• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年09月18日 20篇

文献来源

  • 17
  • 3

主题分类

      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 3
      • 1
      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1

文献类型

  • 8
  • 4
  • 7
  • 1
筛选
订阅
<< 前一天 后一天 >>

BLOCKCHAIN-BASED LIGHTWEIGHT AUTHENTICATION FOR RESILIENT UAV COMMUNICATIONS: ARCHITECTURE, SCHEME, AND FUTURE DIRECTIONS

【Author】 Tan, Yawen Liu, Jiajia Kato, Nei

【影响因子】12.777

【主题类别】

区块链应用-实体经济-无人机领域

【Abstract】Representing a new stage in the industrial value chain, Industry 4.0 paves the way to the future ecosystems of industrial innovation, where cyber-physical systems (e.g., smart machines) form its basis by bridging the physical and digital worlds. As one of the most popular groups in intelligent devices, unmanned aerial vehicles (UAVs) have shown great potential for facilitating various industrial sectors. With research on new applications flourishing, the accompanying communication security issue between UAVs is also of concern because of the vital role of communication in enabling the reliable performance of UAV networks. Authentication is recognized as the first defense line for guaranteeing communication security, but traditional authentication schemes are either highly dependent on the central authority or too costly for UAV networks, making them less feasible in practical applications. In this article, we propose a novel authentication scheme for UAV networks using blockchain technology, where blockchain edge nodes are introduced to maintain the ledger, while drones can just be clients to use the distributed blockchain services by calling smart contract APIs. Experimental results illustrate its efficiency, and future research directions are also summarized to guide explorations for realizing more general authentication systems for UAV-assisted industrial applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.1109/MWC.002.2100594

TOWARD A FAILURES MODEL FOR COMMUNICATION OF DECENTRALIZED APPLICATIONS WITH BLOCKCHAIN NETWORKS APPLIED IN THE INDUSTRIAL ENVIRONMENT

【Author】 Batista Garrocho, Charles Tim Oliveira, Karine Nogueira dos Santos, Aldri Luiz Marcelo da Cunha Cavalcanti, Carlos Frederico Rabelo Oliveira, Ricardo Augusto

【影响因子】12.777

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】Consensus algorithms seek to solve communication failures between nodes in a blockchain network. However, the communication failures that involve decentralized applications running on Industrial Internet of Things devices have not yet been addressed. Thus, this work aims to fill this research gap, presenting a failure model for communication between decentralized applications and the blockchain network. Initially, the failures are defined and classified; then countermeasures are presented to circumvent the failures; and at the end, the impact of the countermeasures on the performance of decentralized applications, smart contract, and the blockchain network is evaluated. Therefore, this work provides an analysis of the effects of failures and assists in the design of blockchain applications capable of tolerating certain failures and continuing to function.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.1109/MWC.001.2100572

DELIA: Distributed Efficient Log Integrity Audit Based on Hierarchal Multi-Party State Channel

【Author】 Chen, Jing Chen, Xin He, Kun Du, Ruiying Chen, Weihang Xiang, Yang

CCF-A

【影响因子】6.791

【主题类别】

区块链应用-实体经济-网安领域

【Abstract】Audit log contains the trace of different activities in computing systems, which makes it critical for security management, censorship, and forensics. However, experienced attackers may delete or modify the audit log after their attacks, which makes the audit log unavailable in attack investigation. In this article, we focus on the log integrity audit in the same domain, in which a number of servers update audit logs for a single or several organizations as an alliance. We propose a distributed efficient log integrity audit framework, called DELIA, which employs the distributed ledger technique to protect audit information, and utilizes the idea of state channel to improve the throughput of distributed ledger. To generate stable state from the rapidly-updated logs in the domain, we propose a log state generation scheme, which not only generates state suitable for audit logs, but also enables mutual supervision within the domain. To overcome the high latency in existing state channel schemes, we propose a hierarchal multi-party state channel scheme, which makes the latency in our framework independent of the number of servers in the domain. We implement DELIA on Ethereum and evaluate its performance. The results show that our framework is efficient and secure in practice.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Servers; Distributed ledger; Data structures; Gold; Forensics; Organizations; Intrusion detection; Audit log; integrity; blockchain; state channel

