• 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
logo 区块链前沿
  • 区块链前沿
  • 首页
  • 每日更新
  • 文献
  • 会议文献
  • 政策法规
  • 研究专题
  • 区块链游戏
  • 文章创新角色
  • 科研创新指数
  • 区块链领域本体
  • 热点主题挖掘
  • 主题展示
  • 专利文献
  • 排行榜
  • DAO治理
  • 文献上传
  • 积分获取规则
  • 大语言模型解析
  • 期刊发文分布
注册 登录

2024年08月18日 31篇

文献来源

  • 31

主题分类

      • 1
      • 1
      • 1
      • 2
      • 4
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 3
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1
      • 1

文献类型

  • 15
  • 8
  • 6
  • 1
  • 1
筛选
订阅
<< 前一天 后一天 >>

Emergence of metabolic-like cycles in blockchain-orchestrated reaction networks

【Author】 Roszak, Rafak Wolos, Agnieszka Benke, Marcin Glen, Lukasz Konka, Jakub Jensen, Phillip Burgchardt, Pawek Zadlo-Dobrowolska, Anna Janiuk, Piotr Szymkuc, Sara Grzybowski, Bartosz A.

【影响因子】25.832

【主题类别】

区块链应用-实体经济-化学领域

【Abstract】This theoretical work harnesses the power of an open-access, blockchain-based platform for distributed computing to generate the largest-known network of prebiotic reactions and then to trace within this network (1) synthetic routes to biotic molecules and (2) reaction cycles and their unions that could have defined some elements of primitive, non-enzymatic metabolism. The calculation of this network, spanning >4.9 billion plausible prebiotic reactions and >3.7 billion molecules, was orchestrated automatically over hundreds of machines worldwide, each machine bidding its dynamically adjustable computing power in return for Golem cryptocurrency tokens, which underlie this platform and are traded at major cryptocurrency exchanges. In a broader context, this work illustrates how (1) blockchain-based technology can find new productive uses outside of the financial/security sector, whereas (2) scientists can benefit from this technology by gaining access to computing resources they would normally not have at their disposal.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1016/j.chempr.2023.12.009

Does the carbon market signal the market efficiency of clean and dirty cryptocurrencies? An analysis of quantile directional dependence

【Author】 Wei, Yu Hu, Rui Zhang, Jiahao Wang, Qian

【影响因子】9.848

【主题类别】

区块链治理-市场治理-市场分析

【Abstract】The role of the carbon market in the market efficiency of cryptocurrencies has not received much attention from scholars, despite its particular relevance for integrating environmental externalities into the theory and practice of digital financial markets. We investigate whether and how the performance of the carbon market during busts and booms affects the market efficiency of both clean and dirty cryptocurrencies. Overall, our results underscore the complex quantile dependence of cryptocurrency market efficiency on carbon market performance, highlighting significant variability in how different types of cryptocurrencies respond to carbon market. These results have significant implications for regulatory policies, investment strategies, industry practices, public perceptions, and technological advances in the pursuit of aligning cryptocurrency markets with environmental sustainability goals.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Clean cryptocurrency; Dirty cryptocurrency; Carbon market; Market efficiency; Cross-quantilogram technique

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1016/j.frl.2024.105913

A Blockchain-Powered Malicious Node Detection in Internet of Autonomous Vehicles

【Author】 Prathiba, Sahaya Beni Murali, Pranav Moorthy, Rajalakshmi Shenbaga Anandhan, Deepak Kumar Selvaraj, Arikumar K. Rodrigues, Joel J. P. C.

CCF-B

【影响因子】9.551

【主题类别】

区块链应用-实体经济-汽车领域

【Abstract】The proliferation of Autonomous Vehicles (AVs) in recent times has opened up new possibilities for effective and secure transportation. However, with the increasing adoption of AVs, guaranteeing the accuracy and security of their sensory systems is becoming paramount. Specifically, the vulnerability of these systems to malware and sensor faults can pose significant risks to the dependable and secure operation of the vehicle. To identify and combat these issues we propose a stream-based Blockchain-powered Malicious Node Detection (BMND) method to analyze and report any malicious activity of the AV operating as a node on the Internet of Autonomous Vehicles (IoAV) network, wherein the existing solutions are at lower latency. BMND involves the detection of sensor anomalies and defects post-production of the AV. In the case that malware or any other malicious software is detected on the onboard compute unit it is isolated and contained, and the AV will be classified as malicious until appropriate remedial measures are taken to deter any sharing of erroneous or malicious data. When the AV is deemed safe from malware and defects in the system then a block is mined by the AV node and a unique ID is assigned to allow data transfers on the blockchain with other nodes. Only active nodes with assigned IDs and available blocks for transactions on the blockchain influence AV decision-making. BMND would allow modern AVs on the road to effectively communicate with reliable information. Experimental analysis shows that the malware detection in BMND is 4.4% more accurate with an F1-score of similar to 0.99 as compared to previous and other current state-of-the-art methods, and the communication capabilities of BMND are also better regarding security and latency concerning proposed vanilla blockchain methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Malware; Blockchains; Security; Gray-scale; Autonomous vehicles; Anomaly detection; Feature extraction; Internet of Autonomous Vehicles; malware detection; image classification; anomaly detection; blockchain

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1109/TITS.2024.3433480

Green gold or carbon beast? Assessing the environmental implications of cryptocurrency trading on clean water management and carbon emission SDGs

【Author】 Mustafa, Fairouz Mordi, Chima Elamer, Ahmed A.

