计算机科学 ›› 2021, Vol. 48 ›› Issue (11A): 500-508.doi: 10.11896/jsjkx.201200163

• 信息安全 • 上一篇    下一篇

区块链技术研究综述

代闯闯1,2, 栾海晶1,2, 杨雪莹1,2, 过晓冰3, 陆忠华1,2, 牛北方1,2   

  1. 1 中国科学院计算机网络信息中心 北京100190
    2 中国科学院大学 北京100049
    3 联想研究院 北京100085
  • 出版日期:2021-11-10 发布日期:2021-11-12
  • 通讯作者: 牛北方(bniu@sccas.cn)
  • 作者简介:dcc@cnic.cn
  • 基金资助:
    中国科学院战略先导科技专项(XDC01040100);广西科技重大专项(桂科AA18118054)

Overview of Blockchain Technology

DAI Chuang-chuang1,2, LUAN Hai-jing1,2, YANG Xue-ying1,2, GUO Xiao-bing3, LU Zhong-hua1,2, NIU Bei-fang1,2   

  1. 1 Computer Network Information Center,Chinese Academy of Sciences,Beijing 100190,China
    2 University of Chinese Academy of Sciences,Beijing 100049,China
    3 The Lenovo Research,Beijing 100085,China
  • Online:2021-11-10 Published:2021-11-12
  • About author:DAI Chuang-chuang,born in 1993,Ph.D.His main research interests include algorithms and software in high-performance and blockchain.
    NIU Bei-fang,born in 1978,Ph.D,professor.His main research interests include the research of high-performance computing technology for biological and medical bigdata,specifically involving cancer genomics and macrogenomics, especially the “precision medicine” data processing technology based on the next generation.
  • Supported by:
    Strategic Priority Research Program of the Chinese Academy of Sciences(XDC01040100) and Science and Technology Major Project of Guangxi(Guike AA18118054).

摘要: 随着比特币等虚拟数字货币的日益普及与发展,区块链技术受到了研究人员的广泛关注。区块链技术是一种按照时间顺序将区块以链式结构组合而成的分布式数据账本,具有去中心化、可编程、可溯源、不可篡改等特性,在金融领域中的研究尤为广泛。文章面向区块链技术的发展,介绍区块链技术的起源和概述,详细地讨论环签名、零知识证明、数字签名和同态加密等区块链关键技术,综述区块链技术的特点和种类。对区块链技术的应用领域进行概括,重点关注其应用原则和应用领域相关的案例,分析区块链应用当前的发展现状,并对未来区块链技术的发展方向进行分析与预测。

关键词: 区块链, 比特币, 共识机制, 环签名, 零知识证明, 数字签名, 智能合约, 去中心化

Abstract: With the increasing popularity and development of virtual digital currencies such as bitcoin,blockchain technology has been widely concerned by researchers.Blockchain technology is a distributed data ledger which combines blocks in a chain structure according to the time sequence.It has the characteristics of decentralization,programmability,and traceability.It has been widely studied in the financial field.Facing the development of blockchain technology,this paper introduces the origin and overview of blockchain technology,discusses in detail the crucial technologies of blockchain,consisting of ring signature,zero know-ledge proof,digital signature and homomorphic encryption,and summarizes the characteristics and types of blockchain technology.This paper summarizes the application field of blockchain technology,focuses on its application principles and relevant cases in the application field,analyzes the current development status of blockchain application,and analyzes and forecasts the development direction of blockchain technology in the future.

Key words: Blockchain, Bitcoin, Consensus mechanism, Ring signature, Zero knowledge proof, Digital signature, Smart contract, Decentralization

中图分类号: 

