• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2023年07月13日 22篇

文献来源

  • 11
  • 11

主题分类

      • 1
      • 1
      • 2
      • 1
      • 1
      • 1
      • 1
      • 1
      • 4
      • 1
      • 1
      • 1
      • 2
      • 1
      • 3
      • 1
      • 1
      • 1
      • 1

文献类型

  • 9
  • 8
  • 3
  • 1
  • 1
筛选
订阅
<< 前一天 后一天 >>

FedTwin: Blockchain-Enabled Adaptive Asynchronous Federated Learning for Digital Twin Networks

【Author】 Qu, Youyang Gao, Longxiang Xiang, Yong Shen, Shigen Yu, Shui

【影响因子】10.294

【主题类别】

区块链技术-协同技术-联邦学习

区块链技术-协同技术-数字孪生

【Abstract】The fast proliferation of digital twin (DT) establishes a direct connection between the physical entity and its deployed digital representation. As markets shift toward mass customization and new service delivery models, the digital representation has become more adaptive and agile by forming digital twin networks (DTNs). The DTN institutes a real-time single source of truth everywhere. However, there are several issues preventing DTNs from further application, including centralized processing, data falsification, privacy leakage, lack of incentive mechanism, and so on. To make DTN better meet the ever changing demands, we propose a novel block-chain-enabled adaptive asynchronous federated learning (FedTwin) paradigm for privacy-preserving and decentralized DTNs. We design Proof-of-Federalism (PoF), which is a tailor-made consensus algorithm for autonomous DTNs. In each DT's local training phase, generative adversarial network enhanced differential privacy is used to protect the privacy of local model parameters, while a modified Isolation Forest is deployed to filter out the falsified DTs. In the global aggregation phase, an improved Markov decision process is leveraged to select optimal DTs to achieve adaptive asynchronous aggregation while providing a rollback mechanism to redact the falsified global models. With this article, we aim to provide insights to forthcoming researchers and readers in this under-explored domain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Training; Adaptation models; Computational modeling; Task analysis; Blockchains; Privacy; Digital twins

【发表时间】2022

【收录时间】2023-07-13

【文献类型】 实验仿真

【DOI】 10.1109/MNET.105.2100620

Autonomous Collaborative Authentication with Privacy Preservation in 6G: From Homogeneity to Heterogeneity

【Author】 Fang, He Wang, Xianbin Xiao, Zhenlong Hanzo, Lajos

【影响因子】10.294

【主题类别】

区块链技术-协同技术-6G

区块链技术-协同技术-隐私保护

【Abstract】The emerging collaborative authentication schemes are capable of outperforming the conventional isolated methods as a benefit of their multi-dimensional data/information gleaned, but they face new challenges in the sixth generation (6G) wireless networks owing to their increased overhead, limited flexibility and autonomy. Moreover, they may also be vulnerable to the privacy leakage of individual entities. These challenges are mainly due to the complex heterogeneous network architecture, owing to the distributed nature of the devices and information involved as well as the diverse security requirements of the 6G-aided vertical systems. As a remedy, we introduce autonomous collaborative authentication for achieving security enhancement through the situation-aware cooperation of different security mechanisms, of heterogeneous security information/context, and of heterogeneous devices and networks. For this purpose, a federated learning-based collaborative authentication scheme capable of privacy-preservation is developed, where cooperative peers observe and locally analyze heterogeneous information of the authenticating device, and afterwards update their authentication models locally. By sharing their authentication models rather than directly sharing the observed authentication information, privacy preservation can be achieved based on the proposed scheme. Moreover, given the time-varying heterogeneous network environment and the wide range of quality-of-service (QoS) requirements, the membership of the group collaborating in support of distributed authentication is updated based on the situation-dependent conditions. To further reduce the communication overhead, a locally collaborative learning process is further developed, where both the updated parameters and observed authentication information are stored and processed locally at the cooperative peers. Finally, a smart contract is designed for achieving collaborative security combined with privacy preservation and for providing accountable services.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Security; Collaboration; Peer-to-peer computing; 6G mobile communication; Reliability; Privacy