【影响因子】8.910

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】This study addresses the ongoing debate concerning the environmental implications of cryptocurrencies. Specifically, it investigates the impact of Bitcoin trading volume on water and sanitation (Sustainable Development Goal (SDG) 6) and climate action (SDG 13). The research employs Ordinary Least Squares (OLS) panel data analysis to examine these relationships using a sample of 32 countries with available Bitcoin trading volume data from 2013 to 2020. The findings indicate that Bitcoin trading significantly and positively impacts progress towards SDG 6, suggesting potential benefits for water and sanitation initiatives. However, the study reveals a significant negative impact of higher Bitcoin trading volume on increased carbon emissions, underscoring the environmental costs associated with cryptocurrency activities. Similar impacts are observed for gold reserves, as their mining necessitates substantial energy consumption. These results highlight the need to regulate cryptocurrency trading and promote voluntary sustainable practices, particularly given the disparities between developed and emerging markets based on their governance frameworks. Additionally, the study considers the disparities between countries based on technology exports and economic policy uncertainty as influential determinants. The study's results emphasize the importance of proactive measures to ensure the responsible and sustainable use of cryptocurrencies. While cryptocurrencies offer significant economic returns, their early adoption stage necessitates further investigation into environmentally friendly approaches. Potential strategies include directing financial returns from cryptocurrencies towards alternative energy projects and supporting other environmental SDGs, thereby fostering a positive impact on the overall ecosystem. The study's implications extend to policymakers, regulators, and stakeholders, advocating for comprehensive and collaborative efforts to integrate sustainability into the rapidly evolving cryptocurrency market. This integration is crucial to ensure that the economic benefits of cryptocurrencies do not come at the cost of our environment.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Environmental SDGs; Cryptocurrency; Water management; Sustainability; Renewable energy; Carbon emission

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1016/j.jenvman.2024.122059

Profit distribution through blockchain solution from battery energy storage system in a virtual power plant using intelligence techniques

【Author】 Machado, Alysson A. P. Fiorotti, Rodrigo Villaca, Rodolfo da S. Rocha, Helder R. O.

【影响因子】8.907

【主题类别】

区块链应用-实体经济-电力领域

【Abstract】The implementation of Virtual Power Plants (VPPs) with appropriate energy management can provide consumer units (CUs) with a significant reduction in energy purchase costs and stimulate the use of distributed generation from renewable energy sources, thereby reducing the environmental impact of the energy sector. This study presents a new methodology that integrates meteorological forecasts to estimate renewable energy production through mathematical models and from the day-ahead demands forecast, the Whale Optimization Algorithm (WOA) is applied to optimize the Battery Energy Storage System (BESS) parameters to minimize the total VPPs energy costs. Additionally, a smart contract was written in Solidity and implements user registration, an oracle mechanism to integrate real-world data on-chain, such as Time-of-Use (TOU) prices and feed-in tariffs. An optimization-based profit distribution algorithm is employed to distribute the value generated by the Demand Side Management (DSM) operation among all participants, utilizing Load Factor and a modified Peak-to-Average Ratio. The study case results show a cost reduction of 22.63%, the energy consumption at the peak periods reduced by 48.67%, and 83.53% of the energy exported into the grid, due to the aggregation of the CUs and the BESS implementation. Results from DSM's blockchain-based system have achieved savings for consumer units ranging from 10.41% to 114.80%. The savings of 114.80% represents a nominal profit of 14.80% compared to the previous cost (without DSM). The profit distribution mechanism plays an important role in encouraging consumer units to improve their demand profile in order to maximize the efficiency of the DSM system and consequently obtain financial benefits. Finally, the Deployment costs and operational expenses of the proposed DSM smart contract on various Ethereum-based blockchains are also analyzed, providing insights into the feasibility and scalability of the system.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Demand side management; Blockchain; Battery energy storage system; Virtual power plant; Artificial intelligence

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1016/j.est.2024.113150

Cryptocurrency Price Bubble Detection Using Log-Periodic Power Law Model and Wavelet Analysis

【Author】 Zhang, Junhuan Wang, Haodong Chen, Jing Liu, Anqi

【影响因子】8.702

【主题类别】

区块链治理-市场治理-价格预测

【Abstract】In this article, we establish a method to detect and formulate price bubbles in the cryptocurrency markets. This method identifies abnormal crashes through violations of the exponential decaying property. Confirmations of bubble bursts within these anomalies are obtained through wavelet analysis. By decomposing the cryptocurrency price into the high-frequency and low-frequency factors, we distinguish the price regimes versus the periods with bubbles and crashes in both time and frequency domains. In addition, we apply the log-periodic power law model to fit the bubble formation. In the analysis of eight cryptocurrencies-Bitcoin, Ethereum, Litecoin, Antshares, Ethereum Classic, Dash, Monero, and OmiseGO-from 15 May 2018 to 28 November 2022, we identify 24 bubbles. Some of them exhibit a significant and strong exponential growth pattern.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; Wavelet analysis; Analytical models; Computer crashes; Blockchains; Stochastic processes; Smart contracts; Cryptocurrency; financial crises; log-periodic power law (LPPL); price bubbles; wavelet analysis

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1109/TEM.2024.3427647

A blockchain platform selection method with heterogeneous multi-criteria Decision-Making based on hybrid distance measures and an AHP-EWM weight method

【Author】 Liu, Jun Zhang, Qi Xie, Mingyue Lin, Mingwei Xu, Zeshui

CCF-C

【影响因子】8.665

【主题类别】

区块链技术-平台项目-深度学习

【Abstract】The blockchain platforms (BPs) have emerged as important tools for improving enterprise data security. However, the selection of a suitable BP for is a challenging issue for enterprises. In this paper, a novel heterogenous multi-criteria decision-making (MCDM) model is proposed to facilitate the BP selection and evaluation process. First, the evaluation criteria for BPs are defined through an analysis of popular BPs. Second, based on the defined evaluation criteria, multiple types of fuzzy numbers are adopted to accurately represent the evaluation criteria. Then, to deal with multiple types of fuzzy numbers, a hybrid distance measure is proposed to determine the negative and positive ideal separation matrices of the evaluation criteria. In addition, using the axiomatic design's information content metric the as basis, an improved method is proposed to unify the evaluation of multiple types into a single number. An improved weight method is then proposed based on the combination of objective and subjective weighting to obtain the comprehensive weights of the criteria. Finally, a closeness degree metric is introduced to obtain the ranking order of all BP alternatives. An example case is analyzed to illustrate how to evaluate and select a suitable BP. The superiority of the proposed heterogeneous model is verified by comparisons with state-of-the-art methods.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Multi-criteria decision-making; TOPSIS; Hybrid distance measures; AHP-EWM weight method

