Computer Engineering & Science ›› 2024, Vol. 46 ›› Issue (01): 46-62.
• Computer Network and Znformation Security • Previous Articles Next Articles
SHEN Chuan-nian
Received:
2023-03-31
Revised:
2023-05-31
Accepted:
2024-01-25
Online:
2024-01-25
Published:
2024-01-15
SHEN Chuan-nian. Review on security issues of blockchains[J]. Computer Engineering & Science, 2024, 46(01): 46-62.
[1] | Nakamoto S.Bitcoin:A peer-to-peer electronic cash system[EB/OL].[2008-10-31]. https://git.dhimmel.com/bitcoin-whitepaper/. |
[2] | Zheng Z,Xie S,Dai H,et al.An overview of blockchain technology:Architecture,consensus,and future trends[C]∥Proc of 2017 IEEE International Congress on Big Data,2017:557-564. |
[3] | Swan M, de Filippi P.Toward a philosophy of blockchain:A symposium:Introduction[J].Metaphilosophy,2017,48(5):603-619. |
[4] | Wood G.Ethereum:A secure decentralised generalised tran- saction ledger[J].Ethereum Project Yellow Paper,2014,151:1-32. |
[5] | Zou W, Lo D,Kochhar P S,et al.Smart contract development:Challenges and opportunities[J].IEEE Transactions on Software Engineering,2019,47(10):2084-2106. |
[6] | 田国华,胡云瀚,陈晓峰.区块链系统攻击与防御技术研究进展[J].软件学报,2021,32(5):1495-1525. |
Tian Guo-hua,Hu Yun-han,Chen Xiao-feng.Research progress on attack and defense techniques in block-chain system[J].Journal of Software,2021,32(5):1495-1525. | |
[7] | 曹雪莲,张建辉,刘波.区块链安全、隐私与性能问题研究综述[J].计算机集成制造系统,2021,27(7):2078-2094. |
Cao Xue-lian,Zhang Jian-hui,Liu Bo.Review on security,privacy,and performance issues of blockchain[J].Computer Integrated Manufacturing Systems,2021,27(7):2078-2094. | |
[8] | Bach L M,Mihaljevic B,Zagar M.Comparative analysis of blockchain consensus algorithms[C]∥Proc of 2018 41st International Convention on Information and Communication Technology,Electronics and Microelectronics,2018:1545-1550. |
[9] | Ganesh C,Orlandi C,Tschudi D.Proof-of-stake protocols for privacy-aware blockchains[C]∥Proc of Annual International Conference on the Theory and Applications of Cryptographic Techniques,2019:690-719. |
[10] | Larimer D.Delegated proof of stake[EB/OL].[2014-04-03].https://how.bitshares.works/en/master/technology/dpos.htm. |
[11] | Cachin C.Architecture of the hyperledger blockchain fabric[C]∥Proc of Workshop on Distributed Cryptocurrencies and Consensus Ledgers,2016:1-4. |
[12] | Ongaro D,Ousterhout J.In search of an understandable consensus algorithm[C]∥Proc of 2014 USENIX Annual Technical Conference,2014:305-319. |
[13] | Lamport L.The part-time parliament[J]. ACM Transactions on Computer Systems, 1998, 16(2):133-169. |
[14] | Merkle R C.A digital signature based on a conventional encryption function[C]∥Proc of Conference on the Theory and Application of Cryptographic Techniques,1987:369-378. |
[15] | 袁勇,倪晓春,曾帅,等.区块链共识算法的发展现状与展望[J].自动化学报,2018,44(11):2011-2022. |
Yuan Yong,Ni Xiao-chun,Zeng Shuai,et al.Blockchain consensus algorithms:The state of the art and future trends[J].Acta Automatica Sinica,2018,44(11):2011-2022. | |
[16] | 王永利,徐秋亮.量子计算与量子密码的原理及研究进展综述[J].计算机研究与发展,2020,57(10):2015-2026. |
Wang Yong-li,Xu Qiu-liang.Principle and research progress of quantum computation and quantum cryptography[J].Journal of Computer Research and Development,2020,57(10):2015-2026. | |
[17] | Campbell R. Evaluation of post-quantum distributed ledger cryptography[J].The Journal of The British Blockchain Association,2019,2(1):1-8. |
[18] | 胡希,向宏,丁津泰,等.后量子密码迁移趋势下应用于区块链的公钥密码安全[J].密码学报,2023,10(2):219-245. |
Hu Xi,Xiang Hong,Ding Jin-tai,et.al.Security of public key cryptography in blockchain under the trend on post-quantum cryptography migration[J].Journal of Cryptologic Research,2023,10(2):219-245. | |
