网络与信息安全学报 ›› 2022, Vol. 8 ›› Issue (4): 45-65.doi: 10.11959/j.issn.2096-109x.2022045
• 专栏:区块链系统、智能合约与应用安全 • 上一篇 下一篇
宋晓玲, 刘勇, 董景楠, 黄勇飞
修回日期:
2022-06-09
出版日期:
2022-08-15
发布日期:
2022-08-01
作者简介:
宋晓玲(1985− ),女,河南郑州人,重庆邮电大学博士生,主要研究方向为区块链技术及应用,数据安全及隐私保护,网络安全Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG
Revised:
2022-06-09
Online:
2022-08-15
Published:
2022-08-01
摘要:
元宇宙是虚拟数字世界与真实物理世界无缝融合的新生态,近来引发了各界的广泛关注。区块链、人工智能、虚拟现实/增强现实及传感技术、移动通信及泛在计算等各种新型互联网技术愈发成熟,使元宇宙的进一步发展成为可能。关于元宇宙的研究主要涉及产业项目、基础设施、关键技术、隐私安全等方面,这些研究虽然涉及区块链技术,但未具体指出区块链应用于元宇宙的优势及具体应用方式。区块链技术不仅可以为元宇宙提供开放自由的去中心化环境,而且可以为其提供公平合理的数字资产分配机制。主要从区块链赋能元宇宙中数字身份和数字资产管理的角度出发,分析了元宇宙的发展历程和特征,讨论了元宇宙发展所需核心技术及面临的挑战。同时研究了区块链的关键技术,并从区块链的本质特征及与其他技术融合优势两个方面对区块链应用于元宇宙做可行性分析。进一步提出元宇宙生态体系架构,重点详细分析了基于区块链的自我主权身份管理模型、区块链-非同质化通证(NFT,non-fungible token)工作流程及其在元宇宙中的应用。结合区块链和元宇宙的最新研究进展,从基础设施、通信和计算资源管理机制、监管与隐私保护以及区块链可扩展和互操作性4个方面指出区块链应用于元宇宙将面临的挑战和未来的研究方向。
中图分类号:
宋晓玲, 刘勇, 董景楠, 黄勇飞. 元宇宙中区块链的应用与展望[J]. 网络与信息安全学报, 2022, 8(4): 45-65.
Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse[J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65.
表3
链式结构与有向无环图结构的比较Table 3 Comparison of chain structure and directed acyclic graph structure"
名称 | 链式结构 | 有向无环图结构 |
区块形式 | 区块以链式结构连接,每个区块中包含多笔交易 | 区块以有向无环图结构连接,每个区块中只包含一笔交易 |
交易速度 | 每次只能增加一个区块的数据量,交易速度较慢 | 支持局部处理和并行结算,交易的人越多交易越频繁,速度越快 |
共识机制 | 共识机制是为了选举出打包交易的节点,如工作量证明、权益证明等,共识过程有矿工参与 | 共识机制不是为了选举打包交易的节点,每笔交易由节点自身处理,共识过程无矿工参与 |
扩展性和改进方案 | 可扩展性弱,改进方案:增加区块大小、支持,链外通道、节点分级或分片 | 可扩展性强,扩展方案:使用耦合网络和事务验证,但前提是用户先要处理自己的交易 |
抗量子攻击 | 加密算法容易被量子计算机攻击 | 使用了抗量子攻击的密码算法不易被攻破 |
交易费用 | 需要消耗的资源费用高 | 资源费用消耗很低 |
表4
共识算法分类Table 4 The classification of consensus algorithm"
类别 | 详细 | 代表算法 |
证明类 | 通过证明节点具有的某种特定能力(如算力、权益)较高的方式选出记账节点 | PoW[ |
选举类 | 通过“投票选举”的方式选出获得一半以上选票的节点作为记账节点 | DPoS[ |
随机类 | 根据某种随机方式(如抽签)选出记账节点 | Ouroboros[ |
混合类 | 多种共识算法结合使用选出记账节点 | PoA[ |
注:权益流通证明(PoSV,proof of stake velocity);燃烧证明(PoB,proof of burn);委托权益证明(DPoS,delegated proof of stake);实用拜占庭容错(PBFT,practical Byzantine fault tolerance);授权拜占庭容错(DBFT,democratic Byzantine fault tolerance);时间流逝证明(PoET, proof of elapsed-time);活动证明(PoA,proof of activity)。 |
表6
区块链的关键特征描述Table 6 Description of key features of blockchain"
关键特征 | 描述 |
去中心化 | 在传统的分布式交易方案中,所有的交易都需要进行身份验证,这不可避免地造成了开销和流量在中心服务器上的使用。在区块链中,主要用共识算法来保持去中心化网络中信息的一致性 |
透明性 | 链上所有节点都可以使用并确认参与的交易,因此这些交易信息对于所有用户来说都是透明的,主要体现在溯源数据的获取和共享、数据云存储和决策透明性[ |
不易篡改性 | 区块链上每个块中都包含前一个块的哈希值,对最后一个块的任何更改都会使所有之前创建的块失效。同时,Merkle树根哈希存储所有参与交易的哈希,对任何交易的任何修改都会产生一个新的Merkle根。因此,任何捏造都很容易被识别出来 |
抗抵赖性 | 验证私钥正确性的过程将被用来作为签名放置到事务中,然后该签名由使用等效公钥的其他节点进行确认,因此,以加密方式签名的事务不能被事务发起者拒绝 |
可追踪性 | 所有存储在区块链中的交易都是使用时间戳粘贴的,因此,节点可以使用相同的时间戳检查区块信息,等待确定无误后,进一步确认和跟踪历史信息 |
持久性 | 区块链中事务经常被快速地验证,正常的矿工节点不会允许无效的事务,不正常的交易几乎不能在区块链内部一次性删除并将被立即纰漏 |
可审核性 | 一旦当前交易被存储在区块链中,那么未使用的货币或资产将变为已使用,通过这种方式,可以确认和审核交易 |
匿名性 | 节点用户可以使用不泄露个人信息的地址在区块链进行操作,但由于区块链具有一定的局限性,因此它只能进行适当地加密保护 |
表8
NFT的特征描述Table 8 The characterization of NFT"