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 理论模型

【DOI】 10.1016/j.eswa.2024.124910

Conditional privacy-preserving and efficient distributed IoV data sharing scheme based on a hierarchical and zonal blockchain

【Author】 Zhou, Ziyu Wang, Na Liu, Jianwei Zhou, Wen Fu, Junsong Deng, Lunzhi

【影响因子】8.373

【主题类别】

区块链应用-实体经济-车联网

【Abstract】With the prevalence of intelligent driving, the vehicular data corresponding to driving safety and traffic management efficiency is widely applied by the Internet of Vehicles (IoV) applications. Vehicular data is shared frequently in IoV, leading to privacy leakage of the message sender, yet most privacy-preserving measures bring difficulties for receivers to detect malicious messages. To trade-off between privacy and security, conditional privacy-preserving authentication (CPPA) solutions have been proposed. However, CPPA protocols deployed in IoV rely on hardware devices or center servers to manage key generation and updates. This paper proposed a blockchain-based CPPA mechanism for IoV data-sharing to mitigate these challenges. A hierarchical key generation mechanism is presented to protect drivers' privacy and authenticate messages which is suitable for resource-limited IoV nodes. Management nodes can issue temporary pseudo-identity (PID) from their keys for vehicles to interact in their area and trace the malicious behaviors, but know nothing about vehicles' activities outside their administration. A hierarchical and zonal blockchain is presented to realize distributed fine-grained IoV management and enhance efficiency concerning traditional blockchain. Specifically, we propose a cross- domain data-sharing mechanism, which can facilitate efficient communication and a mutual cross-domain chain verification to guarantee the security of each domain blockchain in our IoV system. The security analysis and performance evaluation demonstrate the security as well as computational and storage efficiency of our scheme.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Internet of Vehicles (IoV); Blockchain; Conditional privacy-preserving authentication; (CPPA); Key derivation algorithm

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1016/j.vehcom.2024.100832

CryptojackingTrap: An Evasion Resilient Nature-Inspired Algorithm to Detect Cryptojacking Malware

【Author】 Chahoki, Atefeh Zareh Shahriari, Hamid Reza Roveri, Marco

CCF-A

【影响因子】7.231

【主题类别】

区块链治理-技术治理-加密劫持检测

【Abstract】The high profitability of mining cryptocurrencies mining, a computationally intensive activity, forms a fertile ecosystem that is enticing not only legitimate investors but also cyber attackers who invest their illicit computational resources in this area. Cryptojacking refers to the surreptitious exploitation of a victim's computing resources to mine cryptocurrencies on behalf of the cyber-criminal. This malicious behavior is observed in executable files and browser executable codes, including JavaScript and Assembly modules, downloaded from websites to victims' machines and executed. Although there are numerous botnet detection techniques to stop this malicious activity, attackers can circumvent these protections using a variety of techniques. In this paper, CryptojackingTrap is presented as a novel cryptojacking detection solution designed to resist most malware defense methods. The CryptojackingTrap is armed with a debugger and extensible cryptocurrency listeners and its algorithm is based on the execution of cryptocurrency hash functions: an indispensable behavior of all cryptojacking executors. This algorithm becomes aware of this specific hash execution by correlating the memory access traces of suspicious executables with publicly available cryptocurrency P2P network data. With the advantage of this assembly-level investigation and a nature-inspired approach to triggering the detection alarm, CryptojackingTrap provides an accurate, evasion-proof technique for detecting cryptojacking. After experimental evaluation, the false negative and false positive rates are zero, and in addition, the false positive rate is mathematically calculated as 10(-20). CryptojackingTrap has an open, extensible architecture and is available to the open-source community.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Malware; Botnet; Codes; Feature extraction; Behavioral sciences; Blockchains; Bitcoin; Blockchain; cryptocurrency; Ethereum; Monero; mining; malware detection; botnet; Botcoin; Crypto jacking; blockchain security; dynamic analysis; dynamic binary instrumentation

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1109/TIFS.2024.3353072

From whales to minnows: The impact of crypto-reward fairness on user engagement in social media

【Author】 Yang, Woojin Kim, Yeongin Kim, Tae Hun Lee, Chul Ho Ceran, Yasin

CCF-C

【影响因子】6.969

【主题类别】

区块链治理-市场治理-行为分析

【Abstract】In an era where user-generated content drives social media growth, effectively incentivizing contributions remains a challenge. This study explores the empirical impact of a crypto-integrated platform, Steemit, focusing on a system transition designed to enhance fairness in reward distribution. We assess how this shift affects user engagement, specifically through the volume of posts. Our findings indicate that a fairer crypto-reward distribution boosts user-generated posts, though the increase is less pronounced for users with higher capital or reputation. Further analysis reveals the complex dynamics of cryptocurrency rewards and their role in fostering individual contributions and platform growth, while offering financial incentives. The effects of fair distribution are consistent across diverse user groups, highlighting novel incentivization strategies in social media and the transformative potential of integrating cryptocurrencies into reward systems.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Cryptocurrency; Social medial; User-generated content; Distributive justice

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1016/j.dss.2024.114289

The application of metaverse in healthcare

【Author】 Wang, Yue Zhu, Mengying Chen, Xi Liu, Ruibin Ge, Jinnian Song, Yuxuan Yu, Guilin

