with the previous double-layer
sensus architecture, the architecture constructed by “two-step consensus architectures, this architecture can alleviate the
clustering” can alleviate single-fault case or cheating case to a single-fault case to a certain extent, and can also play a
certain extent. The protocol which was proposed by Hu et al. role of mutual supervision among the cluster centers of
[26] is a preventive work, and still cannot solve the problems the same cluster.
that more than 1/3 of the total consensus nodes offline during • We design a threshold proxy signature scheme to improve
the consensus process. To solve the offline-tolerant problem, the offline tolerance of PBFT. When more than 1/3 of
we use threshold proxy signature scheme to agent vote for the consensus nodes are offline, the proxy signers can
offline nodes. In addition, traditional PBFT can tolerate failure use the power of proxy signing to vote on behalf of the
of no more than 1/3 of consensus nodes, it does not have the offline nodes. After the offline nodes come back online,
function of detecting and clearing the fault nodes. Thus, we the system will automatically connect these nodes to the
introduce a reputation mechanism to purify the system. The network and let them continue to provide services.
reputation mechanism can exclude Byzantine nodes or inactive • Based on the “two-step clustering” and threshold proxy
nodes from the consensus group by scoring the behavior of signature scheme, we propose a scalable TP-PBFT con-
nodes. sensus protocol, which is suitable for IoT-blockchain
applications where nodes are unstable. We also introduce
a reputation mechanism to the system to evaluate the
B. Our Motivation
quality of nodes. The purpose of this is to gradually purify
Adopting PBFT in IoT-blockchain applications has the the system.
following three critical challenges. • We analyze and demonstrate the effectiveness and scala-
Scalability: The PBFT protocol relies on all-to-all in- bility of TP-PBFT mechanism. We also experimentally
ternode communications which result in the exponentially evaluate the tolerability of the TP-PBFT. The results
increasing message (O(n2 ) communication complexity among show that TP-PBFT can achieve consensus even when
n nodes). Thus, it scales poorly as the number of nodes the number of offline nodes more than 1/3.
increases, this is contrary to IoT networks which are expected In order to illustrate the practicality of the TP-PBFT, we
to involve numerous devices [31]. use the following example. A distributed energy measurement
Tolerability: In the traditional PBFT of blockchain, if and transaction blockchain network consisting of 1000 IoT
more than 1/3 of the consensus nodes go offline, the entire devices. These devices issue, circulate, exchange, and consume
system becomes paralyzed. But this situation is likely to energy tokens within the blockchain network [26]. However,
occur in IoT scenarios due to the failure of nodes and poor due to varying operating states and working hours of IoT de-
network connectivity [1]. This limitation significantly impacts vices controlled by terminals, the network becomes dynamic.
the security and stability of the IoT-blockchain applications Fluctuations arise from differing on/off times, and network
[26], [40]. disconnections may occur due to public network conditions.
Flexibility: Although PBFT has some advantages in terms This dynamic IoT network poses challenges, such as the
of computing power, complexity, and fault tolerance compared BFT consensus algorithm’s vulnerability to producing empty
with other consensus protocols in IoT-blockchain applications, blocks when IoT nodes go offline. If more than 1/3 of IoT
it has a fatal disadvantage of flexibility. Blockchain is designed nodes disconnect, the BFT consensus algorithm fails, causing
with the assumption of a stable network connection [47], while
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
• PrivKeyGen(pp): The original signer A input pp as the Assuming that adversary Adv can attack at most t−1 proxy
public parameter and gets a key pair (dA , PA ) where dA signers, we define the following two types of adversaries:
is the private key and PA is the public key. • Eavesdropping adversary: the adversary can obtain the
• ProxyKeyGen(dA ): A authorizes the signing power to storage information of the proxy signers and eavesdrop
the proxy signers with the private key dA , and then on all broadcast messages.
interacts with the proxy signers to generate the proxy • Halting adversary: the adversary can control the proxy
signing key dB cooperatively. signers to stop sending messages at the beginning of each
• ProxySign(dB , m): The proxy signer uses the proxy round of communication.
signing key dB to sign the message m, and gets a We assume that the computing power of the adversary is under
signature s. of probabilistic polynomial Turing machine model, so it is
• VerifySign(PA ): The verifier can utilize the original
impossible to solve the discrete logarithm problem on the
signer’s public key PA to authenticate the validity of the elliptic curve.
