Computer Science ›› 2021, Vol. 48 ›› Issue (2): 271-281.doi: 10.11896/jsjkx.200800021

Special Issue: Information Security

• Information Security • Previous Articles     Next Articles

Summary of Principle and Application of Blockchain

GUO Shang-tong, WANG Rui-jin, ZHANG Feng-li   

  1. School of Information and Software Engineering,University of Electronic Science and Technology of China,Chengdu 610054,China
  • Received:2020-08-03 Revised:2020-12-01 Online:2021-02-15 Published:2021-02-04
  • About author:GUO Shang-tong,born in 1995,postgraduate,is a member of China Computer Federation.His main research interests include blockchain and privacy protection.
    WANG Rui-jin,born in 1980,associate professor,is a member of China Computer Federation.His main research interests include information security,privacy protection and blockchain.
  • Supported by:
    The National Natural Science Foundation of China(61802033,61472064,61602096),Sichuan Regional Innovation Cooperation Project(2020YFQ0018),Sichuan Science and Technology Program (2020YFG0475,2018GZ0087,2019YJ0543),Chinese Postdoctoral Science Foundation(2018M643453),Guangdong Provincial Key Laboratory Project(2017B030314131) and Network and Data Security Key Laboratory of Sichuan Province Open Issue(NDSMS201606).

Abstract: In recent years,as digital cryptocurrency has gradually come into people's sight,its underlying technology blockchain has also attracted people's attention.As a distributed ledger technology,blockchain is characterized by multi-party maintenance,non-tampering,openness and transparency.In this paper,the structure of block chain is divided according to the hierarchy,and the functions and principles of each layer are introduced from low to high.Block chain is divided into public chain,alliance chain and private chain according to the degree of openness.The working principle of public chain and alliance chain is illustrated by taking Bitcoin and Hyperledger Fabric as examples.And this paper gives a detailed introduction to the underlying core technology consensus algorithm,smart contract and privacy security of blockchain,and analyzes the research progress and research prospect of blockchain in the end.

Key words: Blockchain, Consensus algorithms, Digital cryptocurrency, Privacy protect, Smart contract

CLC Number: 

