Computer Science ›› 2023, Vol. 50 ›› Issue (6A): 220400200-12.doi: 10.11896/jsjkx.220400200
• Information Security • Previous Articles Next Articles
TAN Pengliu, WANG Runshu, ZENG Wenhao, WANG Shikun, ZOU Wenshi
CLC Number:
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].http://bitcoin.org/bitcoin.pdf. [2]The global economy is in its weakest period in a decade,but bitcoin is quietly brewing the next bull market?[EB/OL].https://baijiahao.baidu.com/s?id=1648083421346579310&wfr=spider&for=pc. [3]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain Technology:Architecture and progress[J].Chinese Journal of Computers,2018,41(5):969-988. [4]ZHU L,YU H,ZHAN S X,et al.Research on high performance alliance blockchain Technology[J].Journal of Software.2019,30(6):17. [5]CHEN W L,ZHENG Z B.Blockchain data analysis:status,trends and challenges[J].Journal of Computer Research and Development,2018,55(9):1853-1870. [6]Blockchain for financial services[EB/OL].https://www.ibm.com/blockchain/industries/financial-services. [7]Ant chain[EB/OL].https://antchain.antgroup.com/. [8]Blockchain for Supply Chain-IBM Blockchain[EB/OL].https://www.ibm.com/blockchain/supply-chain. [9]Home-GBA Global[EB/OL].https://www.gbaglobal.org/. [10]State of the DApps-Ranking the Best Ethereum DApps[EB/OL].https://www.stateofthedapps.com/zh/rankings/platform/ethereum. [11]YUAN Y,WANG F.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica.2016,42(4):481-494. [12]OLSEN P,BORIT M.The components of a food traceabilitysystem[J].Trends in Food Science & Technology.2018,77:143-149. [13]YUAN Y,WANG F.Blockchain and Cryptocurrencies:Model,Techniques,and Applications[J].IEEE Transactions on Systems,Man,and Cybernetics:Systems.2018,48(9):1421-1428. [14]LIU A D,DU X H,WANG N,et al Blockchain technology and its research progress in the field of information security[J].Journal of Software.2018,29(7):2092-2115. [15]DWORK C,NAOR M.Pricing via Processing or CombattingJunk Mail[M]//Berlin:Springer,2001:139-147. [16]BACK A.Hashcash-a denial of service counter-measure[EB/OL].https://sites.cs.ucsb.edu/~rich/class/old.cs290/papers/hascash2.pdf. [17]WANG M,DUAN M,ZHU J.Research on the Security Criteria of Hash Functions in the Blockchain[C]//Proceedings of the 2nd ACM Workshop on Blockchains,Cryptocurrencies,and Contracts.ACM,2018:47-55. [18]ZHENG W,ZHENG Z,CHEN X,et al.NutBaaS:A Blockchai-nas-a-Service Platform[J].IEEE Access.2019,7:134422-134433. [19]KING S,NADAL S.Ppcoin:Peer-to-peer crypto-currency withproof-of-stake[EB/OL].https://bitcoin.peryaudo.org/vendor/peercoin-paper.pdf. [20]VASIN P.Blackcoin’s proof-of-stake protocol v2[J/OL].https://blackcoin.co/blackcoin-pos-protocol-v2-whitepaper.pdf. [21]YANG F,ZHOU W,WU Q,et al.Delegated Proof of StakeWith Downgrade:A Secure and Efficient Blockchain Consensus Algorithm With Downgrade Mechanism[J].IEEE Access.2019,7:118541-118555. [22]CASTRO M,LISKOV B.Practical byzantine fault tolerance and proactive recovery[J].ACM transactions on computer systems.2002,20(4):398-461. [23]GRAMOLI V.From blockchain consensus back to Byzantineconsensus[J].Future Generation Computer Systems.2020,107:760-769. [24]GUETA G G,ABRAHAM I,GROSSMAN S,et al.Sbft:a sca-lable and decentralized trust infrastructure[C]//IEEE.2019:568-580. [25]GAO S,YU T,ZHU J,et al.T-PBFT:An EigenTrust-basedpractical Byzantine fault tolerance consensus algorithm[J].ChinaCommunications,2019,16(12):111-123. [26]KAMVAR S D,SCHLOSSER M T,GARCIA-MOLINA H.TheEigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International Conference on World Wide Web.ACM.2003:640-651. [27]DU M,CHEN Q,MA X.MBFT:A New Consensus Algorithm for Consortium Blockchain[J].IEEE