Chinese Journal on Internet of Things ›› 2022, Vol. 6 ›› Issue (4): 183-196.doi: 10.11959/j.issn.2096-3750.2022.00301
• Theory and Technology • Previous Articles
Chuannian SHEN
Revised:
2022-09-19
Online:
2022-12-30
Published:
2022-12-01
CLC Number:
Chuannian SHEN. Review on cross-chain technology research of blockchains[J]. Chinese Journal on Internet of Things, 2022, 6(4): 183-196.
"
模式 | 优点 | 缺点 |
托管模式 | 托管模式不需要对现有协议进行任何改造; | 单一托管模式存在过度中心化风险; |
联盟托管模式中公证人联盟的诚实度越高,系统的安全性越高 | 联盟托管模式中公证人联盟仍存在共谋风险 | |
SPV模式 | SPV模式在进行交易验证时,由于只验证区块头信息,无须验证 | 需要在兼容现有主链的情况下对协议进行改造; |
所有交易记录,可提高交易处理速度; | SPV 模式由于只保存了区块头信息,无法验证全部交易记 | |
通过将小额零散交易转移到侧链进行,一方面可以缓解主链的交 | 录,存在被恶意攻击的安全风险; | |
易负担,提高交易效率,另一方面可以有效保护主链上大额资产 | 需要对主链进行软分叉 | |
账户的地址; | ||
可扩展主链的功能,提供更多的跨链应用场景 | ||
驱动链模式 | 诚实矿工的参与数量越多,系统的安全性越高 | 需要在兼容现有主链的情况下对协议进行改造; |
需要对主链进行软分叉 | ||
混合模式 | 主链和侧链使用不同的模式,通过整合多种模式的优点,弥补了 | 需要在兼容现有主链的情况下对协议进行改造; |
单一模式的不足 | 需要对主链进行软分叉 |
"
跨链机制性能 | 公证人机制 | 侧链/中继 | 哈希锁定 | 分布式私钥控制 | 公证人+侧链混合机制 |
互操作性 | 所有 | 所有(所有链都须支持中继,否则只支持单向操作[ | 只支持交叉依赖 | 所有 | 所有 |
信任模型 | 多数公证人诚实 | 所有链不会失效 | 所有链不会失效 | 所有链不会失效 | 混合模式 |
是否可用于跨链交换 | 是 | 是 | 是 | 是 | 是 |
是否可用于跨链资产转移 | 是(需要公证人一直 | 是 | 否 | 是 | 是 |
受信任) | |||||
是否可用于跨链预言机 | 是 | 是 | 不能直接使用 | 是 | 是 |
是否可用于跨链资产抵押 | 是(需要公证人一直 | 是 | 大多数支持 | 是 | 是 |
受信任) | |||||
跨链实现难度 | 中 | 高 | 低 | 中 | 高 |
跨链交易效率 | 低 | 低 | 中 | 中 | 高 |
跨链安全性 | 低 | 低 | 中 | 中 | 高 |
代表项目 | Interledger Palletone | BTC Relay Cosmos | 闪电网络 | Wanchain Fusion | Ether Universe Sifchain |
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Decentralized Business Review, 2008:21260. |
[2] | ZHENG Z B , XIE S A , DAI H N ,et al. An overview of blockchain technology:architecture,consensus,and future trends[C]// Proceedings of 2017 IEEE International Congress on Big Data (BigData Congress). Piscataway:IEEE Press, 2017: 557-564. |
[3] | WANG H M , ZHENG Z B , XIE S A ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web and Grid Services, 2018,14(4): 352-375. |
[4] | YAGA D , MELL P , ROBY N ,et al. Blockchain technology overview[EB]. 2019. |
[5] | PILKINGTON M . Blockchain technology:principles and applications[M]// Research handbook on digital transformations. Edward Elgar Publishing, 2016. |
[6] | 邵奇峰, 金澈清, 张召 ,等. 区块链技术:架构及进展[J]. 计算机学报, 2018,41(5): 969-988. |
SHAO Q F , JIN C Q , ZHANG Z ,et al. Blockchain:architecture and research progress[J]. Chinese Journal of Computers, 2018,41(5): 969-988. | |
[7] | 贺海武, 延安, 陈泽华 . 基于区块链的智能合约技术与应用综述[J]. 计算机研究与发展, 2018,55(11): 2452-2466. |
HE H W , YAN A , CHEN Z H . Survey of smart contract technology and application based on blockchain[J]. Journal of Computer Research and Development, 2018,55(11): 2452-2466. | |
[8] | 袁勇, 倪晓春, 曾帅 ,等. 区块链共识算法的发展现状与展望[J]. 自动化学报, 2018,44(11): 2011-2022. |
YUAN Y , NI X C , ZENG S ,et al. Blockchain consensus algorithms:the state of the art and future trends[J]. Acta Automatica Sinica, 2018,44(11): 2011-2022. | |
[9] | 袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494. |
