Chinese Journal of Network and Information Security ›› 2018, Vol. 4 ›› Issue (4): 22-29.doi: 10.11959/j.issn.2096-109x.2018028
Special Issue: 区块链
• Comprehensive Reviews • Previous Articles Next Articles
Feng ZHANG,Boxuan SHI,Wenbao JIANG
Revised:
2018-03-20
Online:
2018-04-15
Published:
2018-05-30
CLC Number:
Feng ZHANG, Boxuan SHI, Wenbao JIANG. Review of key technology and its application of blockchain[J]. Chinese Journal of Network and Information Security, 2018, 4(4): 22-29.
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008: 1-49. |
[2] | PERCIVAL C , JOSEFSSON S . The scrypt password-based key derivation function[R]. 2016. |
[3] | WOOD G . Ethereum:a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014,151: 1-32. |
[4] | DRYJA T . Hashimoto:I/O bound proof of work[R]. 2014. |
[5] | BUTERIN V . Dagger:a memory-hard to compute,memory-easy to verify scrypt alternative[R]. 2013. |
[6] | KING S . Primecoin:cryptocurrency with prime number proof-of-work[R]. 2013. |
[7] | BIRYUKOV A , KHOVRATOVICH D . Equihash:asymmetric proof-of-work based on the generalized birthday problem[J]. Ledger, 2017,2: 1-30. |
[8] | ANDRYCHOWICZ M , DZIEMBOWSKI S . Distributed cryptography based on the proofs of work[J]. IACR Cryptology ePrint Archive, 2014: 796. |
[9] | BONNEAU J , CLARK J , GOLDFEDER S . On Bitcoin as a public randomness source[J]. IACR Cryptology ePrint Archive, 2015: 1015. |
[10] | APOSTOLAKI M , ZOHAR A , VANBEVER L . Hijacking bitcoin:Routing attacks on cryptocurrencies[C]// Security and Privacy (SP). 2017: 375-392. |
[11] | BAQER K , HUANG D Y , MCCOY D ,et al. Stressing out:Bitcoin“stress testing”[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2016: 3-18. |
[12] | MILLER A , XIA Y , CROMAN K ,et al. The honey badger of BFT protocols[C]// The 2016 ACM SIGSAC Conference on Computer andCommunications Security. 2016: 31-42. |
[13] | LARIMER D . Delegated proof-of-stake (dpos)[R]. Bitshare whitepaper. 2014. |
[14] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance[C]// OSDI. 1999: 173-186. |
[15] | LAMPORT L . Paxos made simple[J]. ACM Sigact News, 2001,32(4): 18-25. |
[16] | Szabo N . Smart contracts:building blocks for digital markets[J]. EXTROPY:The Journal of Transhumanist Thought, 1996,(16). |
[17] | MCCORRY P , SHAHANDASHTI S F , HAO F . A smart contract for boardroom voting with maximum voter privacy[C]// International Conference on Financial Cryptography and Data Security. 2017: 357-375. |
[18] | LUU L , CHU D H , OLICKEL H ,et al. Making smart contracts smarter[C]// The 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016: 254-269. |
[19] | KOSBA A , MILLER A , SHI E ,et al. Hawk:The blockchain model of cryptography and privacy-preserving smart contracts[C]// ecurity and Privacy (SP). 2016: 839-858. |
[20] | DELMOLINO K , ARNETT M , KOSBA A ,et al. Step by step towards creating a safe smart contract:Lessons and insights from a cryptocurrency lab[C]// International Conference on Financial Cryptography and Data Security.Springer. 2016: 79-94. |
[21] | DLA P . Blockchain and the law:practical implications of a revolutionary technology for financial markets and beyond[R]. 2016. |
[22] | Accenture. Banking in a world of programmable assets[R]. 2016. |
[23] | ECB. Distributed ledger technologies in securities post-trading[R]. 2016. |
[24] | ECB . A brave new world? What impact will distributed ledger technology have on the financial industry?[J]. 2016. |
[25] | BRAINARD L . The use of distributed ledger technologies in payment,clearing,and settlement[J]. Speech, 2016. |
[26] | 杨东, 潘曌东 . 区块链带来金融与法律优化[J]. 中国金融, 2016(8): 25-26. |
YANG D , PAN Z D . Block chain bring financial and legal optimization[J]. China finance , 2016(8): 25-26. | |
[27] | DUNPHY P , PETITCOLAS F A P . A First Look at Identity Management Schemes on the Blockchain[C]// IEEE Security and Privacy Magazine special issue on Blockchain Security and Privacy. 2018. |
