CN112054990B - Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system - Google Patents

Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system Download PDF

Info

Publication number
CN112054990B
CN112054990B CN202010708776.4A CN202010708776A CN112054990B CN 112054990 B CN112054990 B CN 112054990B CN 202010708776 A CN202010708776 A CN 202010708776A CN 112054990 B CN112054990 B CN 112054990B
Authority
CN
China
Prior art keywords
seed
hash
instruction set
height
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010708776.4A
Other languages
Chinese (zh)
Other versions
CN112054990A (en
Inventor
杜晓楠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202010708776.4A priority Critical patent/CN112054990B/en
Publication of CN112054990A publication Critical patent/CN112054990A/en
Application granted granted Critical
Publication of CN112054990B publication Critical patent/CN112054990B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0891Revocation or update of secret information, e.g. encryption key update or rekeying
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to a method for preventing Hash flood attack in a block chain system. And initializing and loading a hash algorithm instruction set, wherein the hash algorithm instruction set comprises a fixed instruction set and a variable instruction set. The blocks of the blockchain system are loaded and synchronized. The blockchain system is run and a seed hash value is generated. And stopping Hash operation, updating the variable instruction set according to the seed Hash value, and continuing to operate the block chain system after the variable instruction set is updated. The invention also relates to a computer readable medium and a blockchain system. According to the method, the variable instruction set of the memory intensive algorithm program is periodically updated, so that an attacker cannot generate a large number of hash values in a short period by using hardware such as an FPGA (field programmable gate array) and an ASCI (asynchronous serial communication interface) and further can carry out hash flood attack on the block chain, the network performance of the block chain can be stabilized, and the robustness and the adaptability of the network performance of the block chain are improved.