YUAN Y , WANG F Y . Blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2016,42(4): 481-494. | |
[10] | WOOD G . Ethereum:a secure decentralised generalised transaction ledger[J]. Ethereum Project Yellow Paper, 2014: 1-32. |
[11] | GUéGAN D . Public blockchain versus private blockhain[EB]. 2017. |
[12] | 吴振铨, 梁宇辉, 康嘉文 ,等. 基于联盟区块链的智能电网数据安全存储与共享系统[J]. 计算机应用, 2017,37(10): 2742-2747. |
WU Z Q , LIANG Y H , KANG J W ,et al. Secure data storage and sharing system based on consortium blockchain in smart grid[J]. Journal of Computer Applications, 2017,37(10): 2742-2747. | |
[13] | HAO Y , LI Y , DONG X H ,et al. Performance analysis of consensus algorithm in private blockchain[C]// Proceedings of 2018 IEEE Intelligent Vehicles Symposium. Piscataway:IEEE Press, 2018: 280-285. |
[14] | HOPE-BAILIE A , THOMAS S . Interledger:creating a standard for payments[C]// Proceedings of WWW '16 Companion:Proceedings of the 25th International Conference Companion on World Wide Web. 2016: 281-282. |
[15] | NOLAN T , . Alt chains and atomic transfers[C]// Bitcoin Forum. 2013. |
[16] | BACK A , CORALLO M , DASHJR L ,et al. Enabling blockchain innovations with pegged sidechains[EB]. 2014. |
[17] | POON J , DRYJA T . The bitcoin lightning network:scalable off-chain instant payments[J]. 2016. |
[18] | Hyperledger[EB]. 2019. |
[19] | DILLEY J , POELSTRA A , WILKINS J ,et al. Strong federations:an interoperable blockchain solution to centralized third-party risks[EB]. 2016. |
[20] | KWON J , BUCHMAN E . Cosmos whitepaper[EB]. 2020. |
[21] | WOOD G . Polkadot:vision for a heterogeneous multi-chain framework[EB]. 2017. |
[22] | 何帅, 黄襄念, 陈晓亮 . 区块链跨链技术发展及应用研究综述[J]. 西华大学学报(自然科学版), 2021,40(3): 1-14. |
HE S , HUANG X N , CHEN X L . The research summary of the development and application of blockchain cross-chain technology[J]. Journal of Xihua University (Natural Science Edition), 2021,40(3): 1-14. | |
[23] | 刘懿中, 刘建伟, 张宗洋 ,等. 区块链共识机制研究综述[J]. 密码学报, 2019,6(4): 395-432. |
LIU Y Z , LIU J W , ZHANG Z Y ,et al. Overview on blockchain consensus mechanisms[J]. Journal of Cryptologic Research, 2019,6(4): 395-432. | |
[24] | HERLIHY M , . Atomic cross-chain swaps[C]// PODC '18:Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing. 2018: 245-254. |
[25] | BUCHMAN E . Tendermint:Byzantine fault tolerance in the age of blockchains[EB]. 2016. |
[26] | TEUTSCH J , REITWIE?NER C , . A scalable verification solution for blockchains[J]. arXiv preprint arXiv:1908.04756, 2019. |
[27] | 路爱同, 赵阔, 杨晶莹 ,等. 区块链跨链技术研究[J]. 信息网络安全, 2019(8): 83-90. |
LU A T , ZHAO K , YANG J Y ,et al. Research on cross-chain technology of blockchain[J]. Netinfo Security, 2019(8): 83-90. | |
[28] | 章振海, 虞思城, 蒋云杰 ,等. 基于区块链交易验证的设备认证方法[J]. 信息安全研究, 2021,7(6): 550-557. |
ZHANG Z H , YU S C , JIANG Y J ,et al. Device authentication method based blockchain transaction verification[J]. Journal of Information Security Research, 2021,7(6): 550-557. | |
