Computer Science ›› 2022, Vol. 49 ›› Issue (12): 362-367.doi: 10.11896/jsjkx.211100282
• Information Security • Previous Articles Next Articles
WANG Dong1,2, XIAO Bing-bing1,2, JIN Chen-guang1, LI Zheng1,2, LI Xiao-ruo1, ZHU Bing-nan1
CLC Number:
[1]YUAN Y,WANG F Y.Blockchain:thestate of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494. [2]XIE P,SHI W G.Digital cryptocurrency research:a literature review[J].Financial Research,2015,415(1):1-15. [3]YUAN Y,NI X C,ZENG S,et al.The development status and outlook of blockchain consensus algorithm[J].Journal of Automation,2018,44(11):2011-2022. [4]XU F,YANG G W,JU D P.Design of Distributed Storage System on Peer-to-Peer Structure based on Peer-to-Peer [J].Journal of Software,2004,15(2):268-277. [5]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System[EB/OL].https://blog.csdn.net/yingkee/article/details/53888910. [6]CHO H.ASIC-Resistance of Multi-Hash Proof-of-Work Mechanisms for Blockchain Consensus Protocols[J].IEEE Access,2018,6:66210-66222. [7]VUKOLI M.The Quest for Scalable Blockchain Fabric:Proof-of-Work vs.BFT Replication[C]//International Workshop on Open Problems in Network Security.Springer International Publishing,2016. [8]WANG J.Research on resource management mechanisms in P2P systems [D].Hefei:University of Science and Technology of China,2007. [9]LI D Q.Denial of Service Attacks [M].Beijing:Electronic Industry Press,2007. [10]July 2015 flood attack[EB/OL].Bitcoin Wiki.https://en.bitcoin.it/wiki/July_2015_flood_attack. [11]LI W,ANDREINA S,BOHLI J M,et al.Securing Proof-of-Stake Blockchain Protocols[C]//European Symposium on Research in Computer Security International Workshop on Data Privacy Management Cryptocurrencies and BlockchainTechno-logy.2017. [12]HANKE T.Asicboost-a speedup for bitcoin mining[J].arXiv:1604.00575,2016. [13]HOU Y N.It Will Cost You Nothing to ‘Kill’ a Proof-of-Stake Crypto-Currency[J].Social Science Electronic Publishing,2014,34(2):1038-1044. [14]POELSTRA A.Distributed consensus from proof of stake is impossible[EB/OL].https://download.wpsoftware.net/bitcoin/pos.pdf. [15]BUTERIN V.On stake[EB/OL].https://blog.ethereum.org/2014/07/05/stake/. [16]BEIKVERDI A.NEM technical reference[EB/OL].https://nem.io/wp-content/themes/nem/files/NEM_techRef.pdf. [17]FANG W,ZHANG W,PAN T,et al.Cyber Security in Blockchain:Threats and Countermeasures[J].Journal of Cyber Secu-rity,2018,3(2):87-104. [18]ZHOUC Z.The Fibonacci-Lucas sequence and its applications [M].Changsha:Hunan Science and Technology Press,1993. [19]YANG J,PAUDEL A,GOOI H B,et al.A Proof-of-Stake Public Blockchain-Based Pricing Scheme for Peer-to-Peer Energy Trading[J].Applied Energy,2021,298:117154. [20]LARIMER D.Delegated Proof-of-Stake(DPOS)[EB/OL].https://bitshares.org/technology/delegated-proof-of-stake-con-sensus/2014. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[3] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[4] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[5] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[6] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | CHU An-qi, DING Zhi-jun. Application of Gray Wolf Optimization Algorithm on Synchronous Processing of Sample Equalization and Feature Selection in Credit Evaluation [J]. Computer Science, 2022, 49(4): 134-139. |
[12] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[13] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[14] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[15] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
|