Computer Science ›› 2022, Vol. 49 ›› Issue (3): 360-370.doi: 10.11896/jsjkx.210900110
• Information Security • Previous Articles
YANG Xin-yu1,3, PENG Chang-gen1,2,3, YANG Hui1, DING Hong-fa4
CLC Number:
[1]CASTRO M,LISKOV B.Practical Byzantine Fault Tolerance[C]//Proceedings of the Third Symposium on Operating Systems Design and Implementation.New York:ACM Press,1999:173-186. [2]SUKHWANI H,MARTÍNEZ J M,CHANG X L,et al.Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric)[C]//2017 IEEE 36th Symposium on Reliable Distributed Systems.NJ:IEEE Press,2017:253-255. [3]GAO S,YU T Y,ZHU J M,et al.T-PBFT:An EigenTrust-based Practical Byzantine Fault Tolerance Consensus Algorithm[J].China Communications,2019,16(12):111-123. [4]LI Y X,WANG Z,FAN J,et al.An Extensible Consensus Algorithm Based on PBFT[C]//2019 International Conference on Cyber-Enabled Distributed Computing and Knowledge Disco-very.NJ:IEEE Press,2019:17-23. [5]NWEBONYI F N,MARTINS R,CORREIA M E.Reputation based Approach for Improved Fairness and Robustness in P2P Protocols[J].Peer-to-Peer Networking and Applications,2019,12(4):951-968. [6]GAYVORONSKAYA T M.Blockchain:Hype Or Innovation[M]//Springer International Publishing AG.Berlin:Springer,2021:1-14. [7]BOU A J,EI S R,KAMBHAMPATY K,et al.PermissionlessReputation-based Consensus Algorithm for Blockchain[J].Internet Technology Letters,2020,3(3):7-12. [8]ZHU S C,ZHANG Z Y,CHEN L Q,et al.A PBFT Consensus Scheme with Reputation Value Voting based on Dynamic Clustering[C]//International Conference on Security and Privacy in Digital Economy.Singapore:Springer,2020:336-354. [9]LIU Z Y,LUONG N C,WANG W B,et al.A Survey on Blockchain:A Game Theoretical Perspective[J].IEEE Access,2019,7(4):47615-47643. [10]LI W Y,FENG C L,ZHANG L,et al.A Scalable Multi-layer PBFT Consensus for Blockchain[J].IEEE Transactions on Pa-rallel and Distributed Systems,2020,32(5):1146-1160. [11]XU X L,ZHU D W,YANG X X,et al.Concurrent Practical Byzantine Fault Tolerance for Integration of Blockchain and Supply Chain[J].ACM Transactions on Internet Technology,2021,21(1):1-17. [12]LEI K,ZHANG Q C,XU L M,et al.Reputation-based Byzantine Fault Tolerance for Consortium Block-chain[C]//2018 IEEE 24th International Conference on Parallel and Distributed Systems.NJ:IEEE Press,2018:604-611. [13]BIRYUKOV A,FEHER D.ReCon:Sybil-resistant Consensusfrom Reputation[J].Pervasive and Mobile Computing,2020,61(1):1-29. [14]CHEN P,HAN D Z,WENG T H,et al.A Novel ByzantineFault Tolerance Consensus for Green IoT with Intelligence based on Reinforcement[J].Journal of Information Security and Applications,2021,59(6):131-139. [15]LIA Y X,BO Z X,LIU J.Research on Sybil Attack in Defense Blockchain based on Improved PBFT Algorithm[J].Journal on Communications,2020,41(9):104-117. [16]YU J S,KOZHAYA D,DECOUCHANT J,et al.Repucoin:Your Reputation is Your Power[J].IEEE Transactions on Computers,2019,68(8):1225-1237. [17]BOU A J,EI S R,DEMERJIAN J.Permissionless Proof-of-Re-putation-X:A Hybrid Reputation-based Consensus Algorithm for Permissionless Blockchains[J].Transactions on Emerging Telecommunications Technologies,2021,32(1):383-410. [18]MANSHAEI M H,JADLIWALA M,MAITI A,et al.A Game-Theoretic Analysis of Shard-based Permissionless Blockchains[J].IEEE Access,2018,6(12):78100-78112. [19]TIAN Y L,PENG C G,MA J F,et al.Game-Theoretic Mechanism for Cryptographic Protocol[J].Journal of Computer Research and Development,2014,51(2):344-352. [20]DING H F,PENG C G,TIAN Y L,et al.Privacy Risk Adaptive Access Control Model via Evolutionary Game[J].Journal on Communications,2019,40(12):9-20. [21]SANDHOLM W H.Population Games and Evolutionary Dy-namics[M]//Massachusetts Institute of Technology MIT Press.London:The MIT Press,2010:119-140. [22]LI S J,SU W L.The Research of Reputation Incentive Mechanism of P2P Network File Sharing System[J].International Journal of Information and Computer Security,2018,10(2/3):149-169. [23]RANJBAR-SAHRAEI B,BOU A H,BLOEMBERGEN D,et al.Evolution of Cooperation in Arbitrary Complex Networks[C]//Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems.New York:ACM Press,2014:677-684. [24]HARTMAN P.A Lemma in The Theory of Structural Stability of Differential Equations[J].Proceedings of the American Ma-thematical Society,1960,11(4):610-620. [25]WANG E K,LIANG Z D,CHEN C M,et al.PoRX:A Reputation Incentive Scheme for Blockchain Consensus of IioT[J].Future Generation Computer Systems,2020,102(1):140-151. [26]MALKHI D,NAYAK K,REN L.Flexible Byzantine Fault To-lerance[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.New York:ACM Press,2019:1041-1053. |
[1] | FU Yan-ming, ZHU Jie-fu, JIANG Kan, HUANG Bao-hua, MENG Qing-wen, ZHOU Xing. Incentive Mechanism Based on Multi-constrained Worker Selection in Mobile Crowdsourcing [J]. Computer Science, 2022, 49(9): 275-282. |
[2] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[6] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[7] | WANG Xian-fang, ZHANG Liang, ZHANG Ning. Evolutionary Game Analysis of WeChat Health Information Quality Optimization Based on Prospect Theory [J]. Computer Science, 2022, 49(6A): 694-704. |
[8] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[9] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[10] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[11] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[12] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[13] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[14] | DU Hui, LI Zhuo, CHEN Xin. Incentive Mechanism for Hierarchical Federated Learning Based on Online Double Auction [J]. Computer Science, 2022, 49(3): 23-30. |
[15] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
|