Description

Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system
Technical Field
The present invention relates to the field of blockchain, and more particularly, to a method, a computer-readable medium, and a blockchain system for preventing hash flood attacks in a blockchain system.
Background
The blockchain technology is a shared distributed database technology, and the advantages of the blockchain technology are mainly highlighted in aspects of distributed decentralization, no need of trusting a system, no tampering, encryption security and the like. The method is a technology for maintaining a complete, distributed and non-falsifiable account book database by using a decentralized consensus mechanism, and can realize a uniform account book system by participants in a block chain on the premise of not establishing a trust relationship.
During the building of the blockchain, hash values will be continuously calculated for the newly generated blocks. Therefore, an attacker generates a large number of hash values using hardware such as a Field Programmable Gate Array (FPGA) and an Application Specific Integrated Circuit (ASIC), thereby performing a hash flood attack on the block chain.
Disclosure of Invention
The present invention is directed to a method, a computer-readable medium, and a blockchain system for preventing hash flood attack in a blockchain system, which can prevent hash flood attack, thereby stabilizing performance of the blockchain network, and improving robustness and adaptability of the blockchain network
The invention relates to a method for preventing Hash flood attack in a block chain system, which comprises the following steps:
s1, initializing and loading a hash algorithm instruction set, wherein the hash algorithm instruction set comprises a fixed instruction set and a variable instruction set;
s2, loading and synchronizing the blocks of the block chain system;
s3, operating the block chain system and generating a seed hash value;
and S4, stopping Hash operation, updating the variable instruction set according to the seed Hash value, and continuing to operate the block chain system after the variable instruction set is updated.
In the method for preventing hash flood attacks in a blockchain system according to the present invention, the step S1 further includes: and reading the hash algorithm instruction set from a hard disk into a memory and recording the starting address and the ending address of the variable instruction set.
In the method for preventing hash flood attack in a blockchain system, the hash algorithm instruction set includes a first fixed instruction set, a variable instruction set and a second fixed instruction set.
In the method for preventing hash flood attack in a blockchain system according to the present invention, the step S2 further includes: the block chain system loads the local block and inquires the block height of the surrounding nodes; if the height of the surrounding node is higher than the block height of the local block, data synchronization is performed with the surrounding node until the block height of the local block is equal to the block height of the surrounding node.
In the method for preventing hash flood attack in a blockchain system according to the present invention, the step S3 further includes:
s31, operating the block chain system and selecting the seed height according to the current block height;
s32, selecting a seed block based on the selected seed height and the current seed height;
and S33, taking the hash value of the seed block as a seed hash value.
In the method for preventing hash flood attack in a blockchain system according to the present invention, the step S31 further includes: judging whether the height of the current block is smaller than the sum of the seed switching period and the seed selection delay; if yes, the seed height is 0; otherwise, the difference between the current block height and the seed selection delay is subtracted by 1 to obtain a value, the value and the difference between the seed switching period and 1 are subjected to bitwise AND operation, and then the difference is taken as the seed height.
In the method for preventing hash flood attack in a blockchain system according to the present invention, the step S32 further includes: and comparing the selected seed height with the current seed height, if equal, not modifying the seed block, otherwise, reading the block at the selected seed height as the seed block.
Another technical solution adopted by the present invention to solve the technical problem is to construct a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for preventing the hash flood attack in the blockchain system.
By implementing the method for preventing the Hash flood attack in the blockchain system, the computer readable storage medium and the blockchain system, an attacker cannot generate a large amount of Hash values in a short period by using hardware such as FPGA, ASCI and the like through periodically updating the variable instruction set of the memory intensive algorithm program, so that the Hash flood attack is carried out on the blockchain, the network performance of the blockchain can be stabilized, and the robustness and the adaptability of the network performance of the blockchain are improved.
Drawings
The invention will be further described with reference to the accompanying drawings and examples, in which:
FIG. 1 is a flow chart of a first preferred embodiment of a method for preventing Hash flood attacks in a blockchain system of the present invention;
fig. 2 is a schematic block diagram of a hash algorithm instruction set of the method for preventing hash flood attack in the blockchain system of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and do not limit the invention.
The invention relates to a method for preventing Hash flood attack in a block chain system. And initializing and loading a hash algorithm instruction set, wherein the hash algorithm instruction set comprises a fixed instruction set and a variable instruction set. The blocks of the blockchain system are loaded and synchronized. The blockchain system is run and a seed hash value is generated. And stopping Hash operation, updating the variable instruction set according to the seed Hash value, and continuing to operate the block chain system after the variable instruction set is updated. By implementing the method for preventing the Hash flood attack in the blockchain system, through periodically updating the variable instruction set of the memory-intensive algorithm program, an attacker cannot generate a large number of Hash values in a short period by using hardware such as an FPGA (field programmable gate array) and an ASCI (automatic serial communication interface) and the like, so that the Hash flood attack is carried out on the blockchain, the network performance of the blockchain can be stabilized, and the robustness and the adaptability of the network performance of the blockchain are improved.
Fig. 1 is a flowchart of a first preferred embodiment of a method for preventing hash flood attacks in a blockchain system according to the present invention. As shown in fig. 1, in step S1, the load hash algorithm instruction set is initialized. Preferably, the hash algorithm instruction set includes a fixed instruction set and a variable instruction set. In a preferred embodiment of the present invention, a processor (e.g., a CPU) reads a hash algorithm instruction set from a hard disk into a memory and records a start address and an end address of a variable instruction set in the hash algorithm instruction set. Preferably, the hash algorithm instruction set includes a first fixed instruction set, a variable instruction set, and a second fixed instruction set. Further preferably, the variable instruction set may include two fixed instruction set regions and a variable instruction set region located between the two fixed instruction set regions, as shown in fig. 2. The hash algorithm instructions in the hash algorithm instruction set may be any known instructions in the prior art.
In step S2, tiles of the blockchain system are loaded and synchronized. In a preferred embodiment of the present invention, the blockchain system loads the local blocks and queries the surrounding nodes for block height. If the height of the surrounding node is higher than the block height of the local block, data synchronization is performed with the surrounding node until the block height of the local block is equal to the block height of the surrounding node.
In step S3, the blockchain system is run and a seed hash value is generated. In a preferred embodiment of the invention, a blockchain system is run and a seed height is selected based on the current block height. For example, whether the height of the current block is smaller than the sum of the seed switching period and the seed selection delay is judged; if yes, the seed height is 0; otherwise, the difference between the current block height and the seed selection delay is subtracted by 1 to obtain a value, the value and the difference between the seed switching period and 1 are subjected to bitwise AND operation, and then the difference is taken as the seed height. A seed block is then selected based on the selected seed height and the current seed height. For example, the selected seed height is compared with the current seed height, if equal, the seed block is not modified, otherwise the block at the selected seed height is read as the seed block. And finally, taking the hash value of the seed block as a seed hash value.