proxy signature. In this work, the threshold proxy signature is applied to
Based on the proxy signature scheme, the original signer the voting process in the PBFT consensus, so its minimum
can authorize the signing power to n proxy signers, and sets threshold value t also needs to meet a condition: t = f + 1,
the threshold value as t, such that the threshold proxy signature where f is the tolerable Byzantine nodes in the system.
can be realized. The (t, n) threshold proxy signature scheme
should satisfy the following six requirements [51]: D. Reputation Mechanism
- Secrecy. The original signer’s private key cannot be
The reputation mechanism can objectively measure the
obtained from any information, such as the shares of
quality of a node through mutual supervision and evaluation
the proxy signing key, proxy signatures and so on.
among participants. The reputation mechanism [52]–[54] can
Particularly, even all proxy signers collude together, they
help us optimize the IoT-blockchain system. The reputation
cannot recover the original signer’s private key.
value of the node is used to measure whether the node is
- Proxy protection. Only the delegated proxy signer can
eligible to participate in the consensus, and the node whose
generate valid partial proxy signatures. Even the original
reputation does not meet the initial value will be cleared out
signer cannot masquerade as a proxy signer to create
of the system. The reputation value val range is (0, 1], and the
partial signatures.
initial val of each node is uniformly set to 0.5. The reputation
- Unforgeability. A valid proxy signature can only be
of a node is judged from four aspects: incomplete rate θ, evil
cooperatively generated by t or more proxy signers. This
rate ξ, activity rate φ and transaction magnitude factor ψ,
means that valid proxy signatures cannot be created by
respectively. Assume that the number of nodes in the system
t − 1 or less proxy signers, or any third parties who are
is n.
not designated as proxy signers.
- Nonrepudiation. Any valid proxy signature must be gen- 1) Incomplete rate: We use the symbol θi to represent
erated by t or more proxy signers. Therefore, proxy the incomplete rate. θi can be expressed as the ratio of
signers cannot deny that they have signed the message. In the number of times that the node i failed to complete
addition, the original signer cannot deny having delegated consensus (ωi ) to the total number of times Ω that node
the power of signing messages to the proxy signers. i participates in consensus, i.e., θi = ωi /Ω ∈ (0, 1], i ∈
- Time constraint. The proxy signing keys can be used only [1, 2, ..., n].
during the delegated period. Once they expire, the proxy 2) Evil rate : The evil rate is represented by ξi , ξi =
signatures generated by using those keys become invalid. νi /Ω ∈ (0, 1]. νi indicates the number of times that
- Known signers. For internal auditing purposes, the system node i sends an error message and reports it successfully.
is able to identify the actual signers of a given threshold Ω represents the total number of times that the node
proxy signature. participated in the consensus. The evil rate mainly
depends on whether a node sends messages honestly.
The security of the (t, n)-threshold proxy signature scheme
When a node sends an error message, other nodes will
includes unforgeability and robustness, which are defined as
report it, and the report can be counted into the system
follows.
until a consensus is reached.
Definition 1. (Unforgeability): Given public parameters,
3) Activity rate: The activity rate is represented by φi .
the adversary Adv can view the interactive execution and
The time period level of node i offline is recorded as
corrupt at most t − 1 proxy signers, in addition, Adv can
δi , the time period level of node i network latency is
also adaptively select messages m1 , ..., mk and query their
recorded as li , the time period level of node i joining
corresponding threshold proxy signatures for k times. The
the network is recorded as Ti . The node activity rate
probability that adversary Adv can successfully forge a thresh-
is: φi = (δi + li )/Ti ∈ (0, 1]. The activity rate mainly
old proxy signature for a new message m is negligible.
measures the activity performance of the node.