【影响因子】6.461

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】While metaverse is widely discussed, comprehension of its intricacies remains limited to a select few. Conceptually akin to a three-dimensional embodiment of the Internet, the metaverse facilitates simultaneous existence in both physical and virtual domains. Fundamentally, it embodies a visually immersive virtual environment, striving for authenticity, where individuals engage in real-world activities such as commerce, gaming, social interaction, and leisure pursuits. The global pandemic has accelerated digital innovations across diverse sectors. Beyond strides in telehealth, payment systems, remote monitoring, and secure data exchange, substantial advancements have been achieved in artificial intelligence (AI), virtual reality (VR), augmented reality (AR), and blockchain technologies. Nevertheless, the metaverse, in its nascent stage, continues to evolve, harboring significant potential for revolutionizing healthcare. Through integration with the Internet of Medical Devices, quantum computing, and robotics, the metaverse stands poised to redefine healthcare systems, offering enhancements in surgical precision and therapeutic modalities, thus promising profound transformations within the industry.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】metaverse; healthcare; virtual reality; artificial intelligence; augmented reality

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 理论模型

【DOI】 10.3389/fpubh.2024.1420367

A Decentralized Reputation Management Model for Enhanced IoV Networks With 5G Broadcast Services

【Author】 Zuo, Jinxin Wang, Ziping Guo, Chenqing Xie, Weixuan Wu, Hao Yu, Peng Lu, Yueming

【影响因子】5.194

【主题类别】

区块链应用-实体经济-车联网

【Abstract】This paper investigates the challenges of data trust sharing faced by Internet of Vehicles (IoV) network with 5G broadcast services. Particularly we develop a decentralized IoV reputation management model with spatiotemporal feature perception fusion (RMM-STFP) based on blockchain. The proposed reputation evaluation method evaluates the reputation value of nodes from the two aspects of time continuity and spatial transitivity and thus improves the identification accuracy of malicious nodes. To further accelerate the dissemination of reputation data, we have constructed a blockchain-based management storage system, where PBFT consensus scheme combines reputation and Bayesian inference. Finally, numerical results are given to justify the superiority of our proposed scheme. When proportion of malicious nodes reaches 45%, the accuracy of our proposed method is 94.5%, and the suppression rate of malicious messages is 83%. Moreover, compared with the traditional PBFT consensus scheme, the consensus delay and communication overhead are reduced by 87.57% and 78.45%, respectively, and the transaction throughput is increased by 70.65%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】5G mobile communication; Blockchains; Accuracy; Spatiotemporal phenomena; Broadcasting; Computer hacking; Roads; Internet of Vehicles; 5G broadcast services; reputation evaluation; spatiotemporal features; blockchain; reputation management

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1109/TBC.2024.3434745

Hybrid aggregation for federated learning under blockchain framework

【Author】 Li, Xinjiao Wu, Guowei Yao, Lin Geng, Shisong

CCF-C

【影响因子】5.047

【主题类别】

区块链技术-协同技术-联邦学习

【Abstract】Federated learning based on local differential privacy and blockchain can effectively mitigate the privacy issues of server and provide strong privacy against multiple kinds of attack. However, the actual privacy of users gradually decreases with the frequency of user updates, and noises from perturbation cause contradictions between privacy and utility. To enhance user privacy while ensuring data utility, we propose a Hybrid Aggregation mechanism based on Shuffling, Subsampling and Shapley value (HASSS) for federated learning under blockchain framework. HASSS includes two procedures, private intra-local domain aggregation and efficient inter-local domain evaluation. During the private aggregation, the local updates of users are selected and randomized to achieve gradient index privacy and gradient privacy, and then are shuffled and subsampled by shufflers to achieve identity privacy and privacy amplification. During the efficient evaluation, local servers that aggregated updates within domains broadcast and receive updates from other local servers, based on which the contribution of each local server is calculated to select nodes for global update. Two comprehensive sets are applied to evaluate the performance of HASSS. Simulations show that our scheme can enhance user privacy while ensuring data utility.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Federated learning; Local differential privacy; Blockchain; Evaluation

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1016/j.comcom.2024.06.009

BTMDS: Blockchain trusted medical data sharing scheme with privacy protection and access control

【Author】 Chen, Liqiu Feng, Tao Ma, Rong Shi, Jianming

CCF-C

【影响因子】5.047

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】With the development of smart healthcare, eliminating information silos through trusted data sharing has become a social consensus, but there are still many problems that need to be solved. The multi-party sharing process of medical data usually occurs in an untrusted network environment, and the separation of data ownership and usage rights can result in the leakage of patients' private information. Meanwhile, the communication and computation overheads of existing medical data sharing schemes are too large, resulting in inefficient data sharing. To address the above problems, we propose a blockchain-based trusted medical data sharing scheme (BTMDS) with privacy protection and access control. In it, we subdivided patient privacy into identity and data privacy, and designed a privacy protection mechanism for blockchain medical data sharing using local differential privacy technology and searchable encryption technology. The cloud server acts as a proxy server, and the on-chain-off-chain storage structure of the blockchain and the cloud server implements fine-grained access control to prevent conspiracy attacks. Security analysis proves the security of BTMDS and prioritizes it over other schemes. In terms of performance, BTMDS saves 30% and 48% in the decryption phase compared to Feng and Chen schemes, which is more suitable for digital healthcare data sharing services.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain; Localized differential privacy; Privacy protection; Proxy re-encryption; Medical data sharing; Access control

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1016/j.comcom.2024.07.007

An efficient anonymous authentication scheme for blockchain assisted and fog-enabled smart grid

【Author】 Subramani, Jegadeesan Maria, Azees Sivaraman, Audithan Vijayakumar, P. Alqahtani, Fayez Tolba, Amr

【影响因子】4.152

【主题类别】

区块链技术-协同技术-雾计算

【Abstract】The growing integration of blockchain and fog computing with Smart Grid (SG) technologies highlights the need for strong security protocols, dependable communication channels, and sensitive user data protection. In order to meet the unique needs of SG, this research paper presents a novel and effective anonymous authentication scheme enhanced by fog computing and blockchain. The suggested scheme makes use of blockchain's decentralized structure to strengthen security protocols and ensure user privacy and anonymity within the SG ecosystem. Through the combination of fog computing's low latency benefits and blockchain's immutability, the suggested scheme creates a robust framework for secure authentication. The suggested approach gives considerable weight to reducing computational overhead and optimizing user identity privacy. Through comprehensive analysis, the study highlights the scheme's efficiency concerning authentication speed, resource utilization, and resilience against potential attacks. These results offer an important remedy for the ever-changing landscape of energy management systems and substantially advance the development of safe and privacy-preserving SG architectures.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Authentication; Smart grid; Blockchain; Fog computing; User privacy; Anonymity

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 理论模型

【DOI】 10.1016/j.compeleceng.2024.109508

Bids and asks: Blockchain-based peer-to-peer trading platform

【Author】 Divya, G. Supraja, P.

