區(qū)塊鏈領(lǐng)域十篇經(jīng)典論文(3)-隱私保護和比特幣應(yīng)用

區(qū)塊鏈起源于中本聰?shù)谋忍貛攀火模鳛楸忍貛诺牡讓蛹夹g(shù),本質(zhì)上是一個去中心化的數(shù)據(jù)庫技俐。 是指通過去中心化和去信任的方式集體維護一個可靠數(shù)據(jù)庫的技術(shù)方案。 區(qū)塊鏈技術(shù)是一種不依賴第三方斯议、通過自身分布式節(jié)點進行網(wǎng)絡(luò)數(shù)據(jù)的存儲、驗證、傳遞和交流的一種技術(shù)方案。

上一篇給大家分享了學(xué)術(shù)范里的區(qū)塊鏈面臨的挑戰(zhàn)與機遇洒嗤、研究技術(shù)進展與未來的發(fā)展趨勢。此篇分享區(qū)塊鏈在隱私保護和比特幣方面的應(yīng)用蚀乔。

文獻均來自學(xué)術(shù)范Blockchain-研究方向詳細 - 學(xué)術(shù)范 (xueshufan.com)

參考翻譯:學(xué)術(shù)范自帶翻譯(邊瀏覽邊翻譯這個功能對英語渣渣太太友好了!)

1.Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

會議論文2016IEEE S&P 2016

Ahmed E. Kosba?1?/Andrew Miller?1?/Elaine Shi?2?/Zikai Wen?2?/Charalampos Papamanthou?1

1University of Maryland, College Park2Cornell University

Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, the decentralized blockchain ensures that honest parties obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount transacted, are exposed on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view. A Hawk programmer can write a private smart contract in an intuitive manner without having to implement cryptography, and our compiler automatically generates an efficient cryptographic protocol where contractual parties interact with the blockchain, using cryptographic primitives such as zero-knowledge proofs. To formally define and reason about the security of our protocols, we are the first to formalize the blockchain model of cryptography. The formal modeling is of independent interest. We advocate the community to adopt such a formal model when designing applications atop decentralized blockchains.

2.IoT security: Review, blockchain solutions, and open challenges

期刊論文2017Future Generation Computer Systems

Minhaj Ahmad Khan?1?/Khaled Salah?2

1Bahauddin Zakariya University2Khalifa University

With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security.?

3.?Making Smart Contracts Smarter

會議論文2016ACM CCS 2016

Loi Luu?1?/Duc-Hiep Chu?1?/Hrishi Olickel?2?/Prateek Saxena?1?/Aquinas Hobor?1

1National University of Singapore2Yale-NUS College

Cryptocurrencies record transactions in a decentralized data structure called a blockchain. Two of the most popular cryptocurrencies, Bitcoin and Ethereum, support the feature to encode rules or scripts for processing transactions. This feature has evolved to give practical shape to the ideas of smart contracts, or full-fledged programs that are run on blockchains. Recently, Ethereum's smart contract system has seen steady adoption, supporting tens of thousands of contracts, holding millions dollars worth of virtual coins. In this paper, we investigate the security of running smart contracts based on Ethereum in an open distributed network like those of cryptocurrencies. We introduce several new security problems in which an adversary can manipulate smart contract execution to gain profit. These bugs suggest subtle gaps in the understanding of the distributed semantics of the underlying platform. As a refinement, we propose ways to enhance the operational semantics of Ethereum to make contracts less vulnerable. For developers writing contracts for the existing Ethereum system, we build a symbolic execution tool called Oyente to find potential security bugs. Among 19, 336 existing Ethereum contracts, Oyente flags 8, 833 of them as vulnerable, including the TheDAO bug which led to a 60 million US dollar loss in June 2016. We also discuss the severity of other attacks for several case studies which have source code available and confirm the attacks (which target only our accounts) in the main Ethereum network.

4.Majority Is Not Enough: Bitcoin Mining Is Vulnerable

會議論文2014FC 2014

Ittay Eyal?1?/Emin Gün Sirer?1

1Cornell University

The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed.