[29] | 李强, 颜浩, 陈克非 . 安全多方计算协议的研究与应用[J]. 计算机科学, 2003(8): 52-55. |
LI Q , YAN H , CHEN K F . Research and application of secure multi-party computation protocols[J]. Computer Science, 2003(8): 52-55. | |
[30] | PALLETONE. Protocol for abstract-level ledger ecosystem[EB]. 2020. |
[31] | 王劲松, 杨唯正, 赵泽宁 ,等. 基于有向无环图的区块链技术综述[J]. 计算机工程, 2022,48(6): 11-23. |
WANG J S , YANG W Z , ZHAO Z N ,et al. Survey of directed acyclic graph based blockchain technology[J]. Computer Engineering, 2022,48(6): 11-23. | |
[32] | 戴炳荣, 姜胜明, 李顿伟 ,等. 基于改进PageRank算法的跨链公证人机制评价模型[J]. 计算机工程, 2021,47(2): 26-31. |
DAI B R , JIANG S M , LI D W ,et al. Evaluation model of cross-chain notary mechanism based on improved page rank algorithm[J]. Computer Engineering, 2021,47(2): 26-31. | |
[33] | 蒋楚钰, 方李西, 章宁 ,等. 基于公证人组的跨链交互安全模型[EB]. 2022. |
JIANG C Y , FANG L X , ZHANG N ,et al. Cross-chain interaction safety model based on notary mechanism[EB]. 2022. | |
[34] | ASGAONKAR A , KRISHNAMACHARI B . Solving the buyer and seller's dilemma:a dual-deposit escrow smart contract for provably cheat-proof delivery and payment for a digital good without a trusted mediator[C]// Proceedings of 2019 IEEE International Conference on Blockchain and Cryptocurrency. Piscataway:IEEE Press, 2019: 262-267. |
[35] | 李尚公, 沈春晖 . 资产证券化的法律问题分析[J]. 法学研究, 2000,22(4): 19-30. |
LI S G , SHEN C H . Analysis on the legal issues of asset securitization[J]. Cass Journal of Law, 2000,22(4): 19-30. | |
[36] | 杨保华, 陈昌 . 区块链原理、设计与应用[M]. 2版.北京: 机械工业出版社, 2020. |
YANG B H , CHEN C . The principle,design and application of blockchain[M]. Beijing: China Machine Press, 2020. | |
[37] | FRIEDENBACH M . Compact spv proofs via block header commitments[J]. 2014. |
[38] | 陈伟利, 郑子彬 . 区块链数据分析:现状、趋势与挑战[J]. 计算机研究与发展, 2018,55(9): 1853-1870. |
CHEN W L , ZHENG Z B . Blockchain data analysis:a review of status,trends and challenges[J]. Journal of Computer Research and Devel-opment, 2018,55(9): 1853-1870. | |
[39] | ETHEREUM. Welcome to BTC relay’s documentation[EB]. 2020. |
[40] | KWON J . Tendermint:Consensus without mining[J]. Draft v.0.6,fall, 2014,1(11). |
[41] | 云闯 . 基于侧链技术的区块链可扩展性研究[D]. 天津:天津大学, 2018. |
YUN C . Research on blockchain scalability based on sidechain tech-nology[D]. Tianjin:Tianjin University, 2018. | |
[42] | 刘晶, 朱炳旭, 梁佳杭 ,等. 基于主侧链合作的区块链访问控制策略[J]. 计算机工程, 2022,48(3): 10-16,22. |
LIU J , ZHU B X , LIANG J H ,et al. Blockchain access control strate-gy based on mainchain and sidechain cooperation[J]. Computer Engi-neering, 2022,48(3): 10-16,22. | |
[43] | BEZ M , FORNARI G , VARDANEGA T . The scalability challenge of ethereum:an initial quantitative analysis[C]// Proceedings of 2019 IEEE International Conference on Service-Oriented System Engineering. Piscataway:IEEE Press, 2019: 167-176. |
[44] | 张诗童, 秦波, 郑海彬 . 基于哈希锁定的多方跨链协议研究[J]. 网络空间安全, 2018,9(11): 57-62,67. |
ZHANG S T , QIN B , ZHENG H B . Research on the protocol of mul-tiple cross-chains based on the hash lock[J]. Cyberspace Security, 2018,9(11): 57-62,67. | |
