【影响因子】11.446
【主题类别】
区块链应用-实体经济-能源领域
【Abstract】Combined heat and power dispatch (CHPD) has attracted wide attention recently, which exploits the potential flexibility in the district heating system (DHS) and provides an economic-effective solution for better wind accommodation. However, DHS operators bear extra operation cost in CHPD, which is proved theoretically in this paper, so that they have insufficient incentive to coordinate with electrical power system. To cope with this issue, a cost allocation strategy based on the Aumann-Shapley value method is proposed, which can rationally allocate the benefit among multiple agents. And a new solution scheme with the Gauss-Legendre quadrature formula is developed to enhance computation efficiency. Also, considering the potential malicious behavior of dishonest agents in the process of allocation, the blockchain framework with Proof of Solution consensus mechanism is introduced to ensure mutual trust among multiple agents. Numerical simulations based on different cases demonstrate the effectiveness of the proposed method of benefit allocation among multiple agents. In addition, the validity of the proposed blockchain framework in preventing malicious behavior when CHPD is verified.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Combined power and heat dispatch; Benefit allocation; Cooperative game; Shapley value; Aumann-Shapley value; Blockchain
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 理论模型
【Author】 van Wassenaer, Lan Verdouw, Cor Kassahun, Ayalew van Hilten, Mireille van der Meij, Koos Tekinerdogan, Bedir
【影响因子】11.072
【主题类别】
区块链应用-实体经济-农牧领域
【Abstract】This paper presents a conceptual framework that reflects the current state of thinking on tokenizing circularity in agri-food systems. The framework is built upon classifications of tokens and the key principles of circular economy and shows how tokenization can support circularity in agri-food systems through the flows of infor-mation and flows of value. Based on an integrative review of literature on tokenization, blockchain and the circular economy and multiple case studies in the agri-food domain, we show the relevance of tokenization to the circular economy in three ways: 1) enhancing traceability of physical and digital objects in supply chains; 2) improving transparency and credibility of circularity claims; 3) facilitating collaborative business ecosystems with incentives for more circular production and distribution. Based on the framework, we derive important research questions for future research agenda on tokenizing circularity in agri-food systems.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Tokenization; Blockchain; Circularity; Agri-food systems
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 理论模型
【Author】 Xing, Rui Su, Zhou Luan, Tom. H. Li, Ruidong
【影响因子】10.294
【主题类别】
--
【Abstract】A cyber-physical social system (CPSS), which integrates the social world with the cyber world and physical world, plays a crucial role in a more intelligent and efficient network. Recent advances in blockchain have significant impacts on securing the transactions in CPSS. Nevertheless, the deployment of blockchain faces fundamental engineering challenges. Specifically, in remote or disaster areas, users of CPSS typically cannot effectively connect to the blockchain system in real time due to the deficiency of Internet connection. In busy urban areas, however, users are reluctant to frequently connect to the blockchain system due to the costly communication connection. Thus, the offline blockchain system, which enables direct secured offline transaction channels among users in CPSS and efficiently synchronizes batch transactions to the global blockchain system, is a promising solution to address these problems. This article presents a novel CPSS architecture that can realize secure transactions for users participating in offline blockchain transactions by making use of an AI-based algorithm. We first introduce three typical offline blockchain transaction environments in CPSS, followed by analysis of the security issues of the proposed architecture. In addition, we present the hashed time locked contract (HTLC) established for the CPSS users participating in an offline blockchain transaction. To detect potential malicious attackers in offline transactions, we introduce an LSTM-based recurrent neural network (RNN) model to detect the malicious transaction witness. Numerical results are presented to validate the effectiveness of this model.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Artificial intelligence; Security; Social networking (online); Computer architecture; Synchronization; Mobile handsets
【发表时间】2022
【收录时间】2023-07-16
【文献类型】
【DOI】 10.1109/MNET.111.2100700
【影响因子】10.294
【主题类别】
区块链技术-协同技术-5G
【Abstract】Many of the key enabling technologies of the fifth-generation (5G), such as network slicing, spectrum sharing, and federated learning, rely on a centralized authority. This may lead to pitfalls in terms of security or single point of failure. Distributed ledger technology, specifically blockchain, is currently employed by different applications related to the Internet of Things (IoT) and 5G to address the drawbacks of centralized systems. For this reason, mobile blockchain networks (MBNs) have recently attracted a great deal of attention. To add a transaction to the blockchain in MBNs, mobile or IoT users must perform various tasks like encryption, decryption, and mining. These tasks require energy and processing power, which impose limitations on mobile and IoT users' performance because they are usually battery powered and have a low processing power. One possible solution is to perform the tasks virtually on commodity servers provided by mobile edge computing (MEC) or cloud computing. To do so, all tasks needed to add a transaction to the blockchain can be treated as virtual blockchain functions that can be executed on commodity servers. We introduce a blockchain virtualization framework called blockchain function virtualization (BFV), through which all blockchain functions can be performed virtually by MEC or cloud computing. Furthermore, we describe applications of the BFV framework and resource allocation challenges brought by the BFV framework in mobile networks. In addition, to illustrate the advantages of BFV, we define an optimization problem to simultaneously minimize the energy consumption cost and maximize miners' rewards. Finally, simulation results show the performance of the proposed framework in terms of total energy consumption, transaction confirmation rate, and miners' average profit.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Internet of Things; Broadcasting; 5G mobile communication; Servers; Task analysis; Computational modeling
【发表时间】2022
【收录时间】2023-07-16
【文献类型】 实验仿真
【DOI】 10.1109/MNET.009.2100473
【Author】 Nguyen, Dinh C. Nguyen, Van-Dinh Ding, Ming Chatzinotas, Symeon Pathirana, Pubudu N. Seneviratne, Aruna Dobre, Octavia Zomaya, Albert Y.
