CN113014577B - Mixed block chain system and trusted block identification method thereof - Google Patents

Mixed block chain system and trusted block identification method thereof Download PDF

Info

Publication number
CN113014577B
CN113014577B CN202110205286.7A CN202110205286A CN113014577B CN 113014577 B CN113014577 B CN 113014577B CN 202110205286 A CN202110205286 A CN 202110205286A CN 113014577 B CN113014577 B CN 113014577B
Authority
CN
China
Prior art keywords
block
blocks
trusted
nodes
authentication node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110205286.7A
Other languages
Chinese (zh)
Other versions
CN113014577A (en
Inventor
吴凌云
王旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Academy of Mathematics and Systems Science of CAS
Original Assignee
Academy of Mathematics and Systems Science of CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Academy of Mathematics and Systems Science of CAS filed Critical Academy of Mathematics and Systems Science of CAS
Priority to CN202110205286.7A priority Critical patent/CN113014577B/en
Publication of CN113014577A publication Critical patent/CN113014577A/en
Application granted granted Critical
Publication of CN113014577B publication Critical patent/CN113014577B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a mixed block chain system and a trusted block identification method thereof. The participating nodes in the system include authenticated nodes and non-authenticated nodes, and the blocks generated by all the nodes form a DAG structure. The authentication node needs to construct a new block according to a set generation rate, and the non-authentication node needs to solve a random value to enable the hash value of the new block to meet specific requirements so as to construct the new block. The system seeks consensus by determining a block order. When the block sequence is determined, the trusted blocks are firstly identified by adopting a trusted block identification method, and then all the blocks are sorted according to the number of the blocks which are directly or indirectly referenced by the trusted blocks. In the trusted block identification, the blocks generated by the authentication node are firstly identified, and then all the blocks are identified on the basis of the blocks. The block chain system can greatly improve the problems that the existing public chain has low performance and the node of the alliance chain has low expandability.