名称 | 描述 |
标准化 | NFT具有通用标准,如铸造标准、流动性标准等。标准中还包括基本的原子操作,如所有权、传输方式和访问控制等 |
流动性 | NFT没有第三方的干涉,在一定程度上解决了应用程序的排他性问题,使其具有很高的流动性 |
不变性 | NFT永久记录于区块链中,不可改变只能相互转让,其又是完整不可分割的,就像景区门票不能半张出售一样 |
唯一性 | NFT所标识数字资产是独一无二的,节点用户可以通过查看NFT中的属性了解数字资产的相关信息 |
可编程性 | NFT由元数据组成并通过智能合约编程来实现其价值,CryptoKitties和Axie Infinity项目[ |
多模态化 | NFT内容形式多样化,可包含图片、视频、音频等,同时具有复合性与多变性,如有些内容是音频和视频的综合体。除了内容形式多模态化以外,其内容的存储位置也不是唯一的,可存于链上或链下 |
[95] | 杨冠群, 刘荫, 徐浩 ,等. 基于区块链的电网可信分布式身份认证系统[J]. 网络与信息安全学报, 2021,7(6): 88-98. |
YANG G Q , LIU Y , XU H ,et al. Credible distributed identity authentication system of microgrid based on blockchain[J]. Chinese Journal of Network and Information Security, 2021,7(6): 88-98. | |
[96] | KUBACH M , SCHUNCK C H , SELLUNG R.et.al . Self-sovereign and Decentralized identity as the future of identitymanagement[C]// Open Identity Summit 2020 - Lecture Notes in Informatics (LNI) - Proceedings. 2020: 35-47. |
[97] | TOYGAR A , ROHM JR C E , ZHU J . A new asset type:digital assets[J]. Journal of International Technology and Information Management, 2013,22(4): 7. |
[98] | Cryptokitties[EB]. |
[99] | Axieinfinity[EB]. |
[100] | KARANDIKAR N , CHAKRAVORTY A , RONG C M . Blockchain based transaction systemwith fungible and non-fungible tokens for a community-based energy infrastructure[J]. Sensors, 2021,21(11): 3822. |
[101] | SGHAIER OMAR A , BASIR O . Capability-based non-fungible tokens approach for a decentralized AAA framework in IoT[M]// Blockchain Cybersecurity,Trust and Privacy. Cham: Springer, 2020. |
[1] | FACEBOOK INC . Introducing Meta:a social technology company[EB]. |
[2] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. 2008. |
[3] | DIONISIO J D N , III W G B , GILBERT R . 3D virtual worlds and the metaverse:current status and future possibilities[J]. ACM Computing Surveys (CSUR), 2013,45(3): 1-38. |
[4] | LEE L H , BRAUD T , ZHOU P Y ,et al. All one needs to know about metaverse:a complete survey on technological singularity,virtual ecosystem,and research agenda[J]. arXiv preprint arXiv:2110.05352, 2021. |
[5] | NING H , WANG H , LIN Y ,et al. A survey on Metaverse:the state-of-the-art,Technologies,applications and challenges[J]. arXiv preprint arXiv:2111.09673, 2021. |
[6] | PARK S M , KIM Y G . A Metaverse:taxonomy,components,applications,and open challenges[J]. IEEE Access, 2022,10: 4209-4251. |
[7] | LEENES R , . Privacy in the Metaverse[C]// IFIP International Summer School on the Future of Identity in the Information Society. 2007: 95-112. |
[8] | WANG Y T , SU Z , ZHANG N ,et al. A Survey on Metaverse:Fundamentals,Security,and Privacy[J]. arXiv preprint arXiv:2203.02662, 2022. |
[9] | THOMASON J . MetaHealth-how will the Metaverse change health care[J]. Journal of Metaverse, 2021,1(1): 13-16. |
[10] | BOURLAKIS M , PAPAGIANNIDIS S , LI F . Retail spatial evolution:paving the way from traditional to metaverse retailing[J]. Electronic Commerce Research, 2009,9(1): 135-148. |