  • TP399
[1]HUANG H Y,YANG X H,WANG X L,et al.Overview of domestic blockchain research based on CNKI [J].Software Guide,2020,19 (1):234-237.
[2]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system [EB/OL].https://bitcoin.org/bitcoin.pdf:bitcoin,2018.
[3]HAN X,YUAN Y,WANG F Y.Blockchain security:researchstatus and prospects [J].Journal of Automation,2019,45 (1):206-225.
[4]SHEN X,PEI Q Q,LIU X F.Overview of blockchain technology [J].Journal of Network and Information Security,2016,2 (11):11-20.
[5]CAI X Q,DENG Y,ZHANG L,et al.Principle and core technology of blockchain [J].Journal of Computer Science,2019,42 (115):1-51.
[6]WANG Q,QIN B,HU J K,et al.Preserving transaction privacy in bitcoin[J].Future Generation Computer Systems,2020,107:793-804.
[7]LIU A D,DU X H,WANG N,et al.Blockchain technology and its research progress in the field of information security [J].Journal of Software,2018,29 (7):2092-2115.
[8]ZHANG L,LIU B X,ZHANG R Y,et al.Overview of blockchain technology [J].Computer Engineering,2019,45 (5):1-12.
[9]SHI J S,LI R.Overview of blockchain access control under the Internet of things [J].Journal of Software,2019,30 (6):1632-1648.
[10]GARAY J A,KIAYIAS A,LENOARDOS N.The bitcoin backbone protocol:Analysis and applications[C]//Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Sofia,Bulgaria,2015:281-310.
[11]CAO Z.A consensus mechanism for alliance chain[J].Cyber-space Security,2019,10(1):96-101.
[12]KING S,NADAL S.PPCoin:Peer-to-peer crypto-currency with proof-of-stake[EB/OL].https://www.chainwhy.com/upload/default/20180619/126a057fef926dc286accb372da46955.pdf:Google,2012.
[13]LI G,ZHANG J H,ZANG J M.Research on improved POAconsensus mechanism blockchain system for solving civil aviation virtual seat occupation [J].Computer Application Research,2020:1-7.
[14]ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm[C]//Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference.Philadelphia,USA,2014:305-320.
[15]TAN H B,ZHOU T,ZHAO H,et al.Archive data protection and sharing method based on blockchain [J].Journal of Software,2019,30 (9):2620-2635.
[16]LAMPORT L,SHOSTAK R,PEASE M.The Byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[17]CASTRO M,LISKOV B.Proactive recovery in a Byzantine-fault-tolerant system[C]//Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation.Berkeley,United States,2000:273-288.
[18]YUAN Y,NI X C,ZENG S,et al.Development status and Prospect of blockchain consensus algorithm [J].Journal of Automation,2018,44 (11):2011-2022.
[19]YU G,NIE T Z,LI X H,et al.Distributed data managementtechnology in blockchain system - challenges and prospects [J].Journal of Computer Science,2019,42 (116):1-27.
[20]PORTMANN E.Rezension “Blockchain:Blueprint for a New Economy”[J].Praxis Der Wirtschaftsinformatik,2018,55(6):1362-1364.
[21]ZHANG J,GAO W Z,ZHANG Y C,et al.Intelligent distributed power energy system running on blockchain:demand,concept,method and prospect [J].Journal of Automation,2017,43(9):1544-1554.
[22]FU X Q,YANG Y.An improved mobile payment system model [J].Journal of Huazhong University of science and technology(Natural Science Edition),2004,32(12):49-50,74.
[23]FANG Y B,ZHOU C G.Token system based on blockchain smart contract [J].Computer Application Research,2020,37(12):1-7.
[24]HE H L.Ruibo coin and operation mechanism of Ruibo system [J].Times finance,2016(20):267-278.
[25]SZABO N.Smart contracts:building blocks for digital markets[EB/OL].http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html:Google,1996.
[26]BUTERIN V.Ethereum:a next generation smart contract anddecentralized application platform[EB/OL].https://www.weusecoins.com/assets/pdf/library/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalikbuterin.pdf:Google,2016.
[27]XU X B,SUN B S,QI X H,et al.Scalable information sharing mechanism of Internet of things based on Ethereum [J].Computer Applications and Software,2019,36 (12):111-116,142.
[28]ZHU J M,ZHANG Q N,GAO S.Research progress on key technologies and applications of blockchain [J].Journal of Taiyuan University of technology,2020:1-14.
[29]MENG W T,ZHANG D W.Optimization scheme of hyperledger fabric consensus mechanism [J].Journal of Automation,2020:1-14.
[30]ANDROULAKI E,BARGERA,BORTNIKOV V,et al.Hy-perledger fa-bric:a distributed operating system for permissioned blockchains[EB/OL].https://www.colabug.com/3052594.html:Google,2018.
[31]MEI Y X,DIAO X L .The era of blockchain from 2.0 to 3.0 requires the deep integration of eliminating the false and preserving the true and the real economy [J].Communication World,2018 (27):48-49.
[32]XU M X,YUAN C,WANG Y J,et al.Pseudo blockchain-blockchain security solution [J].Journal of Software,2019,30(6):1681-1691.
[33]SONG Q.On the development of blockchain-Xunlei chainshows the technological advantages of the 3.0 era [J].Computer and Network,2018,44(5):33.
[34]LI Y.Identity authentication system based on blockchain 3.0 Architecture [J].Journal of Suzhou University,2019,34 (11):70-76.
[35]WANG J W,ZHENG Z Z,WU F,et al.Data market based on blockchain based data market [EB / OL].http://kns.cnki.net/kcms/detail/10.1321.g2.20200311.1050.004.html:Big data,2020.
[36]YUAN B A,LIU J,LI G.Fair multi-party undeniable protocol based on blockchain [J].Journal of Cryptologic Research,2018,5(5):546-555.
[37]KARAME G O,ANDROULAKI E,ROESCHLIN M,et al.Misbehavior in bitcoin:A study of double-spending and accountability[J].ACM Transactions on Information and System Security,2015,18(1):1-32.
[38]YE C C,LI G Q,CAI H M,et al.Security detection model of blockchain [J].Journal of Software,2018,29(5):1348-1359.
[39]YUAN Y,WANG F Y.Development status and Prospect ofblockchain technology [J].Journal of Automation,2016,42(4):481-494.
[40]ZHANG L.Overview of digital signatures[C]//Society for the Application of Intelligent Information Technology.China:Henan,2011:541-544.
[41]ZHAO X.Overview of digital signatures [J].Computer Engineering and Design,2006,27(2):195-197.
[42]JAIN J,SINGH A.Quantum-based Rivest-Shamir-Adleman(RSA) approach for digital forensic reports[J].Modern Physics Letters B,2020,34(6):2050085.
[43]KARIMA D,LAMINEM.Two dimensional ElGamal public key cryptosystem[J].Information Security Journal:A Global Perspective,2019,28(4/5):120-126.
[44]FU Y,YU Y H,WU X P.Differential privacy protection technology and application in big data environment [J].Journal of Communications,2019,40(10):157-168.
[45]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
[46]HU Z,YANG G,YANG B S,et al.Parallel homomorphic encryption algorithm based on MapReduce [J].Computer Applications,2015,35(12):3408-3412,3418.
[47]WANG R J,TANG Y C,ZHANG W Q,et al.Privacy protection scheme of Internet of vehicles based on homomorphic encryption and blockchain technology [J].Journal of Network and Information Security,2020,6(1):46-53.
[48]GUO J L,HOU H X.Laboratory open management systembased on homomorphic encryption technology [J].Information Security Research,2020,6(2):188-192.
[49]GOLDWASSER S,MICALI S,RACKOFF C.The knowledge complexity of interactive proof-systems[J].SIAM Journal on Computing,1989.18(1):186-208.
[50]LI X D,NIU Y K,WEI L B,et al.Overview of bitcoin privacy protection [J].Journal of Cryptography,2019,6(2):133-149.
[51]RIVEST R,SHAMIR A,TAUMANY.How to leak a secret[C]//Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security.Gold Coast,Australia,2001:552-565.
[52]SZABO N.Formalizing and securing relationships on public networks[J].First Monday,1997,2(9).
[53]SHAO Q F,ZHANG Z,ZHU Y C,et al.Overview of enterprise blockchain technology [J].Journal of Software,2019,30(9):2571-2592.
[54]ZENG S Q,HUO R,HUANG T,et al.Research review ofblockchain Technology:principle,progress and application [J].Journal of Communications,2020,41(1):134-151.
[55]HAN F.On the civil protection of China’s investors’ rights and interests under the new ICO Regulations [J].Journal of Taiyuan University (Social Science Edition),2019,20(6):73-82.
[56]OUYANG L W,WANG S,YUAN Y,et al.Smart contract:Architecture and progress [J].Journal of Automation,2019,45(3):445-457.
[57]SANG A Q,SHEN M,ZHU L H,et al.Research on multi-party collaborative security identity authentication mechanism based on blockchain [J].Journal of Nanjing University of Information Engineering (Natural Science Edition),2019,11(5):581-589.
[58]WANG Y,HE M J.Application case analysis of blockchain and Internet of things [J].Integrated Circuit Application,2018,35(3):70-74.
[59]FREY R M,VUCKOVAC D,ILIC A.A Secure Shopping Experience Based on Blockchain and Beacon Technology[C]//Proceedings of the 10th ACM Conference on Recconmmender Systems.Boston,MA,USA,2016:3-4.
[60]ENGLISH S M,NEZHADIAN E.Conditions of full disclosure:The blockchain remuneration model[C]//Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops.Paris,France,2017:64-67.
[61]BOGNER A,CHANSON M,MEEUW A.A decentralised sha-ring app running a smart contract on the ethereum blockchain[C]//Proceedings of the 6th International Conference on the Internet of Things.Stuttgart,Germany,2016:177-178.
[62]LAMBERT D M,COOPER M C,PAGH J D.Supply chain management:implementation issues and research opportunities[J].International Journal of Logistics Management,1998,9(2):1-20.
[63]LU Y,WEN J.Supply chain control and traceability schemebased on bitcoin technology [J].Computer Engineering,2018,44 (12):85-93 ,101.
[64]HOU Z G,LIANG H.Research on development status andcharacteristic application of blockchain technology [J].Scientific and Technological Innovation and Application,2019 (30):18-20,23.
[65]RAO D N,WANG J X,JIANG Z H,et al.Overview of the application of blockchain technology in logistics supply chain [J].Software Guide,2018,17(9):1-3,8.
[66]CHAKRAVORTY A,RONG C.Ushare:user controlled socialmedia based on blockchain[C]//Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication.Beppu,Japan,2017:99.
[67]DENNIS R,OWEN G.Rep on the block:A next generation reputation system based on the blockchain[C]//Proceedings of the 10th International Conference for Internet Technology and Secured Transactions.London,UK,2015:131-138.
[68]GERSTL D S.Leveraging bitcoin blockchain technology to mo-dernize security perfection under the uniform commercial code[C]//Proceedings of the International Conference of Software Business.Ljubljana,Slovenia,2016:109-123.
[69]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and progress [J].Journal of Computer Science,2018,41(05):969-988.
[70]HUANG Y X,LIANG Z H,HUANG P,et al.Supply chaintrusted data management based on blockchain [J].Computer System Application,2018,27(12):9-17.
[71]LUO W H.Rules and consensus:from electronic signature to blockchain [J].Journal of China University of Political Science and Law,2019(2):48-59,206.
[72]ZHANG S,DONG Y.Research on digital copyright protectionbased on blockchain technology [J].Research on Science and Technology Management,2020,40(1):132-136.
[73]FENG T,JIAO Y,FANG J L,et al.Health data security model based on alliance blockchain [J].Computer Science,2020,47(4):305-311.
[74]ZHANG C D,WANG B S,DENG W P.Design of supply chain traceability system based on side chain technology [J].Computer Engineering,2019,45(11):1-8.
[75]WORLEY C,SKJELLUM A.Blockchain tradeoffs and challenges for current and emerging applications:generalization,fragmentation,sid-echains,and scalability[C]//Proceedings of the 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber,Physical and Social Computing and IEEE Smart Data.Washington D.C.,USA,2018:1582-1587.
[76]TIAN Y L,YANG K D,WANG Z,et al.Blockchain data traceability algorithm based on attribute encryption [J].Journal of Communications,2019,40(11):101-111.
[77]YANG X M,LI X,WU H Q,et al.Application mode and practical challenges of blockchain technology in Education [J].Modern Distance Education Research,2017(2):34-45.
[1] 郭显, 王雨悦, 冯涛, 曹来成, 蒋泳波, 张迪. 基于区块链的工业控制系统角色委派访问控制机制[J]. 计算机科学, 2021, 48(9): 306-316.
[2] 王日宏, 周航, 徐泉清, 张立锋. 用于联盟链的非拜占庭容错共识算法[J]. 计算机科学, 2021, 48(9): 317-323.
[3] 张小艳, 李秦伟, 付福杰. 基于数字承诺的区块链交易金额保密验证方法[J]. 计算机科学, 2021, 48(9): 324-329.
[4] 周艺华, 贾玉欣, 贾立圆, 方嘉博, 侍伟敏. 基于红黑树的共享电子病历数据完整性验证方案[J]. 计算机科学, 2021, 48(9): 330-336.
[5] 刘嘉琪, 刘贝丽, 彭韬, 段江, 康立, 陈智. 基于区块链的音频版权存证模型[J]. 计算机科学, 2021, 48(6A): 438-442.
[6] 唐飞, 陈云龙, 冯卓. 基于区块链和代理重加密的电子处方共享方案[J]. 计算机科学, 2021, 48(6A): 498-503.
[7] 王向宇, 杨挺. 智能合约定义路由目录服务器[J]. 计算机科学, 2021, 48(6A): 504-508.
[8] 姜昊堃, 董学东, 张成. 改进的具有前向安全性的无证书代理盲签名方案[J]. 计算机科学, 2021, 48(6A): 529-532.
[9] 李嘉明, 赵阔, 屈挺, 刘晓翔. 基于知识图谱的区块链物联网领域研究分析[J]. 计算机科学, 2021, 48(6A): 563-567.
[10] 郭上铜, 王瑞锦, 张凤荔. 区块链技术原理与应用综述[J]. 计算机科学, 2021, 48(2): 271-281.
[11] 陈自民, 卢艺文, 郭燕. 基于区块并行的以太坊智能合约高速重放[J]. 计算机科学, 2021, 48(2): 289-294.
[12] 王卫红, 陈震宇. 基于改进区块链的智能制造安全模型[J]. 计算机科学, 2021, 48(2): 295-302.
[13] 季钰翔, 黄建华, 王喆, 郑红, 唐瑞琮. 基于信任度匹配的改进PBFT共识算法[J]. 计算机科学, 2021, 48(2): 303-310.
[14] 闫凯伦, 张继连. 一种可用于数据和模型分享的模型链[J]. 计算机科学, 2021, 48(2): 311-316.
[15] 张宁, 方靖雯, 赵雨宣. 基于LSTM混合模型的比特币价格预测[J]. 计算机科学, 2021, 48(11A): 39-45.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 冯芙蓉, 张兆功. 目标轮廓检测技术新进展[J]. 计算机科学, 2021, 48(6A): 1 -9 .
[2] 孙正, 张小雪. 生物光声成像中声反射伪影抑制方法的研究进展[J]. 计算机科学, 2021, 48(6A): 10 -14 .
[3] 周欣, 刘硕迪, 潘薇, 陈媛媛. 自然交通场景中的车辆颜色识别[J]. 计算机科学, 2021, 48(6A): 15 -20 .
[4] 黄雪冰, 魏佳艺, 沈文宇, 凌力. 基于自适应加权重复值滤波和同态滤波的MR图像增强[J]. 计算机科学, 2021, 48(6A): 21 -27 .
[5] 江妍, 马瑜, 梁远哲, 王原, 李光昊, 马鼎. 基于分数阶麻雀搜索优化OTSU肺组织分割算法[J]. 计算机科学, 2021, 48(6A): 28 -32 .
[6] 冯霞, 胡志毅, 刘才华. 跨模态检索研究进展综述[J]. 计算机科学, 2021, 48(8): 13 -23 .
[7] 周文辉, 石敏, 朱登明, 周军. 基于残差注意力网络的地震数据超分辨率方法[J]. 计算机科学, 2021, 48(8): 24 -31 .
[8] 朝乐门, 尹显龙. 人工智能治理理论及系统的现状与趋势[J]. 计算机科学, 2021, 48(9): 1 -8 .
[9] 雷羽潇, 段玉聪. 面向跨模态隐私保护的AI治理法律技术化框架[J]. 计算机科学, 2021, 48(9): 9 -20 .
[10] 王俊, 王修来, 庞威, 赵鸿飞. 面向科技前瞻预测的大数据治理研究[J]. 计算机科学, 2021, 48(9): 36 -42 .