[45] | 李祖建 . 基于哈希时间锁定协议的区块链跨链算法研究与应用[D]. 郑州:郑州大学, 2020. |
LI Z J . Research and application of block chain cross chain algorithm based on hashed timelock protocol[D]. Zhengzhou:Zhengzhou Uni-versity, 2020. | |
[46] | 刘峰, 张嘉淏, 周俊杰 ,等. 基于改进哈希时间锁的区块链跨链资产交互协议[J]. 计算机科学, 2022,49(1): 336-344. |
LIU F , ZHANG J H , ZHOU J J ,et al. Novel hash-time-lock-contract based cross-chain token swap mechanism of blockchain[J]. Computer Science, 2022,49(1): 336-344. | |
[47] | GENNARO R , JARECKI S , KRAWCZYK H ,et al. Secure distributed key generation for discrete-log based cryptosystems[C]// International Conference on the Theory and Applications of Cryptographic Techniques. Heidelberg:Springer-Verlag, 1999: 295-310. |
[48] | SHAMIR A . How to share a secret[J]. Communications of the ACM, 1979,22(11): 612-613. |
[49] | BLAKLEY G R , . Safeguarding cryptographic keys[C]// Managing Requirements Knowledge,International Workshop on.IEEE Computer Society,[S.l.:s.n], 1979: 313-313. |
[50] | 刘桂华 . 基于公证人组的区块链跨链机制[D]. 重庆:重庆邮电大学, 2020. |
LIU G H . The cross-chain mechanism of blockchain based on notary group[D]. Chongqing:Chongqing University of Posts and Telecommunications, 2020. | |
[51] | 潘晨, 刘志强, 刘振 ,等. 区块链可扩展性研究:问题与方法[J]. 计算机研究与发展, 2018,55(10): 2099-2110. |
PAN C , LIU Z Q , LIU Z ,et al. Research on scalability of blockchain technology:problems and methods[J]. Journal of Computer Research and Development, 2018,55(10): 2099-2110. | |
[52] | 王兵, 李辉灵, 牛新征 . 基于综合选举的 DPoS 共识算法[J]. 计算机工程, 2022,48(6): 50-56. |
WANG B , LI H L , NIU X Z . DPoS consensus algorithm based on comprehensive election[J]. Computer Engineering, 2022,48(6): 50-56. | |
[53] | 孙国梓, 王纪涛, 谷宇 . 区块链技术安全威胁分析[J]. 南京邮电大学学报(自然科学版), 2019,39(5): 48-62. |
SUN G Z , WANG J T , GU Y . Security threat analysis of blockchain technology[J]. Journal of Nanjing University of Posts and Telecommunications (Natural Science Edition), 2019,39(5): 48-62. | |
[54] | 叶少杰, 汪小益, 徐才巢 ,等. BitXHub:基于侧链中继的异构区块链互操作平台[J]. 计算机科学, 2020,47(6): 294-302. |
YE S J , WANG X Y , XU C C ,et al. BitXHub side-relay chain based heterogeneous blockchain interoperable platform[J]. computer Science, 2020,47(6): 294-302. | |
[55] | 李芳, 李卓然, 赵赫 . 区块链跨链技术进展研究[J]. 软件学报, 2019,30(6): 1649-1660. |
LI F , LI Z R , ZHAO H . Research on the progress in cross-chain technology of blockchains[J]. Journal of Software, 2019,30(6): 1649-1660. | |
[56] | 斯雪明, 徐蜜雪, 苑超 . 区块链安全研究综述[J]. 密码学报, 2018,5(5): 458-469. |
SI X M , XU M X , YUAN C . Survey on security of blockchain[J]. Journal of Cryptologic Research, 2018,5(5): 458-469. | |
[57] | MOHURLE S , PATIL M . A brief study of wannacry threat:ransomware attack 2017[J]. International Journal of Advanced Research in Computer Science, 2017,8(5): 1938-1940. |
[58] | 蔡晓晴, 邓尧, 张亮 ,等. 区块链原理及其核心技术[J]. 计算机学报, 2021,44(1): 84-131. |
CAI X Q , DENG Y , ZHANG L ,et al. The principle and core technology of blockchain[J]. Chinese Journal of Computers, 2021,44(1): 84-131. | |