【发表时间】2022

【收录时间】2023-07-13

【文献类型】 理论模型

【DOI】 10.1109/MNET.002.2100312

Trusted fingerprint localization for multimedia devices based on blockchain

【Author】 Guan, Zhenyu Liu, Zhiting Wen, Xiaoqing Wan, Qinjun Xu, Wenhan

CCF-B

【影响因子】8.233

【主题类别】

区块链应用-实体经济-多媒体领域

【Abstract】The localization process is necessary for intelligent multimedia systems to provide appropriate service, but it is still a significant challenge to provide localization services for devices without active localization ability. The vulnerability of existing localization frameworks is that the incredibility of the information provided can not be verified. This remains the localization process vulnerable to forgery attacks, which can cause false localization results and impact the performance of intelligent multimedia systems. To address this problem, a blockchain-based fingerprint localization scheme is proposed and evaluated in this article. Firstly, A real-time database of verified and temper-proof electromagnetic fingerprints is established by collecting the information from contributors through blockchain. Secondly, a distributed algorithm is designed to obtain a trusted localization based on shared electromagnetic fingerprint information. Lastly, to save on-chain computing resources and defend against spoofing attacks and collusion attacks, an on-chain/off-chain scheme is proposed. The simulations show the practicability and robustness of the proposed scheme. The results are analyzed based on localization accuracy and resistance to malicious activities. It is shown that devices can be located without increasing location errors in malicious environments where 20% of data is uploaded by malicious nodes, and the localization results become more accurate as the decentralized database spontaneously established is expanded.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Internet of multimedia things; Positioning; Smart contract; Off-chain computing

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 实验仿真

【DOI】 10.1016/j.ins.2023.119231

Efficient consensus algorithm based on improved DPoS in UAV-assisted mobile edge computing

【Author】 Song, Mingyang Li, Chunlin Ye, Jingsong Gong, Xunqiang Luo, Youlong

CCF-C

【影响因子】5.047

【主题类别】

区块链应用-实体经济-无人机

区块链技术-核心技术-共识机制

【Abstract】Aiming at the problems of low decentralization, low motivation for node voting, and malicious behavior of nodes for the traditional DPoS consensus mechanism in the blockchain-based UAV-assisted mobile edge computing environment, this paper proposes an improved DPoS-based consensus mechanism approach. First, the framework of a blockchain-based UAV-assisted mobile edge computing system is given, and the consensus mechanism design problem in this framework is analyzed. Second, a proxy node selection model is established based on the rights and votes obtained by the blockchain nodes, and the proxy nodes are selected to participate in the consensus process of the current cycle. Then, the voting behavior, block generation behavior, and block verification behavior of nodes are classified into positive and malicious behaviors to reward and punish the reputation value of nodes. Finally, a blockchain-based UAV-assisted mobile edge computing experimental environment is built, and the TDPoS algorithm, ADRP algorithm, and RDPoS algorithm are used as benchmark algorithms to experimentally compare with the proposed improved DPoS consensus-based algorithm. The experimental results show that the algorithms in this paper can improve network throughput, reduce block-out delay, and increase the proportion of secure proxy nodes.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Consensus algorithm; DPoS; UAV-assisted mobile edge computing

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 理论模型

【DOI】 10.1016/j.comcom.2023.05.008

Application of Blockchain Technology for Microgrid Restoration

【Author】 Mishra, Abhisek Jena, Premalata

【影响因子】4.825

【主题类别】

区块链应用-实体经济-电力领域

【Abstract】In this paper, a novel microgrid (MG) restoration framework is proposed based on Blockchain Technology (BCT). The proposed method consists of a two-stage restoration process. In the first stage, stable Blockchain (BC) links are formulated with the grid-forming Distributed Energy Resources (DERs). In the second stage, load assignment is carried out based on the priority level of the load. The miners run through the consensus mechanism to accommodate the priority-based loads to their corresponding BC links. The consensus mechanism provides the value of an index, known as Combined Stability Measurement (CSM). The BC link, with the higher CSM value, is declared as the winner of the consensus mechanism. Subsequently, the targeted priority load is assigned to that winner BC link. The proposed BCT-based restoration framework is tested with the modified IEEE-33 and IEEE-69 bus test systems using the Ethereum blockchain platform.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Microgrids; Power system stability; Security; Peer-to-peer computing; Uncertainty; Stability criteria; Consensus protocol; Microgrid restoration; microgrid stability margin; blockchain technology; combined stability measurement

