Computer Science ›› 2017, Vol. 44 ›› Issue (4): 1-7, 15.doi: 10.11896/j.issn.1002-137X.2017.04.001

    Next Articles

Survey on Blockchain Technology and Its Application Prospect

HE Pu, YU Ge, ZHANG Yan-feng and BAO Yu-bin   

  • Online:2018-11-13 Published:2018-11-13

Abstract: Blockchain is a decentralized,untrustworthy distributed database technology.The database is collectively maintained by all the nodes involved in the system,and has the features of decentralization,tamper-resistance,trans-parentness and security.The emergence of blockchain technology thanks to the Bitcoin applications.Blockchain is the underlying technique support of Bitcoin system and is the fundament of the Bitcoin system.Since Blockchain technology is a promising technology,the key technologies,components,principles,limitations,applications and prospect were introduced,and the related research issues was discussed.

Key words: Blockchain,Bitcoin,Merkle tree,POW consensus,Smart contract

[1] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].
[2] PILKINGTON M.Blockchain technology:Priciplesand applica- tions.
[3] HANCOCK M,VAIZEY E.Distributed ledger technology:beyond block chain[R].UK:Government Office for Science,2016.
[4] R3.About R3 .
[5] MCKINSEY COMPANY.Blockchain in insurance —opportunity or threat?[EB/OL].[2016-07].
[6] SWAN M.Blockchain thinking:the brain as a decentralized autonomous corporation[J].IEEE Technology and Society Magazine,2015,34(4):41-52.
[7] LEE L.New kids on the blockchain:How bitcoin’s technology could reinvent the stock market[EB/OL].(2015-09-18).[2016-09-22].
[8] GODSIFF P.Bitcoin:bubble or blockchain[J].Springer International Publishing,2015,38:191-203.
[9] KRAFT D.Difficulty control for blockchain-based consensussystems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413.
[10] WILSON D,ATENIESE G.From pretty good to great:enhan-cing PGP using Bitcoin and the blockchain[C]∥Proceedings of the 9th International Conference on Network and System Securi-ty.New York:Springer International Publishing,2015,9408:368-375.
[11] ZYSKIND G,NATHAN O,PENTLAND A S.Decentralizingprivacy:using blockchain to protect personal data[C]∥Pro-ceedings of the 2015 IEEE Security and Privacy Workshops (SPW 2015).San Jose,CA:IEEE,2015:180-184.
[12] KYPRIOTAKI K N,ZAMANI E D,GIAGLIS G M.From Bit-coin to decentralized autonomous corporations:extending the application scope of decentralized peer-to-peer networks and blockchains[C]∥Proceedings of the 17th International Conference on Enterprise Information Systems(ICEIS2015).Barcelona,2015:284-290.
[13] LEWENBERG Y,SOMPOLINSKY Y,ZOHAR A.Inclusve blockchain protocols[J].Financial Cryptography and Data Security,2015,8975:528-547.
[14] BACK A,Corallo M,Dashjr L,et al.Enabling blockchain innovations with pegged sidechains[EB/OL].[2014-10-22].
[15] PETERS G W,PANAYI E,C HAPELLE A.Trends in crypto-currencies and blockchian technologies:A monetary theory and regulation perspective[DB/OL].[2015-08-19].
[16] ATZORI M.Blockchain technology and decentralized gover-nance:is the state still necessary?.
[17] VUKOLIC M.The Quest for Scalable Blockchain Fabric:Proof-of-Work vs.BFT Replication[C]∥International Federation for Information Processing.New York:Springer International Publishing,2016:112-125.
[18] WRIGHT A,FILIPPI P D.Decetralized Blockchain Technology and the Rise of Lex Cryptographia.httt://
[19] KOSBA A,MILLER A,SHI E.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[C]∥Symposium on Security and Privacy.New York:IEEE Computer Society,2016:839-858.
[20] WOLRICH G M,YAP K S,GuilfordJ D,et al.Instruction set for message scheduling of SHA256 algorithm:US,8838997B2[P].2012-09-28.
[21] SZYDLO M.Merkle tree traversal in log space and time[J].Lecture Notes in Computer Science,2004,7:541-554.
[22] MERKLE R C.Protocols for public ke y cryptosystems[C]∥Proc.1980 Symposium on Security and Privacy.New York:IEEE Computer Society,1980:122-133.
[23] MERKLE R C.A digital signature based on a conventional encryption function[J].Conference on Advances in Cryptology-crypto,1987,293(1):369-378.
[24] HABER S,STORNETTA W S.How to time-stamp a digital document[J].Journal of Cryptology,1991,3(2):99-111.
[25] BAYER D,HABER D,STORNETTA W S.Improving the efficiency and reliability of digital time-stamping[M].New York:Springer New York.1993:329-334.
[26] Wikipedia.区块链[EB/OL].[2016-10-21].区块链.
[27] Wikipedia.Blockchain(database)[EB/OL].[2016-9-15].ht-tps://
[28] 巴比特.区块链是什么[EB/OL]
[29] SWANM.Blockchain:Blueprint for New Economy[M].USA:O’Reilly Media Inc,2015.
[30] ANTONOPOULOS A M.Mastering Bitcoin[M].USA:O’Reilly Media,2014.
[31] BUTERIN V.Ethereum:A next generation smart contractand decentralized application platform[EB/OL].,2013.
[32] HYPERLEDGER.About the hyperledger project[EB/OL].
[33] HYPERLEDGER.Projects[EB/OL].
[34] WIKIPEDIA.Smart contract[EB/OL].
[35] CASSANO J.What are smart contracts?cryptocurrency’s killer app[N/OL].Fastcompany,2014-09-17 [2016-10-23].
[36] BROWN A R.A simple model for smart contracts[EB/OL].
[37] WILKINSON S,BOSHEVSKI T,BRANDOFF J,et al.Storj:A peer-to-peer cloud storage network(V0.2)[EB/OL].[2016-11-15].

No related articles found!
Full text



[1] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[2] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[3] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[4] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[5] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[6] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[7] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[8] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[9] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .
[10] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99, 116 .