Computer Science ›› 2020, Vol. 47 ›› Issue (6A): 603-608.doi: 10.11896/JsJkx.190800155

• Interdiscipline & Application • Previous Articles     Next Articles

Design and Analysis of Token Model Based on Blockchain Technology

WU Guang-fu, CHEN Ying, ZENG Xian-wen, HE Dao-Jing and LI Jiang-hua   

  1. School of Information Engineering,Jiangxi University of Science and Technology,Ganzhou,Jiangxi 341000,China
  • Published:2020-07-07
  • About author:WU Guang-fu, born in 1977, Ph.D, associate professor, master supervisor.His main research interests information theo-ry and channel coding, cryptography, network Security and blockchain technology.
  • Supported by:
    This work was supported by the National Natural Science Foundation of China (11461031),Key Scientific Foundation of the Education Department of Jiangxi Province(GJJ170492),General Scientific ProJect of the Education Department of Jiangxi Province,China (GJJ180442,GJJ170516) and Natural Science Foundation of Jiangxi Province,China(20181BBE58018).

Abstract: Through in-depth study of the traditional general evidence model,it is found that the centralized mode has always been restricting the development of the system,and the emergence of blockchain technology undoubtedly provides an entry point for the application and promotion of the certificate,which will break the information barrier between enterprises.Blockchain techno-logy is an Internet database technology,where each user has an equal right to compete for writing the database records.In this paper,a pass-through chain based on blockchain technology was designed.The pass-through chain has the characteristics of decentralization and non-tamperability.It can break the information barrier between enterprises and combine the use of the pass on the pass-through chain to increase the trust between enterprises.To enhance the information flow between enterprises,the pass-through chain proposed a safer and more efficient consensus algorithm,that is,the pass-through consensus algorithm,so that the pass-through chain has better efficiency and performance compared with the traditional public chain such as Bitcoin andEthe-reum.Using pluggable technology to realize the pluggable applications of cryptography and database will make the blockchain more efficient and convenient in the development of different application scenarios.

Key words: Consensus algorithm, Decentralization, General evidence model, Pass-through chain, Pluggable technology

CLC Number: 