Definition 2. (Robustness): The scheme can still operate
4) Transaction magnitude factor: The transaction magni-
successfully even when adversary Adv can corrupt at most
tude factor is used to identify the historical transaction
t − 1 proxy signers.
processing capability of node i. Assuming that the
transaction magnitude processed by node i is denoted as
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
A. Clustering
In IoT blockchain applications, massive terminal devices
pose challenges to the scalability of PBFT consensus. At Algorithm 1: Generating Proxy Key Algorithm (For
present, there are some improvement schemes for the scal- A)
ability of PBFT, and one of the more common methods is
Input: KB : the random number selected by B;
hierarchical consensus [37]. In some traditional double-layer
Output: (GA , GAB , sA,i ): authorization information;
architecture based on clustering algorithm, top-layer cluster is
1 A receives the GB = KB G sent by proxy group B;
composed of the cluster centers, so when the cluster center
2 if |GB | ≥ t then
goes offline or crashes, the whole cluster where the center is
3 A calculates GA = KA G;
located cannot upload the lower consensus data to the whole
4 GAB = (x1 , y1 ) = KA GB ;
network consensus.
5 rAB = x1 mod q;
In this work, we propose a “two-step clustering” method.
6 end
We use this approach to construct a double-layer architecture
7 if rAB == 0 then
composed of top-layer cluster and lower-layer cluster. The
8 return null;
clusters divided by this method have multiple cluster centers,
9 else
so we refer to multiple cluster centers in the same cluster −1
10 A calculates sA = KA rAB dA mod q;
as representative points. As shown in Fig. 2, a cluster is
11 if sA = 0 then
represented by two representative points (RP). All the rep-
12 return null;
resentative points form the top-layer cluster, and all the nodes
13 else
in the cluster form the lower-layer consensus group. The
14 A calculates sA,i , and sends (GA , GAB , sA,i )
“two-step clustering” can alleviate single-fault cases, and the
to Bi ;
representative points in the same cluster can play the role of
15 end
mutual supervision in the consensus.
16 end
In IoT-blockchain applications, we use “two step clustering”
to divide the terminal devices (nodes) into n1 clusters. The
detailed steps are as follows:
• We select n1 nodes with the highest reputation value to
serve as the cluster center.
• We use K-Mediods algorithm to perform initial cluster-
ing. All nodes (except cluster centers) choose to join
the cluster where the nearest cluster center is located. Algorithm 2: Generating Proxy Key Algorithm (For
The number of nodes in the lower-layer cluster can be B)
expressed as n2 , and n2 in different clusters may have Input: (GA , GAB , sA,i ): authorization information;
different value. Output: dB,i : proxy signing key;
• After the initial cluster is stable. We perform secondary 1 Bi receives (GA , GAB , sA,i ) from A, where
clustering to achieve the effect that λ cluster centers i = 1, 2..., n2 − 1;
describe one cluster. Taking the distance between clus- 2 if (GA , GAB , sA,i ) 6= null then
ter centers as a similar feature, cluster the two closest 3 Bi calculates GAB = (x2 , y2 ) = KB GA ;
clusters, and repeat the aggregation operation until the 4 end
0
representative points in the aggregated clusters are close 5 each Bi calculates rAB = x2 mod q, sA,i GA , and
to λ. sends sA,i GA to proxy signers Bj , j = 1, 2..., n2 − 1
and j 6= i;
B. Generating Proxy Key 6 if |sA,j GA | ≥ t then
After all nodes have completed clustering, the original 7 Bi uses the interpolation formula to get the result
signer A in the top-layer cluster will use the threshold proxy sA GA ;
8 end
authorization algorithm to delegate its signing rights to other 0
nodes in the lower-layer cluster. The nodes in the lower-layer 9 if sA GA = rAB PA then
cluster cluster can be described as B = {B1 , B2 , ..., Bn2 −1 }. 10 Bi accepts the agency;
The detailed process of threshold proxy signature algorithm 11 else
is shown in Section IV. The algorithm for generating the 12 Bi refuses to accept agency;
threshold proxy key is divided into two algorithm models 13 return null;
according to different operators. The original signer A corre- 14 end
0 −1
sponds to Algorithm 1 and the proxy group B corresponds to 15 Bi calculates dB,i = (ki + sA,i )KB mod q as its
Algorithm 2. A and B use a pseudorandom number generator own proxy key.
to generate pseudorandom number KA and KB , respectively.
KB is jointly generated by all proxy group members Bi .
