Computer Science ›› 2021, Vol. 48 ›› Issue (11A): 500-508.doi: 10.11896/jsjkx.201200163
• Information Security • Previous Articles Next Articles
DAI Chuang-chuang1,2, LUAN Hai-jing1,2, YANG Xue-ying1,2, GUO Xiao-bing3, LU Zhong-hua1,2, NIU Bei-fang1,2
CLC Number:
[1]HUANG H Y,YANG X H,WANG X L,et al.Overview of domestic blockchain research based on CNKI [J].Software Guide,2020,19 (1):234-237. [2]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system [EB/OL].https://bitcoin.org/bitcoin.pdf:bitcoin,2018. [3]HAN X,YUAN Y,WANG F Y.Blockchain security:researchstatus and prospects [J].Journal of Automation,2019,45 (1):206-225. [4]SHEN X,PEI Q Q,LIU X F.Overview of blockchain technology [J].Journal of Network and Information Security,2016,2 (11):11-20. [5]CAI X Q,DENG Y,ZHANG L,et al.Principle and core technology of blockchain [J].Journal of Computer Science,2019,42 (115):1-51. [6]WANG Q,QIN B,HU J K,et al.Preserving transaction privacy in bitcoin[J].Future Generation Computer Systems,2020,107:793-804. [7]LIU A D,DU X H,WANG N,et al.Blockchain technology and its research progress in the field of information security [J].Journal of Software,2018,29 (7):2092-2115. [8]ZHANG L,LIU B X,ZHANG R Y,et al.Overview of blockchain technology [J].Computer Engineering,2019,45 (5):1-12. [9]SHI J S,LI R.Overview of blockchain access control under the Internet of things [J].Journal of Software,2019,30 (6):1632-1648. [10]GARAY J A,KIAYIAS A,LENOARDOS N.The bitcoin backbone protocol:Analysis and applications[C]//Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques.Sofia,Bulgaria,2015:281-310. [11]CAO Z.A consensus mechanism for alliance chain[J].Cyber-space Security,2019,10(1):96-101. [12]KING S,NADAL S.PPCoin:Peer-to-peer crypto-currency with proof-of-stake[EB/OL].https://www.chainwhy.com/upload/default/20180619/126a057fef926dc286accb372da46955.pdf:Google,2012. [13]LI G,ZHANG J H,ZANG J M.Research on improved POAconsensus mechanism blockchain system for solving civil aviation virtual seat occupation [J].Computer Application Research,2020:1-7. [14]ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm[C]//Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference.Philadelphia,USA,2014:305-320. [15]TAN H B,ZHOU T,ZHAO H,et al.Archive data protection and sharing method based on blockchain [J].Journal of Software,2019,30 (9):2620-2635. [16]LAMPORT L,SHOSTAK R,PEASE M.The Byzantine generals problem[J].ACM Transactions on Programming Languages and Systems,1982,4(3):382-401. [17]CASTRO M,LISKOV B.Proactive recovery in a Byzantine-fault-tolerant system[C]//Proceedings of the 4th Conference on Symposium on Operating System Design and Implementation.Berkeley,United States,2000:273-288. [18]YUAN Y,NI X C,ZENG S,et al.Development status and Prospect of blockchain consensus algorithm [J].Journal of Automation,2018,44 (11):2011-2022. [19]YU G,NIE T Z,LI X H,et al.Distributed data managementtechnology in blockchain system - challenges and prospects [J].Journal of Computer Science,2019,42 (116):1-27. [20]PORTMANN E.Rezension “Blockchain:Blueprint for a New Economy”[J].Praxis Der Wirtschaftsinformatik,2018,55(6):1362-1364. [21]ZHANG J,GAO W Z,ZHANG Y C,et al.Intelligent distributed power energy system running on blockchain:demand,concept,method and prospect [J].Journal of Automation,2017,43(9):1544-1554. [22]FU X Q,YANG Y.An improved mobile payment system model [J].Journal of Huazhong University of science and technology(Natural Science Edition),2004,32(12):49-50,74. [23]FANG Y B,ZHOU C G.Token system based on blockchain smart contract [J].Computer Application Research,2020,37(12):1-7. [24]HE H L.Ruibo coin and operation mechanism of Ruibo system [J].Times finance,2016(20):267-278. [25]SZABO N.Smart contracts:building blocks for digital markets[EB/OL].http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart_contracts_2.html:Google,1996. [26]BUTERIN V.Ethereum:a next generation smart contract anddecentralized application platform[EB/OL].https://www.weusecoins.com/assets/pdf/library/Ethereum_white_paper-a_next_generation_smart_contract_and_decentralized_application_platform-vitalikbuterin.pdf:Google,2016. [27]XU X B,SUN B S,QI X H,et al.Scalable information sharing mechanism of Internet of things based on Ethereum [J].Computer Applications and Software,2019,36 (12):111-116,142. [28]ZHU J M,ZHANG Q N,GAO S.Research progress on key technologies and applications of blockchain [J].Journal of Taiyuan