Research Article

Rational Protocols and Attacks in Blockchain System

Algorithm 2

The HoneyBadgerBFT protocol.
Step 1. One proposal consisting of transactions is randomly selected and encrypted to be , where is the batch size parameter and is the number of parties
Step 2. Parties agree on these ciphertexts
Step 3. Parties first decrypt if it has passed the verification