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
for V, num and state containing a different d. 11 waiting for timer to expire, proxy signing failed;
• Node i has not performed proxy signing for prj with 12 end
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
B15: Bi calcultes the result of r. If r = 0 or rGAB + Multiplying both sides of the equation by GAB , we have
τ GAB = qGAB , then go back to step B13, 0
τ GAB = (η(dB − 1) + s )GAB
r = (e + x3 ) mod q. −1
= (ηsA KB + s )GAB
0
0
B16: Bi calculates the signature si and broadcasts it, −1 −1
= (ηKA rAB dA KB + s )GAB
0
si = (ci (τi + r) + µi − r) mod q. = ηrAB dA G + s GAB
0
B17: Bi receives at least 2t participants Bj to broadcast its = ηrAB PA + s GAB .
signature (r, sj ), and obtains the signature result (r, s) through The above theorems proves that the scheme satisfies the ver-
the interpolation formula, ifiable property of proxy signature, and the verifier can directly
s = (d−1
B (τ + r) − r) mod q. use the public key of the original signer for verification.
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
other proxy signers during the proxy authorization process to (2) τˆ1 , τˆ2 , ..., τˆt are generated by Joint-RSS, so α̂i∗ =
generate proxy keys for man-in-the-middle attacks. τˆi GAB (1 ≤ i ≤ t) satisfies the uniform distribution,
The man-in-the-middle attack can be effectively prevented and the rest of α̂i∗ (t + 1 ≤ i ≤ n) is determined by
by means of a digital certificate generated by an authority on α̂i∗ (1 ≤ i ≤ t) and α̂. So α̂i∗ (t + 1 ≤ i ≤ n) has the
the public key of the original signer and the proxy. same probability distribution α̂i∗ (1 ≤ i ≤ t).
(3) As proved above, sˆi also satisfies the uniform random
E. Security Proof of Threshold Proxy Signature distribution on [1, q − 1], and is consistent with si =
dB,i (τi + r) + µi − r(1 ≤ i ≤ t), sˆi also satisfies this
We prove the security of the threshold proxy signature
equation.
scheme from two points of unforgeability and robustness.
According to literatures [56] and [57] , if the signature Combined with literature [57], it can be proved that the
scheme is unforgeable and the threshold proxy signing scheme threshold proxy signature scheme TP-SM2 is unforgeable.
is simulatable, then this threshold proxy signing scheme is Next we need to prove the robustness of the TP-SM2
unforgeable. Since the SM2 signature scheme itself is secure scheme.
and unforgeable, we only need to prove that the threshold For an eavesdropping attack with t members, if n ≥ 2t + 1,
proxy signing scheme proposed in this article is imitable. then the (t, n)-threshold proxy signing scheme is robust. For
Proof : The simulation process of the threshold proxy an halting attack with t members, if n ≥ 3t + 1, then (t, n)
signature scheme is shown in the SIM (simulation protocol). threshold signing scheme is robust.
The input parameters include the public key PA , the message Proof : According to the formula si = ci (τi + r) + µi − r,
M , and the signature (r, s). We assume that an adversary D since the polynomials sharing ci and τi are all of order t,
can control the front t participants (members of the proxy the polynomials sharing s are of order 2t, so at least 2t + 1
signing group), and conduct eavesdropping or halting attacks participants are required to restore the signature s through the
on them, and the rest of the participants are honest partici- interpolation formula. Therefore, for an halting attack with t
pants. Therefore, the shares that the adversary can control are members. It is necessary to ensure that n ≥ 3t+1 to complete
0 0 0
(dB,1 , dB,2 , ..., dB,t ). the signing process.
According to the above proofs, we can conclude that the
SIM TP-SM2 scheme is secure, that is, it has unforgeability and
Input: PA : public key of A, robustness. When n ≥ 2t + 1, it can resist the eavesdropping
M : the message that needs to be signed, attack on t members, when n ≥ 3t+1, it can resist the halting
(s, r): signature for M , attack of t members.
0 0 0
(dB,1 , dB,2 , ..., dB,t ): the key shares controlled by the ad-
versary D; VI. E XPERIMENT A NALYSIS
(1) Calculating the formula α̂ = sGAB + (r + s)rAB PA ; In this section, we conduct a comparative experiment on
(2) Honest participants jointly execute Joint-RSS, and the the improved PBFT and the traditional PBFT from the two
share µ̂i (1 ≤ i ≤ n). Since the SIM can hear the aspects of communication times and time consuming of single
shares of D, the SIM can get those values (SIM knows consensus process.
