Proof of Ownership (PoO)
PoO requires a TEE for participants to participate in the network. This algorithm uses unique pseudonyms generated by an Enhanced Privacy Identity (EPID) signature.
The pseudonyms can track if multiple proofs are coming from a single participant to reduce Sybil attack. PoO generates unique pseudonyms so that if a faulty owner resets the owner epoch register for utilizing it numerous times, the adversary may not be able to do that. Therefore, we reach a consensus by mining a block having most proofs with unique pseudonyms.
A consensus is reached when a block is generated from the user having the most proofs and unique pseudonyms. This technique can be used by artists or businesses to certify the integrity, date of publication, and ownership of their creations or contracts. Only the people with the private key associated with the signature can prove they are the owner. Applications such as Decentralized credits are based on PoO. The advantage is the use of unique pseudonyms makes it difficult to perform multiple attacks.
Last updated