In step S4, the hash operation is stopped and the variable instruction set is updated according to the seed hash value. The set of variable instructions may be updated based on the seed hash value, for example, using a randomx algorithm. And after the variable instruction set is updated, continuing to run the blockchain system.
By implementing the method for preventing the Hash flood attack in the blockchain system, through periodically updating the variable instruction set of the memory-intensive algorithm program, an attacker cannot generate a large number of Hash values in a short period by using hardware such as an FPGA (field programmable gate array) and an ASCI (automatic serial communication interface) and the like, so that the Hash flood attack is carried out on the blockchain, the network performance of the blockchain can be stabilized, and the robustness and the adaptability of the network performance of the blockchain are improved.
The method for preventing hash flood attack in the blockchain system according to the present invention is further described below with reference to the second preferred embodiment of the present invention.
First, technical terms are described as follows.
A block (block) represents a data set that is to be recorded every time a block chaining system elapses.
The height (height) represents the number of recorded data sets in the blockchain system, and the initial value is 0.
The out-of-block period (epoch) represents the time interval between which the block chain system records blocks, and is typically a multiple of 60 seconds, for example: 600 seconds, or 120 seconds.
The hash algorithm (hash) represents a replacement algorithm, which can replace different block data into a unique value with a fixed length, and the representation of the hash algorithm in a computer is a segment of instruction set, and some parts of the instruction set of the hash algorithm can be randomly replaced. In the present invention, the instruction set area in which the hash algorithm is not changeable is referred to as a fixed instruction set area, and the instruction set area in which the hash algorithm is changeable is referred to as a variable instruction set area.
The hash value (block hash) represents a unique value to which different block data is replaced by a hash algorithm, and the length of the hash value is usually a multiple of 32, such as: 128 bits, 256 bits, 512 bits, etc.
The invention can periodically select the hash value of a certain block as a seed, and then randomly change the instruction of a certain area in the algorithm according to the value of the seed.
The seed switching period (seed _ epoch) represents the number of blocks of the seed interval, usually a multiple of 1024, per reselection.
The seed selection delay (lag) represents the delay of selecting the seed value, for example, the seed should be selected in the 1024 th cycle, but the seed value in the 1024 th cycle is not used until the block is delayed to 1084 cycles, so as to prevent the block chain system from being branched, and avoid the inconsistency of the selected seeds at different nodes in the block chain system.
The seed height (seed _ height) represents the height of the seed, and the initial value is 0.
First, program initialization is performed.
The processor reads the instruction set of the hash algorithm from the hard disk into the memory, and records the start address and the end address of the variable instruction set in the hash algorithm.
The block chain system loads the block of the local disk, simultaneously inquires the block height of the surrounding nodes, starts to carry out data synchronization if the block height of the surrounding nodes is higher than the block height of the surrounding nodes, and till the block height of the surrounding nodes is equal to the block height of the surrounding nodes
Then the block chain starts to run and carries out Hash operation
The blockchain system starts to run and calculates hash values for the newly generated blocks, and a seed height seed _ height is selected before calculating the hash value each time, and the seed height is selected as follows:
firstly, after data loading and synchronization are finished, seeds of a Hash algorithm are selected, and the following selection process is made according to the height of the current block
If height < seed _ epoch + lag, then seed _ height is 0
Otherwise seed _ height ═ height-lag-1 & (seed _ epoch-1)
After the seed height seed _ height is selected, comparing the seed height seed _ height with the current seed height; if the selected seed height seed _ height is found to be consistent with the current selected seed height seed _ height, the program is continuously run without any change; if the selected seed height seed _ height is equal to the current selected seed height seed _ height, the block corresponding to the selected seed height seed _ height is used as a seed block, and then the hash value of the seed block is used as a seed hash value.
The variable instruction set is then updated.
And updating the variable instruction set in the hash algorithm instruction set according to the seed hash value, and suspending the hash operation in the blockchain system until the variable instruction set is updated. The updating procedure may use a so-called randomx algorithm known in the art and will not be described again here.
And finally, continuing to operate the block chain system.
And after the hash algorithm variable instruction set is updated, continuing to run the block chain service.
By implementing the method for preventing the Hash flood attack in the blockchain system, through periodically updating the variable instruction set of the memory-intensive algorithm program, an attacker cannot generate a large number of Hash values in a short period by using hardware such as an FPGA (field programmable gate array) and an ASCI (automatic serial communication interface) and the like, so that the Hash flood attack is carried out on the blockchain, the network performance of the blockchain can be stabilized, and the robustness and the adaptability of the network performance of the blockchain are improved.
Another technical solution adopted by the present invention to solve the technical problem is to construct a computer-readable storage medium, on which a computer program is stored, wherein the computer program, when executed by a processor, implements the method for preventing hash flood attack in a blockchain system.
In order to solve the technical problem, the invention adopts another technical scheme that a blockchain system is constructed, and the blockchain system comprises a plurality of blockchain nodes, wherein computer programs are stored on the blockchain nodes, and when the computer programs are executed by a processor, the method for preventing the Hash flood attack in the blockchain system is realized.
By implementing the computer readable storage medium and the blockchain system, an attacker cannot generate a large number of hash values in a short time by using hardware such as an FPGA (field programmable gate array) and an ASCI (advanced secure storage interface) through periodically updating a variable instruction set of a memory-intensive algorithm program, so that the block chain is subjected to hash flood attack, the network performance of the blockchain can be stabilized, and the robustness and the adaptability of the network performance of the blockchain are improved.
Accordingly, the present invention can be realized in hardware, software, or a combination of hardware and software. The present invention can be realized in a centralized fashion in at least one computer system, or in a distributed fashion where different elements are spread across several interconnected computer systems. Any kind of computer system or other apparatus adapted for carrying out the methods of the present invention is suited. A typical combination of hardware and software could be a general purpose computer system with a computer program that, when being loaded and executed, controls the computer system such that it carries out the methods described herein.
The present invention may also be implemented by a computer program product, comprising all the features enabling the implementation of the methods of the invention, when loaded in a computer system. The computer program in this document refers to: any expression, in any programming language, code or notation, of a set of instructions intended to cause a system having an information processing capability to perform a particular function either directly or after either or both of the following: a) conversion to other languages, codes or symbols; b) reproduced in a different format.
While the invention has been described with reference to specific embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted without departing from the scope of the invention. In addition, many modifications may be made to adapt a particular situation or material to the teachings of the invention without departing from its scope. Therefore, it is intended that the invention not be limited to the particular embodiment disclosed, but that the invention will include all embodiments falling within the scope of the appended claims.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (8)