【影响因子】10.294
【主题类别】
区块链技术-协同技术-边缘计算
【Abstract】The convergence of mobile edge computing (MEC) and blockchain is transforming the current computing services in wireless Internet-of-Things (IoT) networks, enabling task offloading with security enhancement based on blockchain mining. Yet the existing approaches for these enabling technologies are isolated, providing only tailored solutions for specific services and scenarios. To fill this gap, we propose a novel cooperative task offloading and blockchain mining (TOBM) scheme for a blockchain-based MEC system, where each edge device not only handles computation tasks but also conducts block mining for improving system utility. To address the latency issues caused by the blockchain operation in MEC, we develop a new Proof-of-Reputation consensus mechanism based on a lightweight block verification strategy. To accommodate the highly dynamic environment and high-dimensional system state space, we apply a novel distributed deep reinforcement learning-based approach by using a multi-agent deep deterministic policy gradient algorithm. Experimental results demonstrate the superior performance of the proposed TOBM scheme in terms of enhanced system reward, improved offloading utility with lower blockchain mining latency, and better system utility, compared to the existing cooperative and non-cooperative schemes. The article concludes with key technical challenges and possible directions for future blockchain-based MEC research.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Task analysis; Blockchains; Data mining; Servers; Quality of experience; Optimization; Resource management
【发表时间】2022
【收录时间】2023-07-16
【文献类型】 实验仿真
【DOI】 10.1109/MNET.002.2100188
【影响因子】10.294
【主题类别】
区块链技术-协同技术-6G
区块链技术-协同技术-物联网
【Abstract】Artificial intelligence (AI)-enabled Internet of Things (IoT) has attracted great interests. The accuracy of data training model in AI is vital for further development of IoT. In addition, with the increasing number of intelligent IoT devices, the amounts of data available for transmission, learning and training can lead to serious communication burdens and data reliability issues. In order to address these issues, we study novel network architectures in future 6G networks to support the intelligent IoT. Moreover, inspired by the collective learning of humans, we introduce and adopt a novel method named as collective reinforcement learning (CRL) in the intelligent IoT to realize the sharing of learning and training results. To ensure security and privacy, as well as improve computing efficiency, blockchain, mobile edge computing (MEC) and cloud computing are applied to protect data security and enrich computing resources. On this basis, we formulate an optimization problem in the intelligent IoT based on the proposed framework to optimize transmission latency and energy consumption. Simulation results demonstrate that the system performance has improved significantly. At last, some research challenges and open issues are pointed out to the intelligent IoT in future networks.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Internet of Things; 6G mobile communication; Training; Artificial intelligence; Cloud computing; Optimization; Blockchains
【发表时间】2022
【收录时间】2023-07-16
【文献类型】 实验仿真
【DOI】 10.1109/MNET.105.2100516
【Author】 He, Chao Tan, Chunqiao Ip, W. H. Wu, C. H.
【影响因子】10.047
【主题类别】
--
【Abstract】The intrinsic value of brand names has led to the widespread presence of counterfeits in multiindustries. Although government enforcement plays a role in combating counterfeits, it is difficult to fundamentally curb counterfeiting. This paper examines how the brand-name firm adopts the blockchain-technology-supported (BTS) platform in dealing with counterfeits under government enforcement. We consider a market with a manufacturer (i.e., a brand-name firm) and a counterfeiter. First, we develop a signaling game model to analyze the negative impact of deceptive sales. The results show that, under weak government enforcement and a high rampancy level of counterfeits, deceptive sales will decrease the expected demand for authentic products, the manufacturer's expected profit, the expected consumer surplus, and the expected social welfare. Although government enforcement forces the counterfeiter to implement non-deceptive sales, it will decrease the expected consumer surplus under symmetric quality information. Then, we develop a Stackelberg game model to analyze the manufacturer's adoption strategy for the BTS platform. We find that weaker government enforcement will incentivize the manufacturer to adopt the BTS platform. However, the manufacturer does not always adopt the BTS platform even if the counterfeiter implements deceptive sales. Finally, we analyze the effect of adopting the BTS platform under government enforcement. We reveal that the role of the BTS platform in improving consumer rights is stronger than that in combating counterfeits, and the effect of adopting the BTS platform will strengthen as government enforcement weakens.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Counterfeits; Government enforcement; Blockchain-technology-supported platform; Signaling game; Deceptive sales
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
CCF-B
【影响因子】9.551
【主题类别】
区块链应用-实体经济-车辆领域
【Abstract】The dramatically growing trend of vehicles equipped with driving camera recorders has allowed realizing real-time crowdsourced video sharing in vehicular edge computing (VEC). Such cameras can assist in monitoring objects directly in front of and behind the vehicles, enabling them to provide important visual information through real-time video streaming in case of possible accidents. Exploiting the on-board units (OBUs) for VEC can allow drivers and passengers to share and access on-road video surveillance services. However, data security and privacy concerns of video generators (owners) are two key challenges that can severely limit video sharing in a VEC environment. In this article, we propose a blockchain empowered publish/subscribe (P/S) scheme to enable one-to-many secure video sharing in the VEC scenario. Then, we design an attribute-based encryption algorithm with static and dynamic attributes (ABE-SD) to achieve fine-grained access control in a mobile environment. Finally, We utilize permissioned blockchain and smart contracts to record access policy and publish and subscribe events, thus resulting in user self-certification and event traceability. The numerical results indicate that our proposed scheme ABE-SD outperforms traditional centralized CP-ABE methods in terms of encryption and decryption performance. The simulation experiments demonstrated that the proposed video-sharing scheme is secure and efficient.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Streaming media; Blockchains; Access control; Encryption; Real-time systems; Accidents; Vehicle dynamics; Video service; publish/subscribe; attribute-based encryption; blockchain
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实验仿真
【影响因子】8.373
【主题类别】
--
【Abstract】Cooperative, Connected and Automated Mobility (CCAM) applications, enabled by vehicular communica-tions and vehicle automation technologies, are set to increase traffic safety and efficiency. An important feature of CCAM is the potential to decide and coordinate maneuvers among automated vehicles in a more efficient and secure manner, when compared to human drivers. However, maneuver decision and coordination is a rather complex topic due to the multitude of possible maneuvers and the occasional cooperation failures, as caused by issues derived from the use of wireless communications in the vehicular ecosystem, like packet loss or even misbehaving entities. This work focuses on the latter problem by introducing a secure communication design for the decision of general cooperative maneuvers and the distributed storage of related data for accountability purposes using mechanisms based on distributed ledger technologies, while meeting user and data privacy requirements. We present the VERCO (VERifiable COoperation), a scalable geographical-based multi-layered blockchain architecture able to support the high volume of shared vehicular data in order to enhance the security and accountability of cooperative maneuvers, as well as potentially being able to support other vehicular services. To support this architecture, we also provide a performant communication protocol for the decision and negotiation of cooperative maneuvers, based on a new message: the Verifiable Cooperation Message (VCM). The architecture and communication protocol are analyzed and tested employing hardware-in-the-loop (HiL) simulations using two ETSI ITS standard compliant on-board units (OBUs) while deciding maneuvers in a lane-merging scenario. To test the scalability of the architecture a roadside unit (RSU) is put under different stress loads using a variable number of simulated vehicles in the same lane-merging scenario. Experimental results show the feasibility of the communication protocol, with an average delay of 34.68 ms, and the lightweightness of the proposed architecture, with an average overhead of only 2.62 ms for two vehicles and less than 6 ms for dozens of vehicles.& COPY; 2023 The Author(s). Published by Elsevier Inc. This is an open access article under the CC BY license (http://creativecommons .org /licenses /by /4 .0/).
