Advertisement

区块链

    Not found

    Default Latest Most Read
    Please wait a minute...
    For Selected: Toggle Thumbnails
    Supply chain dynamic multi-center coordination authentication model based on block chain
    Jian-ming ZHU,Yong-gui FU
    Chinese Journal of Network and Information Security    2016, 2 (1): 27-33.   DOI: 10.11959/j.issn.2096-109x.2016.00019
    Abstract6237)   HTML152)    PDF(pc) (1052KB)(11258)       Save

    The value of block chain technology is proved by the success of Bitcoin. The characteristics, limitations and its chain structure Hash principle of block chain were analyzed, the applications of block chain technology were researched, the B2B+B2C supply chain each transaction subject transaction structure diagram and dynamic multi-center coordination authentication model based on block chain were proposed. Then the producing process of block chain in B2B+B2C supply chain electronic transaction with example was analyzed, and the facing problems that block chain spreading use in B2B+B2C supply chain enterprise were pointed out. The research results have proposed a new idea for the application of cryptography and block chain.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of block chain
    Xin SHEN,Qing-qi PEI,Xue-feng LIU
    Chinese Journal of Network and Information Security    2016, 2 (11): 11-20.   DOI: 10.11959/j.issn.2096-109x.2016.00107
    Abstract20765)   HTML2591)    PDF(pc) (461KB)(28222)       Save

    With the wide spread of Bitcoin,block chain serving as the building block of digital currency becomes a hot spot in industry and academia.Due to the decentration of network,the unforgeability of block data,etc.,block chain has attracted more and more attentions from financial institutions.The essential theory and core technique of block chain were surveyed,and the issues of management and security problems of block chain based applications were discussed.To help improve the block chain techniques is the goal.

    Table and Figures | Reference | Related Articles | Metrics
    Research and prospect of block chain technology
    DONG Hui, ZHANG Chengyan, YAN Binfeng
    China Internet    2016, 13 (11): 14-19.  
    Abstract40)      PDF(pc) (1398KB)(1288)       Save
    The concept and principle of block chain technology was expounded. The advantages of block chain technology were analyzed. The application of block chain technology was studied, and the main problems in the development of block chain technology were analyzed. Finally, the most likely application areas and suggestions for the development of block chain technology were put forward.
    Related Articles | Metrics
    Theory, application fields and challenge of the blockchain technology
    Dong LI,Jinwu WEI
    Telecommunications Science    2016, 32 (12): 20-26.   DOI: 10.11959/j.issn.1000-0801.2016309
    Abstract1495)   HTML180)    PDF(pc) (1731KB)(4203)       Save

    Blockchain technology is a distributed data recording scheme to record all transactions or electronic behavior, namely public ledger technology. Blockchain technology has gradually caught attention of the public, causing widespread concern and discussion in the world with the features of distributed, decentralized and non fraud. The working theory of the blockchain and its application in the field of finance and non-finance were described. And the challenges and opportunities in the development of the blockchain technology were analyzed.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(1)
    Industry present situation,existing problems and strategy suggestion of blockchain
    Haitao MEI,IUJie L
    Telecommunications Science    2016, 32 (11): 134-138.   DOI: 10.11959/j.issn.1000-0801.2016299
    Abstract665)   HTML40)    PDF(pc) (964KB)(2128)       Save

    Blockchain is one kind of collective and decentralized database technology without trust among the nodes.In essence,it is a distributed database which has no delete and update operations.The technical principles of blockchain was introduced,its industry situations and existing problems were discussed,and related policy suggestions were proposed from government,industry association and academic institution.

    Table and Figures | Reference | Related Articles | Metrics
    Cited: Baidu(2)
    A framework of trusted services management based on blockchain in social internet of things
    Minghui ZHAO,Lu ZHANG,Jin QI
    Telecommunications Science    2017, 33 (10): 19-25.   DOI: 10.11959/j.issn.1000-0801.2017274
    Abstract945)   HTML50)    PDF(pc) (785KB)(1123)       Save

    To cope with current problems of trusted services management in social internet of things (SIoT),such as high degree of centralization,non-transparent transactions,vulnerability and so on,a framework of trusted services management based on blockchain in SIoT was proposed.This framework established the trusted relationship between service requesters and service providers directly by using decentralization of blockchain,then it produced and managed new transactions through smart contracts to realize transparency and reduce the cost of management.At the same time,the consensus mechanism of blockchain could be used for verifying transactions and preventing malicious attacks in order to reduce network attacks and malicious node spoofing.Finally,the main challenges which the framework would face in actual constructions were analyzed.