µˆ1 , µˆ2 , ..., µ̂t and µ̂ = 0);
(3) Honest participants jointly execute Joint-RSS, and D A. Threshold Proxy Signing Analysis
shares secrets τˆ1 , τˆ2 , ..., τˆt ;
(4) Set α̂i∗ = τˆi GAB (1 ≤ i ≤ n), and any set of α̂i∗ (no As shown in Table II, we performed 5 sets of tests on
less than t + 1) can restore α̂∗ . Broadcast α̂i∗ (t + 1 ≤ TP-SM2 and original SM2 signature, respectively. It is found
i ≤ n) to honest participants, then α̂∗ = (x1 , y1 ) that the original signature efficiency is not affected even if
can be recovered by interpolation formula, while r = the concept of threshold proxy is added to SM2 signature.
(H(ZA ||M ) + x1 ) (mod q); Since our experiments are simulated locally, the time of
0
(5) Calculate sˆi = dB,i (τˆi + r) + µ̂i − r(1 ≤ i ≤ t), and communication between signers and original signer is not
randomly select sˆi within the range of t + 1 ≤ i ≤ 2t. factored into the efficiency.
According to sˆi (t + 1 ≤ i ≤ 2t) and sˆ0 = s, the only
shared polynomial of order t can be determined, so TABLE II
EFFICIENCY OF TP-SM2 AND SM2
the rest of sˆi (2t + 1 ≤ i ≤ n) can be determined;
(6) Broadcast sˆi (2t + 1 ≤ i ≤ n) to honest participants; Algorithm Test 1 Test 2 Test 3 Test 4 Test 5 Average time
It can be seen from the SIM protocol that this variable is TP-SM2 0.12s 0.10s 0.11s 0.12s 0.10s 0.110s
SM2 0.11s 0.09s 0.12s 0.10s 0.11s 0.106s
consistent with the variable in TP-SM2. Next, we need to
prove that they have the same probability distribution.
(1) Because the secret sharing scheme of Shamir is
information-theoretic security, all shares have the same B. Communication Cost Analysis
probability distribution. Therefore, the distribution of PBFT is based on information exchange and needs to
µ̂i is consistent with µi , which is a uniform random consume communication resources, so communication over-
distribution on [1, q − 1]. head is a key index related to consensus efficiency. we can
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
TABLE III
C OMMUNICATION ANALYSIS OF PBFT AND TP-PBFT
TP-PBFT
PBFT
lower-layer consensus top-layer consensus
Pre-prepare N −1 Nλ − 1 k−1
k
Prepare (N − 1)2 ( Nkλ − 1)2 (k − 1)2
Commit N (N − 1) N λ ( N λ − 1) k(k − 1)
k k
Total 2N (N − 1) 2 Nkλ ( Nkλ − 1) + 2k(k − 1)
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Fig. 7. Comparison of communication times between K-PBFT and TP-PBFT. Fig. 8. Comparison diagram of consensus delay.
the same host. We use Go to simulate the underlying physical optimize the flexibility and scalability of PBFT, there are
network conditions. The server equippe with an Intel AMD differences. Flexibility refers to the ability of consensus nodes
Ryzen 5 PRO 3500 CPU, running at a frequency of 2.10GHz, to dynamically join or exit the system without affecting the
and runs Ubuntu 20.04.2LTS. Go 1.17.1 was used for the operation of the system itself. The last two proposals have
experiment. The simularion parameters of TP-PBFT consensus implemented flexibility in the consensus process. However,
experiment are as show in Table IV. TP-PBFT not only enables dynamic consensus, but also allows
consensus nodes to join and exit dynamically during the
TABLE IV consensus process. We have carefully introduced DR-PBFT
SIMULATION PARAMETERS and literature [26] in Table I, so we have omitted the details.