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Vehicular communications; Cooperative maneuvers; Consensus; Blockchain; Distributed ledger; Data security
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【Author】 Lu, Chun-Yi Jiunn-Yin Wu, Hsin-Te
【影响因子】7.400
【主题类别】
--
【Abstract】This study proposes using dendrogram clustering as the basis to construct a federated learning system for A.I. model parameter updating. The authors adopted a private blockchain to accelerate downloads of the latest parameters corresponding to the computation results of an A.I. model. This study reduced the computational complexity of the backend server with the A.I. model to elevate backend server performance. Furthermore, the authors propose a hash function to determine whether the machines added new training data. The experimental results revealed that the proposed method could reduce the computational complexity of federated learning and that private blockchains can be applied to ensure parameter confidentiality and completeness. In summary, this research uses software computing methods to save machine learning data transmission, reduce network load, and provide privacy protection for parameter data without updating existing production equipment so that small-cost enterprises can import Industry 4.0.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Artificial Intelligence; Blockchain; Clustering; Federated Learning; Industry 4.0; Machine Learning; Network Security; Smart Factory
【发表时间】2022
【收录时间】2023-07-16
【文献类型】
【DOI】 10.4018/JOEUC.313194
【Author】 Corradini, Flavio Marcelletti, Alessandro Morichetta, Andrea Polini, Andrea Re, Barbara Tiezzi, Francesco
【影响因子】7.307
【主题类别】
--
【Abstract】In modern business scenarios, more and more organisations have to deal with the critical requirements of trustworthiness and flexibility, when collaborating in multi-party business processes. This calls for new kinds of systems able to manage collaborative processes in untrusted and dynamic environments. Concerning the collaborative perspective, the Business Process Management discipline has provided effective and standardised solutions for a long time, now. Regarding the trustworthiness perspective, blockchain is advocated as one of the most prominent technologies to guarantee trust in a multi-party setting. However, while the immutability of blockchain provides transparent and secure proof of past business interactions, it hinders the flexibility of the business process execution, as the business logic regulating the process execution is immutably stored in the blockchain. On the other hand, flexibility is a property that is becoming crucial in such a setting due to the high dynamism of the business scenarios. In fact, it permits to modify a process at run-time to deal with internal or external changes. In this paper, we face this issue by proposing an architecture for the flexible blockchain-based execution of multi-party business processes. In our approach, business processes are modelled by BPMN choreography diagrams translated into code, whose execution state is then stored in the blockchain. Flexibility is achieved by decoupling the business process's logic from its execution state, thus allowing run-time changes to the process execution without losing the fundamental properties of trust provided by the blockchain. To show the effectiveness of our approach, we provide a prototypical implementation, called FlexChain, and we use it on a case study from the healthcare application domain. The results obtained by the analysis of cost for the reported case study show the feasibility of the approach. In particular, major costs to sustain relate to one-time operations, such as the deployment and the run-time update of the model, while the most frequent actions are quite efficient.& COPY; 2023 Elsevier B.V. All rights reserved.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Multi-party business process; BPMN; Blockchain; Smart contracts; Flexibility; Drools
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
CCF-A
【影响因子】7.231
【主题类别】
--
【Abstract】Additively Homomorphic Encryption (AHE) has been widely used in various applications, such as federated learning, blockchain, and online auctions. Elliptic Curve (EC) based AHE has the advantages of efficient encryption, homomorphic addition, scalar multiplication algorithms, and short ciphertext length. However, EC-based AHE schemes require solving a small exponential Elliptic Curve Discrete Logarithm Problem (ECDLP) when running the decryption algorithm, i.e., recovering the plaintext m ? {0, 1}(l) from m * G. Therefore, the decryption of EC-based AHE schemes is inefficient when the plaintext length l > 32. This leads to people being more inclined to use RSA-based AHE schemes rather than EC-based ones. This paper proposes an efficient algorithm called FastECDLP for solving the small exponential ECDLP at 128-bit security level. We perform a series of deep optimizations from two points: computation and memory overhead. These optimizations ensure efficient decryption when the plaintext length l is as long as possible in practice. Moreover, we also provide a concrete implementation and apply FastECDLP to some specific applications. Experimental results show that FastECDLP is far faster than the previous works. For example, the decryption can be done in 0.35 ms with a single thread when l = 40, which is about 30 times faster than that of Paillier. Furthermore, we experiment with l from 27 to 54, and the existing works generally only consider l = 32. The decryption only requires 1 second with 16 threads when l = 54. In the practical applications, we can speed up model training of existing vertical federated learning frameworks by 4 to 14 times. At the same time, the decryption efficiency is accelerated by about 140 times in a blockchain financial system (ESORICS 2021) with the same memory overhead.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Security; Homomorphic encryption; Optimization; Blockchains; Memory management; Federated learning; Runtime; ECDLP; additively homomorphic encryption; fast decryption; BSGS; cuckoo hashing
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【Author】 Jiang, Yiming Zhang, Jiangfan
CCF-A
【影响因子】7.231
【主题类别】
区块链技术-协同技术-物联网
【Abstract】Distributed detection over a blockchain-aided Internet of Things (BIoT) network in the presence of attacks is considered, where the integrated blockchain is employed to secure data exchanges over the BIoT as well as data storage at the agents of the BIoT. We consider a general adversary model where attackers jointly exploit the vulnerability of IoT devices and that of the blockchain employed in the BIoT. The optimal attacking strategy which minimizes the Kullback-Leibler divergence is pursued. It can be shown that this optimization problem is nonconvex, and hence it is generally intractable to find the globally optimal solution to such a problem. To overcome this issue, we first propose a relaxation method that can convert the original nonconvex optimization problem into a convex optimization problem, and then the analytic expression for the optimal solution to the relaxed convex optimization problem is derived. The optimal value of the relaxed convex optimization problem provides a detection performance guarantee for the BIoT in the presence of attacks. In addition, we develop a coordinate descent algorithm which is based on a capped water-filling method to solve the relaxed convex optimization problem, and moreover, we show that the convergence of the proposed coordinate descent algorithm can be guaranteed.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchains; Internet of Things; Biological system modeling; Task analysis; Convex functions; Cloud computing; Performance evaluation; Blockchain; double-spending attack; distributed detection; Kullback-Leibler divergence; capped water-filling
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实验仿真
【Author】 Cheng, Ruifen
【影响因子】5.190
【主题类别】
区块链应用-实体经济-旅游领域
区块链应用-实体经济-酒店领域
【Abstract】The research aims to investigate the potential of blockchain technology to address the challenges facing traditional tourism businesses in the hospitality industry. By assessing and validating tourism business models, the research explores how blockchain can enhance transparency, efficiency, and cost reduction. This research utilizes the ARDL technique to examine the role of blockchain in the tourism in reducing environmental deterioration in China for the period of 2010-2020. The empirical analysis was used in this study. The study presents findings that support the effectiveness of blockchain in validating tourism business models. The authors conclude by discussing the implications of their research for the hospitality industry and suggest future research directions.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Tourism; Blockchain; Environmental quality; China; Innovation
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实证数据
【Author】 Coelho, Kristtopher K. Nogueira, Michele Vieira, Alex B. Silva, Edelberto F. Nacif, Jose Augusto M.
