Computer Science ›› 2020, Vol. 47 ›› Issue (7): 268-277.doi: 10.11896/jsjkx.200200027
• Information Security • Previous Articles Next Articles
LIU Shuai1,2, GAN Guo-hua3, LIU Ming-xi4, FANG Yong1,2, WANG Shou-yang1,2
CLC Number:
[1]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system [EB/OL].(2008-11-01) [2018-09-30].https://bitcoin.org/bitcoin.pdf. [2]LIU M X,GAN G H,CHENG Y K,et al.The development status and prospect of blockchain consensus mechanism[J].Operations Research Transactions,2020,24(1):23-39. [3]DU M X,MA X F,ZHANG Z,et al.A review on consensus algorithm of blockchain[C]//2017 IEEE International Conference on Systems,Man and Cybernetics (SMC).Banff,2017:2567 [4]Quantum Mechanic.Proof of stake[EB/OL].(2011-07-11) [2018-09-30].https://bitcointalk.org /index.php?topic=27787. [5]LARMER D,KASPER L,SCHUH F.BitShares 2.0:Financial smart contract platform [EB/OL].(2015-11-01)[2018-09-30].http://docs.bitshares.eu/downloads/bitshares-financial-platform.pdf. [6] BENTOV I,LEE C,MIZRAHI A,et al.Proof of activity:Ex-tending bitcoin’s proof of work via proof of stake [J].ACM SIGMETRICS Performance Evaluation Review,2014,42(3):34-37. [7]RENL.Proof of stake velocity:Building the social currency ofthe digital age[EB/OL].(2018-04-10) [2018-09-30].https://assets.coss.io/documents/whitepapers/reddcoin.pdf. [8]Intel.Proof of elapsed time[EB/OL].(2016-12-16) [2018-09-30].https://intelledger.github.io /introduction.html. [9]JUELS A,KALISKI B S.PORs:Proofs of retrievability forlarge files [C]//Proceedings of the 14th ACM Conference on Computer and Communications Security.Alexandria:ACM,2007:584-597. [10]MILLER A,JUELS A,SHI E,et al.Permacoin:Repurposing bitcoin work for long-term data preservation [C]//2014 IEEE Symposium on Security and Privacy.IEEE Computer Society,2014,1:475-490. [11]GILAD Y,HEMO R,MICALI S,et al.Algorand:Scaling byzantine agreements for cryptocurrencies[C]//Proceedings of the 26th Symposium on Operating Systems Principles.Shanghai,2017:51 [12]CASTRO M,LISKOV B.Practical byzantine fault tolerance[C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.New Orleans:ACM,1999:1-10. [13]KOTLA R.Zyzzyva:speculative byzantine fault tolerance[J].ACM SIGOPS Operating Systems Review,2007,41(6):45-58. [14]AUBLIN P L,MOKHTAR S B,QUEMA V.RBFT:Redundant byzantine fault tolerance [C]//2013 IEEE 33rd International Conference on Distributed Computing Systems.Washington:IEEE Computer Society,2013:297-306. [15]MILLER A.The honey badger of BFT protocols [C]//Procee-dings of the 2016 ACM SIGSAC Conference on Computer and Communications.Vienna:ACM,2016:31-42. [16]SOMPOLINSKY Y,ZOHAR A.Secure high-rate transactionprocessing in bitcoin [C]//International Conference on Financial Cryptography and Data Security.Heidelberg:Springer,2015:507-527. [17]EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:A scalable blockchain protocol [C]//Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation.2016:45-59. [18]SOMPOLINSKY Y,LEWENBERG Y,ZOHAR A.Inclusiveblock chain protocols [C]//International Conference on Financial Cryptography and Data Security.Heidelberg:Springer,2015:528-547. [19]ZHEN Y,YUE M,YU C Z,et al.Zero-determinant strategy for the algorithm optimize of blockchain PoW consensus[C]//2017 36th Chinese Control Conference (CCC).IEEE,2017:1441-1446. [20]ZHANG R,PRENEEL B.Lay Down the Common Metrics:Evaluating Proof-of-Work Consensus Protocols’ Security[C]//2019 IEEE Symposium on Security and Privacy (SP).IEEE,2019:175-192. [21]KUMAR G,SAHA R,RAI M K,et al.Proof-of-Work Consensus Approach in Blockchain Technology for Cloud and Fog Computing Using Maximization-Factorization Statistics[J].IEEE Internet of Things Journal,2019,6(4):6835-6842. [22]BAHACK L.Theoretical Bitcoin attacks with less than half of the computational power (draft)[J].arXiv:1312.7013,2013. [23]LERNER S D.DECOR+HOP:A scalable blockchain protocol[EB/OL].https://scalingbitcoin.org/papers/DECOR-HOP.pdf. [24]CAMACHO P,LERNER S D.DECOR+LAMI:A scalableblockchain protocol[EB/OL].https://scalingbitcoin.org/he/papers/DECOR-LAMI.pdf. [25]PASS R,SHI E.Fruitchains:A fair blockchain[C]//Procee-dings of the ACM Symposium on Principles of Distributed Computing(PODC’17).ACM,2017:315-324. [26]RIZUN P R.Subchains:A technique to scale Bitcoin and improve the user experience[J/OL].https://www.ledgerjournal.org/ojs/index.php/ledger/article/view/40. [27]ROBERT A,HAMILTON W D.The Evolution of Cooperation[J].Science,1981(211):1390-1396. [28]HUANG Q B,AN Q W,SU H Q.Study and realization of an improved PBFT algorithm as an ethereum consens mechanism[J].Computer Applications and Software,2017,34(10):288-293,297. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[3] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[4] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[5] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[6] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|