    Table and Figures | Reference | Related Articles | Metrics
    Board voting system based on the consortium blockchains
    You-kang DONG,Da-wei ZHANG,Zhen HAN,Liang CHANG
    Chinese Journal of Network and Information Security    2017, 3 (12): 31-37.   DOI: 10.11959/j.issn.2096-109x.2017.00221
    Abstract2001)   HTML38)    PDF(pc) (532KB)(4127)       Save

    The board voting is a scenario of anonymous voting on a particular group of individuals,which is strict with the identities of the participants.A board e-voting protocol based on the consortium blockchains was presented,which replaced the traditional trusted third party with the smart contract so as to reduce the system trust cost.It adopt a digital certificate-based identity mechanism to ensure that the voter's identity is legal.It adopt the blind signature based on elliptic curve technology to achieve the anonymity of voting.The security analysis shows that the proposed protocol can meet the requirements of unforgeability,anonymity and security etc,which is convenient and flexible to use.

    Table and Figures | Reference | Related Articles | Metrics
    Application of blockchain in data circulation
    Shu YAN, Sude QING, Kai WEI
    Big Data Research    2018, 4 (1): 3-12.   DOI: 10.11959/j.issn.2096-0271.2018001
    Abstract1770)   HTML140)    PDF(pc) (1235KB)(1599)       Save

    Circulation of big data is a key link in the value creation of data,but there are numerous problems to be solved.Blockchain is a distributed ledger technology,which can be applied in data circulation by its decentralizing and immutable property.The main idea of authorized deposit certificate,data traceability and smart contract using blockchain was discussed,and the overall architecture of data circulation by blockchain was proposed.Finally,some applications and other data security solutions were introduced.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain based supply-chain finance service platform
    Xiaofeng MA, Mingxiao DU, Wenbing YU, Yi WANG
    Big Data Research    2018, 4 (1): 13-21.   DOI: 10.11959/j.issn.2096-0271.2018002
    Abstract2104)   HTML138)    PDF(pc) (1527KB)(1392)       Save

    Blockchain has the characteristics of decentralization,stability,security,and non-modifiability.With the further improvement and application of the blockchain technology,it will be connected with the traditional industries such as finance,medical treatment and logistics.This will radically change the existing operation modes in some industries and restructure a value network.An application of blockchain in the field of supply-chain finance was tried,and a supplychain finance service platform based on the blockchain technology was constructed.The platform combines blockchain technology with other traditional systems,providing a more convenient way of financing for all parties in the supply-chain,improving the transparency,traceability and security of the supply-chain.

    Table and Figures | Reference | Related Articles | Metrics
    Big data-oriented blockchain for clearing system
    Wei-Tek TSAI, Lian YU, Bo YUAN, Youquan DENG, Qi LI, Bin GUO
    Big Data Research    2018, 4 (1): 22-35.   DOI: 10.11959/j.issn.2096-0271.2018003
    Abstract960)   HTML44)    PDF(pc) (1719KB)(910)       Save

    The big data oriented blockchain for trade clearing was introduced,including consensus,secure transmission of trading data storage,data search,encryption and decryption of trading data and trade clearing business.The analysis of the framework design on dismantlement and combination of the composite trading was emphasized,and the potential value and significant meaning of blockchain data on risk decision and assessment through the big data analysis were identified.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain and sharing database
    Weining QIAN, Cheqing JIN, Qifeng SHAO, Aoying ZHOU
    Big Data Research    2018, 4 (1): 36-45.   DOI: 10.11959/j.issn.2096-0271.2018004
    Abstract1397)   HTML220)    PDF(pc) (1180KB)(1492)       Save

    Blockchain could achieve trustworthy ledger management without central node.It has been successfully supporting financial applications such as Bitcoin.The essence of blockchain is trusted data management in an incompletely trusted environment.It has such features as decentralization,anti-tampering,strong consistency and integrity.On the other hand,blockchain also suffers the problem of weak data management functions,low performance and other issues.By comparing blockchain with traditional data management techniques and analyzing the three applications of blockchain beyond the financial fields,new research issues on blockchain were explored.The requirement for design and implementation of sharing database systems for specific application domains was discussed.The sharing database can be simply defined as a database that supports mission-critical applications,the sharing economic business model,and even itself is implemented in a sharing economy manner.

    Table and Figures | Reference | Related Articles | Metrics
    Privacy protection mechanism for blockchain transaction data
    Liehuang ZHU, Hui DONG, Meng SHEN
    Big Data Research    2018, 4 (1): 46-56.   DOI: 10.11959/j.issn.2096-0271.2018005
    Abstract1751)   HTML134)    PDF(pc) (1160KB)(2398)       Save

    Blockchain technology is a distributed data storage technology that is de-centralized,de-trusted,open and transparent.It can reduce the cost of trust and realize safe and reliable data interaction.However,attackers can easily obtain the transaction data stored in the public ledger,and may extract transaction rules and other privacy information from this data by applying big data analysis techniques.Firstly,the thread of attack of data analysis on blockchain transaction data was analyzed,and the attack methods based on data analysis were described.Then the privacy protection mechanism of transaction data which was represented by mixing mechanism was introduced,the basic principle of various mixing methods was described in brief,and the advantages and disadvantages of different mixing approaches for the problem of whether a central node was needed in the process of mixing were analyzed.In the end,the limitation of the existing technologies and envision the future directions on this topic was discussed.

