區(qū)塊鏈起源于中本聰?shù)谋忍貛攀火模鳛楸忍貛诺牡讓蛹夹g(shù),本質(zhì)上是一個去中心化的數(shù)據(jù)庫技俐。 是指通過去中心化和去信任的方式集體維護一個可靠數(shù)據(jù)庫的技術(shù)方案。 區(qū)塊鏈技術(shù)是一種不依賴第三方斯议、通過自身分布式節(jié)點進行網(wǎng)絡(luò)數(shù)據(jù)的存儲、驗證、傳遞和交流的一種技術(shù)方案。
上一篇給大家分享了學(xué)術(shù)范里的區(qū)塊鏈面臨的挑戰(zhàn)與機遇洒嗤、研究技術(shù)進展與未來的發(fā)展趨勢。此篇分享區(qū)塊鏈在隱私保護和比特幣方面的應(yīng)用蚀乔。
文獻均來自學(xué)術(shù)范Blockchain-研究方向詳細 - 學(xué)術(shù)范 (xueshufan.com)
參考翻譯:學(xué)術(shù)范自帶翻譯(邊瀏覽邊翻譯這個功能對英語渣渣太太友好了!)
1.Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
會議論文2016IEEE S&P 2016
Ahmed E. Kosba?1?/Andrew Miller?1?/Elaine Shi?2?/Zikai Wen?2?/Charalampos Papamanthou?1
1University of Maryland, College Park2Cornell University
Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, the decentralized blockchain ensures that honest parties obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount transacted, are exposed on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view. A Hawk programmer can write a private smart contract in an intuitive manner without having to implement cryptography, and our compiler automatically generates an efficient cryptographic protocol where contractual parties interact with the blockchain, using cryptographic primitives such as zero-knowledge proofs. To formally define and reason about the security of our protocols, we are the first to formalize the blockchain model of cryptography. The formal modeling is of independent interest. We advocate the community to adopt such a formal model when designing applications atop decentralized blockchains.
2.IoT security: Review, blockchain solutions, and open challenges
期刊論文2017Future Generation Computer Systems
Minhaj Ahmad Khan?1?/Khaled Salah?2
1Bahauddin Zakariya University2Khalifa University
With the advent of smart homes, smart cities, and smart everything, the Internet of Things (IoT) has emerged as an area of incredible impact, potential, and growth, with Cisco Inc. predicting to have 50 billion connected devices by 2020. However, most of these IoT devices are easy to hack and compromise. Typically, these IoT devices are limited in compute, storage, and network capacity, and therefore they are more vulnerable to attacks than other endpoint devices such as smartphones, tablets, or computers. In this paper, we present and survey major security issues for IoT. We review and categorize popular security issues with regard to the IoT layered architecture, in addition to protocols used for networking, communication, and management. We outline security requirements for IoT along with the existing attacks, threats, and state-of-the-art solutions. Furthermore, we tabulate and map IoT security problems against existing solutions found in the literature. More importantly, we discuss, how blockchain, which is the underlying technology for bitcoin, can be a key enabler to solve many IoT security problems. The paper also identifies open research problems and challenges for IoT security.?
3.?Making Smart Contracts Smarter
會議論文2016ACM CCS 2016
Loi Luu?1?/Duc-Hiep Chu?1?/Hrishi Olickel?2?/Prateek Saxena?1?/Aquinas Hobor?1
1National University of Singapore2Yale-NUS College
Cryptocurrencies record transactions in a decentralized data structure called a blockchain. Two of the most popular cryptocurrencies, Bitcoin and Ethereum, support the feature to encode rules or scripts for processing transactions. This feature has evolved to give practical shape to the ideas of smart contracts, or full-fledged programs that are run on blockchains. Recently, Ethereum's smart contract system has seen steady adoption, supporting tens of thousands of contracts, holding millions dollars worth of virtual coins. In this paper, we investigate the security of running smart contracts based on Ethereum in an open distributed network like those of cryptocurrencies. We introduce several new security problems in which an adversary can manipulate smart contract execution to gain profit. These bugs suggest subtle gaps in the understanding of the distributed semantics of the underlying platform. As a refinement, we propose ways to enhance the operational semantics of Ethereum to make contracts less vulnerable. For developers writing contracts for the existing Ethereum system, we build a symbolic execution tool called Oyente to find potential security bugs. Among 19, 336 existing Ethereum contracts, Oyente flags 8, 833 of them as vulnerable, including the TheDAO bug which led to a 60 million US dollar loss in June 2016. We also discuss the severity of other attacks for several case studies which have source code available and confirm the attacks (which target only our accounts) in the main Ethereum network.
4.Majority Is Not Enough: Bitcoin Mining Is Vulnerable
會議論文2014FC 2014
Ittay Eyal?1?/Emin Gün Sirer?1
The Bitcoin cryptocurrency records its transactions in a public log called the blockchain. Its security rests critically on the distributed protocol that maintains the blockchain, run by participants called miners. Conventional wisdom asserts that the mining protocol is incentive-compatible and secure against colluding minority groups, that is, it incentivizes miners to follow the protocol as prescribed.