CCF-C
【影响因子】5.047
【主题类别】
区块链技术-协同技术-联邦学习
【Abstract】Technological advances in smart devices and applications targeting the Internet of Healthcare Things provide a perfect environment for using Machine Learning-based techniques. However, traditional ML solutions operate on centralized data collection and processing. Federated Learning (FL) is a promising solution to train ML models on multiple decentralized devices without effectively sharing private data. Therefore, FL offers a secure architecture to handle highly sensitive data in the IoHT context. This survey comprehensively reviews emerging data security and privacy applications for FL in IoHT networks. First, we present a background overview of the basic concepts of FL applied in IoHT. In particular, we rigorously investigate and evaluate the main solutions to IoHT data security and privacy issues. In addition, we categorize the most relevant publications related to IoHT data security, whether due to advances in the architecture of FL or data protection. Next, we list several IoHT network datasets for model training. Finally, we highlight the essential lessons from this review, highlighting current challenges and possible directions for future research in data security and privacy in IoHT networks using FL.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Federated learning; Security; Privacy; Healthcare; IoHT; Machine learning; Blockchain; Datasets
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 综述
【Author】 Ren, Yongjun Liu, Xinyu Sharma, Pradip Kumar Alfarraj, Osama Tolba, Amr Wang, Shenqing Wang, Jin
【影响因子】4.996
【主题类别】
区块链技术-协同技术-物联网
【Abstract】With the rapid development of Industry 4.0, the data security of Industrial Internet of Things in the Industry 4.0 environment has received widespread attention. Blockchain has the characteristics of decentralization and tamper-proof. Therefore, it has a natural advantage in solving the data security problem of Industrial Internet of Things. However, current blockchain technologies face challenges in providing consistency, scalability and data security at the same time in Industrial Internet of Things. To address the scalability problem and data security problem of Industrial Internet of Things, this paper constructs a highly scalable data storage mechanism for Industrial Internet of Things based on coded sharding blockchain. The mechanism uses coded sharding technology for data processing to improve the fault tolerance and storage load of the blockchain to solve the scalability problem. Then a cryptographic accumulator-based data storage scheme is designed which connects the cryptographic accumulator with the sharding nodes to save storage overhead and solve the security problem of data storage and verification. Finally, the scheme is proved to be security and the performance of the scheme is evaluated.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实验仿真
【影响因子】4.960
【主题类别】
--
【Abstract】Data integrity is a property that cloud service providers (CSPs) have focused on. The data integrity checking is assigned to third-party auditors (TPAs) to avoid invalid data storage in CSPs. Nevertheless, this type of mechanism is vulnerable to many threats, including insider/outsider adversaries. Moreover, several threats still exist with its presence, such as deleting, changing, or destroying the recorded data. The study presents a blockchain-based distributed auditing (BB-DA) protocol for auditing confidential/untraceable transactions in a distributed manner. The BB-DA protocol provides message/transaction confidentiality, user privacy, and security against privileged insider adversaries, who want to create disorder in the auditing process by refusing to sign/audit, and those who aim to do so in the BB-DA protocol will fail even if they cooperate. To provide message confidentiality and security against malicious insiders, the ElGamal cryptosystem is used in the BB -DA protocol, and to avoid destroying the submitted data (transactions) by CSPs, the blockchain is used as a distributed and immutable database in the BB-DA protocol. The Zerocoin is applied in the BB-DA protocol for providing user untraceability and anonymity. The security analysis of the BB-DA protocol proves that the offered protocol is secure against the key-only, known message, and chosen message attacks. Additionally, the analysis indicates that it provides security against malicious insiders who want to learn any knowledge about corresponded transactions or break users' anonymity. The paper's comparison and evaluation show that the BB-DA offers more features and is more efficient than other auditing protocols.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; Confidential transaction; Distributed auditing; Threshold signature; User untraceability
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【Author】 Zheng, Changjuan Huang, Xu Xu, Ying
【影响因子】3.889
【主题类别】
区块链应用-实体经济-企业管理
【Abstract】The use of blockchain technology can ensure that data remains untampered with once it is on the chain. However, it doesn't guarantee the authenticity of data before it enters the chain. In this study, we developed a three-party dynamic evolutionary game model involving core enterprises, small and medium-sized enterprises (SMEs), and financial institutions. Our findings indicate that a blockchain supply chain (BSC) generates more economic benefits than a traditional supply chain (TSC). We then built a dynamic evolutionary game model between core enterprises and SMEs, which revealed that SMEs are influenced by core enterprises and tend to adopt the action strategies of the latter. Additionally, we developed a dynamic evolutionary game model between core enterprises and financial institutions and compared the reward and punishment mechanisms with the synergy payoff mechanism. In the reward and punishment mechanisms, the game is a zero-sum game, where one party's gains come at the expense of the other party. This mechanism has certain limitations and must meet specific conditions to improve the willingness of enterprises to share data. On the other hand, the synergy payoff mechanism enhances the authenticity of shared data by increasing the payoff for participants. When core enterprises play games with SMEs, the probability of core enterprises uploading real data and the distribution ratio of synergy payoff show an inverted U-shape. Similarly, core enterprises and financial institutions have comparable results in allocating synergy payoff. To leverage the synergy payoff mechanism, the distribution proportion of players participating in the synergy payoff should be considered fair. Finally, we validated our findings by simulating the models. If we can use blockchain technology to enhance the mutual trust between enterprises and banks, both banks and enterprises can achieve sustainable development.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】blockchain; data sharing; dynamic evolutionary game
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实证数据
【DOI】 10.3390/su15129439
【影响因子】3.557
【主题类别】
--
【Abstract】Database systems are paying more attention to data security in recent years. Immutable systems such as blockchains, verifiable databases, and ledger databases are equipped with various verifiability mechanisms to protect data. Such systems often adopt different threat models, and techniques, therefore, have different performance implications compared to traditional database systems. So far, there is no uniform benchmarking tool for evaluating the performance of these systems, especially at the level of verification functions. In this paper, we first survey the design space of the verifiability-enabled database systems along five dimensions: threat model, authenticated data structure (ADS), query processing, verification, and auditing. Based on this survey, we design and implement VeriBench, a benchmark framework for verifiability-enabled database systems. VeriBench enables a fair comparison of systems designed with different underlying technologies that share the client-side verification scheme, and focuses on design space exploration to provide a deeper understanding of different system design choices. VeriBench incorporates micro- and macro-benchmarks to provide a comprehensive evaluation. Further, VeriBench is designed to enable easy extension for benchmarking new systems and workloads. We run VeriBench to conduct a comprehensive analysis of state-of-the-art systems comprising blockchains, ledger databases, and log transparency technologies. The results expose the weaknesses and strengths of each underlying design choice, and the insights should serve as guidance for future development.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【DOI】 10.14778/3598581.3598588
【影响因子】3.476
【主题类别】
区块链应用-实体经济-无人机
【Abstract】Unmanned-aerial-vehicle (UAV)-enabled intelligent transportation system (ITS) is an advanced technology that can provide various services including autonomous driving, real-time creation of high-definition maps, and car sharing. In particular, a UAV-enabled ITS can be realized through the combination of traditional vehicular ad hoc networks (VANETs) and UAVs that can act as flying roadside units (RSUs) at the outskirts and monitor road conditions from predefined locations to spot car accidents and any law violations. Notably, to realize these services, real-time communication between UAVs and RSUs must be guaranteed. However, UAVs have limited computing powers, and if extensive computation is required during communication, the provision of real-time ITS services may be hindered. Furthermore, UAVs and RSUs communicate via public channels that are prone to various attacks, such as replay, impersonation, trace, and session key disclosure attacks. Thus, in this article, a secure and lightweight authentication scheme is proposed for UAVs and RSUs using the blockchain technology. The proposed scheme is analyzed using informal and formal methods including Burrows-Abadi-Nikoogadam (BAN) logic, automated validation of internet security protocols and applications (AVISPA) simulation tool, and real-or-random (RoR) model, and its performance is compared with that of related schemes. The results reveal that the proposed scheme is more efficient and secure as compared to the other competing schemes.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; wireless communication; unmanned aerial vehicle; lightweight authentication; physically unclonable function; security
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实验仿真
【Author】 Mallick, Soubhagya Ranjan Lenka, Rakesh K. Goswami, Veena Sharma, Suraj Dalai, Asish Kumar Das, Himansu Barik, Rabindra K.