  • TP311.13
[1] YAO Z J,GE J G.A Summary o the Theory and Application of BlockChain[J].E-Science Technology & Aplication,2017,8(2):3-17.
[2] HE P,YU G,ZHANG Y F,et al.Survey on Blockchain Technology and Its Application Prospect[J].Computer Science,2017,44(4):1-7,15.
[3] SHAO Q F,ZHANG Z,ZHU Y C,et al.Survey of enterprise blockchains[J].Ruan Jian Xue Bao,2019,30(9):25712592.
[4] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2020-06-13]. / bitcoin.pdf.
[5] CAO B,LIN L,LI Y,et al.Review of blockchain research[J].Journal of Chongqing University of Post and Telecommunication(Natural Science Edition),2020,32(1):1-14.
[6] Pete Rizzo.Linq [EB/OL].[2020-10-28].
[7] EYAL I.Blockchain Technology:Transforming LibertarianCryptocurrency Dreams to Finance and Banking Realities [J].Computer,2017,50(9):38-49.
[8] BROWN R G,CARLYLE J,GRIGG I,et al.Corda:An introduction.[EB/OL].[2020-05-10].
[9] BUTERIN V.A next-generation smart contract and decentralized application platform White Paper [EB/OL].[2020-06-18]. /wiki / White-Paper.
[10] YUAN Y,WANG F Y.Blockchain:The State of The Art and Future Trends[J].Acta Automatica Sinica,2016,42(4):481-494.
[11] ERKLE R C.Protocols for public key cryptosys-tems[C]//Proceedings of the 1980 IEEE Symposium on Security and Privacy(S&P).Oakland,USA,1980:122-134.
[12] ERKLE R C.A digital signature based on a conventional encryption function[C]//Proceedings of the Advances in Cryptology-CRYPTO'87(CRYPT-O).Santa Barbara,USA,1987:369-378.
[13] SZYDLO M.Merkle tree traversal in log space and time[C]//Proceedings of the Advances in Cryptology-EUROCRYPT.2004(EUROCRYPT).Interlaken,Switzerland,2004:541-554.
[14] Hyperledger Fabric [EB/OL].[2020-10-28].
[15] WANG X L,ZHANG J.Survey on peer-to-peer key technologies[J].Application Research of Computers,2010,27(3):801-805.
[16] BAYER D,HABER S,STORNETTAW S.Improving the efficiency and reliability of digital time-stamping[C]//Sequences II:Methods in Communication,Security and Computer Science.NewYork,USA:Springer-Verlag,1993:329-334.
[17] HABER S,STORNETTA W S.How to time-stamp a digitaldocument[C]//Proceedings of the Advances in Cryptology-CRYPTO'90(CRYPTO).Santa Barbara,USA,1990:437-455.
[18] HABER S,STORNETTA W S.Secure names for bit-strings[C]//Proceedings of the 4th ACM Conferenceon Computer and Communications Security(CCS).Zurich,Switzerland,1997:28-35.
[19] YANG Y G,ZHANG S X.Review and Research for Consensus Mechanism of Block Chain[J].Journal of Information Security Research,2018,4(4):369-379.
[20] GILBERT S,LYNCH N.Brewer's conjecture and the feasibility of consistent,available,partition-tolerant Web services[J].ACM SIGACT News,2002,33(2):51-59.
[21] YUAN Y,NI X C,ZENG S,et al.Blockchain Consensus Algorithms:The State of The Art and Future Trends[J].Acta Automatica Sinica,2018,44(11):2011-2022.
[22] LAMPORT L.The Part-Time Parliament[J].ACM Transac-tions on Computer Systems,1998,16(2):133-169.
[23] ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm[C]//The 2014 USENIX Conference on USENIX Annual Technical Conference.USENIX Association,2015:305-320.
[24] LAMPORT L,SHOSTAK R,PEASE M.The Byzantine Gene-rals Problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401.
[25] CASTRO M,LISKOV B.Practical Byzantine fault tolerance[C]//Proceedings of the Third USENIX Symposium on Opera-ting Systems Design and Implementation (OSDI).New Orleans,LA,USA,1999:173-186.
[26] GOLAN-GUETA G,ABRAHAM I,GROSSMAN S,et al.SBFT:A scalable decentralized trust infrastructure for Blockchains[EB/OL].[2020-05-18].
[27] AUBLIN P L,MOKHTAR S B,QUÉMA V.Rbft:Redundant byzantine fault tolerance[C]//IEEE.2013 IEEE 33rd International Conference on Distributed Computing Systems.New York:IEEE,2013:297-306.
[28] DWORK C,NAOR M.Pricing via Processing or CombattingJunk Mail[C]// Springer-Verlag.1993.
[29] BACK A.Hashcash-a Denial of Service Counter-Measure[EB/OL].[2020-06-11].,2002-8-1.
