【影响因子】10.801
【主题类别】
区块链应用-环境领域-
【Abstract】This study examines the relationship between the adoption of blockchain technology and environmental efficiency by using a sample of US firms over the 2015-2019 period. Our results indicate that the adoption of blockchain technology is positively and significantly associated with environmental efficiency, suggesting that blockchain improves environmental sustainability. In further analyses, we determine that the relationship between blockchain and environmental efficiency is more pronounced for firms in financial and technological industries than for those in other industries. Our findings are also robust to other methods that control for endogeneity, including difference in difference regressions and propensity score matching. Overall, we provide empirical evidence to incentivize business leaders and policymakers to adopt innovative technologies, such as blockchain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain technology; carbon emissions; environmental efficiency; environmental sustainability
【发表时间】
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1002/bse.3030
【影响因子】10.104
【主题类别】
区块链应用-司法领域-
【Abstract】Similar to the early days of the Internet, today, the effectiveness and applicability of legal regulations are being challenged by the advent of blockchain technology. Yet, unlike the Internet, which has evolved into an increasingly centralized system that was largely brought within the reach of the law, blockchain technology still resists regulation and is thus described by some as being "alegal", i.e., situated beyond the boundaries of existing legal orders and, therefore, challenging them. This article investigates whether blockchain technology can indeed be qualified as alegal and the extent to which such technology can be brought back within the boundaries of a legal order by means of targeted policies. First, the article explores the features of blockchain-based systems, which make them hard to regulate, mainly due to their approach to disintermediation. Second, drawing from the notion of alegality in legal philosophy, the article analyzes how blockchain technology enables acts that transgress the temporal, spatial, material, and subjective boundaries of the law, thereby introducing the notion of "alegality by design"-as the design of a technological artifact can provide affordances for alegality. Third, the article discusses how the law could respond to the alegality of blockchain technology through innovative policies encouraging the use of regulatory sandboxes to test for the "functional equivalence" and "regulatory equivalence" of the practices and processes implemented by blockchain initiatives.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】decentralized autonomous organizations; alegality; legal theory; blockchain governance; regulatory sandbox
【发表时间】
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1093/polsoc/puac006
【Author】 Dimitropoulos, Georgios
【影响因子】10.104
【主题类别】
区块链应用-司法领域-
【Abstract】Blockchain is a new general-purpose technology that poses significant challenges to policymaking, law, and society. Blockchain is even more distinctive than other transformative technologies, as it is by nature a global technology; moreover, it operates based on a set of rules and principles that have a law-like quality-the lex cryptographia. The global nature of blockchain has led to its adoption by international organizations such as the United Nations and the World Bank. However, the law-like nature of the technology makes some of its uses by international organizations questionable from an international law and foreign affairs perspective. In this light, the article examines the effectiveness and legitimacy of the use of blockchain for international policymaking.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; effectiveness; international organizations; legitimacy; lex cryptographia
【发表时间】
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1093/polsoc/puab021
【影响因子】7.578
【主题类别】
区块链应用-文化领域-
【Abstract】The paper investigates the application of blockchain technologies to cultural heritage organizations, with a focus on museums, and outlines the advantages and limits of such technologies applied to the loan of cultural objects. To this aim, the paper employs the qualitative methodology of case study and presents two cases concerning the development of blockchain-based tracking systems and blockchain-based smart contracts, and their application to museums for the management of the loan of cultural objects. The application of blockchain technologies facilitates the circulation of cultural items, with benefits for the overall cultural offer, the attractiveness of museums, and, possibly, the consequent tourist flows. Moreover, it is argued that the use of blockchain-based tracking systems and smart contracts for the management of loans of cultural objects between organizations allows to overcome some organizational issues and to reduce transaction costs. Limits of the blockchain technologies for museums and managerial implications are also discussed.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; blockchain-based smart contracts; museums; cultural heritage organizations; case study
【发表时间】
【收录时间】2022-03-30
【文献类型】 期刊
【Author】 Li, Shan Iqbal, Muddesar Saxena, Neetesh
【影响因子】5.261
【主题类别】
区块链应用-物联网-