1. A method for preventing Hash flood attack in a blockchain system is characterized by comprising the following steps:
s1, initializing and loading a hash algorithm instruction set, wherein the hash algorithm instruction set comprises a fixed instruction set and a variable instruction set;
s2, loading and synchronizing the blocks of the block chain system;
s3, operating the block chain system and generating a seed hash value;
s4, stopping hash operation, updating the variable instruction set according to the seed hash value, and continuing to operate the block chain system after the variable instruction set is updated;
the step S3 further includes:
s31, operating the block chain system and selecting the seed height according to the current block height;
s32, selecting a seed block based on the selected seed height and the current seed height of the block chain system;
and S33, taking the hash value of the seed block as a seed hash value.
2. The method for hash flood attack prevention in a blockchain system according to claim 1, wherein the step S1 further comprises: and reading the hash algorithm instruction set from a hard disk into a memory and recording the starting address and the ending address of the variable instruction set.
3. The method of claim 2, wherein the hash algorithm instruction set comprises a first fixed instruction set, a variable instruction set, and a second fixed instruction set.
4. The method for hash flood attack prevention in a blockchain system according to claim 1, wherein the step S2 further comprises: the block chain system loads the local block and inquires the block height of the surrounding nodes; if the height of the surrounding node is higher than the block height of the local block, data synchronization is performed with the surrounding node until the block height of the local block is equal to the block height of the surrounding node.
5. The method for hash flood attack prevention in a blockchain system according to claim 1, wherein the step S31 further comprises: judging whether the height of the current block is smaller than the sum of the seed switching period and the seed selection delay; if yes, the seed height is 0; otherwise, the difference between the current block height and the seed selection delay is subtracted by 1 to obtain a value, the value and the difference between the seed switching period and 1 are subjected to bitwise AND operation, and then the difference is taken as the seed height.
6. The method for hash flood attack prevention in a blockchain system according to claim 5, wherein the step S32 further comprises: and comparing the selected seed height with the current seed height, if equal, not modifying the seed block, otherwise, reading the block at the selected seed height as the seed block.
7. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out a method of preventing hash flood attacks in a blockchain system according to any one of claims 1 to 6.
8. A blockchain system comprising a plurality of blockchain nodes having stored thereon a computer program, characterized in that the program, when being executed by a processor, implements a method for preventing hash flood attacks in a blockchain system according to any one of claims 1 to 6.
CN202010708776.4A 2020-07-21 2020-07-21 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system Active CN112054990B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010708776.4A CN112054990B (en) 2020-07-21 2020-07-21 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010708776.4A CN112054990B (en) 2020-07-21 2020-07-21 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system