[30] SUNNY K,SCOTT N.PPcoin:Peer-to-Peer Crypto-Currencywith Proof-of-Stake[EB/OL].[2020-06-10].,2012-8-19.
[31] LARIMER D.Transactions as proof-of-Stake[EB/OL].[2020-06-10].
[32] BUTERIN V,GRIFFITH V.Casper the Friendly FinalityGadget[OL].
[33] LARIMER D.Delegated Proof-of-stake(DP-oS) [EB /OL].[2020-05-08].http:∥
[34] SZABO N.Formalizing and Securing Relationships on PublicNetworks[EB/OL].[2020-06-18].
[35] JEREMYVINFOLIO.Serpent[EB/OL].[2020-06-20].
[36] ETHEREUM.Solidity[EB/OL].[2020-06-20].
[37] DANNEN C.Introducing Ethereum and Solidity:Foundations of Cryptocurrency and Blockchain Programming for Beginners[EB/OL].[2020-06-20].
[38] RON D,SHAMIR A.Quantitative Analysis of the Full Bitcoin Transaction Graph[C/OL] ∥Financial Cryptography and Data Security.Lecture Notes in Computer Science.
[39] LIAO K,ZHAO Z,DOUPE A,et al.Behind closed doors:Measurement and analysis of CryptoLocker ransoms in Bitcoin[C]//Symposium on Electronic Crime Research.Toronto,ON,2016:1-13.
[40] EYAL I,SIRER E G.Majority is not Enough:Bitcoin Mining is Vulnerable[J].Communications of the ACM,2018,61(7):95-102.
[41] REID F,HARRIGAN M.An Analysis of Anonymity in theBitcoin System[C]// IEEE Third International Conference on IEEE Third International Conference on Privacy.IEEE,2012.
[42] ZYSKIND G,NATHAN O,PENTLAND A.DecentralizationPrivacy:Using Blockchain to Protect Personal Data[J].IEEE Security and Privacy Workshops,2015:180-184.
[43] MEIKLEJOHN S,POMAROLE M,JORDAN G,et al.A fistful of bitcoins:characterizing payments among men with no names[J].Communications of the ACM,2016,59(4):86-93.
[44] ANDROULAKI E,KARAME G O,ROESCHLIN M,et al.Evaluating User Privacy in Bitcoin[C]// International Confe-rence on Financial Cryptography and Data Security.Springer,Berlin,Heidelberg,2013.
[45] CHAU M,DAVID L.Untraceable electronic mail,return ad-dresses,and digital pseudonyms[J].Communications of the Acm,1981,24(2):84-90.
[46] MAXWELL G.Confidential Transactions[EB/OL].[2020-06-13].,2017-4-28.
[47] BONNEAU J ,NARAYANAN A ,MILLER A,et al.Mixcoin:Anonymity for Bitcoin with Accountable Mixes[C]// International Conference on Financial Cryptography & Data Security.Springer,Berlin,Heidelberg,2014.
[48] Dash.Dash is digital cash[EB/OL].[2020-06-15].https:∥
[49] RIVEST R L,SHAMIR A,TAUMAN Y.How to Leak a Secret[C]// International Conference on the Theory & Application of Cryptology & Information Security.Springer,Berlin,Heidelberg,2001.
[50] BERGAN T,ANDERSON O,DEVIETTI J,et al.CryptoNotev 2.0[EB/OL].[2020-06-17].https:∥ cryptonote-v-20/,2017-4-28.
[51] Monero.AboutMonero[EB/OL].[2020-06-17].https:∥
[52] Boolberry.What is Boolberry[EB/OL].[2020-06-17].https:∥
[53] Bytecoin.A clear way to your private future[EB/OL].[2020-06-19].https:∥
[54] GOLDWASSER S,MICALI S,RACKOFF C.The knowledgecomplexity of interactive proof systems[J].SIAM Journal on Computing,1989,18(1):186-208.
[55] MIERS I,GARMAN C,GREEN M,et al.Zerocoins:anonymous distributed E-cash from bitcoin[C]// Proceedings of IEEE Symposium on Security and Privacy.USA:IEEE Press,2013:394-411.
[56] ASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized Anonymous Payments from Bitcoin[C]//Proceedings of the 2014 IEEE Symposium on Security and Privacy.NJ:IEEE,2014:459-474.
[57] SBEN-SASSON E,CHIESA A,GENKIN D,et al.SNARKs for C:Verifying program executions succinctly and in zero knowledge[C]//Proceedings of the Advances in Cryptology-CRYPTO 2013(CRYPTO).Santa Barbara,USA,2013:90-108.
[58] KOSBA A,MILLER A,SHI E,et al.Hawk:The BlockchainModel of Cryptography and Privacy-Preserving Smart Contracts[C]//2016 IEEE Symposium on Security and Privacy (SP).2016:839-858.
[59] GENTRY C.Fully homomorphic encryption using ideal lattices[C]//Proceedings of the 41st Annual ACM Symposium on Theory of Computering(STOC).Bethesda,USA,2009:169-178.