    Table and Figures | Reference | Related Articles | Metrics
    Technical challenges in applying zero-knowledge proof to blockchain
    Kang LI, Yi SUN, Jun ZHANG, Jun LI, Jihua ZHOU, Zhongcheng LI
    Big Data Research    2018, 4 (1): 57-65.   DOI: 10.11959/j.issn.2096-0271.2018006
    Abstract1837)   HTML192)    PDF(pc) (1209KB)(1940)       Save

    Blockchain is a peer-to-peer distributed ledger technology based on cryptography,However,open and transparent blockchain ledger,combined with sociological mining,data mining and other statistical methods,brings a major threat to user’s privacy.Therefore,privacy protection becomes a hot issue on the blockchain technology research.The existing privacy protection schemes were summarized,especially focusing on the zero-knowledge proof techniques.The technical challenges in applying zero-knowledge proof to blockchain privacy protection schemes were expounded and analyzed,and position solutions to these challenges were given.

    Table and Figures | Reference | Related Articles | Metrics
    Brief comments on the operability of blockchain
    Big Data Research    2018, 4 (1): 85-89.   DOI: 10.11959/j.issn.2096-0271.2018009
    Abstract538)   HTML33)    PDF(pc) (681KB)(905)       Save
    Reference | Related Articles | Metrics
    Information transmission mechanism of Blockchain technology based on named-data networking
    Jiang LIU,Ru HUO,Chengcheng LI,Guijin ZOU,Tao HUANG,Yunjie LIU
    Journal on Communications    2018, 39 (1): 24-33.   DOI: 10.11959/j.issn.1000-436x.2018005
    Abstract1515)   HTML43)    PDF(pc) (1211KB)(2809)       Save

    Recent researches on blockchain have been greatly concerned by academia and industry,while the communication based on TCP/IP protocol was not enough for broadcasting a large volume of data in blockchain technology.Therefore,a novel node model supporting push service for blockchain technology and a special procedure reading-writing the table of the node model were designed based on the named-data networking,which was a distributed network architecture supporting data transmission naturally.And then the information transmission architecture of blockchain technology via named-data networking was proposed.With the aggregation of the requests and data caching,this architecture could reduce the traffic redundancy and accelerate the communication speed.Meanwhile,a use case of bitcoin based on the proposed architecture was given,in order to better understand the architecture.A numerical simulation was used to verify the performance advantages of the proposed scheme.In addition,some related future research directions were presented.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on network security based on blockchain
    Ye CHEN,Dongjin XU,Liang XIAO
    Telecommunications Science    2018, 34 (3): 10-16.   DOI: 10.11959/j.issn.1000-0801.2018135
    Abstract1357)   HTML106)    PDF(pc) (748KB)(2165)       Save

    With the development of the mobile internet and IoT (internet of things),mass data are stored in the cyberspace.The network security and privacy are of great significance.The blockchain-based network security mechanism has the properties of decentralization,tamper-resistance,traceability,high availability and credibility,and can be applied to improve network security.The application of blockchain in the network security was explored.The main technologies and the future research direction of the blockchain-based network security mechanism were analyzed.Firstly,the blockchain-based data protection scheme was analyzed,which applied the tamper-resistance of the blockchain to improve the authenticity and reliability of data.Secondly,the blockchain-based IoT device management scheme was analyzed,which applied the blockchain to record and execute the device control instruction and improve the authority and communication of the IoT devices.Lastly,the blockchain-based domain name system was analyzed,which applied the decentralization of the blockchain to resist distributed denial of service effectively.

    Table and Figures | Reference | Related Articles | Metrics
    DNS root domain name analysis system based on block chain
    Tianshu ZHUANG,Wenfeng LIU,Dong LI
    Telecommunications Science    2018, 34 (3): 17-22.   DOI: 10.11959/j.issn.1000-0801.2018125
    Abstract889)   HTML86)    PDF(pc) (681KB)(1397)       Save

    The centralized resolution system of the domain name system (DNS) implies an unavoidable risk of abuse of power,a top-level domain may be deleted from the root zone.By analyzing the related work on the root zone decentralization,the most were mainly to deploy new root resolution services outside the current root servers,but not to decentralize the root zone data.A scheme to decentralize the root zone data was proposed,and the decentralization of root zone data distribution and analysis were achieved through a peer-to-peer coalition between national roots.Trust from peer-to-peer to collective,with features such as autonomy,openness,equality,and transparency,and implements a distributed consensus on root zone data through blockchain technology were transformed by the program,thereby ensuring root zone data consistency.