【Abstract】The emerging techniques, such as the fifth-generation communications (5G), Internet of Things (IoT), blockchain, artificial intelligence, etc., are operating in unison will drive the transformation of global business forward. The 5G technology is expected to unleash a massive IoT ecosystems by providing massive connectivity for huge number of IoT devices with faster data rate, ultra-low latency, and low-cost access. The 5G networks will be designed to bring the level of performance needed for massive IoT and will enable a perceived fully ubiquitous connected world. Meanwhile, the blockchain being promoted as the fundamental for new business model in Future IoT (FIoT). This paper attempts to provide a set of new directions and ideas for research in 5G/6G enabled IoT and new technique trends in IoT. The current IoT are facing a number of challenges, such as massive IoT devices access, network performances, security, standardization, and critical applications. This paper investigates new technologies, such as 5G, zero-trust, and blockchain will catalyse the innovation in IoT. Specifically, a zero-trust security architecture for FIoT is proposed and a blockchain-based device authentication in IoT environment (BasIoT) is proposed that can provide massive secure device access in FIoT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Privacy preserving; Internet of things (IoT); Industrial 4.0; Data anonymisation
【发表时间】
【收录时间】2022-03-30
【文献类型】 期刊
【影响因子】3.889
【主题类别】
区块链治理--
【Abstract】Blockchain technology has the potential to drive innovations across various industries, businesses, and use cases. It is broadly recognized that innovation is a vital source of competitive advantage in a rapidly changing environment. High expectations surround blockchain's potential for contributing to sustainable economic and social development. However, current blockchain projects still show high failure rates. The associated side effects of such failure rates generate a negative impact on economic and social sustainability performances such as corporate governance, risk management, finance management, human resources and culture management, and competitiveness. This paper assesses adoption models and their risk and success factors. Building on a novel, integrated adoption model to operationalize, measure and manage blockchain-driven business innovation in a sustainable way, we assessed its applicability with an empirical study across 20 industry sectors and 125 business leaders. The results reveal that the developed adoption model holds the potential to support the sustainable usage of blockchain technology for business innovations, not limited to a specific industry or use case. Further case studies and industry activities can be carried out to continue its validation in future works.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; sustainable blockchain; blockchain adoption; technology adoption; blockchain innovation; business innovation; sustainable operations; requirements engineering
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.3390/su14052873
【影响因子】3.847
【主题类别】
区块链技术-密码学-
【Abstract】This paper proposes a blockchain-based node authentication model for the Internet of sensor things (IoST). The nodes in the network are authenticated based on their credentials to make the network free from malicious nodes. In IoST, sensor nodes gather the information from the environment and send it to the cluster heads (CHs) for additional processing. CHs aggregate the sensed information. Therefore, their energy rapidly depletes due to extra workload. To solve this issue, we proposed distance, degree, and residual energy-based low-energy adaptive clustering hierarchy (DDR-LEACH) protocol. DDR-LEACH is used to replace CHs with the ordinary nodes based on maximum residual energy, degree, and minimum distance from BS. Furthermore, storing a huge amount of data in the blockchain is very costly. To tackle this issue, an external data storage, named as interplanetary file system (IPFS), is used. Furthermore, for ensuring data security in IPFS, AES 128-bit is used, which performs better than the existing encryption schemes. Moreover, a huge computational cost is required using a proof of work consensus mechanism to validate transactions. To solve this issue, proof of authority (PoA) consensus mechanism is used in the proposed model. The simulation results are carried out, which show the efficiency and effectiveness of the proposed system model. The DDR-LEACH is compared with LEACH and the simulation results show that DDR-LEACH outperforms LEACH in terms of energy consumption, throughput, and improvement in network lifetime with CH selection mechanism. Moreover, transaction cost is computed, which is reduced by PoA during data storage on IPFS and service provisioning. Furthermore, the time is calculated in the comparison of AES 128-bit scheme with existing scheme. The formal security analysis is performed to check the effectiveness of smart contract against attacks. Additionally, two different attacks, MITM and Sybil, are induced in our system to show our system model's resilience against cyber attacks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; clustering; authentication; malicious node detection; LEACH protocol; service provisioning; interplanetary file system; security
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.3390/s22051972
【Author】 Huang, Jing Zhou, Kuo Xiong, Ao Li, Dongmeng
【影响因子】3.847
【主题类别】
区块链治理-技术治理-智能合约漏洞检测