[60] PEDERSEN T P.Non-Interactive and Information-TheoreticSecure Verifiable SecretSharing[C]//International Cryptology Conference on Advances in Cryptology.Springer-Verlag,1991:129-140.
[61] HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse Attacks on Bitcoin's Peer-to-Peer Network[C]// Usenix Conference on Security Symposium.USENIX Association,2015.
[62] MARCUS Y,HEILMAN E,GOLDBERG S.Low-ResourceEclipse Attacks on Ethereum's Peer-to-Peer Network[J].IACR Cryptology ePrint Archive,2018,2018:236.
[63] BONNEAU J.Why Buy When You Can Rent?[C]// International Conference on Financial Cryptography and Data Security.Springer Berlin Heidelberg,2016.
[64] LIAO K ,KATZ J.Incentivizing Blockchain Forks via WhaleTransactions[C/OL] ∥Financial Cryptography and Data Security.https:∥
[65] EYAL I.The miner's dilemma[C]//Proceedings of 2015 IEEE Symposium on Security and Privacy (SP 2015).IEEE,2015:89-103.
[66] BONNEAU J,MILLER A,CLARK J,et al.SoK:Research Perspectives and Challenges for Bitcoin and Cryptocurrencies[C]// 2015 IEEE Symposium on Security and Privacy.IEEE,2015.
[67] NAYAK K,KUMAR S,MILLER A,et al.Stubborn Mining:Generalizing Selfish Mining and Combining with an Eclipse Attack[C]// IEEE European Symposium on Security & Privacy.IEEE,2016.
[68] SAPIRSHTEIN A,SOMPOLINSKY Y,ZOHAR A.Optimalselfish mining strategies in Bitcoin[C]//Financial Cryptography and Data Security—FC 2016.Revised Selected Papers.Springer Berlin Heidelberg,2016:515-532.
[69] BAG S,RUJ S,SAKURAI K.Bitcoin block withholding attack:Analysis and mitigation[J].IEEE Transactions on Information Forensics and Security,2017,12(8):1967-1978.
[70] KWON Y,KIM D,SON Y,et al.Be selfish and avoid dilemmas:Fork after withholding (FAW) attacks on Bitcoin[C]//Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS 2017).ACM,2017:195-209.
[71] BISSIAS G,LEVINE B N,OZISIK A P,et al.An analysis of attacks on Blockchain consensus[EB/OL].[2020-06-22].http:∥
[72] CONTI M,KUMAR E S,LAL C,et al.A survey on security and privacy issues of Bitcoin[J].IEEE Communications Surveys and Tutorials,2018,20(4):3416-3452.
[73] SAAD M,NJILLA L,KAMHOUA C,et al.Countering Selfish Mining in Blockchains[C]//2019 International Conference on Computing,Networking and Communications (ICNC).Honolulu,Hawaii:IEEE,2019:360-364.
[74] KOKORIS-KOGIAS E,JOVANOVIC P,GASSER L,et al.OmniLedger:A Secure,Scale-Out,Decentralized Ledger via Sharding[C]//2018 IEEE Symposium on Security and Privacy (SP).San Francisco,CA:IEEE,2018:583-598.
[75] LUU L,NARAYANAN V,ZHENG C D,et al.A Secure Sharding Protocol For Open Blockchains[C]//The 2016 ACM SIGSAC Conference.Vienna,Austria:ACM,2016:17-30.
[76] KWON J,BUCHAMN E.Cosmos:A network of distributedledgers[OL].
[77] POON J,DRYJA T.The Bitcoin lightening network:Scalable off-chain instant payments[OL].
[78] EYAL I,GENCER A E,SIRER E G,et al.Bitcoin-NG:A scalable Blockchain protocol[C]//Proceedings of 13th USENIX Symposium on Networked Systems Design and Implementation(NSDI 2016).Santa Clara,CA,USA,2016:45-59.
[79] PASS R,SHI E.FruitChains:A fair Blockchain[C]//Proceedings of the ACM Symposium on Principles of Distributed Computing (PODC 2017).ACM,2017:315-324.
[80] SOMPOLINSKY Y,LEWENBERG Y,ZOHAR A.SPECTRE: A fast and scalable crypto currency protocol[J].IACR Cryptology ePrint Archive,2016(2):1159.
[81] DUONG T,FAN L,ZHOU H S.2-hop Blockchain:Combining proof-of-work and proof-of-stake securely[J].IACR Cryptology ePrint Archive,2016(4):716.
[82] BENTOV I,LEE C,MIZRAHI A,et al.Proof of activity:Extending Bitcoin's proof of work via proof of stake[J].SIGMETRICS Performance Evaluation Review,2014,42(3):34-37.
[83] ABRAHAM I,MALKHI D,NAYAK K,et al.Solida:A Blockchain protocol based on reconfigurable Byzantine consensus[C]//Proceedings of 21st International Conference on Principles of Distributed Systems (OPODIS 2017).2017(25):1-19.