    Reference | Related Articles | Metrics
    Review of key technology and its application of blockchain
    Feng ZHANG, Boxuan SHI, Wenbao JIANG
    Chinese Journal of Network and Information Security    2018, 4 (4): 22-29.   DOI: 10.11959/j.issn.2096-109x.2018028
    Abstract5560)   HTML585)    PDF(pc) (690KB)(10144)       Save

    The rise of blockchain technology is a paradigm shift,which is similar to the rise of the Internet,and it has attracted wide attention.Blockchain has characteristics of decentralization,tamper-resistant,traceability and so on.The achievements of some papers about blockchain at home and abroad have been analysed in recent years,and the core technology principle of blockchain has been parsed.The application scenarios of blockchain were disscussed,such as financial services,credit management,tenure management,public network service and other fields.The existing problems in various application fields were pointed out.Some opinions on the development and application of blockchain were put forward,dedicated to blockchain and hoped to do contribution for the research about blockchain and its applications.

    Table and Figures | Reference | Related Articles | Metrics
    Design and application of blockchain pattern for credit information industry
    Shuohang GUO, Ziqi SONG
    Chinese Journal of Network and Information Security    2018, 4 (4): 63-71.   DOI: 10.11959/j.issn.2096-109x.2018029
    Abstract2453)   HTML34)    PDF(pc) (1285KB)(6214)       Save

    Based on the current status of Chinese credit information system,expounding the problems arising from the traditional credit information system structure,a credit system structure based on blockchain technology and two data transaction pattern and the technical framework of the credit data trading platform was proposed,It has the characteristics of decentralization,safe and credible,collective maintenance,and untampering.And the process of data transaction were expounded.To explore the advantage of application of blockchain in the credit and information industry:promote credit data sharing,improve the quality of supervision of the credit and information industry,ensure the privacy of the information subject,effectively improve the dimension of credit information.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain-based digital copyright trading system
    Li LI,Siqin ZHOU,Qin LIU,Debiao HE
    Chinese Journal of Network and Information Security    2018, 4 (7): 22-29.   DOI: 10.11959/j.issn.2096-109x.2018060
    Abstract8841)   HTML141)    PDF(pc) (771KB)(4094)       Save

    In the current era of digitalization and networking,the demand for digital copyright transactions is increasing.The traditional centralized copyright protection system has series of problems such as high registration costs,long work acceptance times,and being vulnerable to tampering by saboteurs.Blockchain as a decentralized network structure and based on P2P network and cryptographic technology,which can establish trust relationship on the network by pure mathematics.Without relying on the middle platform,blockchain technology can naturally alleviate the above problems.With the help of self-regulatory,traceable and decentralized features of blockchain technology and digital copyright trading scenarios,a digital copyright trading system model was designed.The new system is based on the advanced permissioned blockchain provided by IBM.The implementation of copyright registration and copyright transaction can ensure the integrity and tamper-resistant of the information.Finally,the installation time of chain code deployment was tested.The results show that the system is simple to install and has low maintenance costs.Compared with the traditional trusted third party copyright authentication mechanism,the blockchain-based digital rights trading system has a short registration time,no registration fee,and better architecture security and scalability.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain-based taffic condition early-warning scheme for VANET
    Chunyan LI,Jia ZHAO,Jiqiang LIU,Qiang ZHANG,Lei HAN
    Chinese Journal of Network and Information Security    2018, 4 (7): 39-47.   DOI: 10.11959/j.issn.2096-109x.2018058
    Abstract2258)   HTML17)    PDF(pc) (693KB)(2437)       Save

    Road conditions early-warning scheme is effective solution to solve vehicle congestion and traffic accidents of VANET.The current traffic conditions in China as well as the development and application of VANET were analyzed.Combined with blockchain technology,a blockchain-based traffic conditions early-warning scheme for VANET was proposed.The Hyperledger Fabric alliance chain technology platform is used to simulate this scheme.The experimental results show that the scheme is reasonable and feasible.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain-based key management scheme for distributed networks
    Qianyi DAI,Kaiyong XU,Song GUO,Guoming CAI,Zhicheng ZHOU
    Chinese Journal of Network and Information Security    2018, 4 (9): 23-35.   DOI: 10.11959/j.issn.2096-109x.2018077
    Abstract1943)   HTML73)    PDF(pc) (822KB)(2146)       Save

