• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2022年12月07日 18篇

文献来源

  • 11
  • 7

主题分类

      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 2
      • 1
      • 2
      • 1
      • 1
      • 1
      • 2

文献类型

  • 6
  • 9
  • 2
  • 1
筛选
订阅
<< 前一天 后一天 >>

Age-Critical and Secure Blockchain Sharding Scheme for Satellite-Based Internet of Things

【Author】 Wang, Bingzheng Jiao, Jian Wu, Shaohua Lu, Rongxing Zhang, Qinyu

CCF-B

【影响因子】8.346

【主题类别】

区块链技术-协同技术-物联网

【Abstract】It is witnessed that blockchain technology has been widely studied in Internet of Things (IoT) applications due to its decentralized tamper-resistance. Meanwhile, satellite-based IoT (S-IoT) becomes popular and has been regarded as a potential solution of the scalability due to its ubiquitous coverage inherited from satellites. Nevertheless, the large-scale blockchain network enabled S-IoT (BNS-IoT) would be limited by timely performing consensus. In this paper, we propose an age-critical blockchain sharding (ABS) scheme with the metric of information timeliness, i.e., age of information (AoI) to realize timely consensus in BNS-IoT. Specifically, we propose a forking-waiting-retransmission (FR) mechanism for the ABS scheme to deal with forking events, and realize a secure consensus. Then, we derive the closed-form expressions of average AoI (AAoI), throughput and security performance of the FR mechanism in ABS scheme, respectively, and compare with the n-block confirmation and select the longest-chain (n-LC) mechanism. Simulation results show that our ABS scheme can realize the linear expansion of throughput with the increasing number of shards, and our FR mechanism can greatly improve the security by sacrificing minor AAoI compared with the n-LC mechanism. Furthermore, our ABS scheme can outperform the conventional random sharding (RS) scheme in terms of AAoI and throughout.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain enabled satellite-based Internet of Things; scalability; sharding; age of information; security

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 理论模型

【DOI】 10.1109/TWC.2022.3176874

Impact of Digital Economy on Dual Circulation: An Empirical Analysis in China

【Author】 Wu, Jun Chen, Tianyi

【影响因子】3.889

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】With the growth of Internet technologies, including 5G, blockchain, and big data, the digital economy has emerged as an important driving force of economic growth, offering a fresh viewpoint on the sustainability of dual circulation. Thus, this study analyzes the impact of the digital economy on dual circulation and the underlying influencing mechanism. The influence of the digital economy on the degree of dual circulation sustainability was measured using panel data of 30 provinces in China from 2011 to 2020, and the influence was found to be significant and statistically positive. The analysis of the mechanism indicates that the increasing technological innovation capacity can amplify the digital economy's effect on dual circulation. The promotion effect of the digital economy has a spatial spillover effect. The function of the digital economy in fostering dual circulation is heterogenous, with a greater impact on central and eastern China. Therefore, this study proposes that increasing communication infrastructure investment and implementing differentiated policies supporting the digital economy should be considered by policymakers to boost dual circulation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】dual circulation; digital economy; sustainable growth; technology innovation; spatial effect

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.3390/su142114466

Multimedia Fusion Privacy Protection Algorithm Based on IoT Data Security under Network Regulations

【Author】 Zhu, Guicun Li, Xingguo Zheng, Changlong Wang, Linlin

【影响因子】3.120

【主题类别】

区块链技术-协同技术-物联网

【Abstract】This study provides an in-depth analysis and research on multimedia fusion privacy protection algorithms based on IoT data security in a network regulation environment. Aiming at the problem of collusion and conspiracy to deceive users in the process of outsourced computing and outsourced verification, a safe, reliable, and collusion-resistant scheme based on blockchain is studied for IoT outsourced data computing and public verification, with the help of distributed storage methods, where smart devices encrypt the collected data and upload them to the DHT for storage along with the results of this data given by the cloud server. After testing, the constructed model has a privacy-preserving budget value of 0.6 and the smallest information leakage ratio of multimedia fusion data based on IoT data security when the decision tree depth is 6. After using this model under this condition, the maximum value of the information leakage ratio of multimedia fusion data based on IoT data security is reduced from 0.0865 to 0.003, and the data security is significantly improved. In the consensus verification process, to reduce the consensus time and ensure the operating efficiency of the system, a consensus node selection algorithm is proposed, thereby reducing the time complexity of the consensus. Based on the smart grid application scenario, the security and performance of the proposed model are analyzed. This study proves the correctness of this scheme by using BAN logic and proves the security of this scheme under the stochastic prediction machine model. Finally, this study compares the security aspects and performance aspects of the scheme with some existing similar schemes and shows that the scheme is feasible under IoT.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.1155/2022/3574812

