Chinese Journal of Network and Information Security ›› 2020, Vol. 6 ›› Issue (2): 19-34.doi: 10.11959/j.issn.2096-109x.2020024
Special Issue: 区块链
• Special Column:Blockchain Technology • Previous Articles Next Articles
Kai LEI1,2(),Fangxing SHU1,2,Lei HUANG1,2,Qichao ZHANG1,2
Revised:
2020-02-12
Online:
2020-04-15
Published:
2020-04-23
Supported by:
CLC Number:
Kai LEI,Fangxing SHU,Lei HUANG,Qichao ZHANG. Research on cross-domain trustable blockchain based decentralized DNS architecture[J]. Chinese Journal of Network and Information Security, 2020, 6(2): 19-34.
[1] | 延志伟, 耿光刚, 李洪涛 ,等. DNS 根服务体系的发展研究[J]. 网络与信息安全学报, 2017,3(3): 1-12. |
YAN Z W , GENG G G , LI H T . Study on the development of the DNS root system[J]. Chinese Journal of Network and Information Security, 2017,3(3): 1-12. | |
[2] | 方滨兴 . 从“国家网络主权”谈基于国家联盟的自治根域名解析体系[J]. 信息安全与通信保密, 2014(12): 35-38. |
FANG B X . Country autonomous root domain name resolution architecture from the perfective of country cyber sovereignty[J]. Information Security and Communication Privacy, 2014(12): 35-38. | |
[3] | KAMINSKY D . Spelunking the triangle:exploring Aaron Swartzs take on Zooko’s triangle[EB]. 2011. |
[4] | RAMASUBRAMANIAN V , SIRER E G . The design and implementation of a next generation name service for the Internet[C]// ACM Sigcomm. 2004. |
[5] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2008. |
[6] | BARNABY C , AWAIS R . Trust beyond computation alone:human aspects of trust in blockchain technologies[C]// ACM 41st ICSE 2019. 2019: 21-30. |
[7] | ABRAHAM I , CHAN T H , DOLEV D ,et al. Communication complexity of Byzantine agreement,revisited[C]// Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing (PODC 2019). 2019: 317-326. |
[8] | DONG X L , AMAL A , JIANBING N ,et al. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain[J]. IEEE Transactions on Industrial Informatics, 2019,15(6):35273537 |
[9] | Namecoin[EB]. |
[10] | LI C , LI P , XU W ,et al. Scaling Nakamoto consensus to thousands of transactions per second[EB]. |
[11] | CHAN T H , PASS R , SHI E . PaLa:a simple partially synchronous Blockchain[J]. IACR Cryptology ePrint Archive, 2018 |
[12] | PASS R , SHI E . Rethinking large-scale consensus[C]// Proceedings of 30th IEEE Computer Security Foundations Symposium (CSF 2017). 2017: 115-129. |
[13] | 章峰, 史博轩, 蒋文保 . 区块链关键技术及应用研究综述[J]. 网络与信息安全学报, 2018,4(4): 22-29. |
ZHANG F , SHI B X , JIANG W B . Review of key technology and its application of blockchain[J]. Chinese Journal of Network and In-formation Security, 2018,4(4): 22-29. | |
[14] | ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger fabric:a distributed operating system for permissioned Block-chains[C]// Proceedings of the Thirteenth EuroSys Conference (EuroSys 2018). 2018: 1-15. |
[15] | NKN Lab. NKN:a scalable self-evolving and self-incentivized decentralized network[EB]. |
[16] | FROMKNECHT C , VELICANU D , YAKOUBOV S . Certcoin:a namecoin based decentralized authentication system 6.857 class project[EB]. 2014: |
[17] | HU W H , AO M , SHI L ,et al. Review of blockchain-based DNS alternatives[J]. Chinese Journal of Network and Information Security, 2017,3(3): 71-77. |
[18] | ALI M , JUDE N ,et al. Blockstack:design and implementation of a global naming system with Blockchains[C]// USENIX Annual Technical Conference. 2016: 181-194 |
[19] | 刘井强 . 基于私有根域名的 DNS 解析实验系统设计与实现[D]. 哈尔滨:哈尔滨工业大学, 2017. |
LIU J Q . Design and implementation of DNS resolution test system based on private root domain[D]. Harbin:Harbin Institute of Technology, 2017. | |
[20] | 张宇, 夏重达, 方滨兴 ,等. 一个自主开放的互联网根域名解析体系[J]. 信息安全学报, 2017,2(4): 57-69. |
ZHANG Y , XIA C D , FANG B X ,et al. An autonomous open root resolution architecture for domain name system in the internet[J]. Journal of Cyber Security, 2017,2(4): 57-69. | |
[21] | 庄天舒, 刘文峰, 李东 . 基于区块链的 DNS 根域名解析体系[J]. 电信科学, 2018(3): 17-22. |
ZHUANG T S , LIU W F , LI D . DNS root domain name analysis system based on blockchain[J]. Telecommunications Science, 2018(3): 17-22. | |
[22] | PASS R , SHI E . Hybrid consensus:efficient consensus in the permission less model[C]// Proceedings of 31st International Symposium on Distributed Computing (ISDC 2017). 2017: 1-16. |
[23] | ABRAHAM I , MALKHI D , SPIEGELMAN A . Validated asynchronous Byzantine agreement with optimal resilience and asymptotically optimal time and word communication[EB]. |
[24] | BENALOH J , DE-MARE M , . One-way accumulators:a decentralized alternative to digital signatures[C]// Advances in Cryptology-EUROCRYPT’93.Berlin,Heidelberg:Springer. 1993: 274-285. |
[25] | NIKO B , PFITZMANN B . Collision-free accumulators and fail-stop signature schemes without trees[C]// International Conference on the Theory and Applications of Cryptographic Techniques.Berlin,Heidelberg:Springer. 1997. |
[26] | KOKORIS-KOGIAS E , JOVANOVIC P , GASSER L ,et al. OmniLedger:a secure,scale-out,decentralized ledger via sharding[C]// Proceedings of 2018 IEEE Symposium on Security and Privacy (S&P 2018). 2018: 583-598. |
[27] | LUU L , NARAYANAN V , ZHENG C ,et al. A secure sharding protocol for open blockchains[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 17-30. |
[28] | New Kind of Network[EB]. |
[29] | GARAY J A , KIAYIAS A . SoK:a consensus taxonomy in the Blockchain era[J]. ACR Cryptology ePrint Archive, 2018(5): 26-37. |
[30] | ABRAHAM I , MALKHI D , SPIEGELMAN A . Validated asynchronous Byzantine agreement with optimal resilience and asymptotically optimal time and word communication[EB]. |
[31] | SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in Bitcoin[C]// Financial Cryptography and Data Security 2016. 2016: 515-532. |
[32] | MATHIEU B , SERGE P , PIERRE P ,et al. STewARD:SDN and blockchain-based trust evaluation for automated risk management on IoT devices[C]// IEEE Infocom 2019-WKSHPS. 2019. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fan SHI, Yao ZHONG, Pengfei XUE, Chengxi XU. Dual-stack host discovery method based on SSDP and DNS-SD protocol [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 56-66. |
[5] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[6] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[7] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[8] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[9] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[10] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[11] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[12] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[13] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[14] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[15] | Jiaren YU, Youliang TIAN, Hui LIN. Design of miner type identification mechanism based on reputation management model [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|