Username   Password       Forgot your password?  Forgot your username? 


Research and Development of Blockchain Security

Volume 14, Number 9, September 2018, pp. 2040-2047
DOI: 10.23940/ijpe.18.09.p12.20402047

Zengyu Caia, Chunfeng Dua, Yong Ganc, Jianwei Zhanga,b, and Wanwei Huangb

aSchool of Computer and Communication Engineering, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
bSoftware Engineering College, Zhengzhou University of Light Industry, Zhengzhou, 450002, China
cZhengzhou Institute of Technology, Zhengzhou, 450044, China

(Submitted on May 21, 2018; Revised on July 25, 2018; Accepted on August 6, 2018)


Blockchain is a distributed data structure that integrates security, reliability, and centralization. It is the central support technology of the emerging digital encryption currency. With the emergence of Bitcoin, blockchain as its underlying support has begun to attract great attention and has been initially applied in the fields of finance, stocks, and securities. This article briefly describes the classification, architecture, and key technologies of blockchain. At the same time, it briefly analyzes the key management, access control mechanism, DDOS attack defense mechanism, and fragment information leakage prevention mechanism in the blockchain security mechanism. Finally, the prediction of the future development trend of blockchain aims to help further studies on blockchain and its security.


References: 20

                1. D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology, Springer, US, pp. 199-203, 1983
                2. D. Chaum, “Untraceable Electronic Cash,” Advances in Cryptology, pp. 319-327, 1988
                3. A. Narayanan and J. Clark, “Bitcoin’s Academic Pedigree,” Communications of the ACM, Vol. 60, No. 12, pp 36-45, 2017
                4. Y. Yuan and F. Y. Wang, “Development Status and Prospects of Blockchain Technology,” Journal of Automation, Vol. 42, No. 4, pp. 481-494, 2016
                5. H. Xie and J. Wang, “Blockchain Technology and its Application,” Information Network Security, No. 9, pp. 192-195, 2016
                6. Y. Zhu, G. H. Gan, D. Deng, et al., “Research on Security in Blockchain Key Technologies,” Information Security Research, Vol. 2, No. 12, pp. 1090-1097, 2016
                7. R. C. Merkle, “Protocols for Public Key Cryptosystems,” IEEE Symposium on Security and Privacy, No. 3, pp. 122, April 1980
                8. P. Bailis, A. Narayanan, A. Miller, and S. Han, “Research for Practice: Cryptocurrencies, Blockchains, and Smart Contracts; Hardware for Deep Learning,” Communications of The ACM, Vol. 60, No. 5, pp. 48-51, July 2017
                9. X. Shen, Q. Q. Pei and X. F. Liu, “The Blockchain Technology,” Network and Information Security Journal, Vol. 2, No. 11, 2016
                10. Y. Sompolinsky and A. Zohar, “Bitcoin’s Security Model Revisited,” October 2016
                11. P. Zhou, “China Blockchain Technology and Application Development White Paper,” Ministry of Industry and Information Technology, Beijing, China, October 2016
                12. D. E. Denning and M. Smid, “Key Escrowing Today,” Communications Magazine IEEE, Vol. 32, No. 9, pp. 58-68, September 1994
                13. A. Shamir, “Partial Key Escrow: A New Approach to Software Key Escrow,” in Proceedings of the Key Escrow Conference, Washington, 1995
                14. Y. Li, L. N. Lei and Y. Zhu, “Research on Ciphertext Access Control and its Application,” Information Security Research, Vol. 2, No. 8, pp. 721-728, 2016
                15. J. S. Su, D. Cao, X. F. Wang, et al., “Attribute-based Encryption Mechanism,” Chinese Journal of Software, Vol. 22, No. 6, pp.1299-1315, 2011
                16. D. G. Geng and C. Chen, “Research on Attribute Cryptography,” Chinese Journal of Cryptography, Vol. 1, No. 1, pp. 1-12, 2014
                17. L. Lin, J. Huai and X. X. Li, “Attribute-based Access Control Strategy Synthesis Algebra,” Journal of Software, Vol. 20, No. 2, pp. 403-414, 2009
                18. Z. R. Shen, W. Xue and J. W. Shu, “Research and Development of Searchable Encryption Mechanism,” Journal of Software, Vol. 25, No. 4, pp. 880-895, 2014
                19. Y. Q. Ye, “Blockchain and Protection of Digital Identity Security,” Financial and Technological Times, No. 12, pp. 92-93, 2016
                20. B. Pinkas and T. Sander, “Securing Passwords Against Dictionary Attacks,” in Proceedings of ACM Conference on Computer and Communications Security, pp. 161-170, November 2002


                              Please note : You will need Adobe Acrobat viewer to view the full articles.Get Free Adobe Reader

                              This site uses encryption for transmitting your passwords.