[59] | 胡旭骏 . 区块链技术在政务网络身份凭证中心的应用研究:以 XX市为例[D]. 昆明:云南财经大学, 2020. |
HU X J . Research on the application of block chain technology in government affairs network identity certificate center—A case study of XX city[D]. Kunming:Yunnan University of Finance and Economics, 2020. | |
[60] | 邸剑, 吝伟华 . 区块链中矿池选择策略的研究与分析[J]. 计算机应用研究, 2020,37(6): 1804-1807. |
DI J , LIN W H . Research and analysis of mining pool selection strategy in blockchain[J]. Application Research of Computers, 2020,37(6): 1804-1807. | |
[61] | 曾诗钦, 霍如, 黄韬 ,等. 区块链技术研究综述:原理、进展与应用[J]. 通信学报, 2020,41(1): 134-151. |
ZENG S Q , HUO R , HUANG T ,et al. Survey of blockchain:principle,progress and application[J]. Journal on Communications, 2020,41(1): 134-151. | |
[62] | ROSENFELD M . Analysis of hashrate-based double spending[EB]. 2014. |
[63] | 孙浩, 毛瀚宇, 张岩峰 ,等. 区块链跨链技术发展及应用[J]. 计算机科学, 2022,49(5): 287-295. |
SUN H , MAO H Y , ZHANG Y F ,et al. Development and application of blockchain cross-chain technology[J]. Computer Science, 2022,49(5): 287-295. | |
[64] | HEILMAN E , KENDLER A , ZOHAR A ,et al. Eclipse attacks on Bitcoin's peer-to-peer network[C]// USENIX Security Symposium,USENIX Association.[S.l.:s.n], 2015. |
[65] | MARCUS Y , HEILMAN E , GOLDBERG S . Low-resource eclipse attacks on ethereum's peer-to-peer network[J]. Cryptology ePrint Archive, 2018. |
[66] | DOUCEUR J R , . The sybil attack[C]// International workshop on peer-to-peer systems. Heidelberg:Springer-Verlag, 2002: 251-260. |
[67] | 张志威, 王国仁, 徐建良 ,等. 区块链的数据管理技术综述[J]. 软件学报, 2020,31(9): 2903-2925. |
ZHANG Z W , WANG G R , XU J L ,et al. Survey on data management in blockchain systems[J]. Journal of Software, 2020,31(9): 2903-2925. | |
[68] | 田国华, 胡云瀚, 陈晓峰 . 区块链系统攻击与防御技术研究进展[J]. 软件学报, 2021,32(5): 1495-1525. |
TIAN G H , HU Y H , CHEN X F . Research progress on attack and defense techniques in block-chain system[J]. Journal of Software, 2021,32(5): 1495-1525. | |
[69] | 韩璇, 刘亚敏 . 区块链技术中的共识机制研究[J]. 信息网络安全, 2017(9): 147-152. |
HAN X , LIU Y M . Research on the consensus mechanisms of blockchain technology[J]. Netinfo Security, 2017(9): 147-152. | |
[70] | GREEN M , MIERS I . Bolt:anonymous payment channels for decen tralized currencies[C]// Proceedings of CCS '17:Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2017: 473-489. |
[71] | SONNINO A , BANO S , AL-BASSAM M ,et al. Replay attacks and defenses against cross-shard consensus in sharded distributed ledgers[C]// Proceedings of 2020 IEEE European Symposium on Security and Privacy (EuroS&P). Piscataway:IEEE Press, 2020: 294-308. |
[72] | 姚前, 张大伟 . 区块链系统中身份管理技术研究综述[J]. 软件学报, 2021,32(7): 2260-2286. |
YAO Q , ZHANG D W . Survey on identity management in blockchain[J]. Journal of Software, 2021,32(7): 2260-2286. | |
[73] | 韩璇, 袁勇, 王飞跃 . 区块链安全问题:研究现状与展望[J]. 自动化学报, 2019,45(1): 206-225. |
