Computer Science ›› 2025, Vol. 52 ›› Issue (11A): 250100133-8.doi: 10.11896/jsjkx.250100133
• Information Security • Previous Articles Next Articles
AI Yuan1, LI Jiahao1, ZHAO Yitao1, HU Kai2,3
CLC Number:
| [1]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[J/OL].2008.https://www.semanticscholar.org/paper/Bit-coin%3A-A-Peer-to-Peer-Electronic-Cash-System-Hunt/4e9ec92a90c5d571d2f1d496f8df01f0a8f38596?p2df. [2]BUTERIN V.A next-generation smart contract anddecentrali-zed application platform[J].White Paper,2014,3(37):2-1. [3]ANDROULAKI E,BARGER A,BORTNIKOV V,et al.Hy-perledger fabric:a distributed operating system for permissioned blockchains[C]//Proceedings of the Thirteenth EuroSys Conference.2018:1-15. [4]POON J,DRYJA T.The bitcoin lightning network:Scalable off-chain instant payments[J].2016. [5]FILIBA J.Ethereum breaks one million transactions in a single day[J].Arch.from Orig,2017,22. [6]IMTIAZ M A,STAROBINSKI D,TRACHTENBERG A.Em-pirical comparison of block relay protocols[J].IEEE Transactions on Network and Service Management,2022,19(4):3960-3974. [7]CROMAN K,DECKER C,EYAL I,et al.On Scaling Decentralized Blockchains:(A Position Paper)[C]//International Conference on Financial Cryptography and Data Security.Berlin,Heidelberg:Springer Berlin Heidelberg,2016:106-125. [8]LERNER S D,CID-FUENTES J Á,LEN J,et al.RSK:A Bitcoin sidechain with stateful smart-contracts[J].Cryptology ePrint Archive,2022. [9]WANG J,WANG H.Monoxide:Scale out blockchains withasynchronous consensus zones[C]//16th USENIX Symposium on Networked Systems Design and Implementation(NSDI 19).2019:95-112. [10]LUU L,NARAYANAN V,ZHENG C,et al.A Secure Sharding Protocol For Open Blockchains[C]//the 2016 ACM SIGSAC Conference.ACM,2016. [11]KOKORIS-KOGIAS E,JOVANOVIC P,GASSER L,et al.Omniledger:A secure,scale-out,decentralized ledger via sharding[C]//2018 IEEE Symposium on Security and Privacy(SP).IEEE,2018:583-598. [12]ZAMANI M,MOVAHEDI M,RAYKOVA M.Rapidchain:Scaling blockchain via full sharding[C]//Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security.2018:931-948. [13]HONG Z,GUO S,LI P,et al.Pyramid:A layered shardingblockchain system[C]//IEEE INFOCOM 2021-IEEE Conference on Computer Communications.IEEE,2021:1-10. [14]HONG Z,GUO S,LI P,et al.Pyramid:A layered shardingblockchain system[C]//IEEE INFOCOM 2021-IEEE Conference on Computer Communications.IEEE,2021:1-10. [15]Xi’an Shiyou University.A blockchain sharding method based on transaction frequency analysis:CN202210589229.8[P].2022-05-26. [16]CROMAN K,DECKER C,EYAL I,et al.On Scaling Decentralized Blockchains:(A Position Paper)[C]//Financial Cryptography and Data Security:FC 2016 International Workshops,BITCOIN,VOTING,and WAHC.Berlin:Springer,2016:106-125. [17]WANG J P,WANG H.Monoxide:Scale out Blockchains withAsynchronous Consensus Zones[C]//NSDI 2019.New York:ACM,2019:95-112. [18]HONG Z,GUO S,ZHOUE,et al.Gridb:Scaling blockchain database via sharding and off-chain cross-shard mechanism[J].arXiv:2407.03750,2024. [19]ZHANG Y,PAN S,YU J.TxAllo:Dynamic Transaction Allocation in Sharded Blockchain Systems[J].arXiv:2022[2025-03-18]. |
| [1] | XU Jinlong, WANG Gengwu, HAN Lin, NIE Kai, LI Haoran, CHEN Mengyao, LIU Haohao. Research on Parallel Scheduling Strategy Optimization Technology Based on Sunway Compiler [J]. Computer Science, 2025, 52(9): 137-143. |
| [2] | ZHOU Tao, DU Yongping, XIE Runfeng, HAN Honggui. Vulnerability Detection Method Based on Deep Fusion of Multi-dimensional Features from Heterogeneous Contract Graphs [J]. Computer Science, 2025, 52(9): 368-375. |
| [3] | FENG Yimeng, FENG Yan, XIE Sijiang, ZHANG Qing. Proxy-based Bidirectional Coin Mixing Mechanism of Blockchain [J]. Computer Science, 2025, 52(8): 385-392. |
| [4] | ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8. |
| [5] | ZHOU Kai, WANG Kai, ZHU Yuhang, PU Liming, LIU Shuxin, ZHOU Deqiang. Customized Container Scheduling Strategy Based on GMM [J]. Computer Science, 2025, 52(6): 346-354. |
| [6] | HUANG Chenxi, LI Jiahui, YAN Hui, ZHONG Ying, LU Yutong. Investigation on Load Balancing Strategies for Lattice Boltzmann Method with Local Grid Refinement [J]. Computer Science, 2025, 52(5): 101-108. |
| [7] | WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374. |
| [8] | YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361. |
| [9] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
| [10] | ZHENG Longhai, XIAO Bohuai, YAO Zewei, CHEN Xing, MO Yuchang. Graph Reinforcement Learning Based Multi-edge Cooperative Load Balancing Method [J]. Computer Science, 2025, 52(3): 338-348. |
| [11] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
| [12] | WANG Yijie, GAO Guoju, SUN Yu'e, HUANG He. Flow Cardinality Estimation Method Based on Distributed Sketch in SDN [J]. Computer Science, 2025, 52(2): 268-278. |
| [13] | CAO Yongsheng. Optimal Scheduling Algorithm for Electric Vehicle Charging and Discharging in Q-Learning Based Consortium Blockchain Framework [J]. Computer Science, 2025, 52(11A): 241200015-5. |
| [14] | JIANG Lingyun, LIU Guanhao, YANG Jinglin, XU Jia. P-DAG:An Efficient and Secure Blockchain System Based on Parallel Chain [J]. Computer Science, 2025, 52(11A): 241000174-6. |
| [15] | CHANG Ningyuan, HUANG Ting, ZHANG Huang. Demand Response Scheme for Low Voltage Users Based on Light Weight Blockchains [J]. Computer Science, 2025, 52(11A): 250200125-8. |
|
||