【影响因子】4.152

【主题类别】

区块链应用-实体经济-能源领域

【Abstract】In residential microgrids, rooftop solar power generation is becoming increasingly common. A new concept in electricity markets, such as peer-to-peer (P2P) auctions, is also emerging. In these markets, consumers and prosumers can exchange locally generated power directly with each other without relying on an intermediary. This approach promotes sustainable development. However, data security is a major concern in energy trading. Consequently, the use of blockchain technology in power markets has become more widespread. Blockchain can facilitate the trading of power from P2P sources. This paper presents the design and algorithms for automating energy trading through smart contracts, utilizing Home Energy Management Systems (HEMS) and Smart Meter Gateways (SM) for prosumers, consumers, and utilities. Simulations across various microgrid setups validated the peer-to-peer (P2P) energy market on the blockchain network. This framework increases profits for prosumers and consumers trading with each other, the necessity of blockchain operators for updating smart contracts and managing participants, the economic impracticality of current high gas costs on Ethereum, and the benefit of a closer bidding range for profit generation in P2P energy markets.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】P2P; Smart contract; Smart meter gateway; Blockchain; Total energy coin

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 理论模型

【DOI】 10.1016/j.compeleceng.2024.109516

Playing for keeps: Digital labor and blockchain precarity in play-to-earn gaming

【Author】 Tan, Gordon Kuo Siong

【影响因子】3.926

【主题类别】

区块链治理-市场治理-数字劳动

【Abstract】A recent economic phenomenon has emerged where gamers can earn money by playing blockchain-based games and accumulating cryptocurrency rewards. Known as "play-to-earn" (P2E), this gaming model has drawn a large following of economically struggling players during the pandemic, many of whom are in the Global South. This paper positions P2E gaming as an emerging form of digital labor where work and play are blurred. Using the highly popular P2E game Axie Infinity as a case study, this paper traces the everyday realities of players as workers through document analysis of the grey literature and textual analysis of Reddit user comments. The results reveal a form of blockchain-based precarity that is manifested in volatile earnings, insecure contractual "employment" and onerous working conditions among player-workers. Such precarity is driven by P2E's embeddedness within broader cryptocurrency markets and the platformed blockchain ecosystem, the reworking of capital-labor relationships that are distinguished by ownership of productive virtual assets, and by ongoing code-enabled changes to P2E's platform governance mechanisms. Examining P2E through a precarity lens reflects the ongoing financialization of labor that is enabled by blockchain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Precarity; Digital labor; Blockchain; Play-to-earn; Gaming; Axie Infinity

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1016/j.geoforum.2024.104009

Weighted Attribute-Based Proxy Re-Encryption Scheme with Distributed Multi-Authority Attributes

【Author】 Yi, Wenlong Wang, Chuang Kuzmin, Sergey Gerasimov, Igor Cheng, Xiangping

【影响因子】3.847

【主题类别】

区块链技术-协同技术-云存储

【Abstract】Existing attribute-based proxy re-encryption schemes suffer from issues like complex access policies, large ciphertext storage space consumption, and an excessive authority of the authorization center, leading to weak security and controllability of data sharing in cloud storage. This study proposes a Weighted Attribute Authority Multi-Authority Proxy Re-Encryption (WAMA-PRE) scheme that introduces attribute weights to elevate the expression of access policies from binary to multi-valued, simplifying policies and reducing ciphertext storage space. Simultaneously, the multiple attribute authorities and the authorization center construct a joint key, reducing reliance on a single authorization center. The proposed distributed attribute authority network enhances the anti-attack capability of cloud storage. Experimental results show that introducing attribute weights can reduce ciphertext storage space by 50%, proxy re-encryption saves 63% time compared to repeated encryption, and the joint key construction time is only 1% of the benchmark scheme. Security analysis proves that WAMA-PRE achieves CPA security under the decisional q-parallel BDHE assumption in the random oracle model. This study provides an effective solution for secure data sharing in cloud storage.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】data sharing; access control; blockchain; data security; attribute authority

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 理论模型

【DOI】 10.3390/s24154939

Enhancing Mobile Enterprise Security: A Blockchain and Agent Paradigm-Based Approach for Continuous Protection and Rapid Adaptation

【Author】 Khellaf, Radhia Boudouda, Souheila

【影响因子】3.476

【主题类别】

区块链应用-实体经济-企业管理

【Abstract】With the increasing use of mobiles in the workplace, companies need a strict yet flexible security framework to balance risk and trust. This need has led to the expansion and rapid growth of company security technologies for mobility. Existing application mechanisms cannot precisely cover the diverse security policies of enterprise applications. However, the companies must know in which technologies they need to invest. It also needs to know whether it should rely on a single technology, a combination of technologies or adopt a unified approach. MDM (Mobile Device Management) and MAM (Mobile Application Management) are the best-known existing applications in this field. In this article, an analysis of the two most widely used mobile ecosystem management tools was done from a security point of view. In addition, a new approach that strengthens the security part of the MAM application and supports dynamic policies was proposed. The proposed mechanism is based on a set of artifacts and mobile agents as well as block chain technology to guarantee strong security during interactions between the mobile host and the mobile enterprise. The experimental results showed that this approach significantly improves the efficiency of the MAM application.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Security; Codes; Companies; Privacy; Mobile applications; Authorization; Protection; Artifact; block chain; mobile agent; mobile application management; mobile enterprise; mobile security; security

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 理论模型

【DOI】 10.1109/ACCESS.2024.3434964

Module Lattice-Based Post Quantum Secure Blockchain Empowered Authentication Framework for Autonomous Truck Platooning