[19] | Wang X Y,Feng D G,Lai X J,et al.Collisions for hash functions MD4,MD5,HAVAL-128 and RIPEMD[J/OL].[2022-10-10]. https://eprint.iacr.org/2004/199. |
[20] | Stevens M.New collision attacks on SHA-1 based on optimal joint local-collision analysis[C]∥Proc of Annual International Conference on the Theory and Applications of Cryptographic Techniques,2013:245-261. |
[21] | 张伟,许海洋,周百顺.多进程共享的高效哈希表[J].计算机工程与设计,2017,38(5):1190-1195. |
Zhang Wei,Xu Hai-yang,Zhou Bai-shun.Efficient hash table supporting multi-process sharing[J].Computer Engineering and Design,2017,38(5):1190-1195. | |
[22] | 马传旺,张宇,方滨兴,等.匿名网络综述[J].软件学报,2023,34(1):404-420. |
Ma Chuan-wang,Zhang Yu,Fang Bin-xing,et al.Survey on anonymous networks[J].Journal of Software,2023,34(1):404-420. | |
[23] | 邸剑,吝伟华.区块链中矿池选择策略的研究与分析[J].计算机应用研究,2020,37(6):1804-1807. |
Di Jian,Lin Wei-hua.Research and analysis of mining pool selection strategy in blockchain[J].Application Research of Computers,2020,37(6):1804-1807. | |
[24] | Eyal I,Sirer E G.Majority is not enough:Bitcoin mining is vulnerable[C]∥Proc of International Conference on Financial Cryptography and Data Security,2014:436-454. |
[25] | Grunspan C,Pérez-Marco R.On profitability of selfish mining[J].arXiv:1805.08281,2018. |
[26] | Nguyen C T,Hoang D T,Nguyen D N,et al.Proof-of-stake consensus mechanisms for future blockchain networks:Fundamentals,applications and opportunities[J].IEEE Access,2019,7:85727-85745. |
[27] | Daian P.Analysis of the DAO exploit [EB/OL].[2020-12-29].https://hackingdistributed.com/2016/06/18/analysis-of-the-dao-ex-ploit/. |
[28] | 钱鹏,刘振广,何钦铭,等.智能合约安全漏洞检测技术研究综述[J].软件学报,2022,33(8):3059-3085. |
Qian Peng,Liu Zhen-guang,He Qin-ming,et al.Smart contract vulnerability detection technique:a survey[J].Journal of Software,2022,33(8):3059-3085. | |
[29] | 陈虹,王颖辉,金海波,等.区块链拍卖退款交易智能合约DoS漏洞优化研究[J].计算机应用研究,2023,40(2):343-348. |
Chen Hong,Wang Ying-hui,Jin Hai-bo,et al.Research on DoS vulnerability optimization of blockchain auction refund transaction smart contract[J].Application Research of Computers,2023,40(2):343-348. | |
[30] | Arias L,Spagnuolo F,Giordano F,et al.OpenZeppelin[EB/OL].[2020-12-29].https://http://github.com/OpenZeppelin/openzeppelin-Solidity. |
[31] | 李雷孝,郑岳,高昊昱,等.智能合约漏洞检测研究综述[J].计算机科学与探索,2022,16(11):2456-2470. |
Li Lei-xiao,Zheng Yue,Gao Hao-yu,et al.Survey of research on smart contract vulnerability detection[J].Journal of Frontiers of Computer Science and Technology,2022,16(11):2456-2470. | |
[32] | 刘汉卿,阮娜.区块链中攻击方式的研究[J].计算机学报,2021,44(4):786-805. |
Liu Han-qing,Ruan Na.A survey on attacking strategies in blockchain[J].Chinese Journal of Computers,2021,44(4):786-805. | |
[33] | 韩璇,袁勇,王飞跃.区块链安全问题:研究现状与展望[J].自动化学报,2019,45(1):206-225. |
Han Xuan,Yuan Yong,Wang Fei-yue.Security problems on blockchain:The state of the art and future trends[J].Acta Automatica Sinica,2019,45(1):206-225. | |
[34] | 付梦琳,吴礼发,洪征,等.智能合约安全漏洞挖掘技术研究[J].计算机应用,2019,39(7):1959-1966. |
Fu Meng-lin,Wu Li-fa,Hong Zheng,et al.Research on vulnerability mining technique for smart contracts[J].Journal of Computer Applications,2019,39(7):1959-1966. | |
[35] | Jablon D P.Extended password key exchange protocols immune to dictionary attack[C]∥Proc of IEEE 6th Workshop on Enabling Technologies:Infrastructure for Collaborative Enterprises,1997:248-255. |
[36] | 斯雪明,徐蜜雪,苑超.区块链安全研究综述[J].密码学报,2018,5(5):458-469. |
Si Xue-ming,Xu Mi-xue,Yuan Chao.Survey on security of blockchain[J].Journal of Cryptologic Research,2018,5(5):458-469. | |
[37] | 吴振铨,梁宇辉,康嘉文,等.基于联盟区块链的智能电网数据安全存储与共享系统[J].计算机应用,2017,37(10):2742-2747. |
Wu Zhen-quan,Liang Yu-hui,Kang Jia-wen,et al.Secure data storage and sharing system based on consortium blockchain in smart grid[J].Journal of Computer Applications,2017,37(10):2742-2747. | |