[11] | DíAZ J , SALDA?A C , AVILA C . Virtual world as a resource for hybrid education[J]. International Journal of Emerging Technologies in Learning (iJET), 2020,15(15): 94-109. |
[12] | DUAN H H , LI J Y , FAN S ZH ,et al. Metaverse for social good:a university campus prototype[C]// Proceedings of the 29th ACM International Conference on Multimedia. 2021: 153-161. |
[13] | NEVELSTEEN K J L . Virtual world,defined from a technological perspective and applied to video games,mixed reality,and the Metaverse[J]. Computer Animation and Virtual Worlds, 2018,29(1): 1-22. |
[14] | MOZUMDER M A I , SHEERAZ M M , ATHAR A ,et al. Overview:Technology Roadmap of the Future Trend of Metaverse based on IoT,Blockchain,AI Technique,and Medical Domain Metaverse Activity[C]// International Conference on Advanced Communication Technology (ICACT). 2022: 256-261. |
[15] | YANG Q L , ZHAO Y T , HUANG H W ,et al. Fusing blockchain and AI with metaverse:a survey[J]. arXiv preprint arXiv:2201.03201, 2022. |
[16] | XU H , LI Z H , LI Z Y ,et al. Metaverse Native Communication:A Blockchain and Spectrum Prospective[J]. arXiv preprint arXiv:2203.08355, 2022. |
[17] | GADEKALLU T R , HUYNH-THE T , WANG W ZH ,et al. Blockchain for the Metaverse:a review[J]. arXiv preprint arXiv:2203.09738, 2022. |
[18] | NGUYEN C T , HOANG D T , NGUYEN D N ,et al. MetaChain:A novel blockchain-based framework for Metaverse applications[J]. arXiv preprint arXiv:2201.00759, 2021. |
[19] | JOSHUA J . Information bodies:computational anxiety in neal stephenson's snow crash[J]. Interdisciplinary Literary Studies, 2017,19(1): 17-47. |
[20] | 袁勇, 倪晓春, 曾帅 ,等. 区块链共识算法的发展现状与展望[J]. 自动化学报, 2018,44(11): 2011-2022. |
YUAN Y , NI X C , ZENG S ,et al. Blockchain consensus algorithms:the state of the artand future trends[J]. Acta Automatica Sinica, 2018,44(11): 2011-2022. | |
[21] | DUSTDAR S , FERNáNDEZ P , GARCíA J M ,et al. Elastic smart contracts in blockchains[J]. IEEE/CAA Journal of AutomaticaSinica, 2021,8(12): 1901-1912. |
[22] | WANG Q , LI R J , WANG Q ,et al. Non-fungible token (NFT):overview,evaluation,opportunities and challenges[J]. arXiv preprint arXiv:2105.07447, 2021. |
[23] | XU M , NG W C , LIM W Y B ,et al. A full dive into realizing the edge-enabled metaverse:visions,enabling technologies,and challenges[J]. arXiv preprint arXiv:2203.05471, 2022. |
[24] | KOUTITAS G , SMITH S , LAWRENCE G . Performance evaluation of AR/VR training technologies for EMS first responders[J]. Virtual Reality, 2021,25(1): 83-94. |
[25] | LIUBOGOSHCHEV M , RAGIMOVA K , LYAKHOV A ,et al. Adaptive cloud-based extended reality:modeling and optimization[J]. IEEE Access, 2021,9: 35287-35299. |
[26] | ZHAO H J , WU B . Three‐dimensional face modeling technology based on 5G virtual reality binocular stereo vision[J]. International Journal of Communication Systems, 2022,35(5): e4651. |
