Chinese Journal of Network and Information Security ›› 2022, Vol. 8 ›› Issue (1): 128-138.doi: 10.11959/j.issn.2096-109x.2022002
• Research and Development • Previous Articles Next Articles
Jiaren YU1,2, Youliang TIAN1,2, Hui LIN3
Revised:
2021-10-08
Online:
2022-02-15
Published:
2022-02-01
Supported by:
CLC Number:
Jiaren YU, Youliang TIAN, Hui LIN. Design of miner type identification mechanism based on reputation management model[J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138.
[1] | NAKAMOTO S . Bitcoin:peer-to-peer electronic cash system[R]. 2009. |
[2] | 邵奇峰, 金澈清, 张召 ,等. 区块链技术:架构及进展[J]. 计算机学报, 2018,41(5): 969-988. |
SHAO Q F , JIN C Q , ZHANG Z ,et al. Blockchain:architecture and research progress[J]. Chinese Journal of Computers, 2018,41(5): 969-988. | |
[3] | DINH T T A , LIU R , ZHANG M H ,et al. Untangling blockchain:a data processing view of blockchain systems[J]. IEEE Transactions on Knowledge and Data Engineering, 2018,30(7): 1366-1385. |
[4] | PETERS G , PANAYI E , CHAPELLE A . Trends in cryptocurrencies and blockchain technologies:a monetary theory and regulation perspective[J]. Journal of Financial Perspectives, 2015,3(3): 1-25. |
[5] | REYNA A , MARTíN C , CHEN J ,et al. On blockchain and its integration with IoT.Challenges and opportunities[J]. Future Generation Computer Systems, 2018,88: 173-190. |
[6] | 蔡晓晴, 邓尧, 张亮 ,等. 区块链原理及其核心技术[J]. 计算机学报, 2021,44(1): 84-131. |
CAI X Q , DENG Y , ZHANG L ,et al. The principle and core technology of blockchain[J]. Chinese Journal of Computers, 2021,44(1): 84-131. | |
[7] | 刘懿中, 刘建伟, 张宗洋 ,等. 区块链共识机制研究综述[J]. 密码学报, 2019,6(4): 395-432. |
LIU Y Z , LIU J W , ZHANG Z Y ,et al. Review of blockchain consensus mechanism[J]. Journal of Cryptography, 2019,6(4): 395-432. | |
[8] | XIA J Z , ZHANG Y H , YE H ,et al. A visual analysis system for mine pool supervision[J]. Frontiers of Information Technology &Electronic Engineering, 2021,21(4): 507-524. |
[9] | LEWENBERG Y , BACHRACH Y , SOMPOLINSKY Y ,et al. Bitcoin mining pools:a cooperative game theoretic analysis[C]// Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems. 2015: 919-927. |
[10] | FISCH B , PASS R , SHELAT A . Socially optimal mining pools[C]// International Conference on Web and Internet Economics. 2017. |
[11] | CHANG S Y , PARK Y , WUTHIER S ,et al. Uncle-block attack:blockchain mining threat beyond block withholding for rational and uncooperative miners[C]// Proceedings of International Conference on Applied Cryptography and Network Security, 2019: 241-258. |
[12] | LIU X J , WANG W B , NIYATO D ,et al. Evolutionary game for mining pool selection in blockchain networks[J]. IEEE Wireless Communications Letters, 2018,7(5): 760-763. |
[13] | SAPIRSHTEIN A , SOMPOLINSKY Y , ZOHAR A . Optimal selfish mining strategies in bitcoin[C]// Proceedings of International Conference on Financial Cryptography and Data Security Financial Cryptography and Data Security. 2017: 515-532. |
[14] | EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable[M]. Financial Cryptography and Data Security. Berlin,Heidelberg: Springer Berlin Heidelberg, 2014: 436-454. |
[15] | JOHNSON B , LASZKA A , GROSSKLAGS J ,et al. Game-theoretic analysis of DDoS attacks against Bitcoin mining pools[C]// Proceedings of International Conference on Financial Cryptography and Data Security. 2014: 72-86. |
[16] | FENG J Y , ZHAO X Y , CHEN K X ,et al. Towards random-honest miners selection and multi-blocks creation:proof-of-negotiation consensus mechanism in blockchain networks[J]. Future Generation Computer Systems, 2020,105: 248-258. |
[17] | LEE J , KIM Y . Preventing bitcoin selfish mining using transaction creation time[C]// Proceedings of 2018 International Conference on Software Security and Assurance (ICSSA). 2018: 19-24. |
[18] | TANG C B , WU L Y , WEN G H ,et al. Incentivizing honest mining in blockchain networks:a reputation approach[J]. IEEE Transactions on Circuits and Systems II:Express Briefs, 2020,67(1): 117-121. |
[19] | KACI A , RACHEDI A . PoolCoin:Toward a distributed trust model for miners' reputation management in blockchain[C]// Proceedings of 2020 IEEE 17th Annual Consumer Communications & Networking Conference. Piscataway:IEEE Press, 2020: 1-6. |
[20] | 邸剑, 吝伟华 . 区块链中矿池选择策略的研究与分析[J]. 计算机应用研究, 2020,37(6): 1804-1807. |
DI J , LIN W H . Research and analysis of mining pool selection strategy in blockchain[J]. Application Research of Computers, 2020,37(6): 1804-1807. | |
[21] | XU C Z , ZHU K , WANG R ,et al. Dynamic selection of mining pool with different reward sharing strategy in blockchain networks[C]// Proceedings of ICC 2020 -2020 IEEE International Conference on Communications. Piscataway:IEEE Press, 2020: 1-6. |
[22] | GERVAIS A , KARAME G O , WüST K ,et al. On the security and performance of proof of work blockchains[C]// Proceedings of CCS '16:Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 3-16. |
[23] | YUAN G . The framework of consensus equilibria for mining-pool games in blockchain ecosystems[J]. arXiv preprint arXiv:2003.05067, 2020. |
[24] | FUJITA K , ZHANG Y Y , SASABE M ,et al. Mining pool selection problem in the presence of block withholding attack[C]// Proceedings of 2020 IEEE International Conference on Blockchain (Blockchain). 2020: 321-326. |
[25] | LI W B , CAO M W , WANG Y ,et al. Mining pool game model and Nash equilibrium analysis for PoW-based blockchain networks[J]. IEEE Access, 2020,8: 101049-101060. |
[26] | QIN R , YUAN Y , WANG F Y . A novel hybrid share reporting strategy for blockchain miners in PPLNS pools[J]. Decision Support Systems, 2019,118: 91-101. |
[27] | LI Q L , MA J Y , CHANG Y X ,et al. Markov processes in blockchain systems[J]. Computational Social Networks, 2019,6:5. |
[28] | ROSENFELD M . Analysis of bitcoin pooled mining reward systems[J]. arXiv preprint arXiv:1112.4980, 2011. |
[29] | XUE G , XU J , WU H W ,et al. Incentive mechanism for rational miners in bitcoin mining pool[J]. Information Systems Frontiers, 2021,23(2): 317-327. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[5] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[6] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[7] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[10] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[11] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[12] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[13] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[14] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
[15] | Guanqun YANG, Yin LIU, Hao XU, Hongwei XING, Jianhui ZHANG, Entang LI. Credible distributed identity authentication system of microgrid based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 88-98. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|