【Author】 Chaudhary, Dharminder Santhi, P. Durgarao, M. S. P. Padmavathi, A. Hassan, Mohammad Mehedi Alkhamees, Bader Fahad

【影响因子】3.476

【主题类别】

区块链应用-实体经济-交通领域

【Abstract】Truck platooning uses networking technology and automated driving support systems to join multiple trucks in a group. When these vehicles interact for particular journey stages, such as on highways, they autonomously maintain a predefined, tight spacing among themselves. Platooning improves transportation by making better use of highways, delivering cargo faster, and minimizing congestion in traffic. Therefore, safety and platooning are two important attributes of an intelligent truck system. This paper discusses a quantum-safe blockchain-empowered authentication mechanism for autonomous truck platooning. The proposed idea is to use blockchain to combine multiple nodes and ensure authenticity with the help of an aggregation technique. The proposed design ensures authenticity to the system due to hard assumptions:1) Learning With Error (LWE) and 2) Short Integer Solution (SIS) on random module generated lattice. This paper uses operations over module lattices to be more efficient than general lattices. We can perform operations on module lattices with the help of fast algorithms for polynomial arithmetic.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Lattices; Vehicle dynamics; Security; Smart contracts; Authentication; Quantum computing; Blockchains; Cryptography; Blockchain; signature; aggregate signature; truck platooning; cryptography

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2024.3434691

Secure Sharing Architecture of Personal Healthcare Data Using Private Permissioned Blockchain for Telemedicine

【Author】 Murthy, Ch V. N. U. Bharathi Shri, M. Lawanya

【影响因子】3.476

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】Blockchain technology has fascinated and significantly sparked research activities and industries due to its transparency in transactions and data sharing. The striking proliferation of blockchain technology is used to confront the challenges associated with trust, transparency, security, centralization, supply chain traceability, and regulatory compliance. The promising technology has the potential to enable several boons across diverse fields like healthcare, supply chain management, manufacturing, cross-border payments, finance, and energy trading. Telemedicine primarily aims to facilitate the transmission of healthcare data through electronic channels, enabling users to access medical services. It supports healthcare services around the globe, aids in early diagnosis and treatment, and assists with remote care by provisioning effective healthcare that is safe, secure, and reliable. However, there are challenges associated with Personal Health Records (PHR) due to lack of ownership of the data, accuracy, reliability, and data transaction security. The architecture presented in this work enables us to benefit from telemedicine and securely share PHR. The proposed model offers a permissioned network-based Hyperledger Fabric blockchain framework for secure PHR sharing amongst healthcare providers. The Byzantine Fault Tolerance consensus mechanism protects patient privacy, and the IPFS protocol is used to store the data off-chain. Additionally, the smart contract is utilized for providing patients with granular access control over PHR data. Hyperledger Caliper is used as a benchmarking tool to test this technology and determine the average latency rate for viewing and updating the PHR by healthcare providers along with analysis of CPU and memory utilization. As a result, our goals in telemedicine to improve secure sharing and give the patient access control are achieved.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Blockchain technology; data sharing; security; chaincode; IPFS; privacy; personal health record; Blockchain technology; data sharing; security; chaincode; IPFS; privacy; personal health record

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1109/ACCESS.2024.3436075

A Resource-Based Dynamic Pricing and Forced Forwarding Incentive Algorithm in Socially Aware Networking

【Author】 Zhang, Xuemin Li, Yuan Xiong, Zenggang Liu, Yanchao Wang, Shihui Hou, Delin

【影响因子】2.690

【主题类别】

区块链应用-虚拟经济-虚拟货币

【Abstract】In socially aware networking, nodes typically behave selfishly due to resource constraints and social correlations, resulting in low network performance. To incentivize selfish nodes to actively participate in message forwarding, this paper proposes a resource-based dynamic pricing and forced forwarding incentive algorithm (DFIA). Firstly, the algorithm introduces virtual currency as a transaction medium and then designs a pricing function based on factors such as the node's resource status, participation contribution, location relevance, and social connectivity. It ensures that the forwarding service is transacted at a reasonable price through bargaining rules. Secondly, a forced forwarding strategy is implemented to compel selfish nodes, which are unwilling to participate in other nodes' message forwarding, to forward a certain number of non-local messages. Meanwhile, in order to prevent nodes from discarding messages and to ensure successful forwarding to the destination, specific rules are used to allocate contribution values to nodes that successfully participate in message forwarding. Lastly, to avoid false quotation behavior, blockchain technology is employed. Transaction information is packaged into blocks and added to the blockchain after consensus validation by other nodes in the network, ensuring the transparency and immutability of transaction data. Simulation results indicate that compared with the existing incentive algorithms, this algorithm not only enhances message delivery probability but also effectively reduces average latency.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】socially aware networking; selfish nodes; false quotation; virtual currency

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.3390/electronics13153044

Ensuring Cross-Chain Transmission Technique Utilizing TPM and Establishing Cross-Trusted Root Security via SM Algorithm

【Author】 Wang, Yichuan Yan, Yiliang Zhang, Yaling Tian, Mengjie Liu, Xiaoxue

【影响因子】2.690

【主题类别】

区块链技术-核心技术-跨链与多链

【Abstract】As blockchain technology advances, cross-chain interoperability has become a crucial requirement for achieving seamless interaction among multiple chains. To solve this problem, this paper proposes a scholarly approach to the development of a cross-chain-secure transmission technique, incorporating the Trusted Platform Module (TPM) and the SM algorithm, which is based on trusted roots. This research paper elaborates on the design and implementation of the cross-chain-secure transmission technique based on TPM and the SM algorithm, emphasizing the academic rigor necessary for addressing the security requirements of cross-chain interactions. The research shows that compared with the previous method, the throughput of production capacity is not significantly different from that before and after adding the network delay, and the success rate of preventing attacks is increased by 46.9% by simulating related attacks. After multiple rounds of experiments, the effectiveness and feasibility of this technology in protecting cross-chain communication data are verified.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】trusted computing; cross-chain; TPM; SM algorithm; blockchain security; network security