[27] | BRUMENT H , BRUDER G , MARCHAL M ,et al. Understanding,modeling and simulating unintended positional drift during repetitive steering navigation tasks in virtual reality[J]. IEEE Transactions on Visualization and Computer Graphics, 2021,27(11): 4300-4310. |
[28] | LU J , . Research on optical display technology of virtual reality technology based on optical image[C]// Journal of Physics:Conference Series. 2021,1802(3): 032011. |
[29] | TIAN T , SONG G L , CHEN X ,et al. Monocular stereo vision of image feature-aware interactive generation[C]// 2021 International Conference on Computer Technology and Media Convergence Design (CTMCD). 2021: 281-286. |
[30] | ZHENG M , TIE Y , ZHU F ,et al. Research on panoramic stereo live streaming based on the virtual reality[C]// 2021 IEEE International Symposium on Circuits and Systems (ISCAS). 2021: 1-5. |
[31] | CUI D , MOUSAS C . Evaluating wearable tactile feedback patterns during a virtual reality fighting game[C]// 2021 IEEE International Symposium on Mixed and Augmented Reality Adjunct (ISMAR-Adjunct). 2021: 328-333. |
[32] | SIM D , BAEK Y , CHO M ,et al. Low-latency haptic open glove for immersive virtual reality interaction[J]. Sensors, 2021,21(11): 3682. |
[33] | HUANG S S , QI D Q , YUAN J B ,et al. Review of studies on target acquisition in virtual reality based on the crossing paradigm[J]. Virtual Reality & Intelligent Hardware, 2019,1(3): 251-264. |
[34] | YANG L , HUANG J , TIAN F ,et al. Gesture interaction in virtual reality[J]. Virtual Reality & Intelligent Hardware, 2019,1(1): 84-112. |
[35] | YANG L , W U D , HUANG J ,et al. Influence of multi-modality on moving target selection in virtual reality[J]. Virtual Reality & Intelligent Hardware, 2019,1(3): 303-315. |
[36] | CUI D , KAO D , MOUSAS C . Toward understanding embodied human-virtual character interaction through virtual and tactile hugging[J]. Computer Animation and Virtual Worlds, 2021,32(3-4): e2009. |
[37] | SARKER I H . Machine learning:algorithms,real-world applications and research directions[J]. SN Computer Science, 2021,2(3): 1-21. |
[38] | GUO M H , XU T X , LIU J J ,et al. Attention mechanisms in computer vision:A survey[J]. Computational Visual Media, 2022: 1-38. |
[39] | ALAM M , SAMAD M D , VIDYARATNE L ,et al. Survey on deep neural networks in speech and vision systems[J]. Neurocomputing, 2020,417: 302-321. |
[40] | CAO K , HU S , SHI Y ,et al. A survey on edge and edge-cloud computing assisted cyber-physical systems[J]. IEEE Transactions on Industrial Informatics, 2021,17(11): 7806-7819. |
[41] | TONG Z , YE F , YAN M ,et al. A survey on algorithms for intelligent computing and smart city applications[J]. Big Data Mining and Analytics, 2021,4(3): 155-172. |