University of technology,2020:1-14. [29]MENG W T,ZHANG D W.Optimization scheme of hyperledger fabric consensus mechanism [J].Journal of Automation,2020:1-14. [30]ANDROULAKI E,BARGERA,BORTNIKOV V,et al.Hy-perledger fa-bric:a distributed operating system for permissioned blockchains[EB/OL].https://www.colabug.com/3052594.html:Google,2018. [31]MEI Y X,DIAO X L .The era of blockchain from 2.0 to 3.0 requires the deep integration of eliminating the false and preserving the true and the real economy [J].Communication World,2018 (27):48-49. [32]XU M X,YUAN C,WANG Y J,et al.Pseudo blockchain-blockchain security solution [J].Journal of Software,2019,30(6):1681-1691. [33]SONG Q.On the development of blockchain-Xunlei chainshows the technological advantages of the 3.0 era [J].Computer and Network,2018,44(5):33. [34]LI Y.Identity authentication system based on blockchain 3.0 Architecture [J].Journal of Suzhou University,2019,34 (11):70-76. [35]WANG J W,ZHENG Z Z,WU F,et al.Data market based on blockchain based data market [EB / OL].http://kns.cnki.net/kcms/detail/10.1321.g2.20200311.1050.004.html:Big data,2020. [36]YUAN B A,LIU J,LI G.Fair multi-party undeniable protocol based on blockchain [J].Journal of Cryptologic Research,2018,5(5):546-555. [37]KARAME G O,ANDROULAKI E,ROESCHLIN M,et al.Misbehavior in bitcoin:A study of double-spending and accountability[J].ACM Transactions on Information and System Security,2015,18(1):1-32. [38]YE C C,LI G Q,CAI H M,et al.Security detection model of blockchain [J].Journal of Software,2018,29(5):1348-1359. [39]YUAN Y,WANG F Y.Development status and Prospect ofblockchain technology [J].Journal of Automation,2016,42(4):481-494. [40]ZHANG L.Overview of digital signatures[C]//Society for the Application of Intelligent Information Technology.China:Henan,2011:541-544. [41]ZHAO X.Overview of digital signatures [J].Computer Engineering and Design,2006,27(2):195-197. [42]JAIN J,SINGH A.Quantum-based Rivest-Shamir-Adleman(RSA) approach for digital forensic reports[J].Modern Physics Letters B,2020,34(6):2050085. [43]KARIMA D,LAMINEM.Two dimensional ElGamal public key cryptosystem[J].Information Security Journal:A Global Perspective,2019,28(4/5):120-126. [44]FU Y,YU Y H,WU X P.Differential privacy protection technology and application in big data environment [J].Journal of Communications,2019,40(10):157-168. [45]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126. [46]HU Z,YANG G,YANG B S,et al.Parallel homomorphic encryption algorithm based on MapReduce [J].Computer Applications,2015,35(12):3408-3412,3418. [47]WANG R J,TANG Y C,ZHANG W Q,et al.Privacy protection scheme of Internet of vehicles based on homomorphic encryption and blockchain technology [J].Journal of Network and Information Security,2020,6(1):46-53. [48]GUO J L,HOU H X.Laboratory open management systembased on homomorphic encryption technology [J].Information Security Research,2020,6(2):188-192. [49]GOLDWASSER S,MICALI S,RACKOFF C.The knowledge complexity of interactive proof-systems[J].SIAM Journal on Computing,1989.18(1):186-208. [50]LI X D,NIU Y K,WEI L B,et al.Overview of bitcoin privacy protection [J].Journal of Cryptography,2019,6(2):133-149. [51]RIVEST R,SHAMIR A,TAUMANY.How to leak a secret[C]//Proceedings of 7th International Conference on the Theory and Application of Cryptology and Information Security.Gold Coast,Australia,2001:552-565. [52]SZABO N.Formalizing and securing relationships on public networks[J].First Monday,1997,2(9). [53]SHAO Q F,ZHANG Z,ZHU Y C,et al.Overview of enterprise blockchain technology [J].Journal of Software,2019,30(9):2571-2592. [54]ZENG S Q,HUO R,HUANG T,et al.Research review ofblockchain Technology:principle,progress and application [J].Journal of Communications,2020,41(1):134-151. [55]HAN F.On the civil protection of China’s investors’ rights and interests under the new ICO Regulations [J].Journal of Taiyuan University (Social Science Edition),2019,20(6):73-82. [56]OUYANG L W,WANG S,YUAN Y,et al.Smart contract:Architecture and progress [J].Journal of Automation,2019,45(3):445-457. [57]SANG A Q,SHEN M,ZHU L H,et al.Research on multi-party collaborative security identity authentication mechanism based on blockchain [J].Journal of Nanjing University of Information Engineering (Natural Science Edition),2019,11(5):581-589. [58]WANG Y,HE M J.Application case analysis of blockchain and Internet of things [J].Integrated Circuit