【Abstract】The key issue in the field of smart contract security is efficient and rapid vulnerability detection in smart contracts. Most of the existing detection methods can only detect the presence of vulnerabilities in the contract and can hardly identify their type. Furthermore, they have poor scalability. To resolve these issues, in this study, we developed a smart contract vulnerability detection model based on multi-task learning. By setting auxiliary tasks to learn more directional vulnerability features, the detection capability of the model was improved to realize the detection and recognition of vulnerabilities. The model is based on a hard-sharing design, which consists of two parts. First, the bottom sharing layer is mainly used to learn the semantic information of the input contract. The text representation is first transformed into a new vector by word and positional embedding, and then the neural network, based on an attention mechanism, is used to learn and extract the feature vector of the contract. Second, the task-specific layer is mainly employed to realize the functions of each task. A classical convolutional neural network was used to construct a classification model for each task that learns and extracts features from the shared layer for training to achieve their respective task objectives. The experimental results show that the model can better identify the types of vulnerabilities after adding the auxiliary vulnerability detection task. This model realizes the detection of vulnerabilities and recognizes three types of vulnerabilities. The multi-task model was observed to perform better and is less expensive than a single-task model in terms of time, computation, and storage.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】smart contract; security; vulnerability detection; multi-task learning
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 实证数据
【DOI】 10.3390/s22051829
【Author】 Kus, Merve Can Levi, Albert
【影响因子】3.476
【主题类别】
区块链技术-隐私保护-
【Abstract】Bitcoin is one of the best-known cryptocurrencies, which captivated researchers with its innovative blockchain structure. Examinations of this public blockchain resulted in many proposals for improvement in terms of anonymity and privacy. Generally used methods for improvement include mixing protocols, ring signatures, zero-knowledge proofs, homomorphic commitments, and off-chain storage systems. To the best of our knowledge, in the literature, there is no study examining Bitcoin in terms of differential privacy, which is a privacy notion coming up with some mechanisms that enable running useful statistical queries without identifying any personal information. In this paper, we provide a theoretical examination of differential privacy in Bitcoin. Our motivation arises from the idea that the Bitcoin public blockchain structure can benefit from differential privacy mechanisms for improved privacy, both making anonymization and privacy breaches by direct queries impossible, and preserving the checkability of the integrity of the blockchain. We first examine the current Bitcoin implementation for four query functions using the differential privacy formulation. Then, we present the feasibility of the utilization of two differential privacy mechanisms in Bitcoin; the noise addition to the transaction amounts and the user graph perturbation. We show that these mechanisms decrease the fraction of the cases violating differential privacy, therefore they can be used for improving anonymity and privacy in Bitcoin. Moreover, we showcase the noise addition to transaction amounts by using IBM Differential Privacy Library. We compare four differential privacy mechanisms for varying privacy parameter values and determine the feasible mechanisms and the parameters.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Differential privacy; Bitcoin; Privacy; Blockchains; Libraries; Perturbation methods; Noise measurement; Anonymity; bitcoin; blockchain; cryptocurrency; differential privacy; graph perturbation; noise addition; privacy
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【Author】 Kim, Semin Mun, Hyung-Jin Hong, Sunghyuck
【影响因子】2.838
【主题类别】
区块链应用-网络安全-
【Abstract】Background: Information and communication technology development provides services to various fields. In particular, the development of mobile technology has made ubiquitous services possible. However, as technology advances, security is being emphasized more and more. The existing method of user authentication by entering an ID and password is likely to leak sensitive information if the server is attacked or keylogged. Therefore, multi-level authentication is needed to prevent server attacks or keylogging. Methods: Biometric authentication technology has been utilized by smartphones, but it is challenging to apply in the case of a lost device because the central server does not manage biometric data. Encrypting transactions through blockchain technology makes data management more secure because blockchain technology is distributed, and there is no primary target for hackers. Results: The method proposed in this study can become a basis for an authentication method that guarantees both security and integrity due to the synergetic use of biometric and blockchain technologies. Conclusions: The information stored in the service provider does not include sensitive information such as the user's biometric data but is only a means of verifying the user's information in the blockchain transaction with guaranteed anonymity. Therefore, users can receive services with confidence and safety.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】decentralized identity; multi-authentication; blockchain; random select authentication
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.3390/app12052301
【Author】 Ahsan, Talha Khan, Farrukh Zeeshan Iqbal, Zeshan Ahmed, Muneer Alroobaea, Roobaea Baqasah, Abdullah M. Ali, Ihsan Raza, Muhammad Ahsan
CCF-C
【影响因子】2.146
【主题类别】
区块链应用-物联网-