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 理论模型

【DOI】 10.1109/TPWRD.2022.3226659

The intention to use cryptocurrency: A meta-analysis of what we know

【Author】 Bommer, William H. Milevoj, Emil Rana, Shailesh

【影响因子】4.359

【主题类别】

区块链治理-元分析-数字货币

【Abstract】Cryptocurrency has gained in popularity in emerging markets, however the knowledge accumulation pertaining to factors contributing to intention to use cryptocurrency has been limited. To address this gap, we meta-analyzed 42 samples from multiple theoretical approaches. Seven common antecedents to intention to use cryptocurrency were assessed, as well as six moderators via meta-regression. A regression model to explain the intention to use cryptocurrency was calculated, and relative importance analysis determined the weight of each variable in predicting cryptocurrency use intention. The findings highlight factors influencing intention to use cryptocurrency in emerging markets and refine theoretical models for future research.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency; Bitcoin; Emerging markets; meta -analysis; UTAUT; Technology adoption

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 实证数据

【DOI】 10.1016/j.ememar.2022.100962

Blockchain and NFTs-Based Trades of Second-Hand Vehicles

【Author】 Butera, Alberto Gatteschi, Valentina Prattico, Filippo Gabriele Novaro, Daniela Vianello, Deborah

【影响因子】3.476

【主题类别】

区块链应用-实体经济-车辆领域

【Abstract】Recently, the automotive industry has been characterized by disruptive innovations, like self-driving cars or hybrid/electric engines. Despite this fact, some operations, such as the trade of second-hand vehicles, still continue to be carried out in the "traditional" way, in which the buyer has to trust the seller about the state of the vehicle. Several studies highlighted that odometer fraud alone could cost around 8.9 billion euros per year. In order to overcome these limitations, which are related to information asymmetries between buyers and sellers, in this work we propose to exploit blockchain technology to store a previous vehicle's history in a transparent way. To further explore blockchain advantages, we also present how a decentralized second-hand vehicle market- enabling also automatic transfers of ownership upon monetary transfers- can be built, leveraging on Non-Fungible Tokens (NFTs). We propose an architecture and a practical implementation of a Decentralized Application (Dapp) and discuss the security of the proposed system, its costs, and future developments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; decentralized marketplaces; digital passport; ERC Standards; Ethereum; NFTs; second-hand vehicles trading; smart contracts; used vehicles

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2023.3284676

Improved Virtual Synchronous Generator Principle for Better Economic Dispatch and Stability in Grid-Connected Microgrids with Low Noise

【Author】 Singh, Shruti Gao, David Wenzhong

【影响因子】3.252

【主题类别】

区块链应用-实体经济-电力领域

【Abstract】The proper operation of microgrids depends on Economic Dispatch. It satisfies all requirements while lowering the microgrids' overall operating and generation costs. Since distributed generators constitute a large portion of microgrids, seamless communication between generators is essential. While guaranteeing a reliable microgrid operation, this should be achieved with the fewest losses as possible. The distributed generator technology introduces noise into the system by design. To find the best economic dispatch strategy, noise was considered in this research as a limitation in grid-connected microgrids. The microgrid's performance was improved, and the proposed technique also showed increased resilience. A virtual synchronous generator (VSG) control approach is proposed with a noiseless consensus-based algorithm to improve the power quality of microgrids. Voltage and frequency regulation modules are the foundation of the VSG paradigm. The synchronous generator's second-order equation (hidden-pole configuration) was also used to represent the voltage of the stator and rotor motion. This study compared changes in power, frequency, and voltage for the microgrid by utilizing the described control approach using MATLAB. According to the findings, this method aids in controlling load and noise variations and offers distributed generators an efficient control strategy.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】microgrids; virtual synchronous generator; consensus-based algorithm; economic dispatch; power systems; distributed generators

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 实验仿真

【DOI】 10.3390/en16124670

Assessing linkages between alternative energy markets and cryptocurrencies

【Author】 Naeem, Muhammad Abubakr Gul, Raazia Farid, Saqib Karim, Sitara Lucey, Brian M.