    Regarding the difficult key management and excessive communication overhead in the distributed group networks,KMSBoB-Key management schemes based on blockchain was proposed,featuring key management and transmitting procedure based on blockchain in distributed group networks.Meanwhile,the all-member mining process of blockchain and the MTI/CO protocol process were combined to establish a protocol of dynamically generated session key,so as to streamline key management strategies in cross-heterogeneous autonomous domains.According to simulation testing and result analysis,KMSBoB is safe and effective,with less communication overhead and higher expansibility than traditional key management schemes.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain-based ARP defense scheme
    Fanming LIU,Wei SHI
    Chinese Journal of Network and Information Security    2018, 4 (9): 36-43.   DOI: 10.11959/j.issn.2096-109x.2018071
    Abstract1709)   HTML32)    PDF(pc) (694KB)(1334)       Save

    In order to improve the difficulty of maintaining the static binding method when defending against ARP attacks,a defense method was designed with the features of low cost of defense and easy maintenance by using the idea of a blockchain technology.The blockchain structure had been improved,and the transaction index table structure had been designed to identify attacks and update data in a timely manner to prevent subsequent attacks.The content of the transaction index table was updated after the IP address was changed normally to ensure the correctness of the query.Analysis and experiments show that the blockchain-based defense method has the following merits:high security,guaranteeing the data is not tampered with,low cost of maintenance,and effective prevention against ARP spoofing attacks.

    Table and Figures | Reference | Related Articles | Metrics
    Design of identity authentication agreement in mobile terminal based on SM2 algorithm and blockchain
    Qiuhan WU,Wei HU
    Chinese Journal of Network and Information Security    2018, 4 (9): 60-65.   DOI: 10.11959/j.issn.2096-109x.2018046
    Abstract2355)   HTML45)    PDF(pc) (733KB)(2251)       Save

    To solve the privacy leakage problem in the process of identification by second generation residents’ ID card,the SM2 algorithm and the blockchain technology were adopted,and the dynamic password ,facial recognition and two-dimension code to modify the traditional identification method were combined to design a kind of identification agreement on mobile terminal.The study analyzed the efficiently and security of the agreement,which reflected that the agreement could guarantee users’ privacy when it provide high-efficient identification.

    Table and Figures | Reference | Related Articles | Metrics
    Prospects of blockchain application in smart agriculture
    Zhongfu SUN, Yongli LI, Feixiang ZHENG, Keming DU, Juncheng MA, Delong ZHANG
    Big Data Research    2019, 5 (2): 116-124.   DOI: 10.11959/j.issn.2096-0271.2019018
    Abstract617)   HTML101)    PDF(pc) (1199KB)(745)       Save

    At present time,China is entering an important period of upgradation and transitionin agriculture,therefore,promoting smart agriculture development will be becoming the prior way with integration of modern information technology.Firstly,the current status of agriculture in China and the necessity of smart agriculture were analyzed,including possible blockchain application.Secondly,the connotation and its main trend for blockchain were briefly introduced.Thirdly,the main fields of blockchain application were summed up for smart agriculture.Finally,the prospects were set forth and some important suggestions were proposed for agricultural blockchain in future.

    Reference | Related Articles | Metrics
    Blockchain for IoT: the tradeoff between consistency and capacity
    ZHA Xuan, WANG Xu, NI Wei, LIU Ren-ping, GUO Ying-jie, NIU Xin-xin, ZHENG Kang-feng
    Chinese Journal on Internet of Things    2017, 1 (1): 21-33.   DOI: 10.11959/j.issn.2096-3750.2017.00004
    Abstract2572)      PDF(pc) (1613KB)(1920)       Save
    The Internet of Things (IoT) is poised to transform people’s lives and unleash enormous economic benefit. However, inadequate data security and trust of current IoT are seriously limiting its adoption. Blockchain, a distributed and tamper-resistant ledger, has the potential to resolve the myriad of security, data integrity and reliability concerns in IoT. Integrating blockchain technology into IoT has many challenges, including massive IoT devices, limited computing power, low bandwidth and error-prone radio links, which can have significant impact on the consistency and capacity of the blockchain based IoT. After survey existing theories on consistency and capacity in distributed networks, blockchain-based IoT security architectures is discussed, and future directions in optimally leveraging consistency and capacity of blockchain for IoT applications is pointed out with a review of relevant theories.
    Related Articles | Metrics
    Research on IoT device identification based on blockchain
    Meijuan CHEN,Xiaorong ZHU
    Chinese Journal on Internet of Things    2018, 2 (2): 18-26.   DOI: 10.11959/j.issn.2096-3750.2018.00048
    Abstract2662)   HTML77)    PDF(pc) (2516KB)(2259)       Save

    Combined blockchain technology with IoT applications,a blockchain-based IoT architecture was proposed,and a blockchain-based IoT identification method was designed.The equipment registration service process and the query service process based on the proposed IoT architecture were illustrated,and the security of the system was analyzed.Finally,based on the proposed network architecture and the identification method,the application in the smart home scenario was given.It can be seen from the two typical cases that the proposed solution can guarantee the security of various applications in the Internet of things.