Description

Mixed block chain system and trusted block identification method thereof
Technical Field
The invention relates to the field of block chaining, in particular to a hybrid block chaining system based on Directed Acyclic Graph (DAG), which can simultaneously have high performance, node expandability and safety.
Background
The block chain is essentially a distributed account book database, has the characteristics of decentralization, tracing and tracing, openness and transparency, falsification prevention and counterfeiting and the like, and has wide application prospects in multiple fields of finance, agriculture, medicine, energy internet and the like. Blockchains can be divided into licensed chains (federation chains and private chains) and unlicensed chains (public chains) depending on the consensus mechanism employed and the application scenario. One of the major challenges facing current block-chain technology is performance issues. The licensed chain has high performance but poor node scalability (i.e., performance drops dramatically with increasing node size), while the unlicensed chain typically has good node scalability but low performance.
The block chain technology based on the directed acyclic graph can solve the bifurcation problem brought by the increase of the block generation rate and the block chain performance bottleneck caused by the bifurcation problem by fully utilizing the invalid block information discarded in the traditional block chain technology. However, the existing block chain technology based on the directed acyclic graph has the defects that the safety is not well solved and the anti-attack capability is weak.
Disclosure of Invention
The invention provides a mixed block chain system based on a directed acyclic graph, and by introducing authentication nodes into participating nodes, the problem of identification of trusted blocks can be effectively solved, and the safety of the system is improved. The technology integrates the advantages of a permission chain and an impermissible chain, and has high performance and strong node expandability. The specific technical scheme is as follows:
1. the hybrid blockchain system (as shown in fig. 1) is composed of participating nodes, and the nodes communicate with each other by passing information such as blocks, and the nodes complete the construction of the whole blockchain network. The participating nodes are composed of two parts, one part is an authentication node (such as a server in fig. 1) which does not violate the rules for blockchain generation, the generated blocks are immediately disclosed and not forged, the other part is a non-authentication node (such as a notebook in fig. 1), the nodes may violate the rules for blockchain generation, the generated blocks may not be immediately disclosed and may also be forged. The two types of nodes employ different block generation mechanisms. After the blocks generated by the two types of nodes are broadcasted, the blocks generated by the nodes later are based on the previous blocks, and all the blocks form a Directed Acyclic Graph (DAG) structure through the link relation.
2. An authentication node is typically an organization or an individual with a high degree of reputation, such as a national organization or a large well-known enterprise. The real identities of these nodes need to be authenticated by authority before they can join the system building blocks. The rogue probability of these nodes is much smaller than that of the ordinary nodes. The authentication node needs to construct a new block according to a set generation rate; the generation rate is adjusted according to the actual block generation rate of the non-authentication node in the current system. For example, when the non-authentication node generates blocks at a faster block generation rate, the authentication node should also generate blocks at the faster block generation rate as an adaptation to prevent too much difference between the two rates.
3. All other common nodes belong to non-authentication nodes, identity authentication is not needed, and the nodes can be directly added into the system to build blocks. The non-authentication node must be proved through workload (that is, a random value is solved in an exhaustive manner so that the hash value of the new block meets specific requirements), so as to construct a new block; the difficulty of finding the random value is adjusted by adjusting the requirement which needs to be met by the Hash value, so that the highest rate of generating a new block by the non-authentication node can be limited, and the denial of service attack is prevented.
4. When all nodes, namely the authentication node and the non-authentication node construct a new block, the received hash values of blocks which are not referenced by other blocks in all blocks are recorded in the new block. In this way, a new tile may be linked to a plurality of existing tiles. In the block chain network diagram, blocks can be directly linked with directed edges, as shown in fig. 2, for example, block G links blocks C, D, E, so that all blocks form a DAG structure.
5. When consensus is required to be sought, each node determines a consensus result through the following method:
a) identifying a trusted block in a block generated by an authentication node through MaxCord in a reference or other methods such as PHANTOM and the like;
b) identifying trusted blocks among all blocks (including not only blocks generated by authenticated nodes but also blocks generated by non-authenticated nodes), requiring that the trusted blocks identified in the first step must be included in the final set of trusted blocks;
c) sorting all the blocks according to the number of the blocks directly or indirectly referenced by the credible blocks, wherein the sorting principle is that the blocks with higher reference number are sorted more forwards;
d) if the data of two blocks have conflicting content, such as two transactions in two blocks paid for in the same digital currency, the data of the first block is accepted and the data of the next block is rejected.
The invention has the beneficial effects that: the invention realizes a mixed block chain system, and improves the performance and node expandability of the block chain while ensuring the decentralization and safety of the block chain.
Drawings
Fig. 1 is a diagram of a hybrid blockchain system including authenticated nodes (represented by hosts) and non-authenticated nodes (represented by notebooks).
Fig. 2 is a block chain structure diagram based on a directed acyclic graph.
Fig. 3 is a comparison of the recognition accuracy of the different recognition methods of the trusted blocks in the hybrid block chain.
Fig. 4 is a diagram of a hybrid blockchain system formed by nationally owned commercial banks and other commercial banks.
Fig. 5 is a block chain diagram of the nationally owned commercial banks and other commercial banks, in which the virtual edge blocks are fake blocks and the solid edge blocks are credible blocks, (the solid edge blocks with deeper edges are those of the nationally owned commercial banks, and the solid edge blocks with shallower edges are those of the other commercial banks).
Detailed Description
The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings so that the advantages and features of the present invention can be more easily understood by those skilled in the art, and the scope of the present invention will be more clearly and clearly defined.
The method introduces some authentication nodes in the DAG-based blockchain system to obtain a mixed blockchain system, the true identities of the nodes are authenticated and have high credibility, and most of blocks generated by the nodes are credible blocks complying with system rules. These blocks can be used as a reference to screen other trusted blocks in the system. The accuracy of the identification of the credible blocks is improved by limiting the inclusion of the blocks in the selected blocks, so that the safety of the system is improved. In practical applications, these authentication nodes may be relatively authoritative national institutions, relatively approved large well-known enterprises, and the like.
The problem of trusted block identification for DAG-based hybrid blockchain systems consists mainly of two steps.