[42] | ABDULQADIR H R , ZEEBAREE S R M , SHUKUR H M ,et al. A study of moving from cloud computing to fog computing[J]. Qubahan Academic Journal, 2021,1(2): 60-70. |
[43] | JIANG W , HAN B , HABIBI M A ,et al. The road towards 6G:a comprehensive survey[J]. IEEE Open Journal of the Communications Society, 2021,2: 334-366. |
[44] | CAO M R , CAO B , HONG W ,et al. DAG-FL:direct acyclic graph-based blockchain empowers on-device federated learning[C]// ICC 2021-IEEE International Conference on Communications. 2021: 1-6. |
[45] | WANG T Y , WANG Q , SHEN Z Y ,et al. Understanding intrinsic characteristics and system implications of DAG-based blockchain[C]// 2020 IEEE International Conference on Embedded Software and Systems (ICESS). 2020: 1-6. |
[46] | GAI K K , HU Z Y , ZHU L H ,et al. Blockchain meets DAG:a BlockDAG consensus mechanism[C]// International Conference on Algorithms and Architectures for Parallel Processing. 2020: 110-125. |
[47] | XIE J , ZHANG K , LU Y L ,et al. Resource-efficient DAG blockchain with sharding for 6G networks[J]. IEEE Network, 2022,36(1): 189-196. |
[48] | LI J R , WOLF T . A one-way proof-of-work protocol to protect controllers in software-defined networks[C]// Proceedings of the 2016 Symposium on Architectures for Networking and Communications Systems. 2016: 123-124. |
[49] | GANESH C , ORLANDI C , TSCHUDI D . Proof-of-Stake protocols for privacy-aware blockchains[C]// Proceedings of the 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2019: 690-719. |
[50] | REN L . Proof of stake velocity:building the social currency of the digital age[J]. Self-published white paper, 2014. |
[51] | KARANTIAS K , KIAYIAS A , ZINDROS D . Proof-of-burn[C]// International conference on financial cryptography and data security. 2020: 523-540. |
[52] | YANG F , ZHOU W , WU Q Q ,et al. Delegated proof of stake with downgrade:A secure and efficient blockchain consensus algorithm with downgrade mechanism[J]. IEEE Access, 2019,7: 118541-118555. |
[53] | GAO S H , YU T Y , ZHU J M ,et al. T-PBFT:An EigenTrust-based practical Byzantine fault tolerance consensus algorithm[J]. China Communications, 2019,16(12): 111-123. |
[54] | CRAIN T , GRAMOLI V , LARREA M ,et al. DBFT:efficient leaderless Byzantine consensus and its application to blockchains[C]// 2018 IEEE 17th International Symposium on Network Computing and Applications (NCA). 2018: 1-8. |
[55] | KIAYIAS A , RUSSELL A , DAVID B ,et al. Ouroboros:a provably secure proof-of-stake blockchain protocol[C]// Annual international cryptology conference. 2017: 357-388. |
[56] | CHEN L , XU L , SHAH N ,et al. On security analysis of proof-of-elapsed-time (POET)[C]// International Symposium on Stabilization,Safety,and Security of Distributed Systems. 2017: 282-297. |
[57] | GILAD Y , HEMO R , MICALI S ,et al. Algorand:scaling Byzantine agreements for cryptocurrencies[C]// Proceedings of the 26th symposium on operating systems principles. 2017: 51-68. |
[58] | BENTOV I , LEE C , MIZRAHI A ,et al. Proof of activity:Extending bitcoin's proof of work via proof of stake[extended abstract]y[J]. ACM SIGMETRICS Performance Evaluation Review, 2014,42(3): 34-37. |
[59] | HUANG Y F , BIAN Y Y , LI R P ,et al. Smart contract security:a software lifecycle perspective[J]. IEEE Access, 2019,7:1. |
[60] | DICKERSON T , GAZZILLO P , HERLIHY M ,et al. Adding concurrency to smart contracts[J]. Distributed Computing, 2020,33(3): 209-225. |
[61] | BARTOLETTI M , GALLETTA L , MURGIA M . A true concurrent model of smart contracts executions[C]// International Conference on Coordination Languages and Models. 2020: 243-260. |
[62] | SARAPH V , HERLIHY M . An empirical study of speculative concurrency in ethereum smart contracts[J]. arXiv preprint arXiv:1901.01376, 2019. |
[63] | CAI Z Y , QU J , LIU P P ,et al. A blockchain smart contract based on light-weighted quantum blind signature[J]. IEEE Access, 2019,7: 138657-138668. |
[64] | XU X W , WEBER I , STAPLES M ,et al. A taxonomy of blockchain-based systems for architecture design[C]// 2017 IEEE international conference on software architecture (ICSA). 2017: 243-252. |
[65] | 孟小峰, 刘立新 . 基于区块链的数据透明化:问题与挑战[J]. 计算机研究与发展, 2021,58(2): 237-252. |
MENG X F , LIU L X . Blockchain-based data transparency:lssues and challeges[J]. Journal of Computer Research and Development, 2021,58(2): 237-252. | |
[66] | FALCHUK B , LOEB S , NEFF R . The social metaverse:Battle for privacy[J]. IEEE Technology and Society Magazine, 2018,37(2): 52-61. |
[67] | HU P F , LI H X , FU H ,et al. Dynamic defense strategy against advanced persistent threat with insiders[C]// 2015 IEEE Conference on Computer Communications (INFOCOM). 2015: 747-755. |
[68] | WESTERLUND M . The emergence of deepfake technology:A re view[J]. Technology Innovation Management Review, 2019,9(11). |
[69] | 章峰, 史博轩, 蒋文保 . 区块链关键技术及应用研究综述[J]. 网络与信息安全学报, 2018,29(4): 22-29. |
ZHANG F , SHI B X , JIANG W B . Review of key technology and its application of blockchain[J]. Chinese Journal of Network and Information Security, 2018,29(4): 22-29. | |
[70] | ZHENG Z B , XIE SH A , DAI H N ,et al. Blockchain challenges and opportunities:A survey[J]. International Journal of Web and Grid Services, 2018,14(4): 352-375. |
[71] | JIANG Y , KANG J W , NIYATO D ,et al. Reliable coded distributed computing for metaverse services:coalition formation and incentive mechanism design[J]. arXiv preprint arXiv:2111.10548, 2021. |
[72] | 王晨旭, 程加成, 桑新欣 ,等. 区块链数据隐私保护:研究现状与展望[J]. 计算机研究与发展, 2021,58(10): 2099-2119. |
WANG C X , CHENG J C , SANG X X ,et al. Data privacy-preserving for blockchain:state of the art and trends[J]. Journal of Computer Research and Development, 2021,58(10): 2099-2119. | |
[73] | 李少卓, 王娜, 杜学绘 . 按需披露的区块链隐私保护机制[J]. 网络与信息安全学报, 2020,46(3): 19-29. |