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实证数据

【DOI】 10.1109/TDSC.2021.3092365

Enabling Secure and Efficient Decentralized Storage Auditing With Blockchain

【Author】 Du, Yuefeng Duan, Huayi Zhou, Anxin Wang, Cong Au, Man Ho Wang, Qian

CCF-A

【影响因子】6.791

【主题类别】

区块链技术-核心技术-分布式存储

【Abstract】As a promising alternative solution to cloud storage, decentralized storage networks (DSN) are widely anticipated to develop continuously and reshape the storage market share in the foreseeable future. In particular, one of the most important research problems is how to enforce the quality of service (QoS) in the context of storage solutions. Despite plenty of auditing-related works in the context of cloud storage, none of them can be directly applied to the decentralized storage paradigm. The challenges of designing a feasible storage auditing framework emanate from two aspects: 1) security problems unique to the decentralized settings and 2) performance overhead due to on-chain operations. In this article, we first put forward a basic storage auditing framework that satisfies the security and efficiency requirements, and outperforms the existing approaches. We also identify a critical and overlooked security problem that would compromise the integrity of storage auditing solutions in the blockchain paradigm. With our refined storage auditing design based on customized zero knowledge protocols, we propose a convenient mitigation solution in our revised security model. The evaluation results confirm that our solution would only incur a 10-15 percent increase in the overall auditing costs for common usage scenarios, compared to the basic design.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Blockchain; Cloud computing; Ecosystems; Urban areas; Surges; Secure storage; Decentralized storage; public auditability; blockchain-enabled auditing; smart contract; lightweight verification; zero knowledge; storage outsourceability

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.1109/TDSC.2021.3081826

A Parking Sharing Network Over Blockchain With Proof-of-Planned-Behavior Consensus Protocol

【Author】 Lin, Feilong Xia, Shengnan Qi, Jiahao Tang, Changbing Zheng, Zhonglong Yu, Xinghuo

【影响因子】6.239

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Parking problem has become a bottle neck of urban traffic management. On one hand, there is no effective way to get timely information of available parking lots. On the other hand, owners of private parking spaces are less willing to share their spare lots. To deal with the parking problem, a new parking sharing network named ParkChain is firstly proposed using blockchain to build a decentralized but trustworthy network. Herein, ParkChain provides a distributed autonomous infrastructure for both vehicle drivers and park granters, which can promote the extensive parking resource sharing and relieve the parking problem. A new blockchain consensus protocol named Proof-of-Planned-Behavior (PoPB) is proposed. It builds the model of the autonomous consensus process based on the theory of planned behavior (TPB), derives a computable threshold for qualification of block data authorizers, and then develops a dynamic authorizer group mechanism for creditability and decentrality considerations. Furthermore, various smart contracts are developed to carry out the parking services transparently. Finally, the prototype has been successfully implemented in a university campus setting to demonstrate the effectiveness of ParkChain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart contracts; Consensus protocol; Resource management; Peer-to-peer computing; Computer architecture; Industries; Vehicle dynamics; Blockchain; parking sharing network; PoPB consensus protocol; smart contract

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.1109/TVT.2022.3173989

A General Quantitative Analysis Framework for Attacks in Blockchain

【Author】 Ruan, Na Sun, Hanyi Lou, Zenan Li, Jie

【影响因子】3.796

【主题类别】

区块链治理-技术治理-区块链安全

【Abstract】Decentralized cryptocurrency systems have become primary targets for attackers due to substantial profit gain and economic rewards. A number of attack models have been proposed during last few years. However, the evaluation and comparison of those attack models remain problematic due to the lack of systematic framework to analyze them. In this work, we propose a general quantitative analysis framework for attack models in the network and consensus layer of blockchain. We identify the problem statement and evolution process. And we show how to apply our general framework in previous attacks such as selfish mining and bribery attack. We also explained that the framework is suitable for other attacks in blockchain. For further exploration, we simulate the success rate and benefits of different attacks through experiments. We provide several defensive strategies, and study how these strategies against previous attack models.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Bitcoin; Biological system modeling; Statistical analysis; Computational modeling; IEEE transactions; Analytical models; Blockchain; quantified framework; selfish mining; bribery attack; mechanism design