Access.2020,8:87665-87675. [28]LAMPORT L.Paxos made simple[J].ACM Sigact News.2001,32(4):18-25. [29]ONGARO D,OUSTERHOUT J.In search of an understandable consensus algorithm(extended version)[C]//Proceeding of USENIX Annual Technical Conference.2014:19-20. [30]WU Y,ZHONG S.Research on block chain consensus algorithm raft[J].Netinfo Security.2021,21(6):36-44. [31]MCCORRY P,HEILMAN E,MILLER A.Atomically Tradingwith Roger:Gambling on the Success of a Hardfork[M]//Data Privacy Management,Cryptocurrencies and Blockchain Techno-logy.Cham:Springer International Publishing,2017:334-353. [32]DOUCEUR J R.The sybil attack[C]//Peer-to-Peer Systems.Berlin:Springer,2002:251-260. [33]NAIR P R,DORAI D R.Evaluation of Performance and Security of Proof of Work and Proof of Stake using Blockchain[C]//2021 Third International Conference on Intelligent Communication Technologies and Virtual Mobile Networks(ICICV).IEEE.2021:279-283. [34]DOULIGERIS C,MITROKOTSA A.DDoS attacks and defense mechanisms:classification and state-of-the-art[J].Computer Networks,2004,44(5):643-666. [35]HEILMAN E,KENDLER A,ZOHAR A,et al.Eclipse attacks on bitcoin’s peer-to-peer network[C]//24th USENIX Security Symposium(USENIX Security’15).2015:129-144. [36]ZHENZHEN J.Various possibilities around the “ImpossibleTriangle” of blockchain[EB/OL].http://www.ccw.com.cn/channel/blockchain/2019-04-03/6967.html. [37]ZHANG P Y,SONG J.Research Progress on efficiency optimization of blockchain consensus algorithm[J].Computer Science,2020,47(12):296-303. |
[1] | WANG Junlu, LIU Qiang, ZHANG Ran, JI Wanting, SONG Baoyan. Blockchain-based Dual-branch Structure Expansion Model [J]. Computer Science, 2023, 50(8): 365-371. |
[2] | YANG Jian, WANG Kaixuan. Tripartite Evolutionary Game Analysis of Medical Data Sharing Under Blockchain Architecture [J]. Computer Science, 2023, 50(6A): 221000080-7. |
[3] | HUANG Baohua, PENG Li, ZHAO Weihong, CHEN Ningjiang. Practical Byzantine Consensus Algorithm Based on Verifiable Random Functions [J]. Computer Science, 2023, 50(6A): 220300064-6. |
[4] | TU Jun, JIA Dongli, WANG Jin. Byzantine Fault Tolerant Consensus Algorithm Based on Traceable Ring Signature [J]. Computer Science, 2023, 50(6A): 220300100-7. |
[5] | LIN Feilong, YUE Yuedong, ZHENG Jianhui, CHEN Zhongyu, LI Minglu. Blockchain-based Identity Authentication and Authorization Mechanism [J]. Computer Science, 2023, 50(6A): 220700158-9. |
[6] | PAN Lu, LUO Tao, NIU Xinzheng. Restart and Recovery Algorithm Based on Distributed Cluster Nodes [J]. Computer Science, 2023, 50(6A): 220300205-6. |
[7] | XIAO Jian, YANG Min. Multi-factor Blockchain Private Key Protection Scheme Based on Secret Sharing [J]. Computer Science, 2023, 50(6): 307-312. |
[8] | LIU Wei, GUO Lingbei, XIA Yujie, SHE Wei, TIAN Zhao. Raft Consensus Algorithm Based on Credit Evaluation Model [J]. Computer Science, 2023, 50(6): 322-329. |
[9] | ZHANG Shue, TIAN Chengwei, LI Baogang. Review of Identity Authentication Research Based on Blockchain Technology [J]. Computer Science, 2023, 50(5): 329-347. |
[10] | LIU Zerun, ZHENG Hong, QIU Junjie. Smart Contract Vulnerability Detection Based on Abstract Syntax Tree Pruning [J]. Computer Science, 2023, 50(4): 317-322. |
[11] | LI Bei, WU Hao, HE Xiaowei, WANG Bin, XU Ergang. Survey of Storage Scalability in Blockchain Systems [J]. Computer Science, 2023, 50(1): 318-333. |
[12] | CHEN Yan, LIN Bing, CHEN Xiaona, CHEN Xing. Blockchain-based Trusted Service-oriented Architecture [J]. Computer Science, 2023, 50(1): 342-350. |
[13] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[14] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[15] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
|