[102] | ARCENEGUI J , ARJONA R , BATURONE I . Secure management of IoT devices based on blockchain non-fungible tokens and physical unclonable functions[C]// Proceedings of the International Conference on Applied Cryptography and Network Security. 2020: 24-40. |
[73] | LI S Z , WANG N , DU X H . Privacy protection mechanism of on-demand disclosure on blockchain[J]. Chinese Journal of Network and Information Security, 2020,46(3): 19-29. |
[74] | 刘峰, 杨杰, 李志斌 ,等. 一种基于区块链的泛用型数据隐私保护的安全多方计算协议[J]. 计算机研究与发展, 2021,58(2): 281-290. |
LIU F , YANG J , LI Z B ,et al. A secure multi-party computation protocol for universal data privacy protection based on blockchain[J]. Journal of Computer Research and Development, 2021,58(2): 281-290. | |
[75] | LEE L H , LIN Z J , HU R ,et al. When creators meet the metaverse:a survey on computational arts[J]. arXiv preprint arXiv:2111.13486, 2021. |
[76] | KUMAR S , BHARTI A K , AMIN R . Decentralized secure storage of medical records using blockchain and IPFS:a comparative analysis with future directions[J]. Security and Privacy, 2021,4(5): e162. |
[77] | HUSSAIN A A , AL-TURJMAN F , . Artificial intelligence and blockchain:a review[J]. Transactions on Emerging Telecommunications Technologies, 2021,32(9): e4268. |
[78] | HEWA T , GüR G ,, KALLA A ,et al. The role of blockchain in 6G:challenges,opportunities and research directions[J]. 2020 2nd 6G Wireless Summit(6G SUMMIT), 2020: 1-5. |
[79] | YANG R ZH , YU F R , SI P ,et al. Integrated blockchain and edge computing systems:A survey,some research issues and challenges[J]. IEEE Communications Surveys & Tutorials, 2019,21(2): 1508-1532. |
[80] | CAMP J L . Digital identity[J]. Technology & Society Magazine IEEE, 2004,23(3): 34-41. |
[81] | ALLISON A , CURRALL J , MOSS M ,et al. Digital identity matters[J]. Journal of the American Society for Information Science and Technology, 2005,56(4): 364-372. |
[82] | GOODELL G , ASTE T . A decentralized digital identity architecture[J]. Frontiers in Blockchain, 2019:17. |
[83] | 崔久强, 吕尧, 王虎 . 基于区块链的数字身份发展现状[J]. 网络空间安全, 2020,11(6): 25-29. |
CUI J Q , LYU Y , WANG H . The development of blockchain-aided digital identity[J]. Cyberspace Security, 2020,11(6): 25-29. | |
[84] | AVELLANEDA O , BACHMANN A , BARBIR A ,et al. Decentralized identity:Where did it come from and where is it going[J]. IEEE Communications Standards Magazine, 2019,3(4): 10-13. |
[85] | LIM S Y , FOTSING P T , ALMASRI A ,et al. Blockchain technology the identity management and authentication service disruptor:a survey[J]. International Journal on Advanced Science,Engineering and Information Technology, 2018,8(4-2): 1735-1745. |
[86] | 姚前, 张大伟 . 区块链系统中身份管理技术研究综述[J]. 软件学报, 2021,32(7): 2260-2286. |
YAO Q , ZHANG D W . Survey on identity management in blockchain[J]. Ruan Jian Xue Bao/Journal of Software, 2021,32(7): 2260-2286. | |
[87] | YU X Y , WANG Z J , WANG Y L ,et al. Impsuic:a quality updating rule in mixing coins with maximum utilities[J]. International Journal of Intelligent Systems, 2021,36(3): 1182-1198. |
[88] | FERDOUS M S , CHOWDHURY F , ALASSAFI M O . In search of self-sovereign identity leveraging blockchain technology[J]. IEEE Access, 2019,7: 103059-103079. |
[89] | FAN P F , LIU Y ZH , ZHU J Y ,et al. Identity management security authentication based on blockchain technologies[J]. International Journal of Network Security, 2019,21(6): 912-917. |
[90] | XU J , XUE K P , TIAN H Y ,et al. An identity management and authentication scheme based on redactable blockchain for mobile networks[J]. IEEE Transactions on Vehicular Technology, 2020,69(6): 6688-6698. |
[91] | CUI ZH H , XUE F , ZHANG SH Q ,et al. A hybrid blockchain-based identity authentication scheme for multi-WSN[J]. IEEE Transactions on Services Computing, 2020,13(2): 241-251. |
[92] | MA Z F , MENG J L , WANG J H ,et al. Blockchain-based decentralized authentication modeling scheme in edge and IoT environment[J]. IEEE Internet of Things Journal, 2021,8(4): 2116-2123. |
[93] | LU Z J , WANG Q , QU G ,et al. A blockchain-based privacy-preserving authentication scheme for VANETs[J]. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 2019,27(12): 2792-2801. |
[94] | MALIK N , NANDA P , ARORA A ,et al. Blockchain based secured identity authentication and expeditious revocation framework for vehicular networks[C]// 2018 17th IEEE International Conference On Trust,Security And Privacy In Computing And Communications/ 12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE). 2018: 674-679. |
[1] | 蔡召, 荆涛, 任爽. 以太坊钓鱼诈骗检测技术综述[J]. 网络与信息安全学报, 2023, 9(2): 21-32. |
[2] | 王贺立, 闫巧. 基于交易记录特征的自私挖矿检测方案[J]. 网络与信息安全学报, 2023, 9(2): 104-114. |
[3] | 余北缘, 任珊瑶, 刘建伟. 区块链资产窃取攻击与防御技术综述[J]. 网络与信息安全学报, 2023, 9(1): 1-17. |
[4] | 唐飞, 甘宁, 阳祥贵, 王金洋. 基于区块链与国密SM9的抗恶意KGC无证书签名方案[J]. 网络与信息安全学报, 2022, 8(6): 9-19. |
[5] | 林丹, 林凯欣, 吴嘉婧, 郑子彬. 基于字节码的以太坊智能合约分类方法[J]. 网络与信息安全学报, 2022, 8(5): 111-120. |
[6] | 陈立全, 李潇, 杨哲懿, 钱思杰. 基于区块链的高透明度PKI认证协议[J]. 网络与信息安全学报, 2022, 8(4): 1-11. |
[7] | 张文博, 陈思敏, 魏立斐, 宋巍, 黄冬梅. 基于形式化方法的智能合约验证研究综述[J]. 网络与信息安全学报, 2022, 8(4): 12-28. |
[8] | 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44. |
[9] | 金琳, 田有亮. 基于区块链的多权限属性隐藏电子病历共享方案[J]. 网络与信息安全学报, 2022, 8(4): 66-76. |
[10] | 姜鹏坤, 张问银, 王九如, 黄善云, 宋万水. 基于正常交易掩盖下的区块链隐蔽通信方案[J]. 网络与信息安全学报, 2022, 8(4): 77-86. |
[11] | 王子驰, 冯国瑞, 张新鹏. NFT图像隐写[J]. 网络与信息安全学报, 2022, 8(3): 18-28. |
[12] | 翟宝琴, 王健, 韩磊, 刘吉强, 何嘉豪, 刘天皓. 基于信任值的车联网分层共识优化协议[J]. 网络与信息安全学报, 2022, 8(3): 142-153. |
[13] | 王海龙, 李阳春, 李欲晓. 元宇宙发展演变及安全风险研究[J]. 网络与信息安全学报, 2022, 8(2): 132-138. |
[14] | 余佳仁, 田有亮, 林晖. 基于信誉管理模型的矿工类型鉴别机制设计[J]. 网络与信息安全学报, 2022, 8(1): 128-138. |
[15] | 高振升, 曹利峰, 杜学绘. 基于区块链的访问控制技术研究进展[J]. 网络与信息安全学报, 2021, 7(6): 68-87. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|