【发表时间】

【收录时间】2022-09-18

【文献类型】 实证数据

【DOI】 10.1109/TNET.2022.3201493

Multiscale complexity fluctuation behaviours of stochastic interacting cryptocurrency price model

【Author】 Zheng, Zhiyong Lu, Yunfan Zhang, Junhuan

【影响因子】3.778

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】The price dynamics of the emerging cryptocurrency market become an important factor affecting the current global investment market. To investigate its microscopic nonlinear dynamics mechanism, we develop a novel financial agent-based price model by combining the stochastic interacting system and two opposite directions of random jump processes, in which the attribute interactions between particles in the interacting system are utilized to imitate the influence of information transmission on investor's investment attitude in the cryptocurrency market. Return series of the model, generated by Monte Carlo simulations, can reproduce a number of "stylized facts" of real cryptocurrency data. Additionally, we apply the composite multiscale fuzzy entropy algorithm and the matching energy method to detecting the complexity of price volatility behaviours in both actual and simulated cryptocurrency markets. The similarity of empirical results indicates that the proposed model can replicate the properties of price volatility in actual cryptocurrency market to some extent. (C) 2022 Elsevier B.V. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency market; Complexity analysis; Agent-based models; Econophysics; Stochastic interacting system; Price volatility

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.1016/j.physa.2022.126939

ReliefChain: A blockchain leveraged post disaster relief allocation system over smartphone-based DTN

【Author】 Das, Nabanita Basu, Souvik Das Bit, Sipra

CCF-C

【影响因子】3.488

【主题类别】

区块链应用-实体经济-应急领域

【Abstract】One of the major concerns in any emergency relief operation is appropriate allocation of scarce emergency relief materials to the affected community. Due to several reasons ranging from lack of mechanism to accurately assess demand and utility of relief materials to malicious participation of some of the stakeholders, such allocation may become ad-hoc. Thus, it becomes imperative to have an unchallengeable and globally accessible record of relief requirement vis-a-vis allocation for efficient relief management. Emergency response organizations (e.g. UNICEF) have recommended the adoption of blockchain technology to create such immutable records. However, the usage of blockchain is restricted by the availability of end-to-end internet connection which may not be available in a post-disaster scenario. This paper proposes ReliefChain, a blockchain leveraged post disaster relief allocation system over delay tolerant network that works in such environments. We validate relief requirements to mitigate resource diversion, forecasting the exact demand and enumerating precise utilities of relief items. We design smart contracts for creating new transactions to upload relief requirements and allocations in the blockchain network. The proposed system executes these smart contracts to create an immutable and globally accessible record of relief requirement and allocation. Effectiveness of the proposed system is evaluated through extensive simulation in Ethereum platform. Results substantiate the efficiency of the system over a system using baseline methodologies, in terms of design parameters like shelter specific deficit and average resource deficit while not compromising the blockchain performance in terms of processing time and gas consumption even in presence of malicious forwarders.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Delay-tolerant network (DTN); Ethereum; Post Disaster Relief Allocation; Smart Contracts

【发表时间】

【收录时间】2022-09-18

【文献类型】 实验仿真

【DOI】 10.1007/s12083-022-01366-9

Do-It-Yourself Recommender System: Reusing and Recycling With Blockchain and Deep Learning

【Author】 Pandey, Sachi Chouhan, Vikas Verma, Devanshi Rajrah, Shubham Alenezi, Fayadh Saini, Rajkumar Santosh, K. C.