Firstly, identifying the generation of the authentication node through a MaxCord method based on all the blocks generated by the authentication nodeA set of trusted blocks among the blocks. This step can be obtained by solving the following integer programming problem, where each xiAnd the judgment result shows that whether each block is identified as a credible block, if the block is 1, the corresponding block is identified as the credible block, and if the block is 0, the corresponding block is not identified as the credible block.
Figure BDA0002950207690000031
And secondly, identifying all the credible block sets in the whole block chain DAG network by a restricted MaxCord method based on the credible blocks identified in the first step, wherein the restriction requires that the final credible block set comprises the credible block set selected in the first step. This step can be obtained by solving the following integer programming problem, where each xiAnd the judgment result shows that whether each block is identified as a credible block, if the block is 1, the corresponding block is identified as the credible block, and if the block is 0, the corresponding block is not identified as the credible block.
Figure BDA0002950207690000041
In the above model, V is a set of all patches, V 'is a set of authentication node generation patches, D (i, j) is a discord value of the patches i and j, and k, k', and D are parameters of the model.
In the second step, since the trusted authentication node blocks selected in the first step must be selected into the final trusted block set, many non-trusted blocks with high possibility of collision with the trusted authentication node blocks can be eliminated, and false positives of trusted block identification are reduced. Experiments show that even if an attacker has extremely high calculation power, the attacker is difficult to attack successfully. Subsequent block ordering is facilitated by increasing the accuracy of identification of the authentic blocks.
FIG. 3 shows that only MaxCord method is applied under different simulation results[1](as shown by MIS) or by applying the method (as shown by MISIS)And (4) precision. In the simulation generated DAG network, 10000 nodes participate in the blockchain construction, where the number of authentication nodes is 500, 100, 50, and 10, respectively. The tile generation rate is 1/600 (tiles/sec). The horizontal axis represents the attack power ratio of an attacker, and the vertical axis represents the recognition accuracy of the trusted block. By comparison, it can be seen that, with the method for identifying the trusted partition in the hybrid type blockchain system, even if the attack power reaches 0.9, the obtained identification accuracy of the trusted partition is still almost close to 1, and at this time, the identification accuracy of the trusted partition obtained by using only the MaxCord method is close to 0. Even if the number of authentication nodes is low, the identification accuracy is considerable when the calculation power of an attacker is 0.6% and only 0.1%. Under the framework of the method, due to the addition of the authentication node generation block, the identification precision of the credible block is greatly improved, and the safety of the block chain system is ensured. This also demonstrates the feasibility and effectiveness of our design.
The mixed block chain system provided by the method can be applied to the financial field, the problem that the high-frequency transaction scene cannot be effectively processed when the block chain technology is applied to the financial field is solved, the throughput is about 7 transactions/second when the block chain technology is applied to the financial field, and every second of Visa, Paibao and the like can be processed into ten thousand transactions. The scenes of high frequency trading in finance are common, for example, the trading volume of stock market is more than dozens of per second. This would greatly limit the application of blockchains in the financial field, such as making it difficult to record transaction information in the financial market with blockchains. The blockchain in the method utilizes the information of the forked blocks, and the information contained in the blocks is also used as effective information for blockchain processing to improve the throughput of the blockchain, so that the blockchain can adapt to the scene of processing high-frequency transactions in the financial field.
Specifically, a hybrid blockchain system is formed by nationally owned commercial banks, which belong to trusted nodes (shown as the bank with the renminbi symbol in fig. 4) and other commercial banks (shown as the bank without the renminbi symbol in fig. 4), which are comparatively authoritative, as all participating nodes, as shown in fig. 4. The nodes can perform information transfer and fund transfer, as shown by the edges in fig. 4, the nodes can compete to record transaction information in the blocks, and link the blocks on the existing multiple or one block (leaf blocks), and form a directed acyclic graph structure (as shown in fig. 5), wherein the broken edge blocks are blocks generated by banks wanting to make fake, the solid edge blocks with deeper edges are blocks generated by national commercial banks, and the solid edge blocks with shallower edges are credible blocks generated by other commercial banks, and transaction information is recorded in each block, so the bank can compete for building blocks because the bank building blocks can obtain a certain transaction fee from the recorded transaction. The information of the forked blocks is utilized in the formed directed acyclic graph structure, the transaction amount processed in unit time can be increased, the efficiency of the block chain system is improved, and the block chain can be applied to financial scenes with high requirements on efficiency. Other commercial banks are discouraged from falsely disrupting the system due to the existence of trusted nodes such as national commercial banks, which would otherwise be easily identified by the blocks created by these non-certified nodes (i.e., the dashed edge blocks in fig. 5). The method includes the steps that firstly, blocks (namely, solid edge blocks with deeper edges in fig. 5) generated by credible nodes such as national commercial banks and the like are solved through a model (1), and the blocks with the value of 1 (namely, the solid edge blocks with deeper edges in fig. 5) are taken out. Then, all blocks are screened, but the blocks which are screened by the model (1) must be included, that is, the model (2) is solved, and the blocks with the value of 1 (that is, the solid edge blocks in fig. 5) are taken out. Therefore, the credible blocks can be selected with higher precision, and the safety of the system is improved. Once these attack blocks (i.e., the dashed blocks in fig. 5) are identified, the transactions contained therein are discarded. It is also possible that trusted blocks do not overlie attack blocks.
To summarize, in this embodiment, a commercial bank and other commercial banks in china form the hybrid blockchain system designed in the method, a blockchain based on a directed acyclic graph is established between them to record transaction information between them, so as to improve efficiency, and a trusted block identification method for the hybrid blockchain system in the method is applied, that is, the model (1) and the model (2) are sequentially and respectively solved to identify a trusted block. Because the existence of commercial banks in China with the hybrid system greatly improves the identification precision and the safety of the system.
Finally, it should be noted that the above description is only a specific example of the present invention, and is only used for illustrating the technical solutions of the present invention, and is not used for limiting the protection scope of the present invention. The basic method for identifying the trusted zone in the invention is not limited to MaxCord, and other trusted zone identification methods can be applied to the framework. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention shall fall within the protection scope of the present invention.
Reference documents:
[1]Xu Wang,Guohua Gan,Ling-Yun Wu.Framework and algorithms for identifying honest blocks in blockchain.PLoS ONE,15(1):e0227531,2020.