Publications (2)

Publication Number Publication Date
CN112054990A CN112054990A (en) 2020-12-08
CN112054990B true CN112054990B (en) 2022-09-16

Family

ID=73601115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010708776.4A Active CN112054990B (en) 2020-07-21 2020-07-21 Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system

Country Status (1)

Country Link
CN (1) CN112054990B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571925A (en) * 2016-10-24 2017-04-19 北京云图科瑞科技有限公司 Method of carrying out proof of work on block in block chain system and device thereof
CN108830602A (en) * 2018-06-27 2018-11-16 电子科技大学 A kind of license chain construction and management-control method based on chameleon hash function
CN109241490A (en) * 2018-07-26 2019-01-18 思力科(深圳)电子科技有限公司 A kind of X11 Dynamic Hashing Schemes and device towards block chain
CN110097361A (en) * 2019-04-01 2019-08-06 南京思利华信息科技有限公司 A kind of block chain dynamic calculation power common recognition method and computer system based on X11 algorithm
CN110990497A (en) * 2019-12-19 2020-04-10 上海优扬新媒信息技术有限公司 Block chain-based information processing method and device, equipment and storage medium
CN111291000A (en) * 2018-05-18 2020-06-16 腾讯科技(深圳)有限公司 Block chain-based file acquisition method, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9967088B2 (en) * 2016-05-23 2018-05-08 Accenture Global Solutions Limited Rewritable blockchain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106571925A (en) * 2016-10-24 2017-04-19 北京云图科瑞科技有限公司 Method of carrying out proof of work on block in block chain system and device thereof
CN111291000A (en) * 2018-05-18 2020-06-16 腾讯科技(深圳)有限公司 Block chain-based file acquisition method, equipment and storage medium
CN108830602A (en) * 2018-06-27 2018-11-16 电子科技大学 A kind of license chain construction and management-control method based on chameleon hash function
CN109241490A (en) * 2018-07-26 2019-01-18 思力科(深圳)电子科技有限公司 A kind of X11 Dynamic Hashing Schemes and device towards block chain
CN110097361A (en) * 2019-04-01 2019-08-06 南京思利华信息科技有限公司 A kind of block chain dynamic calculation power common recognition method and computer system based on X11 algorithm
CN110990497A (en) * 2019-12-19 2020-04-10 上海优扬新媒信息技术有限公司 Block chain-based information processing method and device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
An Attack-Tolerant Agreement Algorithm for Block Chain;Masato Kitakami;《 2018 IEEE 23rd Pacific Rim International Symposium on Dependable Computing (PRDC)》;20190214;全文 *
区块链安全研究综述;斯雪明等;《密码学报》;20181015(第05期);全文 *

Also Published As

Publication number Publication date
CN112054990A (en) 2020-12-08

Similar Documents

Publication Publication Date Title
CN111935315B (en) Block synchronization method and device
CN106407430B (en) A kind of intelligent contract state synchronization method of complexity based on stage bucket
KR102455884B1 (en) Data processing method and apparatus, computer device, and storage medium
CN111008201B (en) Method and apparatus for parallel modification and reading of state trees
CN109032803B (en) Data processing method and device and client
JP2018018348A (en) System for creating block chain, and program
CN111163148B (en) Synchronization method and related equipment for consensus state of block chain system
CN102197387B (en) Bootstrap rendezvous federation
WO2020133963A1 (en) Blockchain-based data storage method, related device and storage medium
CN108075914B (en) Dynamic capacity expansion and reduction method and network equipment
JP2011170667A (en) File-synchronizing system, file synchronization method, and file synchronization program
CN108880868B (en) BFD keep-alive message transmission method, device, equipment and machine readable storage medium
CN110149221B (en) Self-adaptive network construction method and device based on alliance chain
CN111245732A (en) Flow control method, device and equipment
US9106629B2 (en) Distributed algorithm for changing a shared value
KR102584292B1 (en) Creation of a blockchain with blocks containing an adjustable number of transaction blocks and multiple intermediate blocks
CN112054990B (en) Method for preventing Hash flood attack in blockchain system, computer readable medium and blockchain system
KR101714770B1 (en) ID Dynamic Allocating Method for CAN Communication System, and CAN Communication System
KR102204605B1 (en) Method and device for providing blockchain capable of optimizing storages of each node included therein
CN111669434A (en) Method, system, device and equipment for establishing communication group
CN111200651A (en) Method, system, device and medium for timed calling of microservice
CN113491092A (en) Method for anonymizing client MAC address for cloud report
CN111147605A (en) Service registration method, device and equipment
CN106228074A (en) storage object aging method and device
CN110888892A (en) Block synchronization method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant