计算机科学 ›› 2018, Vol. 45 ›› Issue (2): 1-7.doi: 10.11896/j.issn.1002-137X.2018.02.001
所属专题: 区块链技术
• 区块链技术 • 下一篇
任明,汤红波,斯雪明,游伟
REN Ming, TANG Hong-bo, SI Xue-ming and YOU Wei
摘要: 随着比特币价值的不断攀升,其背后使用的区块链技术在全球范围内迅速引起了各个行业的广泛关注,同时也引起了各国政府的高度重视。特别是以美国为代表的一些国家在政府和权力机构的支持下,已经开始尝试将此项技术应用于专用信息平台建设、装备物资运转和系统控制等多个方面,认为此项技术的分布式、可追溯、不易篡改等特性能够在匿名数据的收集、数据的完整性校验、智能设备的互联通信等多个方面发挥重要作用。同时,目前也有不少国家政府机构对区块链技术的应用仍然保持谨慎的态度,认为此项技术仍然面临着安全保密、应用的通用性等诸多问题。通过 介绍和分析 政府部门中区块链技术的应用情况,指出目前该项技术在政府部门应用的过程中面临的挑战。最后,针对这些问题,并结合现在学术界已有的工作提出相应的解决方案。
[1] ANTONOPOULOS A M.Mastering Bitcoin[M].USA:O’Reilly Media,2014. [2] Wikipedia.Blockchain (database) [EB/OL].[2017-10-3].https://en.wikipedia.org/wiki/ Blockchain_(database). [3] GERVAIS A,RITZDORF H,KARAME G O,et al.Tampering with the Delivery of Blocks and Transactions in Bitcoin[C]∥ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2015:692-705. [4] PORRU S,PINNA A,MARCHESI M,et al.Blockchain-Oriented Software Engineering:Challenges and New Directions [C]∥International Conference on Software Engineering Companion.Piscataway,NJ:IEEE Press,2017:169-171. [5] CHRISTIDIS K,DEVETSIKIOTIS M.Blockchains and SmartContracts for the Internet of Things[J].IEEE Access,2016,4:2292-2303. [6] KYPRIOTAKI K N,ZAMANI E D,GIAGLIS G M.From Bitcoin to Decentralized Autonomous Corporations:Extending the Application Scope of Decentralized Peer-to-Peer Networks and Blockchains [C]∥Proceedings of the 17th International Confe-rence on Enterprise Information Systems(ICEIS2015).Barcelona,2015:284-290. [7] NEISSE R,STERI G,NAI-FOVINO I.A Blockchain-based Approach for Data Accountability and Provenance Tracking[EB/OL].[2017-6-14].https://arxiv.org/ abs/1706.04507. [8] SZYDLO M.Merkle Tree Traversal in Log Space and Time[J].Lecture Notes in Computer Science,2004,7:541-554. [9] WOLRICH G M,YAP K S,GUILFORD J D,et al.Instruction set for message scheduling of SHA256 algorithm:US8838997B2[P].2012-09-28. [10] HABER S,STORNETTA W S.How to time-stamp a digital document [J].Journal of Cryptology,1991,3(2):99-111. [11] BAYER D,HABER D,STORNETTA W S.Improving the Efficiency and Reliability of Digital Time-Stamping [M]∥Sequences II:Methods in Communication,Security,and Computer Science.New York:Springer.1993:329-334. [12] 杨保华,陈昌.区块链原理、设计与应用[M].北京:机械工业出版社,2017:34-62. [13] KRAFT D.Difficulty control for blockchain-based consensussystems[J].Peer-to-Peer Networking and Applications,2016,9(2):397-413. [14] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash Sys-tem[EB/OL].[2008-11-1].https:// bitcoin.org/bitcoin.pdf. [15] R3.About R3.http://www.r3cev.com/about. [16] ZYSKIND G,NATHAN O,PENTLAND A S.DecentralizingPrivacy:Using Blockchain to Protect Personal Data[C]∥Pro-ceedings of the 2015 IEEE Security and Privacy Workshops (SPW 2015).San Jose,CA:IEEE,2015:180-184. [17] SWAN M.Blockchain Thinking:The Brain as a DecentralizedAutonomous Corporation[J].IEEE Technology and Society Magazine,2015,4(4):41-52. [18] BOGNER A,CHANSON M,MEEUW A.A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain[C]∥Proceeding of ACM International Conference on the Internet of Things.New York:ACM,2016:177-178. [19] KIM K J,HONG S P.Study on Rule-based Data Protection System Using Blockchain in P2P Distributed Networks[J].International Journal of Security and Its Applications,2016,1(10):201-210. [20] KOSBA A,MILLER A,SHI E,et al.Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[C]∥Symposium on Security and Privacy.New York:IEEE Computer Society,2016:839-858. [21] LAMPORT L.Time,Clocks,and the Ordering of Events in aDistributed System[J].Communications of the ACM,1978,21(7):558-565. [22] MERKLE R C.Protocols for Public Key Cryptosystems[C]∥IEEE Symposium on Security and Privacy.New York:IEEE Computer Society,1980:122-133. [23] MERKLE R C.A Digital Signature Based on a Conventional Encryption Function [C]∥Conference on Advances in Cryptology-crypto,1987:369-378. [24] PEASE M,SHOSTAK R,LAMPORT L.Reaching Agreement in the Presence of Faults[J].Journal of the ACM,1980,27(2):228-234. [25] FISCHER M J,LYNCH N A,PATERSON M S.Impossibility of Distributed Consensus with One Faulty Process[J].Journal of the ACM,1985,32(2):374-382. [26] CASTRO M,LISKOV B.Practical Byzantine Fault Tolerance[C]∥Proceedings of the 3rd USENIX Symposium on Operating Systems Design and Implementation.Berkeley:USENIX Associa-tion,1999:173-186. [27] VUKOLIC M.The Quest for Scalable Blockchain Fabric:Proof-of-Work vs.BFT Replication[C]∥International Federation for Information Processing.New York:Springer International Publishing,2016:112-125. [28] BAILIS P,FEKETE A,FRANKLIN M J,et al.CoordinationAvoidance in Database Systems[J].Proceedings of the VLDB Endowment,2014,8(3):185-196. [29] WILKINSON S,BOSHEVSKI T,BRANDOFF J,et al.Storj:A Peer-to-Peer Cloud Storage Network(V0.2)[EB/OL].[2016-11-15].https://storj.io/storj.pdf. [30] HARI A,LAKSHMAN T V.The Internet Blockchain:A Distributed,Tamper-Resistant Transaction Framework for the Internet[C]∥ACM Workshop on Hot Topics in Networks.New York:ACM,2016:204-210. [31] CORBETT J C,DEAN J,EPSTEIN M,et al.Spanner:Google’s globally-distributed database[C]∥Usenix Conference on Operating Systems Design and Implementation.Berkeley:USENIX Association,2012:251-264. [32] HIGGINS S.$700 Billion Senate Defense Bill Calls for Blockchain Cybersecurity Study[EB/OL].[2017-9-19].https:// coindesk.com/700-billion-senate-defense-bill-calls-blockchain-cy-bersecurity-study. [33] KOKORISKOGIAS E,JOVANOVIC P,GAILLY N,et al.Enhancing Bitcoin Security and Performance with Strong Consisten ain-messaging-app-under-development-for-the-us-military. [35] RUUBEL M.Guardtime Federal and Galois Awarded DARPA Contract to Formally Verify Blockchain-Based Integrity Monitoring System[EB/OL].[2016-9-13].https://guardtime.com/blog/galois-and-guardtime-federal-awarded-1-8m-darpa-contract-to-formally-verify-blockchain-based-inte. [36] Industry Relations.NCI Agency innovation challenge[EB/OL].[2016-4-25].https://www.ncia.nato.int/NewsRoom/Pages/160425_Innovation.aspx. [37] NATOLI C,GRAMOLI V.The Balance Attack or Why Forka-ble Blockchains Are Ill-Suited for Consortium[C]∥47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN).Denver:IEEE Press,2017:579-590. [38] LI W T,SFORZIN A,FEDOROV S,et al.Towards Scalable and Private Industrial Blockchains[C]∥ACM Workshop on Blockchain.New York:ACM,2017:9-14. [39] EYAL I,SIRER E G.Majority is not Enough:Bitcoin Mining is Vulnerable[C]∥Proceedings of 18th International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:436-454. [40] LEWENBERG Y,SOMPOLINSKY Y,ZOHAR A.InclusveBlockchain Protocols [J].Financial Cryptography and Data Security,2015,5:528-547. [41] EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:A Scalable Blockchain Protocol [C]∥Proceedings of the 13th USENIX Conference on Networked Systems Design and Implementation.Berkeley:USENIX Association,2016:45-59. [42] KARAME G.On the Security and Scalability of Bitcoin’s Blockchain[C]∥2016 ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2016:1861-1862. [43] GERVAIS A,KALAME G O,WUST K,et al.On the Security and Performance of Proof of Work Blockchains[C]∥ ACM Sigsac Conference on Computer and Communications Security.New York:ACM,2016:3-16. [44] YUAN C,XU M X,SI X M.Rese |
No related articles found! |
|