[28] | 吴健, 高力, 朱静宁 . 基于区块链技术的数字版权保护[J]. 广播电视信息, 2016(7): 60-62. |
WU J , GAO L , ZHU J N . Digital copyright protection based on block chain technology[J]. Radio and Television Information , 2016(7): 60-62. | |
[29] | 金义富 . 区块链+教育的需求分析与技术框架[J]. 中国电化教育, 2017(9): 62-68. |
JIN Y F . Block chain + education demand analysis and technical framework[J]. China Educational Technology , 2017(9): 62-68. | |
[30] | AITZHAN N Z , SVETINOVIC D . Security and privacy in decentralized energy trading through multi-signatures,blockchain and anonymous messaging streams[C]// Transactions on Dependable and Secure Computing. 2016. |
[31] | SIKORSKI J J , HAUGHTON J , KRAFT M . Blockchain technology in the chemical industry:Machine-to-machine electricity market[J]. Applied Energy, 2017,195: 234-246. |
[32] | 张宁, 王毅, 康重庆 ,等. 能源互联网中的区块链技术:研究框架与典型应用初探[J]. 中国电机工程学报, 2016,36(15): 4011-4022. |
ZHANG N , WANG Y , KANG C Q ,et al. Blockchain technique in the energy Internet:preliminary research framework and typical applications[J]. Proceedings of the CSEE. 2016,36(15): 4011-4022. | |
[33] | TIAN F , . An agri-food supply chain traceability system for China based on RFID &blockchain technology[C]// Service Systems and Service Management (ICSSSM). 2016: 1-6. |
[34] | KORPELA K , HALLIKAS J , DAHLBERG T . Digital supply chain transformation toward blockchain integration[C]// proceedings of the 50th Hawaii international conference on system sciences. 2017. |
[35] | KIM H M , LASKOWSKI M . Towards an Ontology-driven blockchain design for supply chain provenance[C]// Submitted:workshop on information technology and systems. 2016. |
[36] | HEILMAN E , BALDIMTSI F , GOLDBERG S . Blindly signed contracts:anonymous on-blockchain and off-blockchain bitcoin transactions[C]// International Conference on Financial Cryptography and Data Security. 2016: 43-60. |
[37] | ZYSKIND G , NATHAN O . Decentralizing privacy:using blockchain to protect personal data[C]// Security and Privacy Workshops (SPW). 2015: 180-184. |
[38] | 方滨兴 . 从“国家网络主权”谈基于国家联盟的自治根域名解析体系[J]. 信息安全与通信保密, 2014,12: 35-38. |
FANG B X . Country autonomous root domain name resolution architecture from the perfective of country cyber sovereignty[J]. Information Security and Communi-cation Privacy, 2014,12: 35-38. | |
[39] | 张宇, 夏重达, 方滨兴 ,等. 一个自主开放的互联网根域名解析体系[J]. 信息安全学报, 2017,2(4): 57-69. |
FANG B X , XIA C D , FANG B X . An autonomous open root resolution architecture for domain name system in the internet[J]. Journal of Cyber Security, 2017,2(4): 57-69. | |
[40] | 刘井强 . 基于私有根域名的 DNS 解析试验系统设计与实现[D]. 哈尔滨:哈尔滨工业大学, 2017. |
LIU J Q . Design and implementation of DNS resolution test system based on private root domain[D]. Harbin:Harbin Institute of Technology, 2017. | |
[41] | 朱国库, 蒋文保 . 一种去中心化的网络域名服务系统模型[J]. 网络空间安全, 2017,8(1): 14-18. |
ZHU G K , JIANG W B . A decentralized domain name system for the network[J]. Cyberspace Security, 2017,8(1): 14-18. | |
[42] | 蒋文保, 朱国库 . 一种安全可信的网络互联协议(STiP)模型研究[J]. 网络空间安全, 2017,8(1): 24-31. |
JIANG W B , ZHU G K . Research on the secure and trusted Internet protocol[J]. Cyberspace Security, 2017,8(1): 24-31. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[5] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[6] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[7] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[10] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[11] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[12] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[13] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[14] | Jiaren YU, Youliang TIAN, Hui LIN. Design of miner type identification mechanism based on reputation management model [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138. |
[15] | Zhensheng GAO, Lifeng CAO, Xuehui DU. Research progress of access control based on blockchain [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 68-87. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|