Computer Science ›› 2022, Vol. 49 ›› Issue (6A): 447-461.doi: 10.11896/jsjkx.210600214
• Information Security • Previous Articles Next Articles
FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling
CLC Number:
[1] DIFFIE W,HELLMAN M.New directions in cryptography[J].IEEE Transactions on Information Theory,1976,22(6):644-654. [2] WANG C.Academic Debate about the Nature of Hayek's Mone-tray Theory and Its Logic Its Combing and Discrimination[J].Foreign Frontier Journal of Social Sciences,2021,2(820):75-87. [3] VON HAYEK F,YAO Z Q.The denationalization of currency[M].Rising Star Press,2007:99-110. [4] MIN X,LI Q,LEI L,et al.A Permissioned Blockchain Frame-work for Supporting Instant Transaction and Dynamic Block Size[C]// 2016 IEEE Trustcom/BigDataSE/ISPA.IEEE,2016,90-96. [5] NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[J/OL].https://bitcoin.org/bitcoin.pdf. [6] SHEN X,PEI Q Q,LIU X F.Survey of block chain[J].Chinese Journal of Network and Information Secuiity,2016,2(11):11-20. [7] CAI X Q,DENG Y.The Principle and core Technology ofBlockchain[J].Chinese Journal of Computers,2021,44(1):84-131. [8] YU G,NIE T Z.The Challenge and Prospect of Distributed Data Management Techniques in BlockChain Systems[J].Chinese Journal of Computers,2021,44(1):28-54. [9] SAPRA R,DHALIWAL P.Blockchain:The new era of Technology[C]//2018 Fifth International Conference on Parallel,Distributed and Grid Computing(PDGC).2018:495-499. [10] WOOD G.Ethereum:A secure decentralised generalised tran-saction ledger[J].Ethereum Project Yellow Paper,2014,151:1-32. [11] DDV,ANISH J.Bitcoin mining acceleration and performancequantification[C]//IEEE Canadian Conference on Electrical and Computer Engineering.2014:1-6. [12] SWAN M.Blockchain-Blueprint for a new economy[M].O'reilly Media,2015:1-9. [13] LI M,SONG W P,HAO H,et al.IEEE Standard for Data Format for Blockchain Systems[J].Institute of Electrical and Electronics Engineers,2020,2(2418):1-32. [14] ZHANG W B.Constructing blockchain world state Merkle Patricia Trie subtree:USA,10 929 374[P].2021-02-23. [15] HONG S,KIM H.Analysis of Bitcoin Exchange Using Rela-tionship of Transactions and Addresses[C]// 2019 21st International Conference on Advanced Communication Technology(ICACT).2019:67-70. [16] YANG X,CHEN Y,CHEN X.Effective Scheme against 51% Attack on Proof-of-Work Block-chain with History Weighted Information[C]//2019 IEEE International Conference on Blockchain(Blockchain).2019:261-265. [17] CHEN H,WANG Y J.A Lightweight Scalable Protocol forPublic Blockchain[J].Journal of Computer Research and Deve-lopment,2020,57(7):1555-1567. [18] ZHU J,LIU P,HE L.Mining Information on Bitcoin Network Data[C]//2017 IEEE International Conference on Internet of Things(iThings) and IEEE Green Computing and Communications(GreenCom) and IEEE Cyber,Physical and Social Computing(CPSCom) and IEEE Smart Data(SmartData).2017:999-1003. [19] HOU B,CHEN F.A Study on Nine Years of Bitcoin Transactions:Understanding Real-world Behaviors of Bitcoin Miners and Users[C]//2020 IEEE 40th International Conference on Distributed Computing Systems(ICDCS).2020:1031-1043. [20] ZOLA F,EGUIMENDIA M,BRUSE J L.Cascading Machine Learning to Attack Bitcoin Anonymity[C]//2019 IEEE Inter-national Conference on Blockchain(Blockchain).2019:10-17. [21] LU T,YAN R,LEI M,et al.AABN:Anonymity assessment model based on Bayesian network with application to blockchain[J].China Communications,2019,16(6):55-68. [22] DIAMOND B.Systems and Methods for Side-Chainnel-Secure Blockchain Anonymity Using:I2P:WO2 021 113 732[P].2021-06-10. [23] HUANG Y,WANG B,WANG Y.MResearch on Ethereum Private Blockchain Multi-nodes Platform[C]//2020 International Conference on Big Data,Artificial Intelligence and Internet of Things Engineering(ICBAIE).2020:369-372. [24] MA F C,REN M,FU Y,et al.Security reinforcement forEthereum virtual machine[J].Information Processing and Ma-nagement,2021,4(58):1709-2022. [25] KUMAR K,XU J,JIA W,et al.Space-Code Bloom Filter for Efficient Per-Flow Traffic Measurement[C]// Infocom Twenty-third Joint Conference of the IEEE Computer & Communications Societies.IEEE,2006:2327-2339. [26] ETHAN B,KWON J,MILOSEVIC Z.The latest gossip on BFT consensus[J].arXiv:1807.04938,2018. [27] JALALZAI M M,BUSCH C,RICHARD G G.Proteus:A Scalable BFT Consensus Protocol for Blockchains[C]//2019 IEEE International Conference on