【Abstract】Advancement in technology has led to innovation in equipment, and the number of devices is increasing every day. Industries are introducing new devices every day and predicting 50 billion connected devices by 2022. These devices are deployed through the Internet, called the Internet of Things (IoT). Applications of IoT devices are weather prediction, monitoring surgery in hospitals, identification of animals using biochips, providing tracking connectivity in automobiles, smart home appliances, etc. IoT devices have limitations related to security at both the software and hardware ends. Secure user interfaces can overcome software-level limitations like front-end-user interfaces are accessed easily through public and private networks. The front-end interfaces are connected to the localized storage to contain data produced by the IoT devices. Localized storage deployed in a closed environment connected to IoT devices is more efficient than online servers from a security perspective. Blockchain has emerged as a technology or technique with capabilities to achieve secure administrational authentication and accessibility to IoT devices and their computationally produced data in a decentralized way with high reliability, interrogation, and resilience. In this paper, we propose device, end-user, and transactional authentication techniques using blockchain-embedded algorithms. The localized server interacts with the user interface to authenticate IoT devices, end-users, and their access to IoT devices. The localized server provides efficiency by reducing the load on the IoT devices by carrying out end-user heavy computational data, including end-user, IoT device authentication, and communicational transactions. Authentication data are placed on the public ledger in block form, distributed over the system nodes through blockchain algorithms.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1155/2022/8570064
【Author】 Ren, Yan Guan, Haipeng Zhao, Qiuxia Yi, Zongxiang
CCF-C
【影响因子】1.968
【主题类别】
区块链技术-数据安全存储-
【Abstract】In the internet of things, user information is usually collected by all kinds of smart devices. The collected user information is stored in the cloud storage, and there is a risk of information leakage. In order to protect the security and the privacy of user information, the user and cloud provider will periodically execute a protocol called proof of retrievability scheme. A proof of retrievability scheme ensures the security of the data by generating proof to convince the user that the cloud provider does correctly store the user information. In this paper, we construct a proof of retrievability scheme using the blockchain technology. Using the advantage that the stored data cannot be tampered with in blockchain, this ensures the integrity of the data. Specifically, some related definitions, security models, and a blockchain-based construction of a proof of retrievability scheme are given. Then the validity and security of the scheme are proved later. As a result, user information can be protected by our scheme.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1155/2022/3186112
【Author】 Zou, Huiying Liu, Xiaofan Ren, Wei Zhu, Tianqing
CCF-C
【影响因子】1.968
【主题类别】
区块链技术-密码学-
【Abstract】The electronic reporting system can alleviate the problems in terms of efficiency, content confidentiality, and reporter privacy imposed in the traditional reporting system. Relying on anonymity, the privacy of reporters can be protected, but the authentication of reporters with fake names should also be maintained. If authenticated anonymity is guaranteed, the reporters may still conduct misbehaviors such as submitting fake reports after the authentication. To address the above dilemma, we propose to apply a proxy signature to achieve authenticated anonymity and employ blockchain to maintain anonymity yet guarantee traceability for reporters' misbehaviors. We also propose a new proxy signature scheme in this paper by module lattice for postquantum security. The extensive analysis justified our proposed scheme is secure and manageable.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1155/2022/5424395
【Author】 Li, Weizhou Lin, Zhiqiang Chen, Qi
CCF-C
【影响因子】1.968
【主题类别】
区块链技术-隐私保护-
【Abstract】Blockchain is a transformational technology which affects finance, Internet, and politics. However, many privacy protection problems for blockchain are waiting to be solved. In this study, we propose a novel linkable ring signature scheme with stealth addresses, which enables the payer and payee of the transaction to be anonymous and unlinkable in the cryptocurrency. The scheme is combined with an elliptic curve discrete logarithm (ECD logarithm)-based key encapsulation mechanism (KEM) stage and a lattice-based signature stage. The master public key and master secret key are much smaller compared with the previous scheme. Complete secure proof of the scheme is also presented in this study.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.1155/2022/1417607
【Author】 Liu, Qiang Song, Baoyan Wang, Junlu
【影响因子】1.938
【主题类别】
区块链技术-分布式存储-