?著作權(quán)歸作者所有,轉(zhuǎn)載或內(nèi)容合作請聯(lián)系作者
  • 序言:七十年代末菲茬,一起剝皮案震驚了整個濱河市吉挣,隨后出現(xiàn)的幾起案子,更是在濱河造成了極大的恐慌婉弹,老刑警劉巖睬魂,帶你破解...
    沈念sama閱讀 206,968評論 6 482
  • 序言:濱河連續(xù)發(fā)生了三起死亡事件,死亡現(xiàn)場離奇詭異镀赌,居然都是意外死亡氯哮,警方通過查閱死者的電腦和手機,發(fā)現(xiàn)死者居然都...
    沈念sama閱讀 88,601評論 2 382
  • 文/潘曉璐 我一進店門商佛,熙熙樓的掌柜王于貴愁眉苦臉地迎上來喉钢,“玉大人,你說我怎么就攤上這事良姆〕λ洌” “怎么了?”我有些...
    開封第一講書人閱讀 153,220評論 0 344
  • 文/不壞的土叔 我叫張陵玛追,是天一觀的道長税课。 經(jīng)常有香客問我,道長痊剖,這世上最難降的妖魔是什么韩玩? 我笑而不...
    開封第一講書人閱讀 55,416評論 1 279
  • 正文 為了忘掉前任,我火速辦了婚禮陆馁,結(jié)果婚禮上找颓,老公的妹妹穿的比我還像新娘。我一直安慰自己叮贩,他們只是感情好叮雳,可當我...
    茶點故事閱讀 64,425評論 5 374
  • 文/花漫 我一把揭開白布想暗。 她就那樣靜靜地躺著,像睡著了一般帘不。 火紅的嫁衣襯著肌膚如雪说莫。 梳的紋絲不亂的頭發(fā)上,一...
    開封第一講書人閱讀 49,144評論 1 285
  • 那天寞焙,我揣著相機與錄音储狭,去河邊找鬼。 笑死捣郊,一個胖子當著我的面吹牛辽狈,可吹牛的內(nèi)容都是我干的。 我是一名探鬼主播呛牲,決...
    沈念sama閱讀 38,432評論 3 401
  • 文/蒼蘭香墨 我猛地睜開眼刮萌,長吁一口氣:“原來是場噩夢啊……” “哼!你這毒婦竟也來了娘扩?” 一聲冷哼從身側(cè)響起着茸,我...
    開封第一講書人閱讀 37,088評論 0 261
  • 序言:老撾萬榮一對情侶失蹤,失蹤者是張志新(化名)和其女友劉穎琐旁,沒想到半個月后涮阔,有當?shù)厝嗽跇淞掷锇l(fā)現(xiàn)了一具尸體,經(jīng)...
    沈念sama閱讀 43,586評論 1 300
  • 正文 獨居荒郊野嶺守林人離奇死亡灰殴,尸身上長有42處帶血的膿包…… 初始之章·張勛 以下內(nèi)容為張勛視角 年9月15日...
    茶點故事閱讀 36,028評論 2 325
  • 正文 我和宋清朗相戀三年敬特,在試婚紗的時候發(fā)現(xiàn)自己被綠了。 大學(xué)時的朋友給我發(fā)了我未婚夫和他白月光在一起吃飯的照片牺陶。...
    茶點故事閱讀 38,137評論 1 334
  • 序言:一個原本活蹦亂跳的男人離奇死亡伟阔,死狀恐怖,靈堂內(nèi)的尸體忽然破棺而出掰伸,到底是詐尸還是另有隱情减俏,我是刑警寧澤,帶...
    沈念sama閱讀 33,783評論 4 324
  • 正文 年R本政府宣布碱工,位于F島的核電站娃承,受9級特大地震影響,放射性物質(zhì)發(fā)生泄漏怕篷。R本人自食惡果不足惜历筝,卻給世界環(huán)境...
    茶點故事閱讀 39,343評論 3 307
  • 文/蒙蒙 一、第九天 我趴在偏房一處隱蔽的房頂上張望廊谓。 院中可真熱鬧梳猪,春花似錦、人聲如沸。這莊子的主人今日做“春日...
    開封第一講書人閱讀 30,333評論 0 19
  • 文/蒼蘭香墨 我抬頭看了看天上的太陽。三九已至匿沛,卻和暖如春扫责,著一層夾襖步出監(jiān)牢的瞬間,已是汗流浹背逃呼。 一陣腳步聲響...
    開封第一講書人閱讀 31,559評論 1 262
  • 我被黑心中介騙來泰國打工鳖孤, 沒想到剛下飛機就差點兒被人妖公主榨干…… 1. 我叫王不留,地道東北人抡笼。 一個月前我還...
    沈念sama閱讀 45,595評論 2 355
  • 正文 我出身青樓苏揣,卻偏偏與公主長得像,于是被迫代替她去往敵國和親推姻。 傳聞我的和親對象是個殘疾皇子平匈,可洞房花燭夜當晚...
    茶點故事閱讀 42,901評論 2 345

推薦閱讀更多精彩內(nèi)容