Imminence: Cryptocurrency addiction and public health

【Author】 Ucar, Mehmet

【影响因子】3.041

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 观点阐述

【DOI】 10.4103/1995-7645.354524

An Efficient MAC Protocol for Blockchain-Enabled Patient Monitoring in a Vehicular Network

【Author】 Ullah, Muhammad Aman Alvi, Ahmad Naseem Javed, Muhammad Awais Khan, Muhammad Badruddin Abul Hasanat, Mozaherul Hoque Saudagar, Abdul Khader Jilani Alkhathami, Mohammed

【影响因子】2.838

【主题类别】

区块链应用-实体经济-医疗领域

区块链应用-实体经济-交通领域

【Abstract】Blockchain is an emerging computing platform that provides recording and tracking facilities to substantially increase the security issues in healthcare systems. The evolution of wireless body area networks requires the continuous monitoring of the health parameters of traveling patients while traveling on road. The health parameter data of each patient are sent to the Road Side Units (RSUs) for generating the blocks by computing the required hash functions. A major challenge in such a network is to efficiently exchange the data blocks between mining RSUs and vehicles using a medium access protocol with a reduced number of collisions. The medium access problem becomes more challenging due to the vehicle mobility, high vehicle density and the varying nature of the data generated by the vehicles. In this work, a TDMA-based MAC protocol to meet an Adaptive Patients Data traffic for Vehicular Network (TAPD(VN)) is proposed. TAPD(VN) is specifically designed for patients in a vehicular network by considering the frequent entry and exit of vehicles in a mining node's coverage area. It allows mining nodes to adjust time slots according to the sensitive patient's data and allows the maximum number of patient vehicular nodes by considering their sensitivity to send their data in a session to compute their hash values accordingly. Simulation results verify that the proposed scheme accommodates the maximum number of high-risk patient data and improves bandwidth utilization by 20%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】vehicular networks; blockchain; medium access protocol; patient monitoring

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.3390/app122110957

A Novel Blockchain Approach for Improving the Security and Reliability of Wireless Sensor Networks Using Jellyfish Search Optimizer

【Author】 Vinya, Viyyapu Lokeshwari Anuradha, Yarlagadda Karimi, Hamid Reza Divakarachari, Parameshachari Bidare Sunkari, Venkatramulu

【影响因子】2.690

【主题类别】

区块链应用-实体经济-通信领域

【Abstract】For the past few years, centralized decision-making is being used for malicious node identification in wireless sensor networks (WSNs). Generally, WSN is the primary technology used to support operations, and security issues are becoming progressively worse. In order to detect malicious nodes in WSN, a blockchain-routing- and trust-model-based jellyfish search optimizer (BCR-TM-JSO) is created. Additionally, it provides the complete trust-model architecture before creating the blockchain data structure that is used to identify malicious nodes. For further analysis, sensor nodes in a WSN collect environmental data and communicate them to the cluster heads (CHs). JSO is created to address this issue by replacing CHs with regular nodes based on the maximum remaining energy, degree, and closeness to base station. Moreover, the Rivest-Shamir-Adleman (RSA) mechanism provides an asymmetric key, which is exploited for securing data transmission. The simulation outcomes show that the proposed BCR-TM-JSO model is capable of identifying malicious nodes in WSNs. Furthermore, the proposed BCR-TM-JSO method outperformed the conventional blockchain-based secure routing and trust management (BSRTM) and distance degree residual-energy-based low-energy adaptive clustering hierarchy (DDR-LEACH), in terms of throughput (5.89 Mbps), residual energy (0.079 J), and packet-delivery ratio (89.29%).