Claims (8)

1. a trusted block identification method for a hybrid blockchain system, comprising:
step one, identifying a credible block set in blocks generated by authentication nodes through a MaxCord method based on all blocks generated by the authentication nodes; the set of trusted blocks is obtained by solving the following integer programming problem, where each xiWhether each block is identified as a credible block or not is shown, if the block is 1, the corresponding block is the identified credible block, and if the block is 0, the corresponding block is not identified as the credible block;
Figure FDA0003470324280000011
secondly, identifying all credible block sets in the whole block chain DAG network through a restricted MaxCord method based on the credible blocks identified in the first step; wherein the final set of trusted blocks is required to include the set of trusted blocks selected in the first step; the set of trusted blocks is obtained by solving the following integer programming problem, where each xiWhether each block is identified as a credible block or not is shown, if the block is 1, the corresponding block is the identified credible block, and if the block is 0, the corresponding block is not identified as the credible block;
Figure FDA0003470324280000012
wherein V is a set of all the patches, V 'is a set of authentication node generation patches, D (i, j) is a discord value of the patches i and j, and k, k', and D are parameters of the model.
2. The method of claim 1, wherein: in step two, since the trusted authentication node blocks selected in step one are required to be selected into the final trusted block set, many non-trusted blocks with high possibility of collision with the trusted authentication node blocks are eliminated, and false positives of trusted block identification are reduced.
3. The method of claim 1 or 2, wherein: the mixed block chain system is composed of participating nodes, the nodes communicate by transmitting block information, and the nodes complete the construction of the whole block chain network; the participating node is composed of two parts, one part is an authentication node, the authentication node does not violate the rule of block chain generation, and the generated block can be immediately disclosed and is not forged; and the other part is a non-authentication node, the non-authentication node can violate the rule of block chain generation, and the generated blocks are not immediately disclosed and can be faked.
4. The method of claim 3, wherein: the two types of nodes adopt different block generation mechanisms; after the blocks generated by the two types of nodes are broadcasted, the blocks generated by the nodes later are based on the previous blocks, and all the blocks form a directed acyclic graph DAG structure through the link relation.
5. The method of claim 3, wherein: an authentication node is an organization or an individual with a high degree of reputation; the real identities of the nodes need to be authenticated by authority to be added into the system building block; these nodes have less likelihood of doing malicious than ordinary nodes; the authentication node needs to construct a new block according to a set generation rate; the generation rate is adjusted according to the actual block generation rate of the non-authentication node in the current system.
6. The method of claim 3, wherein: all other common nodes belong to non-authentication nodes, do not need identity authentication and are directly added into the system; the non-authentication node must solve a random value through workload certification, namely, through an exhaustion mode, so that the hash value of the new block meets specific requirements, and then the new block can be constructed; the difficulty of finding the random value is adjusted by adjusting the requirement which needs to be met by the Hash value, so that the highest rate of generating a new block by the non-authentication node is limited, and the denial of service attack is prevented.
7. The method of claim 3, wherein: when all nodes, namely the authentication node and the non-authentication node construct a new block, recording the received hash value of the block which is not referenced by other blocks in the new block; in this way, a new block is linked to a plurality of existing blocks; in a blockchain network, blocks are directly linked with directed edges.
8. The method of claim 3, wherein: when consensus needs to be sought, each node determines the consensus result by: identifying a credible block through MaxCord or PHANTOM in a block generated by the authentication node; identifying trusted blocks among all blocks, requiring that the identified trusted blocks must be included in the final set of trusted blocks; sorting all the blocks according to the number of the blocks directly or indirectly referenced by the credible blocks, wherein the sorting principle is that the blocks with higher reference number are sorted more forwards; if the data of the two blocks have conflicting contents, the data of the block which is sorted at the front is accepted, and the data of the block which is sorted at the back is rejected.
CN202110205286.7A 2021-02-24 2021-02-24 Mixed block chain system and trusted block identification method thereof Active CN113014577B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110205286.7A CN113014577B (en) 2021-02-24 2021-02-24 Mixed block chain system and trusted block identification method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110205286.7A CN113014577B (en) 2021-02-24 2021-02-24 Mixed block chain system and trusted block identification method thereof