【影响因子】2.000

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】Surmounted environmental concerns and energy challenges have created an augmented awareness among the public and policymakers about alternate energy resources. Using a network approach, this paper aims to investigate the dependence between cryptocur-rencies and the alternative energy market using data from January 1, 2018, to December 23, 2021. For this investigation, first, we build a static dependency network for a given set of variables using partial correlations. Then, we demonstrate within-system connec-tions in a minimum spanning tree (MST) to assess the centrality of all variables. Finally, rolling-window estimations are made to exhibit time variations in both dependency and centrality networks. We find that clean alternative markets (SPGCE, ELEVHC & WILCE) and ETH are net risk transmitters to other markets and system-wide net contributors. We also demonstrate how SPGCE is essential for tying together the various parts of the networks and provide convincing evidence of time-varying within-system dependency. Our thorough examination of the dependency analysis offers significant insights to macroprudential reg-ulators, policymakers, and portfolio managers, enabling them to safeguard the most vul-nerable markets and choose the best legislative and policy measures to protect investors' interests in the face of unforeseen financial and economic conditions.& COPY; 2023 The Author(s). Published by Elsevier B.V. This is an open access article under the CC BY license ( http://creativecommons.org/licenses/by/4.0/ )

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 实证数据

【DOI】 10.1016/j.jebo.2023.04.035

Towards Forensics Investigation of Blockchain-based Healthcare Applications

【Author】 Zehra, Farzeen Javed, Maha Hyder, Muhammad Faraz Tariq, Sheikh Muhammad Ahsan

【影响因子】1.877

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Blockchain, an emerging technology benefits the new technological world from its features such as immutability, transparency, and decentralization. The diversity of its domain is from e-commerce, health care, real estate, and enterprise to NFT markets, voting, and digital currency trading. The underlying blockchain features make auditing blockchain applications a challenging task. In this paper, we thoroughly analyze the general challenges faced in blockchain forensics, application-specific challenges, and challenges with respect to public and private blockchains. The aim of this paper is to highlight the challenges faced during the forensics of blockchain-based applications. For this, we took a healthcare system, introduced a contract vulnerability in it, and defined two scenarios for attack depending on that vulnerability. One that allows an attacker to make a malicious transaction directly and the other in which the attacker first gives itself access and then adds malicious transactions. The attacks are generated just to analyze the difficulty level of forensics in blockchain applications. To achieve our goal, we performed log analysis for both scenarios and specified the challenges faced during the analysis. Our experiment shows that due to some blockchain-specific features such as anonymity, identification of malicious entities in the system sometimes becomes a hectic challenge. This research benefits the auditors by highlighting the forensics challenges and auditing issues so they can work on these areas to identify the attackers and illegal data modifications accurately in blockchain applications. Experimental results confirmed that our proposed technique enabled efficient forensics investigation of events inside blockchain-based healthcare applications.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Auditing; blockchain; digital forensics