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】block chain; jellyfish search optimizer; routing; security; trust management; wireless sensor network

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.3390/electronics11213449

Blockchain based energy efficient multi-tasking optimistic scenario for mobile edge computing

【Author】 Wu, Jianbin Haider, Sami Ahmed Soni, Mukesh Kalra, Ashima Deb, Nabamita

【影响因子】2.411

【主题类别】

区块链技术-协同技术-边缘计算

【Abstract】Mobile edge computational power faces the difficulty of balancing the energy consumption of many devices and workloads as science and technology advance. Most related research focuses on exploiting edge server computing performance to reduce mobile device energy consumption and task execution time during task processing. Existing research, however, shows that there is no adequate answer to the energy consumption balances between multi-device and multitasking. The present edge computing system model has been updated to address this energy consumption balance problem. We present a blockchain-based analytical method for the energy utilization balance optimization problem of multi-mobile devices and multitasking and an optimistic scenario on this foundation. An investigation of the corresponding approximation ratio is performed. Compared to the total energy demand optimization method and the random algorithm, many simulation studies have been carried out. Compared to the random process, the testing findings demonstrate that the suggested greedy algorithm can improve average performance by 66.59 percent in terms of energy balance. Furthermore, when the minimum transmission power of the mobile device is between five and six dBm, the greedy algorithm nearly achieves the best solution when compared to the brute force technique under the classical task topology.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Mobile edge computing; Energy balance; Greedy algorithm; Blockchain; Task offloading

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.7717/peerj-cs.1118

Blockchain-based Raw Material Shipping with PoC in Hyperledger Composer

【Author】 Saini, Hemraj Dash, Satyabrata Pani, Subhendu Kumar Sousa, Maria Jose Rocha, Alvaro

【影响因子】1.170

【主题类别】

区块链应用-实体经济-供应链

【Abstract】In today's world, a lot of various kinds of raw materials are shipped from one place to another as per the requirement of industries. This shipping process involved many multiple levels with multiple personalities or authorities. The intermediates may be influenced by some illegal external factors and there may be some theft or modification in the raw material which is in the shipping process. This generates a significant loss if the material is of high cost. Presently, the advancements in information technology precede a method to restrict this loss and it is blockchain. Blockchain technology is an essential feature in enabling a comprehensive view of events back to origination. The shipping chain of raw materials that provides integrity and tamper resistance for raw materials in the shipping process is proposed in the manuscript. we have also provided proof of concept (PoC) in Hyperledger Composer with performance evaluation.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; SCRM; PoC; Hyperledger; Raw Material

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.2298/CSIS210930032S

Fabric-GC: A Blockchain-based Gantt Chart System for Cross-organizational Project Management

【Author】 Li, Dun Han, Dezhi Xia, Benhui Weng, Tien-Hsiung Castiglione, Arcangelo Li, Kuan-Ching

【影响因子】1.170

【主题类别】

区块链应用-实体经济-项目管理

【Abstract】Large-scale production is always associated with more and more development and interaction among peers, and many fields achieve higher economic benefits through project cooperation. However, project managers in the traditional centralized approach cannot rearrange their activities to cross-organizational project management. Thanks to its characteristics, the Blockchain can represent a valid solution to the problems mentioned above. In this article, we propose Fabric-GC, a Blockchain-based Gantt chart system. Fabric-GC enables to realize secure and effective cross-organizational cooperation for project management, providing access control to multiple parties for project visualization. Compared with other solutions, the proposed system is versatile, as it can be applied to project management in different fields and achieve effective and agile scheduling. Experimental results show that Fabric-GC achieves stable performance in large-scale request and processing distributed environments, where the data synchronization speed of the consortium chain reached four times faster than a public chain, achieving faster data consistency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cross-organizational secure cooperation; Blockchain; Gantt chart; Project management; Hyperledger fabric; Data sharing

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 实验仿真

【DOI】 10.2298/CSIS211105024L

Privacy Information Protection Applying Digital Holography to Blockchain

【Author】 Jeon, Seok Hee Gil, Sang Keun

【影响因子】0.879

【主题类别】

区块链技术-核心技术-加密算法

【Abstract】Blockchain technology provides a decentralized and peer-to-peer network, which has the advantages of transparency and immutability. In this paper, a novel secure authentication scheme applying digital holography to blockchain technology is proposed to protect privacy information in network nodes. The transactional information of the node is chained permanently and immutably in the blockchain to ensure network security. By designing a novel two-dimensional (2D) array data structure of the block, a proof of work (PoW) in the blockchain is executed through digital holography technology to verify true au-thentication and legal block linkage. A hash generated from the proposed algorithm reveals a random number of 2D array data. The real identity of each node in the network cannot be forged by a hacker's tampering because the privacy information of the node is encrypted using digital holography and stored in the blockchain. The reliability and feasibility of the proposed scheme are analyzed with the help of the research results, which evaluate the effectiveness of the proposed method. Forgery by a malicious node is impossible with the proposed method by rejecting a tampered transaction. The principal appli-cation is a secure anonymity system guaranteeing privacy information protection for handling of large information.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Blockchain technology; Digital holography; Hash; Optical encryption

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 理论模型

【DOI】 10.3807/COPP.2022.6.5.453

Proposals for Addressing Research Gaps at the Intersection of Data Analytics and Supply Chain Management

【Author】 Udokwu, Chibuzor Brandtner, Patrick Darbanian, Farzaneh Falatouri, Taha

【影响因子】

【主题类别】

区块链应用-实体经济-供应链

【Abstract】Data Analytics (DA) plays an important role in improving and optimizing the processes in a Supply Chain (SC) network. Due to a huge amount of data generated in the various SC processes, the role of DA in Supply Chain Management (SCM) is becoming increasingly evident. Organizations have already invested heavily in applying various DA technologies to their SC networks. Several reviews have been conducted in different domains of SCM indicating applications and limitations of DA in SCM. As the research domain of DA applications in SCM matures, it is necessary to identify and address the research gaps that exist at the intersection of these domains. The paper qualitatively examines recent review papers in the domain of DA in SCM to identify and outline prominent ways that DA is currently applied in SCM, what potential future opportunities stated and what challenges affecting DA application in SCM are existing. Prominent use cases of DA in SCM include i) forecasting demand, ii) product development, iii) logistics route planning and iv) lean SC development. However, there is no prominent, unique future application list of DA in SCM since the findings vary across the papers. Prominent challenges affecting DA in SCM include i) lack of collaboration, ii) data sharing problems, iii) risks associated with BD management and iv) lack of skilled experts. Lastly, this article provides two conceptual ideas for addressing these prominent DA challenges in SCM: first, a framework for data analytics enabling collaboration in SCM by using transparent data questions and second, a blockchain-based data management approach in SC networks.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】data analytics; supply chain management; SCM challenges; SCM research gaps; data analytics research gaps

【发表时间】2022

【收录时间】2022-12-07

【文献类型】 综述

【DOI】 10.12720/jait.13.4.338-346

区块链技术与个人数据保护规范的内源性冲突及调和路径——以欧盟GDPR为例

【作者】 王士博;王海霞;

【作者单位】中国人民公安大学;福建警察学院;

【文献来源】情报杂志

【复合影响因子】3.030

【综合影响因子】2.087

【主题类别】

区块链治理-法律治理-个人隐私

【摘要】[研究目的]基于集中式数据保护模式的GDPR与基于分布式架构的区块链技术之间存在张力,难以实现GDPR所赋予数据主体的数据权利。通过研究区块链技术与个人数据保护规范冲突的归因逻辑及实质,为完善我国个人信息保护法提供可资借鉴的经验。[研究方法]根据欧盟第29条工作组出台的GDPR相关术语解释指南,基于区块链技术本身的技术性架构,整理欧盟为调和区块链与GDPR冲突出台的文件,研究其冲突的根源,探求调和二者冲突的可能路径。[研究结论]我国应从理念与实体两个层次应对这一冲突。理念上,短期内需解释法律并调适区块链技术,长远来看仍需寻求法律代码化进路。实体上,鉴于公有链与许可链不同的去中心化程度,采取公有链的技术路径与许可链的法律路径分别予以规制,由此实现区块链与个人信息保护法律规范的有效衔接。

【关键词】区块链;;GDPR;;被遗忘权;;链下存储;;数据控制者;;个人数据保护

【文献类型】 观点阐述

【DOI】

【发表时间】2022-12-07

元宇宙的行政规制路径:一个框架性分析

【作者】 黄锫;

【作者单位】同济大学法学院;

【文献来源】中国法学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】元宇宙是新一代全真互联网形态,用户、数据、算法是元宇宙时代社会经济活动的三个重要支点,三者之中都存在着诸多风险,包括:因元宇宙用户身份匿名化导致阻碍人们之间深入合作的风险,因元宇宙数据集聚化导致对用户个人信息与隐私、市场主体创新动力、国家数据安全的侵害风险,因元宇宙算法权力化导致的信息数据再中心化、经济活动垄断化、社会观念操控化的风险。这些风险难以通过市场力量自行化解,需要行政规制的力量予以防范。具体的行政规制路径包括搭建统一的元宇宙身份认证平台、组织类用户实行准入与单一身份认证制、个体类用户实行多元身份认证制等身份真实性规制,实施强制性用户数据脱敏、限制元宇宙平台企业利用商业数据从事同业竞争、规范跨境数据流动等数据安全性规制,以及算法透明规制、算法伦理规制及算法问责规制等算法向善性规制。

【关键词】元宇宙;;行政规制;;身份匿名化;;数据集聚化;;算法权力化

【文献类型】 理论模型

【DOI】 10.14111/j.cnki.zgfx.20221130.013

【发表时间】2022-12-07

元宇宙治理法治化的理论定位与基本框架

【作者】 王奇才;

【作者单位】上海师范大学哲学与法政学院;

【文献来源】中国法学

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-虚拟经济-元宇宙

【摘要】元宇宙是人类以技术手段为自己构筑的虚拟世界。元宇宙兴起在延续数字治理部分议题的同时,也引发了新的治理难题。技术主导型的元宇宙治理模式,其局限性主要体现在技术架构非中立性、虚拟身份不平等性和智能执法并非最优等方面。以法治化方式实施和推进元宇宙治理,应当重视体系性整合、法治主导、合法性思维优先。基于元宇宙的事物性质和构筑元宇宙良好秩序的目标,元宇宙治理法治化的基本框架应分类型、分层次立体展开,区分元宇宙治理中的内容和行为、对现实的弱干涉和强干涉、公共品和私人品,在技术层、商业层、社会层采取不同法治化治理策略。在治理的要素构成方面,元宇宙治理法治化意味着在治理目的上强化法律干预正当性论证,在治理主体上政府与平台协同治理,在治理规则上技术性规则与法律性规则有序衔接。

【关键词】元宇宙治理;;法治化;;理论定位;;基本框架;;治理策略

【文献类型】 理论模型

【DOI】 10.14111/j.cnki.zgfx.20221130.010

【发表时间】2022-12-07

基于区块链的无人机群可靠应急搜救模型

【作者】 杜梦瑶;许凯;张淼;傅翔;尹全军;

【作者单位】国防科技大学系统工程学院;国防科技大学计算机学院;

【文献来源】系统仿真学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-医疗领域

【摘要】自然灾害将突发性地导致地面通信基础设施与交通系统瘫痪,基于无人机群的应急救援方法能够有效应对这类不确定性强且高度动态的特殊场景。然而,无人机群动态的网络拓扑结构以及暴露在开放环境中的通信链路,难以满足弱中心化环境下搜救系统高鲁棒性的需要。本文提出基于区块链技术的无人机应急救援链UERChain,能够实现应急救援任务中的可靠协同。通过在分层局部网络中部署无人机骨干节点,并设计考虑无人机社交关系的信誉度管理智能合约,利用区块链作为信任机器实现分布式环境下无人机群的可信交互。实验结果表明,无人机应急救援链UERChain具有较好的鲁棒性,在资源消耗可控的情况下,能够实现分布式环境中信誉度管理以及故障节点筛选。

【关键词】无人机;;区块链;;智能合约;;信誉管理;;应急救援

【文献类型】 实验仿真

【DOI】 10.16182/j.issn1004731x.joss.22-0872

【发表时间】2022-12-07

面向海量灵活性资源的两阶段分布式协同调度方法

【作者】 潘建辉;张宁;雍培;王鹏;

【作者单位】清华大学电机工程与应用电子技术系;清华大学深圳国际研究生院;

【文献来源】电力系统自动化

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-能源领域

【摘要】电动汽车和5G基站作为柔性负荷资源,为电网提供了充足的备用容量,采用一定策略对其进行调控,可参与电网的辅助服务。但在未来海量分布式柔性资源参与的情况下,集中式的优化调度方法会存在隐私泄露和计算负担沉重的缺点。基于此,首先建立5G基站备用电池和电动汽车可调度容量的实时评估模型,利用无向图网络对通信系统和储能元件建模,提出一种基于均衡荷电状态的调度策略,采用分布式共识算法实现了隐私保护和海量资源的调度控制。然后,提出一种先评估功率边界、后分布式共识调度的两阶段的实时调度流程方案。最后,通过仿真验证了该方案的有效性。

【关键词】电动汽车;;5G基站;;可调度容量;;分布式调度;;广义储能;;虚拟电厂

【文献类型】 实验仿真

【DOI】

【发表时间】2022-12-07

基于区块链的双线性对外包支付协议

【作者】 杨丹玲;任艳丽;

【作者单位】上海大学通信与信息工程学院;

【文献来源】应用科学学报

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-协同技术-云计算

【摘要】为解决现有的双线性对外包支付协议依赖可信第三方,没有实现参与双方的公平性等问题,提出基于区块链系统的协议以实现去中心化,通过对原始数据进行盲化处理实现数据隐私,对恶意参与方实施扣除押金惩罚来保证公平支付。当用户质疑外包结果的正确性时,区块链利用用户提供的随机数据和随机向量即可快速验证,从而提高了支付效率。在以太坊中进行模拟实验,结果表明用户计算量大幅减少,用户能有效验证外包结果的正确性且实现支付公平性。与已有协议相比,用户和服务器在支付阶段效率都是最高的。

【关键词】云计算;;外包计算;;区块链;;双线性对;;公平支付

【文献类型】 理论模型

【DOI】

【发表时间】2022-12-07

基于信任评估模型的PBFT共识算法

【作者】 任玺羽;童向荣;张伟;

【作者单位】烟台大学计算机与控制工程学院;山东外国语职业技术大学二级学院;

【文献来源】山西大学学报(自然科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-核心技术-共识机制

【摘要】实用拜占庭容错(Practical Byzantine Fault Tolerance,PBFT)共识算法是确保区块链等分布式系统达成一致性的重要算法,但其仍难以应用到节点数量规模较大的网络环境,且共识过程中主节点的错误选取会导致系统通信资源的浪费。针对以上问题,本文提出了基于信任评估模型的PBFT共识算法(Trust-based Practical Byzantine Fault Tolerance,T-PBFT),首先采用聚类的方法对系统中的共识节点进行分组共识,降低通信复杂度;然后根据网络中节点历史行为进行信任度评估,选取可靠的节点作为共识小组中的主节点;组内实现共识后,再进行组间共识,确保系统中共识节点存储的数据信息达成一致。所提出的改进算法能够更好地应用于大规模区块链网络系统,并能够选择更可靠的主节点。通过仿真实验和分析得出,改进算法通信复杂度小于原算法的O(N~2),系统的吞吐量与原算法相比最高增加了17%,共识时间节省了25%。

【关键词】区块链;;共识算法;;实用拜占庭容错;;节点可扩展;;信任度评估

【文献类型】 理论模型

【DOI】 10.13451/j.sxu.ns.2022110

【发表时间】2022-12-07

在线标注

备案号: 苏ICP备17025947号-5

评论回复