[38] | Hope-Bailie A,Thomas S.Interledger:Creating a standard for payments[C]∥Proc of the 25th International Conference Companion on World Wide Web,2016:281-282. |
[39] | 李芳,李卓然,赵赫.区块链跨链技术进展研究[J].软件学报,2019,30(6):1649-1660. |
Li Fang,Li Zhuo-ran,Zhao He.Research on the progress in cross-chain technology of blockchains[J].Journal of Software,2019,30(6):1649-1660. | |
[40] | 孙国梓,王纪涛,谷宇.区块链技术安全威胁分析[J].南京邮电大学学报(自然科学版),2019,39(5):48-62. |
Sun Guo-zi,Wang Ji-tao,Gu Yu.Security threat analysis of blockchain technology[J].Journal of Nanjing University of Posts and Telecommunications(Natural Science Edition),2019,39(5):48-62. | |
[41] | 郭朝,郭帅印,张胜利,等.区块链跨链技术分析[J].物联网学报,2020,4(2):35-48. |
Guo Zhao,Guo Shuai-yin,Zhang Sheng-li,et al.Analysis of cross-chain technology of blockchain[J].Chinese Journal on Internet of Things,2020,4(2):35-48. | |
[42] | Green M,Miers I.Bolt:Anonymous payment channels for decentralized currencies[C]∥Proc of the 2017 ACM SIGSAC Conference on Computer and Communications Security,2017:473-489. |
[43] | 柏语蔓,于莲芝.区块链权益证明共识机制综述[J].信息安全与通信保密,2021(8):68-81. |
Bai Yu-man,Yu Lian-zhi.A survey on proof-of-stake consensus mechanism of blockchain[J].Information Security and Communications Privacy,2021(8):68-81. | |
[44] | 何帅,黄襄念,陈晓亮.区块链跨链技术发展及应用研究综述[J].西华大学学报(自然科学版),2021,40(3):1-14. |
He Shuai,Huang Xiang-nian,Chen Xiao-liang.The research summary of the development and application of blockchain cross-chain technology[J].Journal of Xihua University(Natural Science Edition),2021,40(3):1-14. | |
[45] | Gervais A,Karame G O,Wüst K,et al.On the security and performance of proof of work blockchains[C]∥Proc of the 2016 ACM SIGSAC Conference on Computer and Communications Security,2016:3-16. |
[46] | 区块链白皮书[EB/OL].[2019-11-15]. http://www.caict.ac.cn/kxyj/qwfb/bps/201911/P020191108365460712077. pdf. |
[47] | 陈纯.联盟区块链关键技术与区块链的监管挑战[J].中国工业和信息化,2020(11):54-58. |
[48] | Lu Q, Xu X. Adaptable blockchain-based systems: A case study for product traceability[J].IEEE Software,2017,34(6):21-27. |
[49] | Zheng L W,Helu X H,Li M H,et al.Automatic discovery mechanism of blockchain nodes based on the Kademlia algorithm[C]∥Proc of the 5th International Conference on Artificial Intelligence and Security,2019:605-616. |
[50] | 张健毅,王志强,徐治理,等.基于区块链的可监管数字货币模型[J].计算机研究与发展,2018,55(10):2219-2232. |
Zhang Jian-yi,Wang Zhi-qiang,Xu Zhi-li,et al.A regulatable digital currency model based on blockchain[J].Journal of Computer Research and Development,2018,55(10):2219-2232. |
[1] | DING Yan, WANG Chuang, FENG Liao-liao, WANG Feng, CHANG Jun-sheng. Trusted data circulation between alliances based on supervision of blockchain [J]. Computer Engineering & Science, 2022, 44(10): 1771-1780. |
[2] | LIN Jie-he, ZHANG Shao-hua, LI Chao, DAI Bing-rong. A blockchain data sharing system based on ECC [J]. Computer Engineering & Science, 2022, 44(05): 810-818. |
[3] | PEI Song-ying, CHEN Zhen-guo. Research and application situation analysis of domestic blockchain technology based on bibliometrics [J]. Computer Engineering & Science, 2021, 43(11): 1966-1978. |
[4] |
CHEN Zi-hao,LI Qiang,GAN Jun,ZHANG Chao,LI Zu-rui.
VC Chain:An alliance audio-video
copyright blockchain system
[J]. Computer Engineering & Science, 2019, 41(11): 1939-1948.
|
[5] | DUAN Bin,LI Tao,KUANG Yi,XIAO Xiangxiang. Block chain design for engineering education learning outcomes [J]. Computer Engineering & Science, 2018, 40(增刊S1): 103-108. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
湘公网安备 43010502000083号
湘ICP备10006030号
Copyright © Computer Engineering & Science, All Rights Reserved.
Address:109 Deya Rd,Changsha,hunan(410073) Tel: 0731-87002567 Email: jsjgcykx@vip.163.com
Powered by Beijing Magtech Co., Ltd.