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 实验仿真

【DOI】 10.1080/03772063.2023.2226106

A formal model for blockchain-based consent management in data sharing

【Author】 Peyrone, Neda Wichadakul, Duangdao

【影响因子】1.088

【主题类别】

区块链技术-协同技术-数据管理

【Abstract】Consent is one of six legal bases for personal data processing mentioned in the General Data Protection Regulation (GDPR). The GDPR is a privacy law giving European Union (EU) citizens authority over personal data. It enforces software systems to collect, analyze, and share only necessary information ('data minimization') following the specific purpose ('consent'). The GDPR defines consent as permission of individuals ('data subjects') to give organizations ('data controllers') processing their personal data. Without a data subject's consent, the data controller processes personal data unlawfully. Therefore, consent management is an essential component of a software system to build data subjects' trust and engagement. However, sharing data can lead to a potential loss of control over personal data, as data are across boundaries between software services. One of the significant risks is caused by a lack of developers' experience in data protection practices. Hence, in this paper, we propose to use blockchain technology to manage data subjects' informed consent for data sharing to build trust, transparency, and traceability to share data across software services. We formalized the semantics of smart contracts to extend the blockchain features to validate the consent authorization and manage the request-response interaction between the services. Furthermore, we used the Event-B method to describe the dynamic behavior of the proposed model and prove its correctness. Finally, we provided a mapping from the formal model to a smart contract class diagram and a prototype called SmartDataTrust implemented with solidity and Python REST API that developers can easily utilize. & COPY; 2023 Elsevier Inc. All rights reserved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】GDPR; Data protection; Privacy by design; Consent management; Event-B; Smart contracts

【发表时间】2023

【收录时间】2023-07-13

【文献类型】 理论模型

【DOI】 10.1016/j.jlamp.2023.100886

元宇宙图书馆:内涵衍变、建设发展与问题应对

【作者】 梁荣贤;李通;凌征强;

【作者单位】广州城建职业学院图书馆;广州涉外经济职业技术学院图书馆;广州番禺职业技术学院图书馆;

【文献来源】图书馆工作与研究

【复合影响因子】2.830

【综合影响因子】2.536

【主题类别】

区块链应用-实体经济-智慧图书馆

【摘要】文章基于元宇宙时代图书馆向一体化平台衍变、馆员向智慧馆员衍变、用户向数字用户衍变、资源向数字资产衍变、服务向多元化方式衍变的特点,探讨技术融合应用、资源智能捕捉、用户自主建设、馆员转型发展、应用场景落地等元宇宙时代图书馆的发展趋势,并提出化解元宇宙图书馆与现实图书馆的价值取向冲突、制定元宇宙图书馆内在运行规则、维系元宇宙图书馆和现实图书馆的良性互动等元宇宙图书馆发展需应对的问题。

【关键词】元宇宙;;图书馆;;智慧图书馆;;虚拟图书馆;;数字孪生图书馆

【文献类型】 观点阐述

【DOI】 10.16384/j.cnki.lwas.2023.06.015

【发表时间】2023-07-13

自适应节点规模的区块链分片可扩展模型

【作者】 李宝莹;李志淮;王成爱;杨锋;

【作者单位】大连海事大学信息科学技术学院;

【文献来源】计算机工程

【复合影响因子】1.808

【综合影响因子】1.289

【主题类别】

区块链技术-核心技术-扩展方案

【摘要】分片是解决区块链可扩展性问题的最核心技术之一。然而,现有的分片方案普遍采用预定分片规模的静态分片方式,这与公链开放的、低门槛的分布式环境不相匹配。当网络中的节点数大幅增加时,静态分片方式难以及时充分地发挥全部节点的性能;反之,在网络中节点数大幅减少的情况下,它又会增加分片内的安全隐患。为此,提出了一种自适应节点规模变化的动态分片可扩展模型(Danymic Sharding Scalable Model,DSSM)。该模型在基础分片的基础上,建立了合二归一的分层的逻辑分片。该模型支持状态归约,允许节点在不同层级的分片上进行状态同步。同时,在逻辑分片与基础分片间建立一种满二叉树的逻辑关系,由此来实现分片规模的自适应地调整:通过分片的动态分裂来扩张分片的规模,通过分片的动态合并来收缩分片的规模。实验表明,当节点数量大幅增多时,DSSM能够通过自适应地扩展分片的规模使得吞吐量得到近乎翻倍地提升;而当节点数量大幅减少时,DSSM通过自适应地收缩分片的规模,从而保证了网络的最低安全要求。