【影响因子】3.476

【主题类别】

区块链应用-实体经济-环境领域

【Abstract】Due to aggressive urbanization (with population size), waste increases exponentially, resulting in environmental damage. Even though it looks challenging, such an issue can be controlled if we can reuse them. To handle this, in our work, we design a machine learning and blockchain-oriented system that identifies the waste objects/products and recommends to the user multiple 'Do-It-Yourself' (DIY) ideas to reuse or recycle. Blockchain records every transaction in the shared ledger to enable transaction verifiability and supports better decision-making. In this study, a Deep Neural Network (DNN) trained on about 11700 images is developed using ResNet50 architecture for object recognition (training accuracy of 94%). We deploy several smart contracts in the Hyperledger Fabric (HF) blockchain platform to validate recommended DIY ideas by blockchain network members. HF is a decentralized ledger technology platform that executes the deployed smart contracts in a secured Docker container to initialize and manage the ledger state. The complete model is delivered on a web platform using Flask, where our recommendation system works on a web scraping script written using Python. Fetching DIY ideas using web-scraping takes nearly 1 second on a desktop machine with an Intel Core-i7 processor with 8 cores, 16 GB RAM, installed with Ubuntu 18.04 64-bit operating system, and Python 3.6 package. Further, we evaluate blockchain-based smart contracts' latencies and throughput performances using the hyperledger caliper benchmark. To the best of our knowledge, this is the first work that integrates blockchain technology and deep learning for the DIY recommender system.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchains; Smart contracts; Recycling; Deep learning; Recommender systems; Waste management; Object recognition; Distributed ledger; Urban planning; Local government; Deep learning; image recognition; municipal solid waste; blockchain; smart contract; hyperledger fabric; hyperledger caliper; recycle

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2022.3199661

Cross-Domain Self-Authentication Based Consortium Blockchain for Autonomous Valet Parking System

【Author】 Hua, Lei Jiang, Haobin Xiao, Jian Samie, Mohammad

【影响因子】3.476

【主题类别】

区块链应用-实体经济-交通领域

【Abstract】This paper proposed a cross-domain self-authentication scheme to address the "information isolated island" problem of users' identities storage in servers and the "redundant registration problem" of users' identities for Autonomous Valet Parking (AVP). This scheme adopts a decentralized anonymous authentication method to relieve the authentication center's service load. Users are segregated into two categories to increase authentication efficiency: inexperienced and regular users. For the former, the paper explores a self-authentication mechanism based on verification parameters. Then, its valid personal information, pseudonym and public key, were stored in a consortium blockchain (PseIDChain) as the transaction records so that they can be securely shared among servers located in different domains. For the latter (regular users), an efficient authentication mechanism, searching users' personal information on PseIDChain by the smart contract, was proposed. Security proof and simulation results show that the designed scheme has superior security to the existing schemes. Its authentication efficiency is 80.29% and 50.45% higher than the traditional anonymous and batch authentication schemes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Privacy; Authentication; Servers; Security; Navigation; Real-time systems; Autonomous systems; Blockchains; Autonomous valet parking; privacy protection; cross-domain authentication; consortium blockchain; pseudonym

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实证数据

【DOI】 10.1109/ACCESS.2022.3199874

Electronic Health Records Sharing Model Based on Blockchain With Checkable State PBFT Consensus Algorithm

【Author】 Pang, Zhen Yao, Yuan Li, Qiuyan Zhang, Xiaoqin Zhang, Jing

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

区块链技术-核心技术-共识机制

【Abstract】With the popularity of IoT devices and cloud technology in the medical industry. Sharing EHRs (Electronic Health Records) among medical institutions improves the accuracy of medical diagnosis and promotes the development of public medical. However, it is difficult to share EHRs among hospitals, and patients typically don't know about the usage of their health records. In this paper, we propose a patient-controlled EHRs sharing scheme based on cloud computing collaborating blockchain technology. The medical abstract and the access strategy are stored in the blockchain to avoid being tampered with. To achieve the fine-grained access control, we propose the attribute-based encryption scheme and multi-keyword encryption scheme to encrypt EHRs. Moreover, we proposed a node-state-checkable Practical Byzantine Fault Tolerance consensus algorithm (sc-PBFT) to prevent the Byzantine nodes from sneaking into the consortium blockchain. First, we check the state of the elected master node to avoid the master node having any malicious records. Then, using pre-prepared, prepare, and commit processes to complete the consensus request submitted by the client. At last, the proposed consensus algorithm evaluates the state of the master node according to the completion of the three-stage process to reduce the impact of the malicious node on the whole consortium blockchain. By doing this, the malicious node will be marked and isolated into the isolation area. The experimental results show that the proposed sc-PBFT algorithm has better handling capability and lower consensus latency. Compared with the PBFT algorithm in the case of Byzantine nodes, sc-PBFT not only improves the robustness of the consortium blockchain network but also improves the handling capability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Medical services; Cryptography; Blockchains; Medical diagnostic imaging; Cloud computing; Information sharing; Encryption; Data sharing; EHR; blockchain; Byzantine node; PBFT; consortium blockchain

