Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 65-75.doi: 10.11959/j.issn.2096-109x.2021007
• Topic Ⅱ: Blockchain Security • Previous Articles Next Articles
Qi CAO1,2, Shuhua RUAN1,2, Xingshu CHEN1,2, Xiao LAN1,2, Hongxia ZHANG1,2, Hongjian JIN1,2
Revised:
2020-09-18
Online:
2021-02-15
Published:
2021-02-01
Supported by:
CLC Number:
Qi CAO, Shuhua RUAN, Xingshu CHEN, Xiao LAN, Hongxia ZHANG, Hongjian JIN. Embedding of national cryptographic algorithm in Hyperledger Fabric[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 65-75.
[1] | hyperledger-fabricdocs documentation[EB]. |
[2] | 董友康, 张大伟, 韩臻 ,等. 基于联盟区块链的董事会电子投票系统[J]. 网络与信息安全学报, 2017,3(12): 31-37. |
DONG Y K , ZHANG D W , HAN Z ,et al. Board voting system based on the consortium blockchains[J]. Chinese Journal of Net-work and Information Security, 2017,3(12): 31-37. | |
[3] | 潘晨, 刘志强, 刘振 ,等. 区块链可扩展性研究:问题与方法[J]. 计算机研究与发展, 2018,55(10): 7-18. |
PAN C , LIU Z Q , LIU Z ,et al. Research on scalability of block-chain technology:problems and methods[J]. Journal of Computer Research and Development, 2018,55(10): 7-18. | |
[4] | GUEGAN D . Public blockchain versus private blockhain[J]. documents de travail du centre deconomie de la sorbonne, 2017. |
[5] | An introduction to hyperledger[EB]. |
[6] | 中华人民共和国金融行业标准. 金融分布式账本技术安全规范[EB]. |
Financial industry standard of the people's Republic of China. Se-curity specification for financial distributed ledger technology[EB]. | |
[7] | 国家密码管理局. SM2椭圆曲线公钥密码算法[EB]. |
State Cryptography Administration. Public key cryptographic algo-rithm sm2 based on elliptic curves[EB]. | |
[8] | 郭青霄, 张大伟, 常亮 ,等. 基于 SM2 的代理保护代理签名的设计与实现[J]. 网络与信息安全学报, 2017,3(9): 47-54. |
GUO Q X , ZHANG D W , CHANG L ,et al. Design and implemen-tation of proxy-protected proxy signature based on SM2[J]. Chinese Journal of Network and Information Security, 2017,3(9): 47-54. | |
[9] | 国家密码管理局. SM3密码杂凑算法[EB]. |
State Cryptography Administration. SM3 Cryptographic hash algo-rithm[EB]. | |
[10] | 邵梦丽, 殷新春, 李艳梅 . SM3杂凑算法的SoPC组件实现[J]. 网络与信息安全学报, 2017,3(5): 47-53. |
SHAO M L , YIN X C , LI Y M . Implementation of SM3 algorithm based on SoPC component[J]. Chinese Journal of Network and In-formation Security, 2017,3(5): 47-53. | |
[11] | Tongji blockchain Research Institute. Hyperledger-Fabric-gm[EB]. |
[12] | 张青禾 . 区块链中的身份识别和访问控制技术研究[D]. 北京:北京交通大学, 2018. |
ZHANG Q H . Research on identification and acess control in blockchain[D]. Beijing:Beijing Jiaotong University, 2018. | |
[13] | 张梦一 . 基于区块链的通用积分管理系统[D]. 济南:山东大学, 2019. |
ZHANG M Y . General integration management system based on blockchain[D]. Jinan:Shandong University, 2019. | |
[14] | 国家密码管理局. SM4分组密码算法[EB]. |
State Cryptography Administration. SM4 Block cipher algo-rithm[EB]. | |
[15] | ANDROULAKI E , BARGER A , BORTNIKOV V ,et al. Hyperledger Fabric:a distributed operating system for permissioned blockchains[C]// Proceedings of the Thirteenth EuroSys Conference (EuroSys '18).Association for Computing Machinery. 2018: 1-15. |
[16] | hyperledger-fabric-ca documentation[EB]. |
[17] | Hyperledger Fabric SDKs[EB]. |
[18] | 陈剑雄, 张董朱 . 深度探索区块链 Hyperledger 技术与应用[M]. 北京: 机械工业出版社, 2018. |
CHEN J X , ZHANG D Z . In-depth exploration of blockchain Hyperledger technology and application[M]. BeiJing: China Ma-chine Press, 2018. | |
[19] | 同济区块链研究院. 国密SM2、SM3和SM4算法实现[EB]. |
Suzhou Tongji blockchain Research Institute. Implementation of SM2,SM3 and SM4 algorithms[EB]. | |
[20] | GUAN Z . GmSSL[EB]. |
[21] | SM2算法与原生RSA、ECDSA算法的比较[EB]. |
Comparison of SM2 algorithm with RSA and ECDSA[EB]. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[5] | Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU. Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38. |
[6] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[7] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[8] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[9] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[10] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[11] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[12] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[13] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[14] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[15] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|