【关键词】自适应;;节点规模;;状态分片;;归约节点;;状态冗余

【文献类型】 理论模型

【DOI】 10.19678/j.issn.1000-3428.0066930

【发表时间】2023-07-13

一种基于区块链的身份鉴证与授权机制

【作者】 林飞龙;岳跃栋;郑建辉;陈中育;李明禄;

【作者单位】浙江师范大学数学与计算机科学学院;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链技术-协同技术-身份验证

【摘要】身份信息滥用是社会顽疾问题。文中提出了一种基于区块链的身份鉴证与授权(Blockchain-based Identity Authentication and Authorization, BIAA)机制,该机制要求用户主体在对业务进行身份授权时提供有效身份证件和生物特征信息,确保业务为本人授权;同时将业务信息及身份授权写入区块链账本,进一步实现业务的安全存证与可追溯。为构建该机制,提出了“身份注册-身份授权”星形多区块链架构,身份注册链采用可控联盟链方式,由身份管理权威机构对身份信息注册实施管理,并提供身份鉴证服务;身份授权链可由各行业在获得权威机构许可后构建,其提供的相应业务在身份鉴证确认后,与身份授权信息写入身份授权链。在技术实现上,设计了一个身份注册-鉴证-授权(Identity Register-Authenticate-Authorize, IRAA)终端,将用户生物信息和身份证件信息读取后利用哈希运算转化为密文,确保用户明文信息不上线;设计了身份鉴证协议,实现身份鉴证链为各身份授权链提供身份鉴证服务,协议过程以密文形式进行;设计了身份授权通用智能合约,实现对应用业务的身份授权管理与存证。最后利用二代身份证和指静脉纹作为身份信息构建了原型系统,验证了BIAA机制的安全性、可行性与有效性,为解决身份信息滥用问题提供有价值的参考。

【关键词】身份信息安全;;身份鉴证;;身份授权;;区块链;;智能合约

【文献类型】 理论模型

【DOI】

【发表时间】2023-07-13

基于CPN的供应链合约的形式化验证

【作者】 郑红;钱诗慧;刘泽润;杜渂;

【作者单位】华东理工大学信息科学与工程学院;电信科学技术第一研究所;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链应用-实体经济-供应链

区块链技术-核心技术-智能合约

【摘要】智能合约的安全性对于区块链在供应链领域的应用尤为重要。目前,大多数对智能合约的形式化验证工作集中于漏洞检测,对于如何在部署上链前生成安全的智能合约的关注仍然比较少,如何有效规范地将特定领域的属性安全地映射为智能合约代码存在难点。因此,提出在编写合约前基于CPN(Coloured Petri Net)对供应链业务逻辑进行形式化规范并构建双层仿真模型,以图形化界面描述交易状态变化,进行形式化验证和状态分析,从而在建模阶段就减少逻辑漏洞。最后,提供了一种从CPN建模语言到Solidity编写的合约的转换方法,以提高智能合约的安全性和可靠性。

【关键词】智能合约;;形式化方法;;模型检查;;CPN;;供应链

【文献类型】 实验仿真

【DOI】

【发表时间】2023-07-13

区块链架构下医疗数据共享的三方演化博弈研究

【作者】 杨健;王开选;

【作者单位】山西财经大学信息学院;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链应用-实体经济-医疗领域

【摘要】为促进健康医疗大数据的发展,积极推动医疗数据安全共享,基于区块链架构,构建了系统管理方、数据提供方和数据需求方的三方演化博弈模型。首先,将前景理论与演化博弈模型相结合,利用前景价值函数对传统演化博弈的变量和参数进行改进;其次,讨论博弈均衡存在的可能性及其演化趋势;最后,通过数值模拟探讨不同因素对区块链架构下医疗数据共享各参与方的决策影响。结果表明,初始策略选择对博弈策略稳定性有显著影响。通过提高系统管理方的监管收益、降低数据提供方的感知损失以及提高数据需求方举报不合规行为的补偿可以加快系统的演化进程,增强参与方之间的信任,进而促进信任关系的形成。

【关键词】区块链;;医疗数据共享;;前景理论;;演化博弈

【文献类型】 实证数据

【DOI】

【发表时间】2023-07-13

基于多变量公钥密码系统的环机密交易协议

【作者】 洪璇;袁梦玲;

【作者单位】上海师范大学信息与机电工程学院;上海师范大学上海智能教育大数据工程技术研究中心;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链技术-核心技术-密码学

【摘要】与比特币类似,门罗币也是一种加密货币。最初的门罗币是基于CryptoNote协议,该协议使用环签名和一次密钥来隐藏交易双方的真实身份,但是具体的交易金额却暴露在区块链中,存在一定的安全风险。为了解决这个安全漏洞,Shen Noether提出了环机密交易协议(RingCT),利用一个随机数来隐藏真正的交易金额。目前门罗币社区使用的环机密交易协议是基于离散对数难题的。然而随着量子计算机的发展,基于传统数论问题的方案将变得不再安全,后量子方案是一个很好的替代选择。多变量公钥密码学是后量子密码的主要研究方向之一,并且相较于其他后量子密码方案,基于多变量的签名方案往往在签名和验证过程中计算速度快、所需计算资源少,具有很好的研究价值。在多变量环签名方案的基础上,设计了一个基于多变量的环机密交易协议。该协议利用多变量签名方案公钥的加法同态性实现了对交易金额的承诺,并对此承诺进行环签名,通过随机选择区块链中的用户公钥成环,来混淆交易中实际的交易参与者的身份。同时在交易产生过程中会利用交易者的私钥生成唯一一个key-image,并让其参与签名生成过程,成为签名的一部分,通过比对此部分可以有效防止交易双花。在随机预言机模型中证明了本文方案的安全性,并且相比基于格的后量子安全的环机密交易协议,所提方案在签名效率以及验证效率方面都更具优势。

【关键词】多变量公钥密码;;后量子;;环签名;;环机密交易协议;;同态承诺

【文献类型】 实验仿真

【DOI】

【发表时间】2023-07-13

基于可跟踪环签名的拜占庭容错共识算法

【作者】 涂俊;贾东立;王津;

【作者单位】河北工程大学信息与电气工程学院;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链技术-核心技术-共识机制

【摘要】针对联盟链的实用拜占庭容错(PBFT)共识算法在共识过程中节点间的隐私保护弱、网络结构静态、选取主节点不可靠和通信开销大的问题,提出一种基于可跟踪环签名的拜占庭容错共识算法(tracePBFT)。首先,随机将节点分为主域节点和副域节点并且赋予其不同的权量,选择权重高的主域节点为主节点;然后在准备阶段引入可追踪环签名对节点进行隐私保护,并且节点可以通过权重选择可靠节点,在确认阶段验证签名和跟踪拜占庭节点;最后适当惩罚拜占庭节点。这样选择的主节点更加可靠,减少因主节点出错而更换视图导致的通信开销。实验结果表明,相比传统的PBFT算法,tracePBFT算法在通信复杂度、安全性、吞吐量等方面均有一定的提高。

【关键词】联盟链;;实用拜占庭容错共识算法;;可跟踪环签名;;主节点

【文献类型】 理论模型

【DOI】

【发表时间】2023-07-13

基于可验证随机函数的实用拜占庭共识算法

【作者】 黄保华;彭丽;赵伟宏;陈宁江;

【作者单位】广西大学计算机与电子信息学院;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链技术-核心技术-共识机制

【摘要】针对联盟链中广泛应用的实用拜占庭容错共识算法(Practical Byzantine Fault Tolerance, PBFT)主节点选取方式固定和通信成本高等问题进行了改进,提出了一种基于可验证随机函数(Verifiable Random Function, VRF)的拜占庭容错共识算法(Selection-based Byzantine Fault Tolerance, SBFT)。首先,在每轮共识后动态评测节点行为并计算节点贡献值,根据节点贡献值选取参与共识的节点。其次,结合节点贡献值和可验证随机函数进行密码抽签随机选取主节点,在减少非诚实节点成为主节点的概率的同时,使选取的主节点具有不可预测性。最后,改进了PBFT的一致性协议,将PBFT的网状通信网络拓扑变成星形通信网络拓扑,并将视图切换流程融入正常共识流程中。仿真实验结果表明,相比PBFT算法,所提SBFT算法具有更高的吞吐量、更低的共识时延和更高的算法效率。