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.3390/electronics13152978

A Review of Post-Quantum Privacy Preservation for IoMT Using Blockchain

【Author】 Sabrina, Fariza Sohail, Shaleeza Tariq, Umair Ullah

【影响因子】2.690

【主题类别】

区块链应用-实体经济-医疗领域

【Abstract】The Internet of Medical Things (IoMT) has significantly enhanced the healthcare system by enabling advanced patient monitoring, data analytics, and remote interactions. Given that IoMT devices generate vast amounts of sensitive data, robust privacy mechanisms are essential. This privacy requirement is critical for IoMT as, generally, these devices are very resource-constrained with limited storage, computation, and communication capabilities. Blockchain technology, with its decentralisation, transparency, and immutability, offers a promising solution for improving IoMT data security and privacy. However, the recent emergence of quantum computing necessitates developing measures to maintain the security and integrity of these data against emerging quantum threats. This work addresses the current gap of a comprehensive review and analysis of the research efforts to secure IoMT data using blockchain in the quantum era. We discuss the importance of blockchain for IoMT privacy and analyse the impact of quantum computing on blockchain to justify the need for these works. We also provide a comprehensive review of the existing literature on quantum-resistant techniques for effective blockchain solutions in IoMT applications. From our detailed review, we present challenges and future opportunities for blockchain technology in this domain.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】quantum computing; privacy preservation; blockchain; IoMT; post-quantum

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 综述

【DOI】 10.3390/electronics13152962

Blockchain and Homomorphic Encryption for Data Security and Statistical Privacy

【Author】 Raj, Rahul Peker, Yesem Kurt Mutlu, Zeynep Delal

【影响因子】2.690

【主题类别】

区块链技术-协同技术-同态加密

【Abstract】This study proposes a blockchain-based system that utilizes fully homomorphic encryption to provide data security and statistical privacy when data are shared with third parties for analysis or research purposes. The proposed system not only provides security of data in transit, at rest, and in use but also assures privacy and computational integrity for simple statistical computations. This is achieved by leveraging the attributes of the blockchain technology, which provides availability and data integrity, combined with homomorphic encryption, which provides confidentiality of data in use. The computations are performed on smart contracts residing on the blockchain, providing computational integrity. The proposed system is implemented on the Zama blockchain and performs statistical operations including mean, median, and variance on encrypted data. The results indicate that it is possible to perform fully homomorphic computations on the blockchain. Even though current computing limitations on the blockchain do not allow running the system for large data sets, the technology is available, and with advancements toward more efficient homomorphic operations on blockchains, the proposed system will provide an ultimate solution for providing the much-desired security properties in applications, including data and statistical privacy, confidentiality, and integrity at rest, in transit, and in use.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】data privacy; data integrity; computational integrity; homomorphic encryption; blockchain; statistical privacy; data security; statistical confidentiality

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.3390/electronics13153050

A Blockchain-Based Detection and Control System for Model-Generated False Information

【Author】 Liu, Chenlei Xu, Yuhua Hu, Bing Sun, Zhixin

【影响因子】2.690

【主题类别】

区块链应用-实体经济-信息领域

【Abstract】In the digital age, spreading false information has a far-reaching impact on various areas, such as society, politics, and the economy. With the popularization of applications of text generation models, the cost of producing false information has significantly decreased, making it challenging for human beings to screen it. Therefore, research on detection screening and early warning control for model-generated false information becomes particularly important. In this paper, we propose a model-generated false information detection and control system based on blockchain. Firstly, we design a model-generated false information detection method combining model-generated text discrimination based on a self-attention network and text similarity detection based on a twin network. Secondly, we construct a blockchain-based model-generated false information control and traceability system. It utilizes the proposed detection algorithm to provide early warning and control of model-generated false information involving important and sensitive events before social network release. For information judged to be model-generated false, the stored data on the blockchain is utilized to track and trace the publisher. Ultimately, experimental tests prove that the proposed detection method improves the accuracy of false information detection. In addition, the operational efficiency of the prototype system can meet quality of service requirements.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; model-generated false information; information detection; traceability

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.3390/electronics13152984

Investor Sentiment, Unexpected Inflation, and Bitcoin Basis Risk

【Author】 Conlon, Thomas Corbet, Shaen Oxley, Les

【影响因子】2.350

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】The introduction of regulated CME futures contracts on Bitcoin in 2017 raised an expectation that cryptocurrencies would become part of mainstream financial markets. This also heightened links between traditional markets and Bitcoin, implying that the cryptocurrency would be subject to systematic spillovers. This paper uses high-frequency data to examine whether Bitcoin basis risk is linked to investor sentiment from established financial markets. Our findings indicate that extreme investor sentiment, as reflected by the tail risk in various volatility indices, including the VIX, consistently correlates with a negative Bitcoin basis, where Bitcoin futures prices are lower than spot prices. Fluctuations significantly influence this relationship in the trading volume of Bitcoin futures and are more pronounced during periods of substantial unexpected inflation and deflation. These results underline the complex dynamics between market sentiment and cryptocurrency pricing, offering insights with substantial implications for investors and policymakers.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】Bitcoin; futures; inflation; liquidity; spot market; tail risk; volatility

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.1002/fut.22541

An analysis of the influence of famous people's posts on social networks on the cryptocurrency exchange rate

【Author】 Telenyk, Sergii Nowakowski, Grzegorz Gavrilenko, Olena Miahkyi, Mykhailo Khalus, Olena