    Table and Figures | Reference | Related Articles | Metrics
    Survey on privacy preserving techniques for blockchain
    Zonghui WANG,Shengli ZHANG,Shi JIN,Hui WANG
    Chinese Journal on Internet of Things    2018, 2 (3): 71-81.   DOI: 10.11959/j.issn.2096-3750.2018.00066
    Abstract2453)   HTML162)    PDF(pc) (1076KB)(2269)       Save

    Blockchain is a kind of distributed ledger technology with the characteristics of decentralization,security reliability,tamper-proof and programmable.The open and transparent feature of the blockchain system has seriously threatened the transaction privacy of users,and the corresponding privacy problem solution is designed for different application scenarios.Firstly,the basic working principle of block chain technology was introduced,and typical privacy issues was introduced in blockchain,such as transaction privacy and account privacy.Secondly,the existing typical blockchain privacy protection schemes were divided into three types:mixed-coin technology,cryptography technology and secure channel technology,and presents a comprehensive and comprehensive introduction to this three privacy protection schemes; Finally,the blockchain data privacy protection technology was analyzed,the application and development on IoT security were prospeted.

    Table and Figures | Reference | Related Articles | Metrics
    Design and analysis of enterprise management system framework based on blockchain
    Wei ZHAO,Wenyin ZHANG,Jiuru WANG,Yawei ZHANG
    Chinese Journal of Network and Information Security    2019, 5 (2): 13-22.   DOI: 10.11959/j.issn.2096-109x.2019013
    Abstract3084)   HTML88)    PDF(pc) (1128KB)(888)       Save

    How to enhance the management of modern enterprises by blockchain technology has attracted more and more attention.ERP (enterprise resource planning) technology combined modern information technology with enterprise production process management,and effectively strengthened the work efficiency and management level of enterprises.But there were inherent pain points such as equipment security,data security,industrial control security,information leakage and so on.Aimed at the problems exposed by ERP system,a blockchain based framework mod el of ERP system proposed by taking advantage of the characteristics of decentralization,de-trust,openness and transparency,trusted database and traceability of blockchain.The key point is to solved the problem of credible and efficient data collaboration in the production and management process of enterprises.Combine with the incentive mechanism of blockchain,use token to strengthen collaborative management and improve efficiency,which provide a new idea for enterprise performance evaluation and assessment.

    Table and Figures | Reference | Related Articles | Metrics
    Deletable blockchain based on threshold ring signature
    Yanli REN,Danting XU,Xinpeng ZHANG,Dawu GU
    Journal on Communications    2019, 40 (4): 71-82.   DOI: 10.11959/j.issn.1000-436x.2019084
    Abstract854)   HTML79)    PDF(pc) (852KB)(1449)       Save

    With the development of blockchain,huge storage space is needed to store all of blockchain data.In addition,data can’t be changed once it is packaged into the chain,and it may be possible for overdue data to take up large storage space.Firstly,a threshold ring signature scheme was improved,and then a deletable blockchain scheme based on the mechanism of proof of space (PoSpace) consensus was constructed.Most of nodes could sign and delete a block together when block data was overdue,and the overall structure of the blockchain was unchanged.Several experiments in a simulated environment were executed,and the results show that the proposed blockchain scheme has high efficiency in generating and delegating a block.Meanwhile,the deletion of a block doesn’t influence the storage and use of other blocks.

    Table and Figures | Reference | Related Articles | Metrics
    Application of blockchain technology in the demand response management of power grid
    Haowen REN,Yaqi YANG
    Telecommunications Science    2019, 35 (5): 155-160.   DOI: 10.11959/j.issn.1000-0801.2019066
    Abstract655)   HTML38)    PDF(pc) (733KB)(241)       Save

    The theory of decentralized blockchain mechanism was studied,and a method of applying distributed block chain technology to manage demand response planning in smart grid environment was proposed.This method was based on the blockchain distributed ledger accounting tamper-proof technology,which stored the energy consumption information collected from the intelligent metering devices of the IoT,and defined the self-executing intelligent contract at each consumer level in a programmatic way to ensure the flexibility of transactions.Blockchain distributed technologies provided incentives or penalties to balance energy demand with grid energy production rules.Consensus-based validation would be used to validate demand response plans and provide appropriate financial settlement for flexible suppliers.The results show that the power demand side management based on blockchain distributed technology can be used to match energy demand and production under the condition of smart grid,with high accuracy of demand response signal,but less flexibility required for convergence.