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
[27] M. Saad, J. Spaulding, L. Njilla, C. Kamhoua, S. Shetty, D. Nyang, and [49] S. Guha, R. Rastogi, and K. Shim, “Cure: An efficient clustering
D. Mohaisen, “Exploring the attack surface of blockchain: A compre- algorithm for large databases,” ACM Sigmod record, vol. 27, no. 2, pp.
hensive survey,” IEEE Communications Surveys Tutorials, vol. 22, no. 3, 73–84, 1998.
pp. 1977–2008, 2020. [50] Q. Guo, D. Zhang, L. chang, X. Liu, and J. Song, “Design and
[28] M. Xu, C. Liu, Y. Zou, F. Zhao, J. Yu, and X. Cheng, “wchain: A implementation of proxy-protected proxy signature based on sm2,”
fast fault-tolerant blockchain protocol for multihop wireless networks,” Journal of Network and Information Security, vol. 3, no. 9, p. 47, 2017.
IEEE Transactions on Wireless Communications, vol. 20, no. 10, pp. [51] M. S. Hwang, E. Jui-Lin Lu, and I. C. Lin, “A practical (t, n)
6915–6926, 2021. threshold proxy signature scheme based on the rsa cryptosystem,” IEEE
[29] E. A. Shammar, A. T. Zahary, and A. A. Al-Shargabi, “A survey of iot Transactions on Knowledge and Data Engineering, vol. 15, no. 6, pp.
and blockchain integration: Security perspective,” IEEE Access, vol. 9, p.1552–1560, 2003.
pp. 156 114–156 150, 2021. [52] X. Yuan, F. Luo, M. Z. Haider, Z. Chen, and Y. Li, “Efficient byzantine
[30] M. Castro, B. Liskov et al., “Practical byzantine fault tolerance,” in consensus mechanism based on reputation in iot blockchain,” Wireless
OsDI, vol. 99, no. 1999, 1999, pp. 173–186. Communications and Mobile Computing, vol. 2021, 2021.
[31] X. Xu, G. Sun, and H. Yu, “An efficient blockchain pbft consensus [53] J. Zhang, Y. Cheng, X. Deng, B. Wang, J. Xie, Y. Yang, and M. Zhang,
protocol in energy constrained iot applications,” in 2021 International “A reputation-based mechanism for transaction processing in blockchain
Conference on UK-China Emerging Technologies (UCET), 2021, pp. systems,” IEEE Transactions on Computers, pp. 1–1, 2021.
152–157. [54] M. Wang, G. Wang, Y. Zhang, and Z. Li, “A high-reliability multi-
[32] H. Qushtom, J. Mišić, and V. B. Mišić, “Multiple leader pbft based faceted reputation evaluation mechanism for online services,” IEEE
blockchain architecture for iot domains: Invited paper,” in 2021 Transactions on Services Computing, vol. 12, no. 6, pp. 836–850, 2019.
IEEE Canadian Conference on Electrical and Computer Engineering [55] M. Mukherjee, R. Matam, L. Shu, L. Maglaras, M. A. Ferrag, N. Choud-
(CCECE), 2021, pp. 1–6. hury, and V. Kumar, “Security and privacy in fog computing: Chal-
[33] H. Qushtom, J. Mišić, X. Chang, and V. B. Mišić, “A scalable two-tier lenges,” IEEE Access, vol. 5, pp. 19 293–19 304, 2017.
pbft consensus for blockchain-based iot data recording,” in ICC 2021 - [56] M. Shang, Y. Ma, J. Lin, and J. Jing, “A threshold scheme for sm2 el-
IEEE International Conference on Communications, 2021, pp. 1–6. liptic curve cryptographic algorithm,” Journal of Cryptologic Research,
[34] L. Lao, X. Dai, B. Xiao, and S. Guo, “G-pbft: A location-based and vol. 1, no. 2, pp. 155–166, 2014.
scalable consensus protocol for iot-blockchain applications,” in 2020 [57] S. Goldwasser, S. Micali, and R. L. Rivest, “A digital signature scheme
IEEE International Parallel and Distributed Processing Symposium secure against adaptive chosen-message attacks,” SIAM Journal on
(IPDPS), 2020, pp. 664–673. Computing, vol. 17, no. 2, pp. 281–308, 1988.
[35] V. B. Mišić, J. Mišić, and X. Chang, “Coping with smartly malicious [58] L. Chenzh, “Improved pbft consensus mechanism based on k-medoids,”
leaders: Pbft with arbitration for blockchain-based iot applications,” in ComputerScience, vol. 46, no. 12, p. 101G107, 2019.