HAN X , YUAN Y , WANG F Y . Security problems on blockchain:the state of the art and future trends[J]. Acta Automatica Sinica, 2019,45(1): 206-225. | |
[74] | 徐卓嫣, 周轩 . 跨链技术发展综述[J]. 计算机应用研究, 2021,38(2): 341-346. |
XU Z Y , ZHOU X . Survey on crosschain technology[J]. Application Research of Computers, 2021,38(2): 341-346. | |
[75] | 孟博, 王乙丙, 赵璨 ,等. 区块链跨链协议综述[EB]. 2022. |
MENG B , WANG Y B , ZHAO C ,et al. Survey on cross-chain protocols of blockchain[EB]. 2022. |
[1] | Weijin JIANG, Tiantian LUO, Ying YANG, En LI, Wenying ZHOU. Private data access control model based on block chain technology in the internet of things environment [J]. Chinese Journal on Internet of Things, 2022, 6(4): 169-182. |
[2] | Yangqun LI, Dengyin ZHANG. Research and application of Web of things resource management framework [J]. Chinese Journal on Internet of Things, 2022, 6(2): 50-64. |
[3] | Pengliu TAN, Lixuran WAN. A blockchain architecture with master-slave blockchain [J]. Chinese Journal on Internet of Things, 2021, 5(2): 116-124. |
[4] | Cai GUO, Xuran LI, Yanhua CHEN, Hongning DAI. Blockchain technology for Internet of things: an overview [J]. Chinese Journal on Internet of Things, 2021, 5(1): 72-89. |
[5] | Guanjie CHENG,Zhengjie HUANG,Shuiguang DENG. Data management based on blockchain and edge computing for Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(2): 1-9. |
[6] | Zhen GAO,Qimei CUI,Xuefei ZHANG,Xiaofei WANG. Discussions about application of blockchain in IoT systems [J]. Chinese Journal on Internet of Things, 2020, 4(2): 10-17. |
[7] | Sicheng HAN,Xiaorong ZHU,Xiuxian ZHANG. Optimized scalable Byzantine fault tolerance algorithm [J]. Chinese Journal on Internet of Things, 2020, 4(2): 18-25. |
[8] | Wei WANG,Zuguang LI,Qihui WU. Dynamic spectrum sharing access technology based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 26-34. |
[9] | Zhao GUO,Shuaiyin GUO,Shengli ZHANG,Lingyang SONG,Hui WANG. Analysis of cross-chain technology of blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 35-48. |
[10] | Meng LI,Chengxiang SI,Liehuang ZHU. Secure vehicular digital forensics system based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 49-57. |
[11] | Haojie HUANG,Xiaoxiao WU,Gangqiang LI. Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network [J]. Chinese Journal on Internet of Things, 2020, 4(2): 58-69. |
[12] | Chen TAN,Meijuan CHEN,Ebenezer ACKAH Amuah. Research on distributed identity authentication mechanism of IoT device based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 70-77. |
[13] | Shipeng CHEN,Bin CHEN,Mingjun DAI,Hui WANG. Blockchain-based IoT architecture [J]. Chinese Journal on Internet of Things, 2020, 4(2): 78-83. |
[14] | Yueyue DAI,Ke ZHANG,Yan ZHANG. Blockchain empowered 6G [J]. Chinese Journal on Internet of Things, 2020, 4(1): 111-120. |
[15] | Zonghui WANG,Shengli ZHANG,Shi JIN,Hui WANG. Survey on privacy preserving techniques for blockchain [J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|