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2022.3186682

Enhanced Elman spike neural network fostered blockchain framework espoused intrusion detection for securing Internet of Things network

【Author】 Vadi, Vikas Rao Abidin, Shafiqul Khan, Azimuddin Izhar, Mohd

【影响因子】3.310

【主题类别】

区块链技术-协同技术-物联网

【Abstract】In general, due to the complexity and limited computation capabilities, the security issues occur in Internet of Things (IoT). Security protocols are required to increase the security of the system. Therefore, in this article, an enhanced Elman spike neural network (EESNN) with green proof of work consensus algorithm (GPoW) is proposed for enhancing the security of IoT network. Initially, the generalized security mechanism as EESNN approach is proposed for the IoT network by categorizing the devices into malicious and benign. Then, the GPoW consensus algorithm is used for enhancing the security of the devices from malicious attacks. Subsequently, a coalition formation (CF) algorithm is used for reducing the excess energy consumption in a network. The proposed EESNN-GPoW-CF approach has effectively classified the malicious attacks and enhances the security of the IoT network. The simulation of this work is done in Python. From the simulation, the proposed EESNN-GPoW-CF approach attains high efficiency outcomes in terms of accuracy, recall, precision, PDR, PLR, throughput, overhead, computation time, and delay. Moreover, the proposed EESNN-GPoW-CF approach attains 3.1%, 5.3%, 7.4% high accuracy rate, and 7.5%, 12.5%, 14.7% lower computation time with 4.8%, 2.3%, 5.7% lower energy utilization than the existing methods, such as deep learning based blockchain for IoT security, deep reinforcement learning based blockchain for IoT security, and deep blockchain-based trustworthy privacy preserving secured framework in IoT, respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】

【收录时间】2022-09-18

【文献类型】 实验仿真

【DOI】 10.1002/ett.4634

Protocols for the Graphic and Constructive Diffusion of Digital Twins of the Architectural Heritage That Guarantee Universal Accessibility through AR and VR

【Author】 Cruz Franco, Pablo Alejandro Marquez de la Plata, Adela Rueda Gomez Bernal, Elena

【影响因子】2.838

【主题类别】

区块链应用-虚拟经济-VR

【Abstract】The objective of this article is to generate and validate a workflow that allows us to use virtual twins obtained from unique buildings of our architectural heritage. These twins will guarantee the preservation and dissemination of cultural assets and will promote universal accessibility through new technologies, such as databases, metaverses, virtual reality, augmented reality or gamification. This universal accessibility is based on new metaverses to offer experiences that allow us to overcome physical barriers and reach any user regardless of their economic or physical condition or their location. To obtain this workflow, we worked with digital twins obtained by photogrammetry. Different databases and metaverses were studied, understanding them as new systems for the representation and dissemination of architecture. These metaverses were critically assessed and screened, looking for the most suitable one to be integrated into an effective workflow that satisfies a series of imposed premises, such as being suitable for use in virtual reality and augmented reality environments. The ultimate goal is the aforementioned universal accessibility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】digital heritage; metaverse; virtual reality; augmented reality; digital twins; virtual museum; digital survey; 3D database; photogrammetry

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.3390/app12178785

An Effective Sharding Consensus Algorithm for Blockchain Systems

【Author】 Chen, Runyu Wang, Lunwen Peng, Chuang Zhu, Rangang

【影响因子】2.690

【主题类别】

区块链技术-核心技术-共识机制

【Abstract】Sharding is the widely used approach to the trilemma of simultaneously achieving decentralization, security, and scalability in traditional blockchain systems. However, existing schemes generally involve problems such as uneven shard arithmetic power and insecure cross-shard transaction processing. In this study, we used the Practical Byzantine Fault Tolerance (PBFT) as the intra-shard consensus and, here, we propose a new sharding consensus mechanism. Firstly, we combined a jump consistent hash algorithm with signature Anchorhash to minimize the mapping of the node assignment. Then, we improved the process of the cross-shard transaction and used the activity of nodes participating in intra-shard transactions as the criterion for the shard reconfiguration, which ensured the security of the blockchain system. Meanwhile, we analyzed the motivation mechanism from two perspectives. Finally, through theoretical analysis and related experiments, we not only verified that the algorithm can ensure the security of the entire system, but also further clarified the necessary conditions to ensure the effectiveness of the shards and the system on the original basis.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; sharding; Practical Byzantine Fault Tolerance; consensus mechanism; jump consistent hash algorithm; Anchorhash; timestamp

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实验仿真

【DOI】 10.3390/electronics11162597

A Blockchain-Based and SGX-Enabled Access Control Framework for IoT

【Author】 Han, Jiujiang Zhang, Yuxiang Liu, Jian Li, Ziyuan Xian, Ming Wang, Huimei Mao, Feilong Chen, Yu

【影响因子】2.690

【主题类别】

区块链技术-协同技术-物联网

【Abstract】With the rapid development of physical networks, tens of billions of Internet of Things (IoT) devices have been deployed worldwide. Access control is essential in the IoT system, which manages user access to vital IoT data. However, access control for the IoT is mainly based on centralized trusted servers, which face problems such as a single point of failure and data leakage. To tackle these challenges, we propose an access control framework for the IoT by combining blockchain and Intel software guard extension (SGX) technology. A blockchain validates both IoT devices and edge servers added to the network. The access control contract is deployed on the blockchain, which can manage attribute-based access control policies in a fine-grained manner and make access control decisions flexibly. SGX technology is introduced into the edge computing server to realize the confidentiality of data processing. Finally, we implemented the prototype of the framework on Quorum and conducted extensive experiments and theoretical analyses on the performance of the blockchain. The results of the experimental tests and theoretical analyses show that our framework has more advantages in computing costs and on-chain storage costs.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; software guard extensions (SGX); Internet of Things (IoT); access control; smart contract

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实验仿真

【DOI】 10.3390/electronics11172710

Money mining and price dynamics: The case of divisible currencies

【Author】 Choi, Michael Rocheteau, Guillaume

【影响因子】1.620

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】We develop a random-matching model to study the price dynamics of divisible monies produced privately through mining. The equilibrium set is composed of a unique equilibrium where the value of money increases until it reaches a steady state and, if money has no intrinsic value, a continuum of perfect-foresight equilibria where the price of money inflates and bursts over time. Early on private money is held for a speculative motive and it acquires a transactional role when money supply becomes sufficiently abundant. We study different mining and matching technologies, fiat and commodity monies, single and Money competing currencies. (C) 2021 Elsevier B.V. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Money; Search; Private and competing monies; Mining; Divisible

【发表时间】2022

【收录时间】2022-09-18

【文献类型】 实证数据

【DOI】 10.1016/j.jedc.2021.104152

Subgroup membership testing on elliptic curves via the Tate pairing

【Author】 Koshelev, Dmitrii

【影响因子】1.585

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】This note explains how to guarantee the membership of a point in the prime-order subgroup of an elliptic curve (over a finite field) satisfying some moderate conditions. For this purpose, we apply the Tate pairing on the curve; however, it is not required to be pairing-friendly. Whenever the cofactor is small, the new subgroup test is much more efficient than other known ones, because it needs to compute at most two n-th power residue symbols (with small n) in the basic field. More precisely, the running time of the test is (sub-)quadratic in the bit length of the field size, which is comparable with the Decaf-style technique. The test is relevant, e.g., for the zk-SNARK friendly curves Bandersnatch and Jubjub proposed by the Ethereum and Zcash research teams, respectively.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Non-prime-order elliptic curves; Power residue symbol; Subgroup membership testing; Tate pairing

【发表时间】

【收录时间】2022-09-18

【文献类型】 理论模型

【DOI】 10.1007/s13389-022-00296-9

链上链下数据协同下的政务材料共享设计实现

【作者】 王茜;朱俊伟;张晓东;

【作者单位】上海市大数据中心应用开发部;

【文献来源】计算机工程与应用

【复合影响因子】2.348

【综合影响因子】1.606

【主题类别】

区块链应用-实体经济-政务领域

【摘要】为在保留现有政务多部门分布式存储和分头管理模式的同时实现海量政务材料高效共享,并全面提升设计的性能、安全性和去中心化能力,提出了一种基于链上链下数据协同的高可用共享方案。首先根据需求分析,提出能对单链进行拓展提升的链上链下数据协同方法;接着将该方法理念融入到元数据设计、数据上链、可控访问等一系列环节中,并将整体策略和个体策略互补式元数据设计、基于智能合约及共识节点协同的去中心化访问策略、基于Token的安全灵活数据传输方法应用其中,最终呈现了一个完整的设计应用。经评估,该应用在安全、性能、去中心化各方面实施了多个卓有成效的方法,并在访问性能上做出了重点提升,尤其适用于高并发类的数据协同共享应用。

【关键词】区块链;;政务材料;;链上链下协同;;令牌;;智能合约

【文献类型】 理论模型

【DOI】

【发表时间】2022-09-18

区块链网络隐蔽信道研究进展

【作者】 李雷孝;杜金泽;林浩;高昊昱;杨艳艳;高静;

【作者单位】内蒙古工业大学数据科学与应用学院;内蒙古自治区基于大数据的软件服务工程技术研究中心;天津理工大学计算机科学与工程学院;内蒙古农业大学计算机与信息工程学院;

【文献来源】通信学报

【复合影响因子】2.347

【综合影响因子】1.740

【主题类别】

区块链应用-实体经济-通信领域

【摘要】数字货币伴生的区块链技术具有去中心化、匿名性、强鲁棒性和抗篡改性等特点,是构建隐蔽通信信道的天然载体。首先介绍了网络隐蔽信道的定义和发展历史,区块链技术的架构,以及传统的网络隐蔽信道并引出区块链网络隐蔽信道的优势;然后按照交易地址、签名算法、智能合约和P2P广播机制4类对区块链网络隐蔽信道进行分类,并依据隐蔽性、传输效率和通信成本3个方面分析了其优缺点;最后提出了区块链网络隐蔽信道仍存在的问题并给出了未来研究方向。

【关键词】网络隐蔽信道;;隐蔽通信;;区块链;;传输效率;;通信成本

【文献类型】 综述

【DOI】

【发表时间】2022-09-18

边缘计算与区块多链下的安全可信认证模型

【作者】 黄敏敏;袁凌云;潘雪;张杰;

【作者单位】云南师范大学信息学院;云南师范大学民族教育信息化教育部重点实验室;

【文献来源】计算机科学与探索

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-协同技术-边缘计算

【摘要】边缘计算模式引发的数据安全和隐私保护等问题是制约边缘计算发展的基础性问题,而区块链因自身扩展性瓶颈,使其在解决边缘计算中的安全问题时受到了限制.为了解决边缘侧的信任管理及区块链的扩展性问题,促进边缘计算与区块链协同发展,本文基于边缘计算与主从多链提出了分布式安全可信认证模型.首先基于传统单链设计了主从多链结构,并集成边缘计算部署了三层体系架构;针对边缘侧的安全性问题,基于椭圆曲线加密算法(Elliptic Curve Cryptography,ECC)集成区块链加密技术设计了签名认证方案.其次,基于角色的访问控制模型(Role-Based Access Control,RBAC)结合智能合约对用户权限进行了细粒度划分,构建了域间访问控制模型(Inter domain-role-based access control,ID-RBAC),并给出了域内、域间详细的访问认证流程设计.实验结果表明,该模型安全可信,与传统部署方式的单链架构相比,该方案存储开销平均下降50%,时延也有明显的降低.与现有方案相比,本文方案在吞吐量方面有更大的优越性,发送速率与吞吐量之比达到1:1,能满足大规模物联网实际应用需求,具有高扩展性、高安全性.

【关键词】边缘计算;;区块多链;;跨域;;身份认证;;信任管理

【文献类型】 实验仿真

【DOI】

【发表时间】2022-09-18

在线标注

备案号: 苏ICP备17025947号-5

评论回复