Computer Science ›› 2021, Vol. 48 ›› Issue (11): 159-169.doi: 10.11896/jsjkx.210400027
• Blockchain Technology • Previous Articles Next Articles
XIANG A-xin1,2, GAO Hong-feng1,3, TIAN You-liang1,2,4
CLC Number:
[1]NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system [OL].(2008-10-31) [2020-10-30].http://bitcoin.org/bitcoin.pdf. [2]TSUNG-TING K,HYEONEUI K,LUCILA O M.Blockchaindistributed ledger technologies for biomedical and health care applications[J].the American Medical Informatics Association,2017,24(6):1211-1220. [3]CHUKWU E,GARG L.A systematic review of blockchain inhealthcare:frameworks,prototypes,and implementations[J].IEEE Access,2020,8:21196-21214. [4]TIAGO M,FERNÁNDEZ-CARAMÉS,PAULA F.A Reviewon the Use of Blockchain for the Internet of Things[J].IEEE Access,2018,6:32979-33001. [5]OUIMET S.Bitcoin dominance rate hits 50% for first times[OL].[2020-09-28].https://www.coin-desk.com/bitcoin-do-minance-rate-hits-50-for-first-time-in-2018/. [6]LI L,LIU J Q,CHANG X L,et al.Toward conditionally anonymous Bitcoin transactions:A lightweight-script approach[J].Information Sciences,2020,509:290-303. [7]ESKANDARI S,CLARK J,BARRERA D,et al.A First Look at the Usability of Bitcoin Key Management[C]//Workshop on Usable Security.2015. [8]ITTAY E,ADEM E G,EMIN G S,et al.Bitcoin-NG:A Scalable Blockchain Protocol[C]//Symposium on Networked Systems Design and Implementation.2016:45-59. [9]MÖSER M,EYAL I,SIRER E G.Bitcoin Covenants[C]//International Conference on Financial Cryptography & Data Security.2016:126-141. [10]O'CONNOR R ,PIEKARSKA M.Enhancing Bitcoin Transactions with Covenants[C]//International Conference on Financial Cryptography & Data Security.2017:191-198. [11]POULAMI D,LISA E,TOMMASO F,et al.FastKitten:Practical Smart Contracts on Bitcoin[C]//USENIX Security Sympo-sium.2019:801-818. [12]YU H,ZHANG Z Y,LIU J W.Research on Scaling Technology of Bitcoin Blockchain[J].Journal of Computer Research and Development,2017,54(10):2390-2403. [13]BRENGEL M,ROSSOW C.Identifying Key Leakage of Bitcoin Users[C]//International Symposium on Recent Advances in Intrusion Detection.2018:623-643. [14]LI J,LI T,LIU Z,et al.Secure Deduplication System with Active Key Update and Its Application in IoT[J].ACM Transactions on Intelligent Systems and Technology,2019,10(6):1-21. [15]HONG H,SUN Z.Achieving secure data access control and efficient key updating in mobile multimedia sensor networks[J].Multimedia Tools and Applications,2017,77(4):4477-4490. [16]TIAN Y,WANG Z,XIONG J,et al.A Blockchain-Based Secure Key Management Scheme with Trustworthiness in DWSNs[J].IEEE Transactions on Industrial Informatics,2020,16(9):6193-6202. [17]LI Y,YU Y,YANG B,et al.Privacy preserving cloud data auditing with efficient key update[J].Future Generation Computer Systems,2018,78(PT.2):789-798. [18]ATHMANI S,BILAMI A,BOUBICHE D E.EDAK:An Efficient Dynamic Authentication and Key Management Mechanism for heterogeneous WSNs[J].Future Generation Computer Systems,2019,92:789-799. [19]NICOLAS T C,REBEKAH M.Stealth Address and Key Ma-nagement Techniques in Blockchain Systems[C]//International Conference on Information Systems Security & Privacy.2017:559-566. [20]STANISLAW J,HUGO K,JASON K R.Updatable Oblivious Key Management for Storage Systems[C]//ACM Conference on Computer and Communictions Secu-rity.2019:379-393. [21]ALBAKRI A,HARN L,MADDUMALA M.Polynomial-based Lightweight Key Management in a Permissioned Blockchain[C]//IEEE Conference on Communications and Network Secu-rity.2019:1-9. [22]ZHANG R,LIU J,HAN Z,et al.An IBE scheme using ECCcombined public key[J].Computers & Electrical Engineering,2010,36(6):1046-1054. [23]LI X,QIAN H,ZHOU Y.Pitfalls in identity-based encryption using an elliptic curve combined public key[J].Applied Mathematics Letters,2012,25(8):1111-1113. [24]ANDERSON R.Two Remarks on Public-Key Cryptology[OL].[2020-09-27].http://www.cl.cam.ac.uk/user/rja14/. [25]THOMAS P.Deterministic Usage of the Digital Signature Algorithm (DSA) and Elliptic Curve Digital Signature Algorithm (ECDSA)[J].Request for Comments,2013,6979:1-79. [26]WANG Z,YU H,ZHANG Z,et al.ECDSA weak randomness in Bitcoin[J].Future Generation Computer Systems,2020,102:507-513. [27]BROWN M,HANKERSON D,LÓPEZ J,et al.Software Implementation of the NIST Elliptic Curves Over Prime Fields[C]//Proceeding of the 2001 Conference on Topics in Crytology:The Cryptographer's Track at RSA.2001:250-265. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[6] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[7] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[8] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[9] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[10] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[11] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[12] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[13] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[14] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[15] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
|