【影响因子】3.476
【主题类别】
区块链应用-实体经济-医疗领域
【Abstract】Most recent research on healthcare systems has focused on integrating the Internet of Things (IoT), Blockchain technology, and cloud computing to enhance the performance of IoT devices with limited resource availability, create smart healthcare platforms, and offer patients the best possible healthcare service. Modern healthcare systems use large-scale sensor devices to address many challenges brought on by the conventional delivery of healthcare services. Most studies have lately identified data collection, massive data processing, geolocating, access management, device prioritization, and storing as primary issues in most IoT healthcare systems. Decentralization, privacy, security, scalability, trust, anonymity, and building geospatial-based intelligent healthcare systems for patient care are significant difficulties that most healthcare systems today must overcome. Blockchain technology in healthcare platforms is noteworthy and innovative since it opens platforms for data privacy, anonymity, and validity through the consensus process. In this work, we proposed a novel decentralized Blockchain-enabled geospatial service architecture for smart healthcare systems called BCGeo. The proposed framework offers an online geospatial healthcare service for residents of Bhubaneswar, a city in India, who are newcomers to the city and are less familiar with its local healthcare organizations. An analytical queueing method prioritizes serving Critical patients more than other patients. In contrast to previously proposed frameworks, the proposed framework includes immutability, scalability, geospatial mapping, patient prioritizing, and decentralized privacy protection policies for addressing the technical challenges in most of the current healthcare systems. Additionally, it explains the performance analysis of BCGeo. It includes graphs showing the various possible outcomes of arithmetic operations, performance measurement, and experimental results on the proposed architecture.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; geospatial web services; medical data; healthcare; queueing model; IoT
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实验仿真
【Author】 Kavasidis, Isaak Lallas, Efthimios Mountzouris, Georgios Gerogiannis, Vassilis C. Karageorgos, Anthony
【影响因子】3.476
【主题类别】
--
【Abstract】The plethora of available data in various manufacturing facilities has boosted the adoption of various data analytics methods, which are tailored to a wide range of operations and tasks. However, fragmentation of data, in the sense that chunks of data could possibly be distributed in geographically sparse areas, hampers the generation of better and more accurate intelligent models that would otherwise benefit from the larger quantities of available data which are derived from various operations taking place at different locations of a manufacturing process. Moreover, in regulated industrial sectors, such as in the medical and the pharmaceutical fields, sector-specific legislation imposes strict criteria and rules for the privacy, maintenance and long-term storage of data. Process reproducibility is often an essential requirement in these regulated industrial sectors, and this issue could be supported by AI models which can be applied to enforce traceability, auditability and integrity of every initial, intermediate and final piece of data used during the AI model training process. In this respect, blockchain technologies could be potentially also useful for enabling and enforcing such requirements. In this paper, we present a multi-blockchain-based platform integrated with federated learning functionalities to train global AI (deep learning) models. The proposed platform maintains an audit trail of all information pertaining the training process using a set of blockchains in order to ensure the training process's immutability. The applicability of the proposed framework has been validated on three tasks by applying three state-of-the-art federated learning algorithms on an industrial pharmaceutical dataset based on two manufacturing lines, achieving promising in terms of both generalizability and convergence time.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Blockchain; data integrity; federated learning; industry 4.0; pharmaceutical industry
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【Author】 Yogarajan, Lovina Masukujjaman, Mohammad Ali, Mohd Helmi Khalid, Norlin Osman, Lokhman Hakim Alam, Syed Shah
【影响因子】3.408
【主题类别】
区块链治理-市场治理-技术采用
区块链应用-实体经济-农牧领域
【Abstract】This study examines the effect of blockchain adoption on the agri-food supply chain. A systematic literature review approach was used to analyze and synthesize the findings from the existing literature, focusing on fundamental research themes, research gaps, and the direction of future research on the impact of blockchain adoption in the agri-food supply chain. Twenty-seven full-length articles were considered and thematically analyzed in this study. The authors identified eight themes from the literature, including factors responsible for blockchain adoption and new research areas such as digitalization and the impact after adoption. These themes shed light on the agri-food supply chain practices following the adoption of blockchain technology. Moreover, this study provides a foundation for strategic and policy initiatives in the agri-food industry involving blockchain technology. The findings indicate that critical factors driving blockchain technology adoption in the agri-food industry include ensuring food traceability and transparency, food safety and security, food supply and logistics, food integrity, environmental awareness, and reducing food waste. Additionally, this study highlights the importance of guidelines and policy-level involvement after adopting blockchain technology, particularly in facilitating accurate quantification and promoting digitalization to address challenges and streamline processes. The study concludes by suggesting future research avenues for blockchain technology in the supply chain domain.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】agri-food industry; blockchain technology; supply chain; systematic literature review
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 综述
【Author】 Mooij, A. M.