Application,2018,35(3):70-74. [59]FREY R M,VUCKOVAC D,ILIC A.A Secure Shopping Experience Based on Blockchain and Beacon Technology[C]//Proceedings of the 10th ACM Conference on Recconmmender Systems.Boston,MA,USA,2016:3-4. [60]ENGLISH S M,NEZHADIAN E.Conditions of full disclosure:The blockchain remuneration model[C]//Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops.Paris,France,2017:64-67. [61]BOGNER A,CHANSON M,MEEUW A.A decentralised sha-ring app running a smart contract on the ethereum blockchain[C]//Proceedings of the 6th International Conference on the Internet of Things.Stuttgart,Germany,2016:177-178. [62]LAMBERT D M,COOPER M C,PAGH J D.Supply chain management:implementation issues and research opportunities[J].International Journal of Logistics Management,1998,9(2):1-20. [63]LU Y,WEN J.Supply chain control and traceability schemebased on bitcoin technology [J].Computer Engineering,2018,44 (12):85-93 ,101. [64]HOU Z G,LIANG H.Research on development status andcharacteristic application of blockchain technology [J].Scientific and Technological Innovation and Application,2019 (30):18-20,23. [65]RAO D N,WANG J X,JIANG Z H,et al.Overview of the application of blockchain technology in logistics supply chain [J].Software Guide,2018,17(9):1-3,8. [66]CHAKRAVORTY A,RONG C.Ushare:user controlled socialmedia based on blockchain[C]//Proceedings of the 11th International Conference on Ubiquitous Information Management and Communication.Beppu,Japan,2017:99. [67]DENNIS R,OWEN G.Rep on the block:A next generation reputation system based on the blockchain[C]//Proceedings of the 10th International Conference for Internet Technology and Secured Transactions.London,UK,2015:131-138. [68]GERSTL D S.Leveraging bitcoin blockchain technology to mo-dernize security perfection under the uniform commercial code[C]//Proceedings of the International Conference of Software Business.Ljubljana,Slovenia,2016:109-123. [69]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and progress [J].Journal of Computer Science,2018,41(05):969-988. [70]HUANG Y X,LIANG Z H,HUANG P,et al.Supply chaintrusted data management based on blockchain [J].Computer System Application,2018,27(12):9-17. [71]LUO W H.Rules and consensus:from electronic signature to blockchain [J].Journal of China University of Political Science and Law,2019(2):48-59,206. [72]ZHANG S,DONG Y.Research on digital copyright protectionbased on blockchain technology [J].Research on Science and Technology Management,2020,40(1):132-136. [73]FENG T,JIAO Y,FANG J L,et al.Health data security model based on alliance blockchain [J].Computer Science,2020,47(4):305-311. [74]ZHANG C D,WANG B S,DENG W P.Design of supply chain traceability system based on side chain technology [J].Computer Engineering,2019,45(11):1-8. [75]WORLEY C,SKJELLUM A.Blockchain tradeoffs and challenges for current and emerging applications:generalization,fragmentation,sid-echains,and scalability[C]//Proceedings of the 2018 IEEE International Conference on Internet of Things and IEEE Green Computing and Communications and IEEE Cyber,Physical and Social Computing and IEEE Smart Data.Washington D.C.,USA,2018:1582-1587. [76]TIAN Y L,YANG K D,WANG Z,et al.Blockchain data traceability algorithm based on attribute encryption [J].Journal of Communications,2019,40(11):101-111. [77]YANG X M,LI X,WU H Q,et al.Application mode and practical challenges of blockchain technology in Education [J].Modern Distance Education Research,2017(2):34-45. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | HUANG Song, DU Jin-hu, WANG Xing-ya, SUN Jin-lei. Survey of Ethereum Smart Contract Fuzzing Technology Research [J]. Computer Science, 2022, 49(8): 294-305. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[5] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[6] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[7] | WEI Hong-ru, LI Si-yue, GUO Yong-hao. Secret Reconstruction Protocol Based on Smart Contract [J]. Computer Science, 2022, 49(6A): 469-473. |
[8] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[9] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[10] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[11] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[12] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[13] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[14] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[15] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
|