2021 IEEE Global Communications Conference (GLOBECOM), 2021,
pp. 1–6.
[36] J. Fu, L. Zhang, L. Wang, and F. Li, “Bct: An efficient and fault tolerance
blockchain consensus transform mechanism for iot,” IEEE Internet of
Things Journal, pp. 1–1, 2021.
[37] W. Li, C. Feng, L. Zhang, H. Xu, B. Cao, and M. A. Imran, “A
scalable multi-layer pbft consensus for blockchain,” IEEE Transactions
on Parallel and Distributed Systems, vol. 32, no. 5, pp. 1146–1160,
2020.
[38] L. Feng, H. Zhang, Y. Chen, and L. Lou, “Scalable dynamic multi-agent
practical byzantine fault-tolerant consensus in permissioned blockchain,” Fei Tang received his Ph.D from the Institute
Applied Sciences, vol. 8, no. 10, p. 1919, 2018. of Information Enginneering of Chinese Academy
[39] X. Hao, L. Yu, L. Zhiqiang, L. Zhen, and G. Dawu, “Dynamic practical of Sciences in 2015. He is currently an associate
byzantine fault tolerance,” in 2018 IEEE conference on communications professor of the Chongqing University of Posts
and network security (CNS). IEEE, 2018, pp. 1–8. and Telecommunications. His research interests are
[40] Y. Fan, H. Wu, and H.-Y. Paik, “Dr-bft: A consensus algorithm for blockchain, public key cryptography and privacy
blockchain-based multi-layer data integrity framework in dynamic edge preserving computation.
computing system,” Future Generation Computer Systems, vol. 124, pp.
33–48, 2021.
[41] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals prob-
lem,” in Concurrency: the Works of Leslie Lamport, 2019, pp. 203–226.
[42] H. Sukhwani, J. M. Martinez, X. Chang, K. S. Trivedi, and A. Rindos,
“Performance modeling of pbft consensus process for permissioned
blockchain network (hyperledger fabric),” in 2017 IEEE 36th Symposium
on Reliable Distributed Systems (SRDS), 2017.
[43] B. Gan, Q. Wu, X. Li, and Y. Zhou, “Classification of blockchain
consensus mechanisms based on pbft algorithm,” in 2021 International
Conference on Computer Engineering and Application (ICCEA). IEEE,
2021, pp. 26–29.
[44] X. Xu, J. Gu, H. Yan, W. Liu, L. Qi, and X. Zhou, “Reputation-aware
supplier assessment for blockchain-enabled supply chain in industry
4.0,” IEEE Transactions on Industrial Informatics, 2022. Tingxian Xu is purchasing the master degree in
[45] J. WANG and Q. LI, “Improved practical byzantine fault tolerance electronic information with School of Computer
consensus algorithm based on raft algorithm,” Journal of Computer Science and Technology, Chongqing University of
Applications, vol. 43, no. 1, p. 122, 2023. Posts and Telecommunications, Chongqing, China.
[46] X. Feng, J. Ma, Y. Miao, X. Liu, and K.-K. R. Choo, “Social her research interests include blockchain, cryptogra-
characteristic-based propagation-efficient pbft protocol to broadcast in phy and consensus algorithms.
unstructured overlay networks,” IEEE Transactions on Dependable and
Secure Computing, vol. 19, no. 6, pp. 3621–3639, 2021.
[47] F. Knirsch, A. Unterweger, and D. Engel, “Implementing a blockchain
from scratch: why, how, and what we learned,” EURASIP Journal on
Information Security, vol. 2019, pp. 1–14, 2019.
[48] V. Pattabiraman, R. Parvathi, R. Nedunchezian, and S. Palaniammal, “A
novel spatial clustering with obstacles and facilitators constraint based
on edge detection and k-medoids,” in 2009 International conference on
computer technology and development, vol. 1. IEEE, 2009, pp. 402–
406.
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.
This article has been accepted for publication in IEEE Internet of Things Journal. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/JIOT.2023.3347232
Authorized licensed use limited to: Indian Institute of Technology (ISM) Dhanbad. Downloaded on January 17,2024 at 11:16:44 UTC from IEEE Xplore. Restrictions apply.
© 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See https://www.ieee.org/publications/rights/index.html for more information.