    Table and Figures | Reference | Related Articles | Metrics
    Design of transnational and intercontinental electricity market with blockchain and token economics
    Siyuan CHEN, Yuyang BAI, Jun ZHANG, Fei-yu WANG
    Chinese Journal of Intelligent Science and Technology    2019, 1 (1): 96-105.   DOI: 10.11959/j.issn.2096-6652.201910
    Abstract1826)   HTML75)    PDF(pc) (2573KB)(1477)       Save

    Transnational and intercontinental electricity trading (TIET) is a fundamental enabling component and efficient method to the development of Global Energy Internet (GEI),which aims to build an energy model centered on electricity consumption.The problems faced by TIET was analyzed,and a transnational and intercontinental electricity market (TIEM) based on blockchain and token economics was proposed.The TIEM was divided into five components,and each component was described and modeled respectively.A scale-up power grid based IEEE 39-nodes system was used to analyze the proposed market.The simulation results show that TIEM based on blockchain and token economy can ensure the effective implementation of cross-regional and multi-agent electricity transactions,and also encourage the generation companies (GENCOs) to participate in electricity market with clean energy.

    Table and Figures | Reference | Related Articles | Metrics
    Research on a new network covert channel model in blockchain environment
    Yanfeng LI,Liping DING,Jingzheng WU,Qiang CUI,Xuehua LIU,Bei GUAN
    Journal on Communications    2019, 40 (5): 67-78.   DOI: 10.11959/j.issn.1000-436x.2019111
    Abstract799)   HTML85)    PDF(pc) (1044KB)(1439)       Save

    Blockchain is a decentralized architecture emerging with cryptocurrencies,which is credible and robust.A network covert channel model in blockchain environment was proposed for the first time,which was anti-interference,anti-tamper modification,multi-line communication,receiver anonymity and line independence.The shortcomings of network covert channel in existing network environment could be tackled by the new type of network covert channel,such as characteristic defect.etc.Firstly,A network covert channel model in blockchain environment was presented by formal method,its anti-interference and anti-tamper modification was proved.Then,a blockchain network covert channel scenario using service operation interval time was presented.Finally,the undetectability,robustness and rate of the blockchain network covert channel evaluation vectors was proposed.A theoretical foundation was laid for the practicality of the new type of network covert channel in blockchain.

    Table and Figures | Reference | Related Articles | Metrics
    Decentralized credit system based on blockchain and its application
    Mingsheng WANG,Heyang CAO,Peiyao LI
    Journal on Communications    2019, 40 (8): 169-177.   DOI: 10.11959/j.issn.1000-436x.2019126
    Abstract433)   HTML42)    PDF(pc) (761KB)(721)       Save

    A decentralized credit system was proposed and its construction application was given.Decentralized credit system could be constructed by expanding the transaction structure of “digital currency commodity” based on block chain,expanding the function of consensus protocol and adding specific accounts.Also,the decentralized credit system was applied to the PKI enhancement and supervision system IKP so that IKP system did not need global fund in operation.Moreover,by introducing the hierarchical “virtual currency commodity” supply adjustment mechanism in the decentralized credit system to alleviate the difficulty of regulating the “virtual currency commodity” supply of “digital currency commodity” based on block chain,the precise “virtual currency commodity” supply regulation can be achieved.

    Table and Figures | Reference | Related Articles | Metrics
    Blockchain-based result-traceable searchable encryption scheme
    Xinyao WENG,Lin YOU,Tingting LAN
    Telecommunications Science    2019, 35 (9): 98-106.   DOI: 10.11959/j.issn.1000-0801.2019183
    Abstract454)   HTML56)    PDF(pc) (1088KB)(852)       Save

    In a searchable encryption scheme,whether it is a cloud server or a user,it may be deceptive.In order to solve the security problem,the definition of fairness security was given and a new searchable encryption scheme based on blockchain was proposed.Through the third-party trusted authority to verify the consistency of data during data transmission,the complete verification results were recorded on the blockchain to prevent tampering,and it could make all the related entities to reach the consistent security consensus and achieve the fairness security.The security and complexity analysis show that the proposed searchable encryption scheme was feasible.If it is combined with a searchable encryption scheme with its searched results verifiable,the proposed scheme can be effectively improved to be a blockchain-based searchable encryption scheme with its searched results verifiable and its security will be more strengthened.