【关键词】区块链;;共识算法;;PBFT;;VRF;;节点贡献值

【文献类型】 理论模型

【DOI】

【发表时间】2023-07-13

区块链共识算法综述

【作者】 谭朋柳;王润庶;曾文豪;王诗堃;邹雯诗;

【作者单位】南昌航空大学软件学院;

【文献来源】计算机科学

【复合影响因子】1.722

【综合影响因子】1.149

【主题类别】

区块链技术-核心技术-共识机制

【摘要】共识算法维持着分布式系统的稳定和安全,同时又是发展区块链方向的关键技术。随着区块链技术快速发展,共识算法的研究也越来越受到研究人员的重视和青睐。现如今,在不同应用场景下选择合适的共识算法是研究人员所要面对的一个选择性难题。主要从服务对象节点种类出发,把共识算法归类为公有链、联盟链和私有链这3个大分类。在这3个大分类的基础之上,分别阐述了现在主流的和一些新的区块链共识算法的基本原理,共列举了9种共识算法,并从去中心化、安全性和可扩容性这3个方面对这9种共识算法进行性能评估。并且对相关算法进行了优缺点的分析总结,给出了优化区块链共识算法的相关方向,以供研究人员研究和参考,从而促进区块链共识算法的稳步发展。

【关键词】区块链;;共识算法;;公有链;;联盟链;;私有链;;优缺点

【文献类型】 综述

【DOI】

【发表时间】2023-07-13

基于区块链的可信数据共享方案设计

【作者】 刘静静;邓浩江;李杨;

【作者单位】中国科学院声学研究所国家网络新媒体工程技术研究中心;中国科学院大学电子电气与通信工程学院;

【文献来源】计算机工程与设计

【复合影响因子】

【综合影响因子】

【主题类别】

区块链技术-协同技术-数据管理

【摘要】针对数据共享时的隐私安全问题,提出一种基于区块链的可信数据共享方案。将星际文件系统和区块链技术结合,在可靠存储数据的同时降低区块链的存储负担。基于高级加密标准和密文策略属性基加密技术,提出双阶段数据访问控制机制,通过设置访问策略限定数据共享范围。利用智能合约对数据进行全生命周期管理,提高数据共享效率。对方案进行性能测试和安全性分析,实验结果表明,所提方案具有可行性,能够有效保护数据隐私安全。

【关键词】区块链;;智能合约;;数据共享;;访问控制;;数据管理;;隐私保护;;星际文件系统

【文献类型】 实验仿真

【DOI】 10.16208/j.issn1000-7024.2023.06.001

【发表时间】2023-07-13

基于区块链的医疗数据流共享

【作者】 陶雪晴;刘立新;张晓琳;王永平;

【作者单位】内蒙古科技大学信息工程学院;中国人民大学信息工程学院;

【文献来源】计算机工程与设计

【复合影响因子】

【综合影响因子】

【主题类别】

区块链应用-实体经济-医疗领域

【摘要】为解决医疗数据流场景存在的数据共享不灵活和医患关系泄漏问题,提出一种基于区块链的医疗数据流共享方案。提出基于密钥生成树的密钥管理策略和密钥搜索策略,用户可根据自身需求使用密钥流加密医疗数据且灵活地共享数据。此外,基于密码学原语提出有效的协议保护区块链上医生和患者的身份信息,实现医患关系隐私保护。安全分析和实验结果分析表明,所提方案可以实现医疗数据流安全和灵活的共享,以及医患关系的隐私保护。

【关键词】数据共享;;隐私保护;;区块链;;密钥生成树;;密钥管理策略;;密钥搜索策略;;医患关系

【文献类型】 实验仿真

【DOI】 10.16208/j.issn1000-7024.2023.06.006

【发表时间】2023-07-13

在线标注

备案号: 苏ICP备17025947号-5

评论回复