【Abstract】The blockchain runs in a complex topological network which is affected by the principle of consensus, and data storage between nodes needs to maintain global consistency in the entire network, which causes the data storage inefficient. At the same time, the information exchange between large-scale communication node groups leads to the problems of bandwidth expropriation and excessive network load. In response to these problems, this article proposes a second-degree branch structure blockchain expansion model. First, a ternary storage structure is established. Data use the way of fully integrated storage, multi-cell storage, and fully split storage, and data are classified and stored in parallel between the structures. Second, a second-degree branch chain model is constructed. The main chain forks into multiple sub-chains, and a free competition chain structure and a Z-type chain structure are defined; a two-way rotation mechanism is introduced to realize the integration and transition between chain structures. Finally, a set of malicious attacks is simulated to realize the security constraints of the blockchain, to verify the security of the second-degree branch chain model. Experiment shows that the second-degree branch structure expansion model proposed in this article has great advantages in data storage efficiency and network load.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain expansion; two-degree branch chain; ternary storage structure; two-way rotation mechanism; security constraints
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【Author】 Aldughayfiq, Bader Sampalli, Srinivas
【影响因子】0.000
【主题类别】
区块链应用-医疗领域-
【Abstract】Objective To evaluate the attitudes of the parties involved in the system toward the new features and measure the potential benefits of introducing the use of blockchain and machine learning (ML) to strengthen the in-place methods for safely prescribing medication. The proposed blockchain will strengthen the security and privacy of the patient's prescription information shared in the network. Once the ePrescription is submitted, it is only available in read-only mode. This will ensure there is no alteration to the ePrescription information after submission. In addition, the blockchain will provide an improved tracking mechanism to ensure the originality of the ePrescription and that a prescriber can only submit an ePrescription with the patient's authorization. Lastly, before submitting an ePrescription, an ML algorithm will be used to detect any anomalies (eg, missing fields, misplaced information, or wrong dosage) in the ePrescription to ensure the safety of the prescribed medication for the patient. Methods The survey contains questions about the features introduced in the proposed ePrescription system to evaluate the security, privacy, reliability, and availability of the ePrescription information in the system. The study population is comprised of 284 respondents in the patient group, 39 respondents in the pharmacist group, and 27 respondents in the prescriber group, all of whom met the inclusion criteria. The response rate was 80% (226/284) in the patient group, 87% (34/39) in the pharmacist group, and 96% (26/27) in the prescriber group. Key Findings The vast majority of the respondents in all groups had a positive attitude toward the proposed ePrescription system's security and privacy using blockchain technology, with 72% (163/226) in the patient group, 70.5% (24/34) in the pharmacist group, and 73% (19/26) in the prescriber group. Moreover, the majority of the respondents in the pharmacist (70%, 24/34) and prescriber (85%, 22/26) groups had a positive attitude toward using ML algorithms to generate alerts regarding prescribed medication to enhance the safety of medication prescribing and prevent medication errors. Conclusion Our survey showed that a vast majority of respondents in all groups had positive attitudes toward using blockchain and ML algorithms to safely prescribe medications. However, a need for minor improvements regarding the proposed features was identified, and a post-implementation user study is needed to evaluate the proposed ePrescription system in depth.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】community pharmacy; electronic prescribing; health informatics; information technology; blockchain; prescriptions; machine learning
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【Author】 Riposo, Julien
【影响因子】0.000
【主题类别】
区块链技术--
【Abstract】In a peer-to-peer complex environment, information is permanently diffused. Such an environment can be modeled as a graph, where there are flows of information. The interest of such modeling is that (1) one can describe the exchanges through time from an initial state of the network, (2) the description can be used through the fit of a real-world case and to perform further forecasts, and (3) it can be used to trace information through time. In this paper, we review the methodology for describing diffusion processes on a network in the context of exchange of information in a crypto (Bitcoin) peer-to-peer network. Necessary definitions are posed, and the diffusion equation is derived by considering two different types of Laplacian operators. Equilibrium conditions are discussed, and analytical solutions are derived, particularly in the context of a directed graph, which constitutes the main innovation of this paper. Further innovations follow as the inclusion of boundary conditions, as well as the implementation of delay in the diffusion equation, followed by a discussion when doing approximations useful for the implementation. Numerous numerical simulations additionally illustrate the theory developed all along the paper. Specifically, we validated, through simple examples, the derived analytic solutions, and implemented them in more sophisticated graphs, e.g., the ring graph, particularly important in crypto peer-to-peer networks. As a conclusion for this article, we further developed a theory useful for fitting purposes in order to gain more information on its diffusivity, and through a modeling which the scientific community is aware of.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; bitcoin; peer-to-peer; diffusion theory; matrix theory; graph theory; partial differential equations
【发表时间】2022
【收录时间】2022-03-30
【文献类型】 期刊
【DOI】 10.3390/jrfm15020047