【影响因子】1.515

【主题类别】

区块链治理-市场治理-数字货币

【Abstract】In this work, the level of influence of the posts published by famous people on social networks on the formation of the cryptocurrency exchange rate is investigated. Celebrities who are familiar with the financial industry, especially with the cryptocurrency market, or are somehow connected to a certain cryptocurrency, such as Elon Musk with Dogecoin, are chosen as experts whose influence through social media posts on cryptocurrency rates is examined. This research is conducted based on statistical analysis. Real cryptocurrency exchange rate forecasts for the selected time period and predicted ones for the same period, obtained using three algorithms, are utilized as a dataset. This paper uses methods such as statistical hypotheses regarding the significance of Spearman's rank correlation coefficient and Pearson's correlation. It is confirmed that the posts by famous people on social networks significantly affect the exchange rates of cryptocurrencies.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】cryptocurrency exchange rate; forecasting algorithms; posts on social networks; methods of statistical analysis; information technology of intellectual analysis

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实证数据

【DOI】 10.24425/bpasts.2024.150117

Blockchain-Based Piecewise Regressive Kupyna Cryptography for Secure Cloud Services

【Author】 Shanmugam, Selvakumar Natarajan, Rajesh H. L., Gururaj Flammini, Francesco Sulaiman Alfurhood, Badria Premkumar, Anitha

CCF-C

【影响因子】1.300

【主题类别】

区块链技术-核心技术-密码学

【Abstract】Cloud computing (CC) is a network-based concept where users access data at a specific time and place. The CC comprises servers, storage, databases, networking, software, analytics, and intelligence. Cloud security is the cybersecurity authority dedicated to securing cloud computing systems. It includes keeping data private and safe across online-based infrastructure, applications, and platforms. Securing these systems involves the efforts of cloud providers and the clients that use them, whether an individual, small-to-medium business, or enterprise uses. Security is essential for protecting data and cloud resources from malicious activity. A cloud service provider is utilized to provide secure data storage services. Data integrity is a critical issue in cloud computing. However, using data storage services securely and ensuring data integrity in these cloud servers remain an issue for cloud users. We introduce a unique piecewise regressive Kupyna cryptographic hash blockchain (PRKCHB) technique to secure cloud services with higher data integrity to solve these issues. The proposed PRKCHB method involves user registration, cryptographic hash blockchain, and regression analysis. Initially, the registration process for each cloud user is performed. After registering user particulars, Davies-Meyer Kupyna's cryptographic hash blockchain generates the hash value of data in each block. When a user requests data from the server, a piecewise regression function is used to validate their identity. Furthermore, the Gaussian kernel function recognizes authorized or unauthorized users for secure cloud information transmission. The regression function results in original data by enhanced integrity in the cloud. An analysis of the proposed PRKCHB technique evaluates different existing methods implemented in Python. The results contain different metrics: data confidentiality rate, data integrity rate, authentication time, storage overhead, and execution time. Compared to conventional techniques, findings corroborate the assertion that the proposed PRKCHB technique improves data confidentiality and integrity by up to 9% and 9% while lowering storage overhead, authentication time, and execution time by 10%, 12%, and 12%.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1049/2024/6863755

A Sealed-Bid Auction with Fund Binding: Preventing Maximum Bidding Price Leakage

【Author】 Chin, Kota Emura, Keita Sato, Shingo Omote, Kazumasa

【影响因子】0.695

【主题类别】

区块链应用-实体经济-竞标拍卖

【Abstract】In an open -bid auction, a bidder can know the budgets of other bidders. Thus, a sealed -bid auction that hides bidding prices is desirable. However, in previous sealed -bid auction protocols, it has been difficult to provide a "fund binding" property, which would guarantee that a bidder has funds more than or equal to the bidding price and that the funds are forcibly withdrawn when the bidder wins. Thus, such protocols are vulnerable to a false bidding. As a solution, many protocols employ a simple deposit method in which each bidder sends a deposit to a smart contract, which is greater than or equal to the bidding price, before the bidding phase. However, this deposit reveals the maximum bidding price, and it is preferable to hide this information. In this paper, we propose a sealed -bid auction protocol that provides a fund binding property. Our protocol not only hides the bidding price and a maximum bidding price, but also provides a fund binding property, simultaneously. For hiding the maximum bidding price, we pay attention to the fact that usual Ethereum transactions and transactions for sending funds to a one-time address have the same transaction structure, and it seems that they are indistinguishable. We discuss how much bidding transactions are hidden. We also employ DECO (Zhang et al., CCS 2020) that proves the validity of the data to a verifier in which the data are taken from a source without showing the data itself. Finally, we give our implementation which shows transaction fees required and compare it to a sealed -bid auction protocol employing the simple deposit method.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】blockchain; sealed-bid auction; price hiding; fund binding

【发表时间】2024

【收录时间】2024-08-18

【文献类型】 实验仿真

【DOI】 10.1587/transinf.2023DAP0002

COINS, CROSS-BORDER PAYMENTS, AND ANTI-MONEY LAUNDERING LAW

【Author】 Skinner, Christina Parajon

【影响因子】

【主题类别】

区块链治理-法律治理-数字货币监管

【Abstract】Financial innovation in the cryptocurrency space has prompted central bankers and financial policymakers around the world to question the future of money and payments. For many scholars and policymakers, the rise of cryptocurrencies implies significant improvements to the efficiency of making cross -border payments-and thus portends a gradual sunset on the legacy payments system. But for decades, that legacy payments system has partnered with the State to accomplish valuable foreign policy and national security goals: to combat money laundering, deter state aggression, and defend human rights and democratic institutions. This Article examines the potential for cryptocurrency payments ecosystems to bypass the legal frameworks that today require banks to act as gatekeepers of illicit finance and enforcers of sanctions regimes. Ultimately, in light of the trade-offs implied by moving from a bank -centric to a multi -railed crypto system, this Article argues for infrastructure -building within the existing system. In particular, it proposes the introduction of a centralized verifying party, which would conduct customer due diligence on an industry -wide basis. Given the current costs and complication of banks' current legal requirements to undertake individualized due diligence, the structural reform proposed here stands to make the legacy payment system more efficient-and hence more attractive relative to crypto competitors-for making cross -border payments.

你可以尝试使用大模型来生成摘要 立即生成

【Keywords】

【发表时间】2023

【收录时间】2024-08-18

【文献类型】 观点阐述

【DOI】

在线标注

备案号: 苏ICP备17025947号-5

评论回复