【影响因子】2.707
【主题类别】
--
【Abstract】Where lies the balance between privacy and transparency? It is an everlasting question, that lied at the heart of the recent judgement of the Court of Justice of the European Union (CJEU). The case concerned the Ultimate Beneficial Ownership registry which contains the information of who has a financial interest in companies. The registry was open to the pub-lic. The wide accessibility aimed to increase transparency and thereby prevent money laundering and the financing of terrorism (MLFT). The registry was open to public access and the question to the CJEU was whether the accessibility was lawful. The judgement of the CJEU declared the wide accessibility to be unlawful. The judgement acknowledges the im-portance of the concept of transparency but nevertheless considers the public access to be unproportionate. Leaving the question of how to balance transparency with privacy. The answer can be found in redesigning the European electronic Identity. This case-note will first discuss the facts of the case in section 2. The note will then continue by summarizing the opinion of the Advocate General in section 3. In section 4 the note will summarize the judgement of the CJEU. The case note will end in section 5 with an analysis of the impact of the case in relation to developing a digital European Identity. (c) 2023 A.M. Mooij. Published by Elsevier Ltd.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】Ultimate beneficial ownership; registry; UBO-registry; Privacy; Transparency; Data-ownership; Data wallets; eID; European digital identity; Blockchain; Digital economy
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【影响因子】2.194
【主题类别】
--
【Abstract】The Internet of Things (IoT), driven by wireless communication and other technologies, is gradually entering our lives and promoting the transformation of society from "informatization" to "intelligence". Certificateless signature (CLS) eliminates the characteristic of certificate management, making it an effective method for verifying large-scale data in the IoT environment. Nevertheless, hash functions are regarded as ideal random oracles in the security proofs of most CLS schemes, which cannot guarantee the security of CLS schemes in reality. In response to this problem, Shim devised a CLS scheme without random oracles in the standard model and declared it to be provably secure. Unfortunately, in this paper, we cryptanalyze Shim's CLS scheme and demonstrate that it is not resistant to public key replacement attacks from a Type I attacker. Furthermore, to further improve the security of the Shim CLS scheme and avoid the single-point failure of the KGC and the signature forgery initiated, we propose a blockchain-based CLS scheme without a random oracle. Finally, we evaluate the comprehensive performance, and while maintaining the computational and communication performance of the Shim scheme, we resist both Type I and Type II attackers, as well as signature forgery initiated against public parameters.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】certificateless signature; forgery attack; random oracle model; blockchain; unforgeability
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【DOI】 10.3934/mbe.2023567
【Author】 Liu, Yishu Li, Xiaojuan
【影响因子】1.771
【主题类别】
区块链治理-市场治理-技术采用
【Abstract】Prefabricated buildings have become an effective way to sustainable development. At the same time, the process from component production to assembly also puts forward higher requirements for data between the subjects of each project. As a powerful database storage system, blockchain technology (BCT) can meet the needs of it, but the BCT has not been widely used. In addition, the Chinese government has issued a series of policy documents in recent years to promote smart digital technologies such as BCT, which have not been well implemented. Therefore, this paper analyzes the decision-making behavior mechanism of stakeholders and the factors that affect the implementation of BCT by establishing an asymmetric evolutionary game model. The model results reveal how to effectively promote the application of BCT in the supply chain of prefabricated buildings and help the government to stimulate the enthusiasm of other stakeholders to use BCT.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】prefabricated building; supply chain; blockchain; evolutionary game
【发表时间】2023
【收录时间】2023-07-16