  • TU375
[1] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cashsystem .http://bitcoins.info/bitcoin.pdf,2018.
[2] BUTERIN V.A next-generation smart contract and decentra-lizedApplication platform.White paper,2014:1-36.
[3] Ethereum Whitepaper.http://github.com/Ethereum/wiki/White-Paper.
[4] Hyperledger white paperwg[OL].http://wiki.hyperledger.org/groups/Whitepaper/whitepaper.wg.
[5] SWAN M.Blockchian:Bluprint for a New Economy.O’Reilly Media,Inc,2015.
[6] ANTONOPOULOS A M.Mastering Bitcoin:Unlocking Digital Crypto-Currencies.O’Reilly Media,Inc,2014.
[7] YUAN Y,WANG F Y.Blockchain:the state of the art and future trends.Acta Automatica Sinica,2016,42(4):481-494.
[8] YU M,LI Z H,ZHANG L B.P2P data management.Journal of Software,2006,17(8):1717-1730.
[9] GRIBBLE S D,HALEVY A Y,IVES Z G,et al.What can data-base do for peer-to-peer?//Proceedings of the Fourth International Workshop on the Web and Databases (WebDB).Santa Barbara,USA,2001:31-36.
[10] HE P U,YU G E,ZHANG Y F,et al.Survey on blockchain technology and its application prospect.Computer Science,2017,44(4):1-7.
[11] JAKOBSSON M,JUELS A.Proofs of work and bread pudding protocols (extended abstract)//Secure Information Networks.Boston,MA,Germany:Springer,1999:258-272.
[12] Proof of stake.https://en.bitcoin.it/wiki/Proof_of_Stake,April 11,2018.
[13] CASTRO M,LISKOV B.Practical Byzantine fault tolerance //Proceedings of the 3rd Symposium on Operating Systems Design and Implementation.New Orleans,USA:USENIX Association,1999.
[14] WU G F,ZENG X W,LIU J,et al.Design and Analysis of Hash Function Based on Error Correcting Code.Netinfo Security,2018(1):67-72.
[15] Bit Shares.Delegated proof of stake.http://docs.bitshares.org/bitshar-es/dpos.html.
[16] SHENTU Qing-Chun.Development guide of blockchain.BeiJing:China Machine Press,2017.
[17] YANG B H,CHEN C.Principle,programming and applications of blockchain.BeiJing:China Machine Press,2017.
[18] GOLDWASSER S,MICALI S,RACKOFF C.The knowledgecomplexity of interactive proof systems.SIAM Journal on Computing,1989,18(1):186-208.
[19] QIAN W N,SHAO Q F,ZHU Y C,et al.Research problemsand methods in blockchain and trusted data management.Journal of Software,2018,29(1):150-159.
[20] GREEN T J,TANNEN V.The semiring framework for database provenance//Proceedings of the 36th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems (PODS).Chicago,USA,2017:93-99
[21] LIANG X P,SHETTY S,TOSH D K,et al.ProvChain:Ablockchain-based data provenance architecture in cloud environment with enhanced privacy and availability//Proc.of the CCGrid.2017:468-477.
[22] DWYER G P.The economics of bitcoin and similar private digitalcurrencies.Social Science ElectronicPublishing,2015,17:81-91.
[23] SCHAUB A,BAZIN R,HASAN O,et al.A trustless privacy-preserving reputation system//Proc.of the IFIP Int’l Information Security and Privacy Conf.Springer Int’l Publishing,2016:398-411.
[24] YANG Z,ZHENG K,YANG K,et al.A blockchain-based reputation system for data credibility assessment in vehicular networks//Proc.of the IEEE Int’l Symp.on Personal,Indoor,and Mobile Radio Communications.2017:1-5.
[25] DENNIS R,OWEN G.Rep on the block:A next generation re-putation system based on the blockchain//Internet Technology and Secured Transactions.2016:131-138.
[1] LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728.
[2] FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339.
[3] YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370.
[4] WANG Ri-hong, ZHOU Hang, XU Quan-qing, ZHANG Li-feng. Non-byzantine Fault Tolerance Consensus Algorithm for Consortium Blockchain [J]. Computer Science, 2021, 48(9): 317-323.
[5] GUO Shang-tong, WANG Rui-jin, ZHANG Feng-li. Summary of Principle and Application of Blockchain [J]. Computer Science, 2021, 48(2): 271-281.
[6] JI Yu-xiang, HUANG Jian-hua, WANG Zhe, ZHENG Hong, TANG Rui-cong. Improved PBFT Consensus Algorithm Based on Trust Matching [J]. Computer Science, 2021, 48(2): 303-310.
[7] DAI Chuang-chuang, LUAN Hai-jing, YANG Xue-ying, GUO Xiao-bing, LU Zhong-hua, NIU Bei-fang. Overview of Blockchain Technology [J]. Computer Science, 2021, 48(11A): 500-508.
[8] WANG Hui, CHEN Bo, LIU Yu-xiang. Research on Personnel File Management System Based on Blockchain [J]. Computer Science, 2021, 48(11A): 713-718.
[9] ZHOU Yi-hua, FANG Jia-bo, JIA Yu-xin, JIA Li-yuan, SHI Wei-min. Consortium Blockchain Consensus Algorithm Based on PBFT [J]. Computer Science, 2021, 48(11): 133-141.
[10] SHAO Xing-hui, HUANG Jian-hua, WANG Meng-nan, WU Hai-xia, MAI Yong. Trust-based Dual-layer Scalable Consensus Protocol [J]. Computer Science, 2021, 48(11): 142-150.
[11] LU Ge-hao, XIE Li-hong and LI Xi-yu. Comparative Research of Blockchain Consensus Algorithm [J]. Computer Science, 2020, 47(6A): 332-339.
[12] WANG Hui, LIU Yu-xiang, CAO Shun-xiang, ZHOU Ming-ming. Medical Data Storage Mechanism Integrating Blockchain Technology [J]. Computer Science, 2020, 47(4): 285-291.
[13] ZHANG Peng-yi, SONG Jie. Research Advance on Efficiency Optimization of Blockchain Consensus Algorithms [J]. Computer Science, 2020, 47(12): 296-303.
[14] WANG Tong, MA Wen-ping, LUO Wei. Information Sharing and Secure Multi-party Computing Model Based on Blockchain [J]. Computer Science, 2019, 46(9): 162-168.
[15] HU Zhao-peng, DING Wei-ping, GAO Zhan, ZHU Xiao-hui, WANG Jie-hua. Multi-stage Cascade Wireless Security Authentication Scheme Based on Blockchain Technology [J]. Computer Science, 2019, 46(12): 180-185.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!