Publications (2)

Publication Number Publication Date
CN113014577A CN113014577A (en) 2021-06-22
CN113014577B true CN113014577B (en) 2022-04-01

Family

ID=76385579

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110205286.7A Active CN113014577B (en) 2021-02-24 2021-02-24 Mixed block chain system and trusted block identification method thereof

Country Status (1)

Country Link
CN (1) CN113014577B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113872816B (en) * 2021-09-30 2023-08-25 北京布洛克快链科技有限公司 Equipment management system for industrial Internet

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816524A (en) * 2018-12-27 2019-05-28 链极智能科技(上海)有限公司 A method of alliance's chain member is managed by block chain public affairs chain
CN111553710A (en) * 2020-04-08 2020-08-18 深圳壹账通智能科技有限公司 Enterprise data processing method, device, equipment and storage medium based on block chain
CN112364317A (en) * 2020-11-17 2021-02-12 中国传媒大学 Internet of things fog environment management architecture and method based on block chain technology

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109639406B (en) * 2018-12-24 2022-03-04 国泰君安证券股份有限公司 Efficient trust solution method based on block chain and IPFS
CN109889382B (en) * 2019-02-20 2020-07-21 中国互联网络信息中心 Domain name information maintenance system based on block chain hybrid consensus
KR20200133140A (en) * 2019-05-18 2020-11-26 주식회사 에이오엔 Method and system for high speed processing of transaction based on hybrid blockchain
CN111260470A (en) * 2020-01-15 2020-06-09 李俊山 Mixed block chain architecture system and processing method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109816524A (en) * 2018-12-27 2019-05-28 链极智能科技(上海)有限公司 A method of alliance's chain member is managed by block chain public affairs chain
CN111553710A (en) * 2020-04-08 2020-08-18 深圳壹账通智能科技有限公司 Enterprise data processing method, device, equipment and storage medium based on block chain
CN112364317A (en) * 2020-11-17 2021-02-12 中国传媒大学 Internet of things fog environment management architecture and method based on block chain technology

Also Published As

Publication number Publication date
CN113014577A (en) 2021-06-22

Similar Documents

Publication Publication Date Title
Aggarwal et al. Attacks on blockchain
CN109964242B (en) Block chain consensus method based on trust relationship
CN107181765A (en) Network digital identity identifying method based on block chain technology
US11470116B2 (en) Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity
CN109447602B (en) Multi-center collaborative distributed digital currency mixing method for protecting privacy
CN113256424B (en) Transaction data processing method, device, equipment and storage medium
KR20210059856A (en) Blockchain network system being capable of verifying a blockchain ledger and method for verifying a blockchain ledger
CN113518005B (en) Block consensus method, device, equipment and storage medium
Chanana et al. Blockchain based secure model for sensor data in wireless sensor network
CN113014577B (en) Mixed block chain system and trusted block identification method thereof
Zhao et al. A secure storage strategy for blockchain based on mcmc algorithm
Gountia Towards scalability trade-off and security issues in state-of-the-art blockchain
CN111260348A (en) Fair payment system based on intelligent contract in Internet of vehicles and working method thereof
Elisa et al. A secure and privacy-preserving e-government framework using blockchain and artificial immunity
CN108809929B (en) Rural financial system based on block chain technology
Ghaffari et al. Distributed ledger technologies for authentication and access control in networking applications: A comprehensive survey
Jeong et al. An efficient management scheme of blockchain-based cloud user information using probabilistic weighting
Gojka et al. Security in distributed ledger technology: An analysis of vulnerabilities and attack vectors
CN110443713B (en) Method and system for improving block chain transaction efficiency
CN114154193A (en) Cross-domain access control method based on block chain
Suresh et al. A hybrid proof based consensus algorithm for permission less blockchain
Li et al. A regulatable data privacy protection scheme for energy transactions based on consortium blockchain
CN111988276A (en) Real-name system method based on PoA consensus
NS et al. Security Attacks and Key Challenges in Blockchain Technology: A survey
CN111369368A (en) Account balance general certification management method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant