• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年05月22日 25篇

文献来源

  • 13
  • 12

主题分类

      • 2
      • 1
      • 1
      • 1
      • 1
      • 3
      • 1
      • 1
      • 1
      • 2
      • 1
      • 2
      • 2
      • 3
      • 2
      • 1

文献类型

  • 8
  • 6
  • 4
  • 5
  • 2
筛选
订阅
<< 前一天 后一天 >>

Blockchain IOTA Sharding-Based Scalable Secure Group Communication in Large VANETs

【Author】 Naresh, Vankamamidi S. Allavarpu, V. V. L. Divakar Reddi, Sivaranjani

CCF-C

【影响因子】10.238

【主题类别】

区块链技术-协同技术-密码学

【Abstract】The advent of group-oriented communication applications has triggered research on secure group communication (SGC) in vehicular ad hoc networks (VANETs). Given this, some researchers worked in this area and proposed various schemes. However, these systems lacking the dynamic nature, and struggling with larger processing loads, enormous storage, increased communications, security, and privacy concerns. Further, with the increase in the size of VANET, it is challenging to manage processing loads and storage requirements of group controller (GC)-centric group key agreement (GKA). To address these drawbacks in existing VANET communications, we propose a blockchain IOTA sharding-based smart contract-centric GKA for SGC in large VANETs. In this scheme, we partition the main network into r sharded subnetworks using blockchain sharding technique, with G(1), G(2), G(3), . . . , G(r) as smart contract (SC) instances generated by GC, G, which functions as Sub GC (Sub-GC) to their respective shards. Under the Elliptic curve decision Diffie-Hellman (ECDDH) and group-Elliptic curve Diffie-Hellman (GECCDH) assumptions, the proposed protocol is proven to be secure. The suggested protocol outperforms the other protocols for secure communication in large VANETs, according to the performance analysis.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Vehicular ad hoc networks; Blockchains; Security; Protocols; Internet of Things; Privacy; Public key; Blockchain; group key agreement (GKA); group controller (GC); IOTA; privacy preserving; sharding; smart contract (SC)

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 理论模型

【DOI】 10.1109/JIOT.2022.3222382

An octonion-based nonlinear echo state network for speech emotion recognition in Metaverse

【Author】 Daneshfar, Fatemeh Jamshidi, Mohammad (Behdad)

CCF-B

【影响因子】9.657

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】While the Metaverse is becoming a popular trend and drawing much attention from academia, society, and businesses, processing cores used in its infrastructures need to be improved, particularly in terms of signal processing and pattern recognition. Accordingly, the speech emotion recognition (SER) method plays a crucial role in creating the Metaverse platforms more usable and enjoyable for its users. However, existing SER methods continue to be plagued by two significant problems in the online environment. The shortage of adequate engagement and customization between avatars and users is recognized as the first issue and the second problem is related to the complexity of SER problems in the Metaverse as we face people and their digital twins or avatars. This is why developing efficient machine learning (ML) techniques specified for hypercomplex signal processing is essential to enhance the impressiveness and tangibility of the Metaverse platforms. As a solution, echo state networks (ESNs), which are an ML powerful tool for SER, can be an appropriate technique to enhance the Metaverse's foundations in this area. Nevertheless, ESNs have some technical issues restricting them from a precise and reliable analysis, especially in the aspect of high-dimensional data. The most significant limitation of these networks is the high memory consumption caused by their reservoir structure in face of high -dimensional signals. To solve all problems associated with ESNs and their application in the Metaverse, we have come up with a novel structure for ESNs empowered by octonion algebra called NO2GESNet. Octonion numbers have eight dimensions, compactly display high-dimensional data, and improve the network precision and performance in comparison to conventional ESNs. The proposed network also solves the weaknesses of the ESNs in the presentation of the higher-order statistics to the output layer by equipping it with a multidimensional bilinear filter. Three comprehensive scenarios to use the proposed network in the Metaverse have been designed and analyzed, not only do they show the accuracy and performance of the proposed approach, but also the ways how SER can be employed in the Metaverse platforms.(c) 2023 Elsevier Ltd. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Speech emotion recognition; Digital twins; Metaverse; Octonion algebra; Echo state network; Machine learning

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 实验仿真

【DOI】 10.1016/j.neunet.2023.03.026

A novel hybrid feature fusion model for detecting phishing scam on Ethereum using deep neural network

【Author】 Wen, Tingke Xiao, Yuanxing Wang, Anqi Wang, Haizhou

CCF-C

【影响因子】8.665

【主题类别】

区块链技术-协同技术-深度学习

【Abstract】The development of blockchain technology has brought prosperity to the cryptocurrency market and has made the blockchain platform a hotbed of crimes. As one of the most rampant crimes, phishing scam has caused a huge economic loss to blockchain platforms and users. In order to address the threat to the financial security of blockchain, this paper proposes a model based on hybrid deep neural network to detect phishing scam accounts, namely LBPS (LSTM-FCN and BP neural network-based Phishing Scam accounts detection model), and verifies its effectiveness on Ethereum. The LBPS model provides a novel approach to analyse transaction records by adopting the BP neural network to obtain the implicit relationship between features extracted from transaction records and the LSTM-FCN neural network to capture the temporal feature from all transaction records of a target account. The experimental results demonstrate that the features selected in this paper could identify phishing scam accounts effectively. Moreover, the LBPS model performs better than the existing methods and baseline models with an F1-score of 97.86%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Ethereum; Phishing scams detection; Deep learning; LSTM-FCN; BP neural network

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 理论模型

【DOI】 10.1016/j.eswa.2022.118463

Uncertainty due to infectious diseases and bitcoin-gold nexus: Evidence from a non-parametric causality-in-quantiles approach

【Author】 Fasanya, Ismail O. Oyewole, Oluwatomisin Dauda, Mariam

【影响因子】8.222

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】The interconnection between bitcoin and gold markets has attracted a lot of interest among investors, policy makers, practitioners and market participants. The objective of this paper is to examine the role of infectious diseases-based uncertainty on the connection between bitcoin and gold markets using a battery of spillovers and causality tests. The following findings are discernible from our analyses. First, the spillover tests, there exists a low level of connection between the two markets, and implying that there were diversification options. Second, the spillover results also reveal that the gold market is a net transmitter of volatility, while bitcoin market is a net receiver of the shocks. Third, BDS test shows strong evidence of nonlinearity is a very crucial factor to be put into consideration when examining the role of health-based uncertainty affecting the interactions between bitcoin and gold markets. Fourth, there is evidence of a linear relationship between bitcoin-gold connectedness and infectious diseases uncertainty mostly for the full sample period. Fifth, the non-parametric causality-in-quantile test confirms that the connectedness between uncertainty due to infectious diseases and the markets is stronger mostly around the lower quantiles. These results have important policy implications for policymakers and market participants.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin-Gold nexus; Infectious Diseases-based Uncertainty; Spillovers; Nonlinearity; Causality-in-quantiles

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 实证数据

【DOI】 10.1016/j.resourpol.2023.103549

COULD ?DIGITAL GOLD? RESIST GLOBAL SUPPLY CHAIN PRESSURE?

【Author】 Qin, Meng Su, Chi-Wei Wang, Yunxu Doran, Nicoleta Mihaela

【影响因子】5.656

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】Exploring the safe-haven characteristics of bitcoin from novel perspectives is crucial to diversify the investment and reap the benefits. This investigation employs bootstrap full-and sub-sample techniques to probe time-varying interrelation between global supply chain pressure (GSCP) and bitcoin price (BP), and further answer if "digital gold" could resist the strains of global supply chain. The empirical outcomes suggest that GSCP positively and negatively affects BP. The positive influence points out that high GSCP might boost the international bitcoin market, driving BP to rise, which indicates that "digital gold" could resist the pressures of global supply chain. But the negative effect of GSCP on BP could not support the above view, mainly affected by the weak purchasing power and more valuable assets, which is not consistent with the assumption of the inter-temporal capital asset pricing model (ICAPM). In turn, GSCP is adversely affected by BP, highlighting that the international bitcoin market may be viewed as a stress reliever for the global supply chain. Against a backdrop of the deteriorative Russia-Ukraine war and the intensifying global supply chain crisis, the above conclusions could bring significative lessons to the public, enterprises and related economies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】global supply chain; bitcoin price; digital gold; Granger causal relation; sub-sample

【发表时间】

【收录时间】2023-05-22

【文献类型】 实证数据

【DOI】 10.3846/tede.2023.18557

Secure multi-factor access control mechanism for pairing blockchains

【Author】 Addobea, Abigail Akosua Li, Qianmu Obiri, Isaac Amankona Hou, Jun

【影响因子】4.960

【主题类别】

区块链技术-核心技术-访问控制

【Abstract】Digitalization has made it easier for centric systems to transition from single-factor to two-factor authentication. However, several access control practices struggle to authenticate users correctly due to their weak and outdated authorization systems. Moreover, the majority of cloud-centric models suffer from security and single-point-of-failure issues. Consequently, several systems have migrated their access control services to the blockchain. A good illustration is using two-factor authentication techniques to increase transaction security in Bitcoin systems. However, with this holistic trend of 2FAs, multi-factor authentication has yet to see this trend. In this regard, the study proposes an access control technique that combines multiple factors of knowledge, inherent, and possession to authenticate users to the blockchain. The multiple factors derive a time-based access code for users to generate private keys. The efficiency of the proposed method is tested with a Py-Eth-pairing library to determine the computation cost and transmission overhead. Furthermore, we use the EIP (Ethereum Improvement Proposals) library to assess the gas cost and determine the throughput. Our findings show the suggested approach to achieving the lowest operational cost, making it scalable on the blockchain while demonstrating its practicability through the model framework.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Access control; Multi-factor authentication; Blockchain; Pairing; Proof of Authority (PoA)

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 实验仿真

【DOI】 10.1016/j.jisa.2023.103477

L2DART: A Trust Management System Integrating Blockchain and Off-Chain Computation

【Author】 De Salve, Andrea Franceschi, Luca Lisi, Andrea Mori, Paolo Ricci, Laura

CCF-B

【影响因子】3.989

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】The blockchain technology has been gaining an increasing popularity for the last years, and smart contracts are being used for a growing number of applications in several scenarios. The execution of smart contracts on public blockchains can be invoked by any user with a transaction, although in many scenarios there would be the need for restricting the right of executing smart contracts only to a restricted set of users. To help deal with this issue, this article proposes a system based on a popular access control framework called RT, Role-based Trust Management, to regulate smart contracts execution rights. The proposed system, called Layer 2 DecentrAlized Role-based Trust management ( L2DART), implements the RT framework on a public blockchain, and it is designed as a layer-2 technology that involves both on-chain and off-chain functionalities to reduce the blockchain costs while keeping blockchain auditability, i.e., immutability and transparency. The on-chain costs of L2DART have been evaluated on Ethereum and comparedwith a previous solution implementing on-chain all the functionalities. The results show that the on-chain costs of L2DART are relatively low, making the system deployable in real-world scenarios.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; smart contract; layer-2; off-chain computation; Trust Management; access control

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 实验仿真

【DOI】 10.1145/3561386

The promise of the metaverse in mental health: The new era of MEDverse (vol 8, e11762, 2022)

【Author】 Cerasa, Antonio Gaggioli, Andrea Marino, Flavia Riva, Giuseppe Pioggia, Giovanni

【影响因子】3.776

【主题类别】

区块链应用-虚拟经济-元宇宙

【Abstract】

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 观点阐述

【DOI】 10.1016/j.heliyon.2023.e14399

DABAC: Smart Contract-Based Spatio-Temporal Domain Access Control for the Internet of Things

【Author】 Guo, Feifei Shen, Guohua Huang, Zhiqiu Yang, Yang Cai, Mengnan Wei, Linlin

【影响因子】3.476

【主题类别】

区块链技术-协同技术-物联网

【Abstract】With the advent of IoT technology, the dynamic nature of IoT devices has introduced new obstacles to access control. It is essential to consider the security requirements of the actual physical environment, rendering the traditional access control approach centered on the information space. In the IoT ecosystem, there are several issues such as the dynamics of devices frequently entering and leaving, the lack of computing and storage capacity, and distributed deployment. To address these challenges, this paper proposes the Domain Attribute Based Access Control(DABAC) that incorporates domain elements to implement the physical location limitation of dynamic devices. Moreover, an intelligent gateway is utilized to divide the physical area and act as a proxy to achieve regional device management, automatic networking of devices in the domain, and the dynamic expansion of the sensor network resulting from device entry or exit. Then, given the distributed deployment of devices, smart contracts are employed to deploy access control mechanisms and construct a trusted environment to mitigate threats such as single points of failure. Finally, the DABAC is implemented on the Ethereum platform, simulating a smart medical situation. The experimental results demonstrate that the proposed solution effectively addresses the problem of access control of device dynamics in an untrusted IoT environment while maintaining system security.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Access control; Internet of Things; Blockchains; Smart contracts; Security; Logic gates; Aerodynamics; blockchain; dynamics; the Internet of Things; spatio-temporal constraints

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2023.3257027

A Solicitous Approach to Smart Contract Verification

【Author】 Otoni, Rodrigo Marescotti, Matteo Alt, Leonardo Eugster, Patrick Hyvarinen, Antti Sharygina, Natasha

CCF-B

【影响因子】2.717

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】Smart contracts are tempting targets of attacks, as they often hold and manipulate significant financial assets, are immutable after deployment, and have publicly available source code, with assets estimated in the order of millions of dollars being lost in the past due to vulnerabilities. Formal verification is thus a necessity, but smart contracts challenge the existing highly efficient techniques routinely applied in the symbolic verification of software, due to specificities not present in general programming languages. A common feature of existingworks in this area is the attempt to reuse off-the-shelf verification tools designed for general programming languages. This reuse can lead to inefficiency and potentially unsound results, as domain translation is required. In this article, we describe a carefully crafted approach that directly models the central aspects of smart contracts natively, going from the contract to its logical representation without intermediary steps. We use the expressive and highly automatable logic of constrained Horn clauses for modeling and instantiate our approach to the Solidity language. A tool implementing our approach, called Solicitous, was developed and integrated into the SMTChecker module of the Solidity compiler solc. We evaluated our approach on an extensive benchmark set containing 22,446 real-world smart contracts deployed on the Ethereum blockchain over a 27-month period. The results show that our approach is able to establish safety of significantly more contracts than comparable, publicly available verification tools, with an order of magnitude increase in the percentage of formally verified contracts.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Smart contracts; direct modeling; vulnerability detection

【发表时间】2023

【收录时间】2023-05-22

【文献类型】 实证数据

【DOI】 10.1145/3564699

A survey on automation approaches of smart contract generation

【Author】 Mars, Rawya Cheikhrouhou, Saoussen Kallel, Slim Hadj Kacem, Ahmed

【影响因子】2.557

【主题类别】

区块链技术-核心技术-智能合约

【Abstract】In the blockchain environment, smart contracts are computer programs that run on the blockchain platform. However, the development of smart contracts is a major challenge for developers, since blockchain platforms are still evolving. Owing to the inherited nature of blockchain, developing smart contracts without introducing vulnerabilities is not an easy task, as the deployed code is immutable and can be invoked by anyone with access to the network. Smart contracts have proved to be error-prone in practice due to the complexity of programming. Additionally, non-functional requirements, such as service cost, security, performance, authorization, and authentication, should be well implemented and defined in computer systems. In this paper, we aim to present a systematic literature review to outline in detail different approaches of smart contracts generation. Furthermore, we present a comparison of the existing approaches based on a classification according to automation paradigm and a set of defined criteria. Finally, we discuss the gaps in the literature, as well as identify a set of potential challenges which can significantly strengthen the existing work. The study shows that the examined works focused only on a limited number of specific features, such as authorization, asset control, and security. Additionally, formal verification of smart contracts and data privacy are poorly addressed.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart contract; Automation; Smart contract generation

【发表时间】

【收录时间】2023-05-22

【文献类型】 综述

【DOI】 10.1007/s11227-023-05262-8

Menger or Marx? The political ontology of cryptocurrency

【Author】 Rector, Tully Allen, Jason Grant

【影响因子】2.273

【主题类别】

区块链治理-法律治理-数字货币监管

【Abstract】One of the perennial fault-lines in monetary theory is that between commodity and credit theories of money. The emergence of alternative payment systems based on blockchain and distributed ledger technologies, of which Bitcoin is the most prominent example, has raised a host of important questions in relation to this debate. This article considers two. The first is ontological: Are Bitcoin and similar 'cryptocurrencies' best conceived of as money? The second is political: Do these money candidates represent an emancipatory development over state-backed fiat currency? The ontological question, we will argue, invites the political one. If it is the case, as Chartalists maintain, that (i) for some X to be money it must have certain properties which can only be imparted by political authority (broadly understood) and if (ii) political authority ought to be subject to public control, then attempts by private actors to usurp a social 'money function' cannot count as legitimate political developments. We will argue in support of this position. This discussion is limited to Bitcoin, though its implications generalize for relevantly similar cryptocurrencies. Our method involves considering, first, claims made by Bitcoin's defenders about its status as money, and what accounts for that status. While these claims are often thought to extend Mengerite or generally Austrian lines of economic argument, they resonate more with Marx's theory of monetary value. Moreover, a close assessment of that theory's defects yields specific normative conclusions that potentially undermine the notion that Bitcoin constitutes a valid means of resisting state monetary authority.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrencies; Monetary theory; Value; Austrian economics; Marx

【发表时间】

【收录时间】2023-05-22

【文献类型】 观点阐述

【DOI】 10.1093/cje/bead008

Blockchain solutions for Local Energy Market

【Author】 Terruggia, Roberta Mauri, Giuseppe Tornelli, Carlo Zani, Alessandro

【影响因子】

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】Tools such as blockchain and smart contracts represent an interesting opportunity for various sectors including the electro-energy one. This paper describes the study and implementation of a Proof of Concept for the creation of local energy markets using blockchain technologies and smart contracts in order to ensure decentralization, transparency, trustworthiness and accountability.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Smart Contract; Local Energy Market

【发表时间】2022

【收录时间】2023-05-22

【文献类型】 实证数据

【DOI】 10.1109/BLORIN54731.2022.10027892

共识协议的形式化验证研究现状与展望

【作者】 葛宁;贺俞凯;翟树茂;李晓洲;张莉;

【作者单位】北京航空航天大学软件学院;软件开发环境国家重点实验室(北京航空航天大学);北京航空航天大学计算机学院;

【文献来源】软件学报

【复合影响因子】3.993

【综合影响因子】2.794

【主题类别】

区块链技术-核心技术-共识机制

【摘要】分布式系统在计算环境中发挥重要的作用,其中的共识协议算法用于保证节点间行为的一致性.共识协议的设计错误可能导致系统运行故障,严重时可能对人员和环境造成灾难性的后果,因此保证共识协议设计的正确性非常重要.形式化验证能够严格证明设计模型中目标性质的正确性,适合用于验证共识协议.然而,随着分布式系统的规模增大,问题复杂度提升,使得分布式共识协议的形式化验证更为困难.采用什么方法对共识协议的设计进行形式化验证、如何提升验证规模,是共识协议形式化验证的重要研究问题.对目前采用形式化方法验证共识协议的研究工作进行调研,总结其中提出的重要建模方法和关键验证技术,并展望该领域未来有潜力的研究方向.

【关键词】共识协议;;形式化验证;;限界模型检测;;定理证明;;布尔表达式可满足性理论;;可满足性模理论

【文献类型】 综述

【DOI】 10.13328/j.cnki.jos.006684

【发表时间】2023-05-22

基于区块链的动态可验证对称可搜索加密方案

【作者】 徐万山;张建标;袁艺林;

【作者单位】北京工业大学信息学部计算机学院;可信计算北京市重点实验室(北京工业大学);

【文献来源】软件学报

【复合影响因子】3.993

【综合影响因子】2.794

【主题类别】

区块链技术-核心技术-加密算法

【摘要】对称可搜索加密(symmetric searchable encryption,S SE)能实现密文数据的检索而不泄露用户隐私,在云存储领域得到了广泛的研究与应用.然而,在SSE方案中,半诚实或者不诚实的服务器可能篡改文件中的数据,返回给用户不可信的文件,因此对这些文件进行验证是十分必要的.现有的可验证SSE方案大多是用户本地进行验证,恶意用户可能会伪造验证结果,无法保证验证的公平性.基于以上考虑,提出一种基于区块链的动态可验证对称可搜索加密方案(verifiable dynamic symmetric searchable encryption,VDSSE);VDSSE采用对称加密实现动态更新过程中的前向安全;在此基础上,利用区块链实现搜索结果的验证,验证过程中,提出一种新的验证标签——Vtag,利用Vtag的累积性实现验证信息的压缩存储,降低验证信息在区块链上的存储开销,并能够有效支持SSE方案的动态验证.由于区块链具有不可篡改的性质,验证的公平性得以保证.最后,对VDSSE进行实验评估和安全性分析,验证方案的可行性和安全性.

【关键词】对称可搜索加密;;可验证;;区块链;;动态更新

【文献类型】 理论模型

【DOI】 10.13328/j.cnki.jos.006685

【发表时间】2023-05-22

区块链技术下碳会计信息审计系统:构建与应用

【作者】 王甲迎;

【作者单位】洛阳职业技术学院;

【文献来源】财会月刊

【复合影响因子】2.910

【综合影响因子】0.683

【主题类别】

区块链应用-实体经济-财会领域

【摘要】区块链赋予碳会计信息审计新定位,为企业践行碳达峰碳中和提供重要技术支撑。本文以区块链在审计领域的应用情况为切入点,探讨区块链技术在企业碳会计信息审计中的应用优势与技术特征。基于此,构建涵括碳会计信息审计数据计量、安全维护与业务管理三大子系统在内的碳会计信息审计系统。为推动碳会计信息审计系统落地,提出以下建议:多方联合制定碳会计信息审计准则,规范系统运行模式;重塑审计组织架构,契合系统运行需求;布局绿色新型基础设施,筑牢系统运行底座。

【关键词】区块链技术;;碳会计信息审计;;碳达峰碳中和;;绿色新基建

【文献类型】 理论模型

【DOI】 10.19641/j.cnki.42-1290/f.2023.10.014

【发表时间】2023-05-22

区块链嵌入的物质流成本会计:框架重构

【作者】 金友良;朱九九;曾辉祥;

【作者单位】中南大学商学院;

【文献来源】财会月刊

【复合影响因子】2.910

【综合影响因子】0.683

【主题类别】

区块链应用-实体经济-财会领域

【摘要】作为环境管理会计工具的物质流成本会计(MFCA),在供应链应用中遇到了信息不对称、MFCA数据信息系统建设不完善等瓶颈。本文借助区块链特征及技术手段,在分析区块链与MFCA耦合机理的基础上,以PDCA管理模式为主线,构建MFCA的区块链数据信息管理系统,设计基于共识机制和智能合约的MFCA核算与分析流程,运用区块链的信任机制、协作机制、激励机制、监督机制,提出完善MFCA管理体系的措施,并运用案例探讨区块链嵌入的MFCA在供应链中的具体实施方案。

【关键词】物质流成本会计;;区块链;;供应链管理;;MFCA;;PDCA

【文献类型】 理论模型

【DOI】 10.19641/j.cnki.42-1290/f.2023.10.015

【发表时间】2023-05-22

计及碳配额与电量协同的双链耦合交易模型

【作者】 龚钢军;袁琳琳;张英丽;杨晟;武昕;

【作者单位】北京市能源电力信息安全工程技术研究中心(华北电力大学);国网冀北张家口供电公司;

【文献来源】电力建设

【复合影响因子】2.558

【综合影响因子】1.954

【主题类别】

区块链应用-实体经济-电力领域

【摘要】电力系统低碳转型要求“多线出击”,仅依靠消纳高比例新能源难度日益增大,只有做到电、碳多元发展,才能实现全链条优化。在综合考虑碳配额与电量之间的关联度、匹配度和相对自由度等协同关系的基础上,研究“源网荷”各环节的各主体参与碳配额和电量的协同交易模式,构建碳配额与电量的双因素交易场景模型;结合具备弱中心化、分布式交易等特征的区块链技术与电碳市场构建的天然吻合性,研究碳配额交易链与电量交易链的耦合交易模型;以源端火力发电厂和清洁能源电厂为例,提出了双链下省级区域内各电厂间碳配额和发电量指标的交易模型架构。通过智能合约,将基于粒子群算法的多目标搜索优化算法进行程序化的脚本运行,实现对发电量指标交易模型的仿真和验证,同时对碳配额交易模型进行可行性分析,证实了所提交易方案的适应性和有效性,为电碳市场的构建提供参考。

【关键词】低碳转型;;区块链;;碳配额;;发电量指标;;电碳市场

【文献类型】 实验仿真

【DOI】

【发表时间】2023-05-22

基于区块链的能源电力数据验证与溯源模型

【作者】 李达;郭庆雷;王栋;王伟贤;周冬旭;

【作者单位】国网数字科技控股有限公司;国家电网有限公司区块链技术实验室;国网区块链科技(北京)有限公司;国网江苏省电力有限公司南京供电公司;国网北京市电力公司;

【文献来源】中国电力

【复合影响因子】2.333

【综合影响因子】1.944

【主题类别】

区块链应用-实体经济-电力领域

【摘要】针对能源电力项目工程数据生成过程中多节点之间信息流转不及时、信息易被篡改以至于数据追溯和存证验证困难的问题,设计了基于区块链的能源电力数据验证与追溯模型,利用访问控制和身份认证对数据进行上链验证存储,并且通过智能合约自动授权将数据开放给特定权限的用户,实现相关参与角色之间的信息互通,使得上链数据可以有效追溯。同时,引入链上数据评分卡机制,对相关人员的数据上链操作进行在线评价督促,提出了加入跨链实时验证方法,以确保链上文件数据内容的跨链有效可验,从而解决了能源电力场景中存在的数据存取验证与追溯模型机制关联性的问题。

【关键词】区块链;;电力数据;;追溯验证;;智能合约

【文献类型】 理论模型

【DOI】

【发表时间】2023-05-22

用于实现区块链隐私保护的属性基加密方案

【作者】 马海峰;李玉霞;薛庆水;杨家海;高永福;

【作者单位】上海应用技术大学计算机科学与信息工程学院;清华大学网络科学与网络空间研究院;

【文献来源】计算机应用

【复合影响因子】2.197

【综合影响因子】1.475

【主题类别】

区块链技术-协同技术-密码学

【摘要】要解决区块链账本公开带来的安全问题,关键在于对私密信息的隐藏。本文中提出使用多属性机构的属性基加密来实现区块链数据的隐私保护。相比单一属性机构,多属性机构在实现权力分散的同时避免了任何单点故障。首先方案修改了密钥组件生成算法,每个属性机构把用户身份作为参数来生成私钥组件,防止节点合谋访问无权访问的数据。然后修改了基于身份的签名技术来建立用户身份与钱包地址之间的连接,让区块链变得可监管的同时还能对非法用户进行可追溯。最后,基于DBDH(Determining the Bilinear Diffie-Hellman)假设,在随机预言模型中证明了该方案的安全性,同时实验结果表明,与基于椭圆曲线上的环签名的区块链隐私保护方案和支持关键字遗忘搜索的区块链隐私保护方案相比,在生成相同区块个数的情况下,本方案用时最少,更具可行性。

【关键词】区块链;;隐私保护;;可监管;;属性基加密;;链上数据

【文献类型】 实验仿真

【DOI】

【发表时间】2023-05-22

基于PSO-GA的分片区块链系统性能优化方法

【作者】 蒋腾聪;张建山;郑鸿强;陈星;

【作者单位】福州大学计算机与大数据学院;空间数据挖掘与信息共享教育部重点实验室;福建省网络计算与智能信息处理重点实验室(福州大学);

【文献来源】小型微型计算机系统

【复合影响因子】1.734

【综合影响因子】1.304

【主题类别】

区块链技术-核心技术-分片区块链

【摘要】在这篇文章中,针对分片区块链(Sharded Blockchain)系统性能优化问题,提出了一种结合粒子群和遗传算法的系统性能优化方法(PSO-GA),目的是为了在尽可能满足当前网络环境情况下,提升其系统吞吐量。该方法考虑分片区块链中节点的计算能力、恶意节点的概率以及节点之间的传输速率等不同网络环境下,找到响应网络状态的最佳分片区块链系统参数;为了避免传统粒子群优化算法陷入局部最优的问题,引入遗传算法中的交叉操作和变异操作,有效提高方法的准确性。通过大量仿真实验对方法的有效性进行验证分析。实验结果表明,相比于其他的方法,本文所提出的方法可以在更短的时间取得更高的系统吞吐量。

【关键词】分片区块链;;可扩展性;;粒子群算法;;遗传算法

【文献类型】 实验仿真

【DOI】

【发表时间】2023-05-22

盗窃NFT行为性质研究——以财产与数据的区分为视角

【作者】 詹红星;李漫惠;

【作者单位】中南大学法学院;

【文献来源】南京邮电大学学报(社会科学版)

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-法律治理-NFT立法

【摘要】NFT属虚拟财产,在侵犯虚拟财产行为规制问题上,广大学者倡导应回归财产犯罪规制路径,引入数据分层理论。在数据信息内容层,NFT是可感知的虚拟财产,而私钥则是纯粹的数据排列,由此非法获取NFT私钥的行为涉及数据犯罪,而NFT本体则是财产犯罪的对象,窃取NFT之行为盗窃罪成立。NFT盗窃分为直接针对平台的盗窃和先获取私钥后盗取NFT两种情形,前者无关私钥一般仅涉及盗窃罪;后者则手段行为和目的行为紧密联系,当前后行为都成立犯罪时是牵连犯;在尚未转移占有NFT时,则可能成立数据犯罪和盗窃罪的犯罪预备之想象竞合。对NFT盗窃既遂数额的认定也需将NFT分为有价凭证与无体物两大类型。

【关键词】NFT;;财产犯罪;;数据犯罪;;数据分层;;盗窃罪

【文献类型】 观点阐述

【DOI】 10.14132/j.cnki.nysk.20230428.001

【发表时间】2023-05-22

警惕利用加密数字货币实施新型腐败

【作者】 阚道远;

【作者单位】复旦大学马克思主义学院;复旦大学党建研究院;

【文献来源】人民论坛

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-法律治理-数字货币监管

【摘要】加密数字货币作为一种基于互联网技术的虚拟货币,其匿名性、分布式、去中心化和全球流通等特征,与受贿、洗钱等违法犯罪活动具有较强的现实关联,成为新型腐败的一种特殊路径和载体。要深入研究网络技术发展和金融产品创新对反腐败斗争的影响,密切关注利用加密数字货币实施新型腐败的新动向和新特点,加强对加密数字货币廉政风险的教育和警示,完善制度供给,加大对新型腐败的防范和惩治力度,不断提升金融管理技术水平并开展综合治理。

【关键词】加密数字货币;;新型腐败;;隐性腐败

【文献类型】 观点阐述

【DOI】

【发表时间】2023-05-22

基于边缘计算的收益激励算法对区块链分片的优化

【作者】 刘云;朱鹏俊;陈路遥;宋凯;

【作者单位】昆明理工大学信息工程与自动化学院;

【文献来源】山东大学学报(理学版)

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-协同技术-边缘计算

【摘要】在基于边缘计算的区块链中可以通过分片来提高吞吐量,但分片会降低区块链的稳定性,且同一分片内的节点可能会因距离较远增加区块传播时间,因此需要一种分片方案能够在不降低吞吐量的同时提高区块链系统的稳定性。本文提出一种收益激励(PI)算法,首先针对单个节点计算其生成一个区块的延迟和能耗,计算出该节点处理任务的最终收益;其次根据基于边缘计算的可信度模型计算出该节点的平均分片可信度,在不降低其他节点收益和平均分片可信度的同时,该节点选择能够最大化其收益的分片;最后得到所有节点收益和分片可信度均最大化的分片结构。仿真结果表明,在基于边缘计算的区块链分片中,与OmniLedger、DBSS和ERCS三种算法进行比较,PI算法能够在保证吞吐量不降低的情况下,提高区块链系统的稳定性。

【关键词】边缘计算;;区块链;;分片;;稳定性

【文献类型】 理论模型

【DOI】

【发表时间】2023-05-22

马克思主义政治经济学视角下的数字货币发展路径研究

【作者】 孙馨月;陈艳珍;

【作者单位】中国科学院大学马克思主义学院;中共山西省委党校公共管理教研部;

【文献来源】经济问题

【复合影响因子】

【综合影响因子】

【主题类别】

区块链治理-市场治理-数字货币

【摘要】加快发展数字经济,是加快建设现代化经济体系,完整、准确、全面贯彻新发展理念,加快构建新发展格局,着力推动高质量发展的有效途径。数字货币是区块链技术的重要应用之一,经过飞速发展,规模不断扩大,引起了广泛的关注。数字货币利用分布式记账技术、时间戳技术等区块链相关技术,依托互联网平台,形成一个去中心化、匿名化、交易成本低、交易效率高的电子交易系统。从马克思主义政治经济学的视角分析,数字货币是商品经济发展的结果,是一种新的商品价值形式,具有独特的信用搭建机制。但由于发展不完善,在应用方面还存在技术不成熟、币值不稳定、与现有货币制度存在冲突等问题,在未来仍需重视数字货币的发展情况,完善监督监管机制,推动数字经济发展,助推中国经济实现高质量增长。

【关键词】数字货币;;区块链技术;;商品价值形式;;马克思主义政治经济学

【文献类型】 观点阐述

【DOI】 10.16011/j.cnki.jjwt.2023.06.002

【发表时间】2023-05-22

在线标注

备案号: 苏ICP备17025947号-5

评论回复