[84] GILAD Y,HEMO R,MICALI S,et al.Algorand:Scaling Byzantine agreements for cryptocurrencies[C]//Proceedings of the 26th Symposium on Operating Systems Principles.Shanghai,2017:51-68.
[85] KOKORIS-KOGIAS E,JOVANOVIC P,GAILLY N,et al.Enhancing Bitcoin security and performance with strong consistency via collective signing[C]//Proceedings of 25th USENIX Security Symposium.USENIX,2016:279-296.
[86] ZOU J,DONG Z,SHAO A,et al.3D-DAG:A High Performance DAG Network with Eventual Consistency and Finality[C]//2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).Shenzhen:IEEE,2018:262-263.
[87] THAM C,CAO B.Stochastic Programming Methods for Workload Assignment in an Ad Hoc Mobile Cloud[J].IEEE Transactions on Mobile Computing,2018,17(7):1709-1722.
[88] THAM C,CAO B.Stochastic Programming Methods for Workload Assignment in an Ad Hoc Mobile Cloud[J].IEEE Transactions on Mobile Computing,2018,17(7):1709-1722.
[89] LEI A,CRUICKSHANK H,CAO Y,et al.Blockchain- based dynamic key management for heterogeneous intelligent transporttation systems[J].IEEE Internet Things,2017,4(6):1832-1843.
[90] TIAGO M.FERNNDEZ C.An Intelligent Power Outlet System for the Smart Home of the Internet of Things[J].International Journal of Distributed Sensor Networks,2015,2015(1):1-11.
[91] SIDDIQI M,ALL S V,SIVARAMAN V.Secure light- weightcontext-driven data logging for bodyworn sensing devices[C]//2017 5th International Symposium on Digital Forensic and Security (ISDFS).New York:IEEE,2017:1-6.
[92] KSHETRI N.Can blockchain strengthen the Internet ofThings? [J].IT Professional,2017,19(4):68-72.
[93] TIAN F.An agrifood supply chain traceability system for Chinabased on RFID &blockchain technology[C]//Proc 13th Int Conf Service Syst Service Manage (ICSSSM).Kunming:IEEE,2016:1-6.
[94] SUANKAEWMANEE K,HOANG D T,NIYATO D,et al.Performance Analysis and Application of Mobile Blockchain[C]//2018 International Conference on Computing,Networking and Communications (ICNC).Maui,HI:IEEE,2018:642-646.
[95] XU F,YANG F,ZHAO C,et al.Edge Computing and Caching based Blockchain IoT Network[C]//2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN).Shenzhen:IEEE,2018:238-239.
[96] XIA C,CHEN H,LIU X,et al.ETRA:Efficient Three-Stage Resource Allocation Auction for MobileBlockchain in Edge Computing[C]//2018 IEEE 24th International Conference on Parallel and Distributed Systems(IC-PADS).Singapore:IEEE,2018:701-705.
[97] ZHANG H,ZHANG Y,GU Y.A Hierarchical Game Framework for Resource Management in Fog Computing[J].IEEE Communications Magazine,2017,55(8):52-57.
[98] XIONG Z,ZHANG Y,NIYATO D,et al.When Mobile Blockchain Meets Edge Computing[J].IEEE Communications Magazine,2018,56(8):33-39.
[99] RAHMAN M A.Blockchain-Based Mobile Edge ComputingFramework for Secure Therapy Applications[J].IEEE Access,2018(6):72469-72478.
[1] LU Chen-yang, DENG Su, MA Wu-bin, WU Ya-hui, ZHOU Hao-hao. Federated Learning Based on Stratified Sampling Optimization for Heterogeneous Clients [J]. Computer Science, 2022, 49(9): 183-193.
[2] WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317.
[3] HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305.
[4] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[5] ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776.
[6] FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461.
[7] GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468.
[8] WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473.
[9] MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530.
[10] WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38.
[11] SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295.
[12] YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332.
[13] REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340.
[14] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[15] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
Full text



No Suggested Reading articles found!