Computer Science ›› 2026, Vol. 53 ›› Issue (1): 331-340.doi: 10.11896/jsjkx.241100053
• Information Security • Previous Articles Next Articles
PAN Yanyang, YANG Binhao, JI Qingge
CLC Number:
| [1]SHAO Q F,JIN C Q,ZHANG Z,et al.Blockchain technology:Architecture and progress[J].Journal of Computer Science,2018,41(5):969-988. [2]BELOTTI M,BOZIC N,PUJOLLE G,et al.A vademecum on blockchain technologies:When,which and how[J].IEEE Communications Surveys Tutorials,2019,21(4):3796-3838. [3]CHEN J,HE K,LI K,et al.Block chain extension technologypresent situation and prospect[J].Journal of Software,2024,35(2):828-851. [4]WRIGHT C S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].https://nakamotoinstitute.org/library/bitcoin/. [5]ZHAO Y,ZHANG M,PEI Z,et al.The effects of quantitative easing on bitcoin prices[J].Finance Research Letters,2023,57:104232. [6]SI X M,CHEN W G.Chain blocks and digital currency techno-logy project introduction[J].Journal of Software,2019,30(6):1575-1576. [7]AGBO C C,MAHMOUD Q H,EKLUND J M.Blockchain technology in healthcare:A systematic review[J].Healthcare,2019,7(2):56. [8]TSE D,ZHANG B,YANG Y,et al.Blockchain application in food supply information security[C]//2017 IEEE International Conference on Industrial Engineering and Engineering Management(IEEM).IEEE,2017:1357-1361. [9]XU Z,LIANG W,LI K C,et al.A blockchain-based roadsideunit-assisted authentication and key agreement protocol for internet of vehicles[J].Journal of Parallel and Distributed Computing,2021,149:29-39. [10]BOURAGA S.A taxonomy of blockchain consensus protocols:A survey and classification framework[J].Expert Systems with Applications,2021,168:114384. [11]CASTRO M,LISKOV B.Practical byzantine fault tolerance[C]//OSDI.1999:173-186. [12]GUPTA S,RAHNAMA S,HELLINGS J,et al.ResilientDB:Global scale resilient blockchain fabric[C]//Proceedings of the VLDB Endowment.2020:868-883. [13]KOKORIS-KOGIAS E,JOVANOVIC P,GASSER L,et al.Omniledger:A secure,scale-out,decentralized ledger via sharding[C]//2018 IEEE Symposium on Security and Privacy(SP).IEEE,2018:583-598. [14]SYTA E,JOVANOVIC P,KOGIAS E K,et al.Scalable bias-resistant distributed randomness[C]//2017 IEEE Symposium on Security and Privacy(SP).IEEE,2017:444-460. [15]MICALI S,RABIN M,VADHAN S.Verifiable random func-tions[C]//40th Annual Symposium on Foundations of Compu-ter Science.IEEE,1999:120-130. [16]GUETA G G,ABRAHAM I,GROSSMAN S,et al.Sbft:A scalable and decentralized trust infrastructure[C]//2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks(DSN).IEEE,2019:568-580. [17]YIN M,MALKHI D,REITER M K,et al.HotStuff:BFT Consensus in the Lens of Blockchain[J].arXiv:1803.05069,2018. [18]XU G,BAI H,XING J,et al.SG-PBFT:A secure and highly efficient distributed blockchain pbft consensus algorithm for intelligent internet of vehicles[J].Journal of Parallel and Distributed Computing,2022,164:1-11. [19]FENG L,ZHANG H,CHEN Y,et al.Scalable dynamic multi-agent practical byzantine fault-tolerant consensus in permissioned blockchain[J].Applied Sciences,2018,8(10):1919. [20]ZHENG X,FENG W,HUANG M,et al.Optimization of pbft algorithm based on improved c4.5[J].Mathematical Problems in Engineering,2021,2021(1):5542078. [21]LIU S,ZHANG R,LIU C,et al.Improvement of the PBFT algorithm based on grouping and reputation value voting[J].International Journal of Digital Crime and Forensics,2022,14(3):1-15. [22]NEO white paper[EB/OL].http://docs.neo.org/en-us/. [23]BERNARDO J M,SMITH A F.Bayesian theory:Vol.405[M].John Wiley & Sons,2009. [24]WANG Y,VASSILEVA J.Bayesian network-based trust model[C]//Proceedings IEEE/WIC International Conference on Web Intelligence(WI 2003).IEEE,2003:372-378. [25]MICALI S,RABIN M,VADHAN S.Verifiable random func-tions[C]//40th Annual Symposium on Foundations of Compu-ter Science.IEEE,1999:120-130. |
| [1] | ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375. |
| [2] | FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392. |
| [3] | ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8. |
| [4] | WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374. |
| [5] | YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361. |
| [6] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
| [7] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
| [8] | JIANG Lingyun, LIU Guanhao, YANG Jinglin, XU Jia. P-DAG:An Efficient and Secure Blockchain System Based on Parallel Chain [J]. Computer Science, 2025, 52(11A): 241000174-6. |
| [9] | CAO Yongsheng. Optimal Scheduling Algorithm for Electric Vehicle Charging and Discharging in Q-Learning Based Consortium Blockchain Framework [J]. Computer Science, 2025, 52(11A): 241200015-5. |
| [10] | AI Yuan, LI Jiahao, ZHAO Yitao, HU Kai. Optimization of Blockchain Dynamic Sharding and Cross-shard Transaction Protocol Based on Greedy Strategy [J]. Computer Science, 2025, 52(11A): 250100133-8. |
| [11] | CHANG Ningyuan, HUANG Ting, ZHANG Huang. Demand Response Scheme for Low Voltage Users Based on Light Weight Blockchains [J]. Computer Science, 2025, 52(11A): 250200125-8. |
| [12] | ZHOU Kai, CHEN Fu, LU Tianyuan, CAO Huaihu. Review of Blockchain Consensus Algorithm [J]. Computer Science, 2025, 52(11): 255-269. |
| [13] | FANG Zhipeng, LI Xiaoyu. Using Ring Blind Signature+Arbitration Authentication Mixed Coin Scheme [J]. Computer Science, 2025, 52(11): 390-397. |
| [14] | LIU Zhanghui, LIN Zhexu, CHEN Hanlin, MA Xinjian, CHEN Xing. Data Trusted Sharing Scheme Based on Consortium Blockchain [J]. Computer Science, 2025, 52(11): 398-407. |
| [15] | WU Moxun, PENG Zeshun, YU Minghe, LI Xiaohua, DONG Xiaomei, NIE Tiezheng, YU Ge. Approach for Lightweight Verifiable Data Management Based on Blockchains [J]. Computer Science, 2025, 52(10): 348-356. |
|
||