    Table and Figures | Reference | Related Articles | Metrics
    Research status and development trend of blockchain in cellular mobile communication system
    ·iping ZUO,Shi JIN,Shengli ZHANG
    Telecommunications Science    2019, 35 (9): 114-123.   DOI: 10.11959/j.issn.1000-0801.2019192
    Abstract511)   HTML37)    PDF(pc) (733KB)(866)       Save

    The blockchain is essentially a distributed database that can be safely updated without the need for third-party intermediaries.The blockchain technology is introduced into the 6G cellular mobile communication system to ensure the privacy of users,reduce the cost of resource allocation and communication services,and support different distributed applications.In order to realize the organic combination of mobile communication and blockchain technology,it is predicted to be one of the key technologies of 6G cellular mobile communication.From the blockchain combined with internet of things (IoT),edge computing,spectrum allocation,interference management,a detailed introduction was introduced,and the latest research progress of international academic circles in this direction was expounded in recent years,and on this basis,the development trend of blockchain technology in 6G cellular mobile communication was further prospected.

    Table and Figures | Reference | Related Articles | Metrics
    Trustworthy network based on blockchain technology
    Cong LI, Bo LEI, Chongfeng XIE, Yunhe LI
    Telecommunications Science    2019, 35 (10): 60-68.   DOI: 10.11959/j.issn.1000-0801.2019226
    Abstract420)   HTML61)    PDF(pc) (1283KB)(315)       Save

    With the frequent occurrence of network security issues,the industry had not satisfied the patch-based external security solution,and it was hoped that the endogenous security could be realized from the network architecture layer.The decentralized trustworthy network architecture was proposed.Based on the research of the security of existing network underlying protocol,a trustworthy network architecture based on decentralization technology was proposed,such as blockchain technology,which could effectively solve the problem of lack of endogenous security in existing networks.Layers implement network security to avoid malicious network attacks or network failures caused by configuration errors.

    Table and Figures | Reference | Related Articles | Metrics
    Algorithm of blockchain data provenance based on ABE
    Youliang TIAN,Kedi YANG,Zuan WANG,Tao FENG
    Journal on Communications    2019, 40 (11): 101-111.   DOI: 10.11959/j.issn.1000-436x.2019222
    Abstract915)   HTML96)    PDF(pc) (810KB)(1607)       Save

    To solve the problem that the blockchain-based traceability algorithm mainly used homomorphic encryption and zero-knowledge proof for privacy protection,making it difficult to achieve dynamic sharing of traceability information,a blockchain data traceability algorithm based on attribute encryption was proposed.In order to realize the dynamic protection of transaction privacy,the strategy update algorithm applicable to block chain was designed based on the CP-ABE scheme proposed by Waters to achieve dynamic protection of transaction privacy.In order to realize the dynamic update of the visibility about block content,based on the strategy update algorithm,the block structure was designed to achieve the dynamic update about the content visibility of the block.The security and experimental simulation analysis show that the proposed algorithm can realize the dynamic sharing of traceability information while completing the protection transaction privacy.

    Table and Figures | Reference | Related Articles | Metrics
    Survey of blockchain:principle,progress and application
    Shiqin ZENG, Ru HUO, Tao HUANG, Jiang LIU, Shuo WANG, Wei FENG
    Journal on Communications    2020, 41 (1): 134-151.   DOI: 10.11959/j.issn.1000-436x.2020027
    Abstract2447)   HTML397)    PDF(pc) (1174KB)(13587)       Save

    Blockchain is a kind of distributed ledger technology that upgrades to a complete storage system by adding logic control functions such as intelligent contracts.With the changes of its classification,service mode and application requirements,the core technology forms of Blockchain show diversified development.In order to understand the Blockchain ecosystem thoroughly,a hierarchical technology architecture of Blockchain was proposed.Furthermore,each layer of blockchain was analyzed from the perspectives of basic principle,related technologies and research progress in-depth.Moreover,the technology selections and characteristics of typical Blockchain projects were summarized systematically.Finally,some application directions of blockchain frontiers,technology challenges and research prospects including Smart Cities and Industrial Internet were given.

    Table and Figures | Reference | Related Articles | Metrics
    6G endogenous security:blockchain technology
    Kaijun NIE,Bin CAO,Mugen PENG
    Telecommunications Science    2020, 36 (1): 21-27.   DOI: 10.11959/j.issn.1000-0801.2020004
    Abstract788)   HTML78)    PDF(pc) (992KB)(630)       Save

    With the development of mobile communication technology towards marginalization and distributed structure,the traditional network security method of external border protection will be faced with more and more challenges.The emerging network security accidents also show that it is necessary to grow self-adaptive,independent and self-growing security capabilities from the information system,that is,endogenous security.Blockchain,as a de-centralized shared ledger and database,has the characteristics of decentralization,immutability,leaving traces throughout,traceability,collective maintenance,openness and transparency,etc.,which can greatly meet the needs of endogenous security design.Therefore,the necessity and demand of endogenous security was described,then the blockchain technology as an important means to realize endogenous security was introduced,the main research progress,difficulties and challenges faced by blockchain were analyzed,and the future research direction and oppor-tunities were put forward.

    Table and Figures | Reference | Related Articles | Metrics