【文献类型】 实证数据
【DOI】 10.1139/cjce-2022-0245
【影响因子】1.368
【主题类别】
--
【Abstract】It has been witnessed that digital technology has the potential to improve the efficiency of emergent healthcare management in COVID-19, which however has not been widely adopted due to unclear definition and configuration. This research aims to propose a proof of concept of digital twins for emergent healthcare management through configuring the cyber and functional interdependencies of healthcare systems at local and city levels. Critical interdependencies of healthcare systems have been firstly identified at both levels, then the information and associated cyber and functional interdependencies embedded in seven critical hospital information systems (HISs) have been identified and mapped. The proposed conceptual digital twin-based approach has been then developed for information coordination amongst these critical HISs at both local and city levels based on permissioned blockchain to (1) integrate and manage the information from seven critical HISs, and further (2) predict the demands of medical resources according to patient trajectory. A case study has been finally conducted at three hospitals in London during the COVID-19 period, and the results showed that the developed framework of blockchain-integrated digital twins is a promising way to provide more accurate and timely procurement information to decision-makers and can effectively support evidence-based decisions on medical resource allocation in the pandemic.
你可以尝试使用大模型来生成摘要 立即生成
【Keywords】
【发表时间】2023
【收录时间】2023-07-16
【文献类型】
【DOI】 10.1680/jensu.22.00073
【作者】 张彪;董坤;田常伟;郭锐;
【作者单位】中国科学院成都文献情报中心;中国科学院大学经济与管理学院信息资源管理系;山东理工大学信息管理研究院;南京大学信息管理学院;
【文献来源】情报理论与实践
【复合影响因子】3.419
【综合影响因子】2.368
【主题类别】
--
【摘要】[目的/意义]从创新链与产业链融合视角科学识别关键核心技术,对把握产业发展重心,制定个性化发展策略具有积极意义。[方法/过程]文章构建融合创新链与产业链的关键核心技术分析框架,包含以下部分:第一,重点技术清单梳理,明确产业的技术构成;第二,技术主题识别,基于论文、专利识别创新链技术主题,基于企业信息识别产业链技术主题;第三,关键核心技术识别,针对创新链、产业链发展的不同特征构建关键核心技术评估指标;第四,关键核心技术归类,根据重点技术清单、创新链关键核心技术、产业链关键核心技术的交叉关系,划分为优势型、待攻关型、待布局型、待转化型关键核心技术。[结果/结论]该分析框架具有可行性与有效性,可以系统全面地把握产业发展中各项技术定位,能够为产业技术情报分析提供分析工具。
【关键词】关键核心技术;;创新链;;产业链;;分析框架;;应用研究
【文献类型】
【发表时间】2023-07-16
【作者】 李馥娟;马卓;王群;
【作者单位】江苏警官学院计算机信息与网络安全系;计算机软件新技术国家重点实验室(南京大学);
【文献来源】计算机工程与应用
【复合影响因子】2.348
【综合影响因子】1.606
【主题类别】
区块链应用-实体经济-身份管理
【摘要】区块链技术是一项集P2P网络、共识机制、密码学、博弈论、经济学等众多技术与理论于一体的应用创新,以其去中心化这一特质冲击着传统系统中心化机制带来的种种约束,通过共识机制在一个无需第三方信任机构的开放网络环境中实现交易的可信性、可溯源、防篡改等功能,其所形成的新型计算范式和信任机制有助于推动管理模式的转变。同时,区块链技术具有的账本公开和多方共识机制,为以交易为最小数据单元的区块链系统身份管理提出了挑战。梳理区块链系统身份管理技术的重要研究成果,为系统掌握区块链身份标识和认证方式、加强不同应用场景中的信息发现和价值挖掘提供借鉴。在讨论传统系统与区块链系统身份管理特征,并明确区块链身份管理主要内容的基础上,阐释UTXO模型和账户模型的特点,深入分析基于公钥转换、数字证书和去中心化数字身份3类区块链系统身份标识机制,以及匿名认证、实名认证和可控匿名认证3类区块链认证方式,最后对区块链身份管理技术的未来发展进行展望。
【关键词】区块链;;身份管理;;身份标识;;身份认证
【文献类型】 综述
【发表时间】2023-07-16
【作者】 陈璐瑀;马小峰;何敬;龚生智;高建;
【作者单位】同济大学电子与信息工程学院;梧桐链数字科技研究院(苏州)有限公司;云南省科学技术院科技管理办公室;
【文献来源】计算机应用
【复合影响因子】2.197
【综合影响因子】1.475
【主题类别】
区块链技术-核心技术-智能合约
【摘要】为满足当代数字化背景下数据共享的需求,同时兼顾保护隐私数据安全的必要性,提出一种基于TrustZone的区块链智能合约隐私数据授权方法。区块链系统能够在不同应用场景中实现数据共享,并且满足监管的要求;TrustZone可信执行环境(TEE)技术则为隐私计算提供安全的隔离环境。在整体系统中,隐私数据的上传由监管机构完成,其余业务节点需要在获得用户授权的前提下,获得隐私数据的明文信息,从而保护用户的隐私安全。针对技术融合时TrustZone架构存在的内存空间较小的问题,提出一种针对小内存条件的隐私求交算法,其中,通过基于分组计算的思想完成对大数量级数据集合的求交运算。使用不同数量级大小的数据集测试所提算法,结果表明所提算法在时间与空间方面的消耗在极小范围内波动,方差分别约为1.0 s2与0.01 MB2,较为稳定;当增大数据集数量级时,所提算法的时间消耗是可预期的;此外,使用事先排序的数据集能够大幅提高算法性能。
【关键词】区块链;;智能合约;;可信执行环境;;TrustZone;;隐私求交
【文献类型】 实验仿真
【发表时间】2023-07-16
【作者】 杨攀;苏波;刘敏贤;张伟;胡谊玲;
【作者单位】西南科技大学计算机科学与技术学院;
【文献来源】计算机应用研究
【复合影响因子】1.888
【综合影响因子】1.138
【主题类别】
--
【摘要】基于委托权益证明(delegated proof of stake, DPoS)的区块链网络因其出色的性能表现而备受开发人员关注,进而对其区块链网络的安全与稳定性提出了更高的要求。为满足对于区块链网络监控与分析的的需求,根据DPoS共识机制实际应用过程中的分析,提出了面向DPoS区块链网络安全态势的可视分析方法。建立了节点稳定性与网络稳定性量化方法、网络价值预测模型,针对节点地理位置分布、网络价值走势、节点与网络整体稳定性演化以及细节查看等方面设计了多个可视化视图,面向区块链网络安全态势分析实现了交互式可视化系统,支持从多个角度对区块链网络进行探索。最后通过案列分析与用户评估验证所提方法与系统的有效性与实用性,结果表明所提方法能更好地协助使用者分析区块链网络安全态势。
【关键词】委托权益证明;;区块链;;可视分析;;安全态势
【文献类型】
【发表时间】2023-07-16
【作者】 黄晓舸;何勇;陈前斌;张杰;
【作者单位】重庆邮电大学通信与信息工程学院;
【文献来源】电子与信息学报
【复合影响因子】1.870
【综合影响因子】1.481
【主题类别】
--
【摘要】针对无线传感器网络(WSN)中数据采集的安全性和能耗问题,该文提出一种无人机(UAV)群辅助的数据采集能耗优化方法。该方法通过优化无人机的数量、高度和WSN中数据传输数量降低系统总能耗。首先,针对WSN数据采集,提出一种基于信誉值的数据双层压缩算法。该算法根据地理位置将传感器分簇,簇内传感器分为簇头和簇成员,簇成员负责训练预测模型并发送给簇头;簇头则负责模型的筛选、聚合以及信誉值更新,并将聚合结果发送给无人机;其次,针对无人机群数据收集,提出一种无人机优化部署算法,该算法将无人机部署问题转化为圆包装问题,通过动态调整无人机数量,最小化无人机群网络总能耗;同时,针对数据采集过程,在无人机群建立了私有区块链用于存储采集数据,保证了数据的安全性;最后,基于伯克利大学联合研究实验室数据集对所提方法进行验证,仿真结果表明该方法能实现无人机的最优部署,同时具有误差小、能耗低及安全性高的优势。
【关键词】无人机;;无线传感器网络;;数据采集;;区块链
【文献类型】
【发表时间】2023-07-16
【作者】 张玉书;何晓彤;肖祥立;朱友文;王良民;
