advertisement

Here’s More About Consensus System Used By CREDITS Platform

CREDITS | Consensus | DPOS | BFT | Blockchain | Blockchain updates

The cryptocurrency, Credits (CS) has been faring well enough since its inception into the market on 3rd March 2018. Even when the cryptocurrency market had shown a massive drop in the first quarter of 2018, Credits (CS) had started with a ‘steady’ growth trend.

“Consensus” means the consent of all parties involved in discussing a possible solution to this issue.

The consensus mechanism used by the CREDITS platform is based on a combination of two mechanisms:

  1. Delegated Proof-of-Stake (DPoS) algorithm: provides differentiation of voters and validators.
  2. Byzantine Fault Tolerance (BFT) algorithm: implies voting protected against malicious activities

The key phases encompassing the consensus reaching process in the CREDITS network selection consist of head node and trusted nodes, the voting of selected nodes on transactions, ledger recording protected against any hacking scams.

Selecting head nodes and trusted nodes

Phase One consists of mainly selecting the head node and trusted nodes which participate in the consensus algorithm.

The head node and trusted nodes have to meet simple requirements: have an updated database in place and comply with the recommended system requirements.

These are the steps invovled:

  • Each node of the network sends the last block hash available at this node to the previous round node by which the last block is recorded on a blockchain.
  • A certain amount of time is spared for this process, and all nodes from which no hash is received in this time interval drop out of the competition for eligibility to participate in the consensus procedure.
  • The node receiving these hashes compares them with the hash of the block recorded by the receiving node during the previous round.
  • This is followed by cutting off all nodes sending an unmatched hash. Accordingly, any node with an outdated ledger is unable to become the head node or a trusted node for the next round.

Phase Two: In Phase two, there can be m number of nodes participating in the transaction voting procedure in every round (trusted nodes and the head node).

  • The node writing the last block generates the length list of nodes with an updated database. The nodes 3m are randomly selected from the nodes n.
  • Then m number of nodes is randomly selected from these nodes 3m, with the first one is appointed as head node for the next round, and the remaining as trusted nodes for the next round.

Transaction voting procedure

During Phase Three, all transactions generated in the system while the head node and trusted nodes are being selected (during Phases 1 and 2) are sent from all nodes to the head node.

The head node generates a pool of transactions eligible to be added to the ledger. This pool is sent by the head node to all trusted nodes.

Phase Four. Once this pool is received, each trusted node verifies every transaction within this pool throughout its database and generates the list of transactions that already been checked out. Following which each trusted node forwards this list to all remaining trusted nodes.

During Phase Five, the first round of exchange between trusted nodes is followed by generating (at each trusted node) a set of lists received from each trusted node during Phase Four. Following which each trusted node forwards this container to all remaining trusted nodes, which constitutes the second round of exchange.

Phase Six. The second round of exchange is followed by the generation of the final decision tree at each trusted node. Each trusted node goes through this tree and determines the majority of decisions (success/failed) in respect of each transaction.

During Phase Seven, a list of approved transactions in place is left with us, which is a finished pool to be recorded in a chain with verified transactions. This list coincides at each trusted node.

Protection against ledger recording by a malicious node

Phase Eight. A new block will be recorded onto a ledger by one of the trusted nodes which makes a decision on the pool that is identical with most of other nodes (reliably honest node).

  • The procedure for intercepting betrayers from among trusted nodes is performed by verifying the outcome of decision-making during Phase 6.
  • All nodes whose decisions are mismatched with the majority decision are removed from the list of trusted nodes which can potentially record a new pool in a chain.
  • The remaining list will be identical at all honest nodes. Any node is randomly selected from the remaining nodes.

During Phase Nine, the node selected during the previous phase generates a hash of the new pool, records the new pool onto a storage, and sends it to all nodes system-wide. Then a new round begins and the whole procedure restarts with Phase One.

KryptoMoney.com publishes latest news and updates about Bitcoin, Blockchain Technology, Cryptocurrencies and upcoming ICO’s.

Get Latest Cryptocurrency And Bitcoin News

Signup this form below to get latest Cryptocurrency and Bitcoin news, directly in your mailbox

Note:

Keep in mind that we may receive commissions when you click our links and make purchases. However, this does not impact our reviews and comparisons. We try our best to keep things fair and balanced, in order to help you make the best choice for you.