Blockchain(Blockchain).2019:308-313. [28] BUTERIN V,REIJSBERGEN D,LEONARDOS S,et al.In-centives in Ethereum's Hybrid Casper Protocol[C]//2019 IEEE International Conference on Blockchain and Cryptocurrency(ICBC).2019:236-244. [29] BUTERIN V,GRIFFITH V.Casper the Friendly FinalityGadget[OL].https://www.researchgate.net/publication/320626951_Casper_the_Friendly_Finality_Gadget. [30] WILLIAM P G,EFSTATHIOS P.Understanding ModernBanking Ledgers Through Blockchain Technologies:Future of Transaction Processing and Smart Contracts on the Internet of Money[J].SSRN Electronic Journal,2015:239-278. [31] FREY R M,VUKOVAC D,ILIC A.A Secure Shopping Experience Based on Blockchain and Beacon Technology[C]//10th ACM Conference on Recommender Systems(RECSYS 2016).ACM,2016:1-2. [32] BOGNER A,CHANSON M,MEEUW A.A Decentralised Sharing App running a Smart Contract on the Ethereum Blockchain[C]// International Conference.2016:177-178. [33] ENGLISH S M,NEZHADIAN E.Conditions of Full Disclo-sure:The Blockchain Remuneration Model[C]//2017 IEEE European Symposium on Security and Privacy Workshops(EuroS&PW).IEEE,2017:64-67. [34] JAGRAT C,PCHANNEGOWDA J.A Survey of BlockchainBased Government Infrastructure Information[C]//InternationalConference on Mainstreaming Block Chain Implementation(ICOMBI).2020,1-5. [35] JABBAR K,BJORN P.Growing the Blockchain Information Infrastructure[C]// CHI Conference on Human Factors in Computing Systems.ACM,2017:6487-6498. [36] DORRI A,KANHERE S S,JURDARK R,et al.Blockchain for IoT security and privacy:The case study of a smart home[C]//The International Conference on Pervasive Computing and Communications Workshops(PerCom Workshop).2017:618-623. [37] DORRI A,KANHERE S S,JURDAK R.Towards an Optimized BlockChain for IoT[C]//The second IEEE/ACM conference on Internet of Things Design and Implementation(IoTDI 2017).ACM,2017:173-178. [38] SINGH S,HOSEN A,YOON B.Blockchain Securi-ty Attacks,Challenges,and Solutions for the Future Distributed IoT Network[J].IEEE Access,2021,9:13938-13959. [39] DING H,CHEN X F,LIN D Z.IEEE Standard for Framework of Blockchain-based Internet of Things(IoT) Data Management[J].Institute of Electrical and Electronics Engineers,2021,1(2144):1-20. [40] SPATARU A L,PUNGILA C P,RADOVANCOVICI M.Ahigh-performance native approach to adaptive blockchain smart-contract transmission and execution[J].Information Processing &Management,2021,58(4):102561. [41] KAMANASHIS B,MUTHUKKUMARASAMY V.Securing Smart Cities Using Blockchain Technology[C]//IEEE International Conference on Smart City.IEEE,2016:1392-1393. [42] LEE B,LEE J H.Blockchain-based secure firmware update for embedded devices in an Internet of Things environment[J].Journal of Supercomputing,2017,73(3):1152-1167. [43] CHAKRAVORTY A,RONG C.Ushare:user controlled socialmedia based on blockchain[C]//International Conference on Ubiquitous Information Management & Communication.2017:1-6. [44] LNES S.Beyond Bitcoin Enabling Smart Government UsingBlockchain Technology[C]//International Conference on Electronic Govern-ment and the Information Systems Perspective.Springer International Publishing,2016:253-264. [45] GERSTL D S.Leveraging Bitcoin Blockchain Technology toModernize Security Perfection Under the Uniform Commercial Code[M].Springer International Publishing,2016:109-123. [46] ZHU H,HOU M.Research on an Electronic Medical Record System Based on the Internet[C]//2018 2nd International Conference on Data Science and Business Analytics(ICDSBA).2018:537-540. [47] INDUMATHI J, SHANKAR A, GHALIB M R, et al.Block Chain Based Internet of Medical Things for Uninterrupted,Ubiquitous,User-Friendly,Unflappable,Unblemished,Unl-imited Health Care Services(BC IoMT U6 HCS)[J].IEEE Access,2020(8):216856-216872. [48] POONGUZHALI N,GAYATHRI S,DEEBIKA A,et al.AFramework For Electronic Health Record Using Blockchain Technology[C]//2020 International Conference on System,Computation,Automation and Networking(ICSCAN).2020:1-5. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[3] | HE Xi, HE Ke-tai, WANG Jin-shan, LIN Shen-wen, YANG Jing-lin, FENG Yu-chao. Analysis of Bitcoin Entity Transaction Patterns [J]. Computer Science, 2022, 49(6A): 502-507. |
[4] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[5] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[13] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[14] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|