【作者单位】南京航空航天大学计算机科学与技术学院;东南大学网络空间安全学院;
【文献来源】计算机科学
【复合影响因子】1.722
【综合影响因子】1.149
【主题类别】
--
【摘要】传统区块链系统采用全副本冗余的存储方式,每个节点存储相同的账本,使得区块链的存储负担非常大。目前,相关的区块链存储优化方法能够降低数据存储开销,但是还存在可扩展性差和可用性低的问题。为此,提出了一种基于纠删码的区块链账本分组存储优化方法。该方法引入一种新的区块链节点——分组存储(Grouping Storage,GS)节点来解决上述问题。区块链账本的主要存储开销位于区块文件中,GS节点采用纠删码对区块文件编码,并以组为单位存储编码后的区块文件,如此,每个组织维持相同的账本,极大地降低了区块链的存储开销且提高了区块链的可用性。针对联盟链的存储扩展,基于GS节点对超级账本文件系统进行改进,重新设计了其存储、恢复和同步区块文件流程,使得本方案能够在实际的区块链架构上工作。最后,理论分析和实验结果表明,所提出的GS节点在存储开销方面取得了显著的进步,且具有较好的可扩展性和可用性。
【关键词】区块链;;存储优化;;纠删码;;超级账本;;分组储存
【文献类型】
【发表时间】2023-07-16
【作者】 朱健;胡凯;王军;李洁;叶亚飞;时希言;
【作者单位】中国电子科技集团第十四研究所;北京航空航天大学计算机学院;北京航空航天大学云南研究院;北京物资学院信息学院;北京化工大学信息管理学院;
【文献来源】计算机科学
【复合影响因子】1.722
【综合影响因子】1.149
【主题类别】
--
【摘要】智能合约是一种以代码的方式执行合同条款的可计算交易协议,其应用场景与规模日益增长,承载着多达数十亿美元的各类资产。由于其代码缺陷可能会造成严重的经济损失,因此智能合约的可信开发成为技术关键。为此,提出了一种基于集合论语言Event-B的智能合约可信验证与自动生成方法。Event-B方法是一种基于精化的形式化方法,可用于规约、设计和验证软件系统。通过对智能合约的模型验证和可执行代码的自动生成技术,研发了自动转换工具EB2S,打通了形式化模型和智能合约编程语言的语义鸿沟和技术壁垒。最后,选取典型的在线支付智能合约场景,应用基于Event-B的智能合约模型自动生成合约代码,验证了EB2S转换工具的有效性。
【关键词】智能合约;;Event-B方法;;自动代码生成;;Solidity合约;;定理证明
【文献类型】
【发表时间】2023-07-16
【作者】 曹鹏勇;段桂江;阳祥贵;
【作者单位】北京航空航天大学机械工程及自动化学院;北京航空航天大学江西研究院景德镇分院;中航工业昌河飞机工业(集团)有限责任公司工程技术部;
【文献来源】计算机工程与设计
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-数据管理
【摘要】为解决传统航空供应链管理存在的制造过程数据信息不明和监管不足等问题,设计区块链下供应商质量数据管理平台。结合生产车间检测业务阐述制造数据获取、归集、上链和应用的运行机制。提出针对航空供应商质量数据的全流程管理方案,涵盖数据的源头采集、质量数据融合与结构化、数据存储及响应和数据识别和溯源等关键技术。依托某航空产业园区对供方数据进行平台应用实践,提出数据管理可视化设计和基于数据应用的工序过程控制方案。通过应用实例验证了所提质量数据管理平台设计的可行性和实用性。
【关键词】区块链;;供应商管理;;数据采集;;数据融合;;分布式存储;;应用平台;;统计过程控制
【文献类型】 实验仿真
【发表时间】2023-07-16
【作者】 叶帅;蒋文保;祁亚楠;
【作者单位】北京信息科技大学信息管理学院;
【文献来源】计算机工程与设计
【复合影响因子】
【综合影响因子】
【主题类别】
区块链技术-核心技术-密码学
【摘要】为解决SM9算法中密钥生成中心(key generation center, KGC)的单点权力过大问题和用户身份的隐私保护问题,提出一种基于SM9多密钥中心的用户身份隐私保护模型。利用区块链技术构建分布式账本,实现多KGC密钥生成参数的分布式管理;将动态身份标识技术与SM9算法相结合,实现匿名传输和匿名验证,兼顾用户身份的隐私性和传输的安全性。通过对用户身份的匿名性证明和对模型的安全性分析,说明模型中用户身份的匿名性以及模型的安全性;通过实验测试,给出模型各部分的相关数据,验证模型的可行性。
【关键词】SM9算法;;多密钥中心;;区块链;;智能合约;;隐私保护;;动态身份标识;;匿名传输
【文献类型】 实验仿真
【发表时间】2023-07-16
【作者】 朱季希凝;王杰华;丁卫平;武卫翔;
【作者单位】南通大学信息科学技术学院;
【文献来源】计算机工程与设计
【复合影响因子】
【综合影响因子】
【主题类别】
区块链应用-实体经济-医疗领域
【摘要】为解决传统疫苗溯源方案存在的数据易篡改、可信度低、追责难和信息孤岛等诸多弊端,实现疫苗信息在生产、流通、接种全过程中的安全存储和共享,提出一种基于双链结构和国密算法的疫苗溯源方案。选用私有链和联盟链双链结合的许可链作为底层架构,引入SM2、SM3国密算法用于代替一般区块链中使用的国际标准通用密码算法,实现更强的抗碰撞性和更高的签名可信度,在确保安全性的基础上进一步提高交易速率和自主性。实验结果表明,该方案交易速度快、运行成本低,不易遭到恶意攻击,可以防范来自内部和外部的安全攻击。该方案与我国疫苗行业的应用场景高度匹配,符合国家对于密码算法和信息安全自主可控的要求。
【关键词】区块链;;许可链;;双链结构;;SM2国密算法;;SM3国密算法;;疫苗溯源;;数据安全
【文献类型】 实验仿真
【发表时间】2023-07-16
【作者】 张夏明;朱太辉;丁伟杰;
【作者单位】中央财经大学法学院;国家金融与发展实验室;中国人民大学国际货币研究所;浙江警察学院计算机与信息安全系;
【文献来源】金融监管研究
【复合影响因子】
【综合影响因子】
【主题类别】
区块链治理-法律治理-数字货币监管
【摘要】近年来,我国数字人民币试点积极推进,试点人数、覆盖区域已居于全球央行数字货币之首;但同时,数字人民币相关的洗钱风险也开始显现。如何系统地分析数字人民币的潜在洗钱风险和相应监管机制,已成为数字人民币发展的重大现实问题。本文基于数字人民币的底层技术和交易结构,综合分析了数字人民币的潜在洗钱风险与规制障碍,进而从制度建设、义务履行、技术赋能三个层面,提出了完善数字人民币反洗钱监管的框架和路径:制度建设层面,从顶层设计明确数字人民币反洗钱的法律支撑,以风险为本评估并细化对不同主体的监管要求;义务履行层面,强化运营机构的客户尽职调查和交易报告义务,厘清数字人民币合作机构反洗钱义务履行的边界;技术赋能层面,提升数字人民币反洗钱数据合规管理,并强化对智能合约的嵌入式监管。上述监管框架与数字人民币的运行模式和现有的金融监管机制具有较强的适应性,为健全数字人民币反洗钱体系提供了政策参考。
【关键词】数字货币;;洗钱风险;;支付结算;;金融监管;;金融科技
【文献类型】 观点阐述
【发表时间】2023-07-16
【作者】 白伊瑞;田宁;雷虹;刘雪峰;芦翔;周勇;
【作者单位】海南大学网络空间安全学院(密码学院);海南大学计算机科学与技术学院;华威大学制造学院;云海链控股股份有限公司;西安电子科技大学 网络与信息安全学院;中国科学院信息工程研究所;
【文献来源】计算机科学与探索
【复合影响因子】
【综合影响因子】
【主题类别】
区块链技术-核心技术-身份验证
【摘要】随着元宇宙和Web3.0等概念的出现,区块链在很多领域中发挥了非常重要的作用,区块链跨链技术是实现链间互联互通和价值转移的重要技术手段。在现阶段,公证人和侧链等传统的跨链技术存在信任问题,在一定程度上已经不适应数字经济的要求,同时,跨链身份认证领域中存在各链身份不统一以及身份不掌握在用户自己手中的问题。分布式数字身份(Decentralized Identity, DID)不依赖于集中式身份管理系统,在分布式场景下赋予每个用户独立控制和使用数字身份的能力,能有效解决跨链交易效率低的问题,还能够让身份完全掌握在用户自己手中,同时也打破了区块链之间的障碍,避免身份的重复认证。首先系统地总结了数字身份和跨链技术的发展历程、技术方案,并对主流项目进行分析比较,然后重点研究了跨链身份认证实现方案,通过对现有的身份认证实现方案进行分析和比较,总结了三种基于DID的跨链身份认证模型,并分析其优点、局限性和效率,最后对跨链在身份认证领域未来的研究方向进行展望。
【关键词】分布式数字身份;;区块链;;跨链;;身份认证
【文献类型】 综述
【发表时间】2023-07-16
【作者】 王祥修;薛清嘉;
【作者单位】上海政法学院国际法学院;上海财经大学法学院;
【文献来源】广西社会科学
【复合影响因子】
【综合影响因子】
【主题类别】
区块链治理-市场治理-数字货币
【摘要】数字货币作为数字经济发展的基石,重要性日益凸显。尽管数字货币相关称谓与概念众多,但其本质特征在于具有数字化形式、采用分布式账本和密码学技术。根据发行与信用背书主体差异,将数字货币划分为主权与非主权数字货币具有概念稳定性。数字货币在实践中表现出与传统货币相似的经济功能潜质,有赖于信息科技和商业模式的发展甚至产生了深化资源配置、实现私人融资等特殊功能。主权数字货币处于起步阶段,但具有法定货币的法律属性已成共识,部分司法管辖区开展了探索研发并通过“监管沙盒”积累经验。非主权数字货币发展更成熟,呈现多样化功能定位与业态设计,存在财产说、证券说、商品说、数据说等争议。非主权数字货币法律属性识别应从形式主义转向功能主义,立足最大共识——财产属性,综合使用场景、功能目的、法律关系与效果等因素甄别特定个体。作为财产,非主权数字货币在实践中衍生出支付与融资功能。反洗钱/反恐怖主义融资监管、证券监管、税收征管成为监管治理的关键。中国采取非主权数字货币禁止政策是在监管技术与经验相对缺乏的情形下所作的过渡性安排,适时推动法律规制由禁易转向管制,实行有效监管是未来趋势。针对数字货币治理,对内应采取包容审慎态度,优化制度供给;对外则积极参与国际标准和通用规则的制定,推动建设公平公正、包容有序的国际金融体系。
【关键词】数字货币;;非主权数字货币;;主权数字货币;;经济功能;;法律属性;;反洗钱;;国际金融体系
【文献类型】 观点阐述
【发表时间】2023-07-16