[1] NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[DB/OL]. (2008-12-10)[2019-07-25]. https://bitcoin.org/bitcoin.pdf.
[2] 杨宇光,张树新. 区块链共识机制综述[J]. 信息安全研究, 2018,4(4):369-379.
[3] BEN SASSON E, CHIESA A, TROMER E, et al. Succinct non-interactive zero knowledge for a von Neumann architecture[C]// Proceedings of the 23rd USENIX Security Symposium. 2014:781-796.
[4] LUU L, NARAYANAN V, ZHENG C D, et al. A secure sharding protocol for open blockchains[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016:17-30.
[5] BEN SASSON E, CHIESA A, GARMAN C, et al. Zerocash: Decentralized anonymous payments from bitcoin[C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. 2014:459-474.
[6] EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: A scalable blockchain protocol[C]// Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. 2016:45-59.
[7] 朱建明,丁庆洋,高胜. 基于许可链的SWIFT系统分布式架构[J]. 软件学报, 2019,30(6):1594-1613.
[8] 史锦山,李茹. 物联网下的区块链访问控制综述[J]. 软件学报, 2019,30(6):1632-1648.
[9] 范贤丽,范春晓,吴岳辛. 基于区块链和IPFS技术实现粮食供应链隐私信息保护[J]. 应用科学学报, 2019,37(2):179-190.
[10]余益民,陈韬伟,段正泰,等. 基于区块链的政务信息资源共享模型研究[J]. 电子政务, 2019(4):58-67.
[11]TokenClub研究院. 区块链安全研究报告[DB/OL]. (2018-08-20)[2019-07-25]. https://max.book118.com/html/2018/0925/5201103323001314.shtm.
[12]舒航,张高煜,赵厚宝,等. 区块链技术研究综述[J]. 福建电脑, 2019,35(1):1-3.
[13]GARAY J, KIAYIAS A, LEONARDOS N. The bitcoin backbone protocol: Analysis and applications[C]// Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2015:281-310.
[14]LAMPORT L, SHOSTAK R, PEASE M. The Byzantine generals problem[J]. ACM Transactions on Programming Languages and Systems, 1982,4(3):382-401.
[15]CASTRO M, LISKOV B. Practical Byzantine fault tolerance[C]// Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. 1999.
[16]韩璇,刘亚敏. 区块链技术中的共识机制研究[J]. 信息网络安全, 2017(9):147-152.
[17]袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4):481-494.
[18]张偲. 区块链技术原理、应用及建议[J]. 软件, 2016,37(11):51-54.
[19]唐长兵,杨珍,郑忠龙,等. PoW共识算法中的博弈困境分析与优化[J]. 自动化学报, 2017,43(9):1520-1531.
[20]SALEH F. Blockchain Without Waste: Proof-of-Stake[DB/OL]. (2018-06-07)[2019-07-25]. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3183935.
[21]夏清,张凤军,左春. 加密数字货币系统共识机制综述[J]. 计算机系统应用, 2017,26(4):1-8.
[22]刘懿中,刘建伟,张宗洋,等. 区块链共识机制研究综述[J]. 密码学报, 2019,6(4):395-432.
[23]DOUCEUR J R. The sybil attack[C]// Proceedings of the 1st International Workshop on Peer-to-Peer Systems. 2002:251-260.
[24]ROWAIHY H, ENCK W, MCDANIEL P, et al. Limiting sybil attacks in structured P2P networks[C]// Proceedings of the 26th IEEE International Conference on Computer Communications. 2007:2596-2600.
[25]BORISOV N. Computational puzzles as sybil defenses[C]// Proceedings of the 6th IEEE International Conference on Peer-to-peer Computing. 2006:171-176.
[26]TOSH D K, SHETTY S, LIANG X P, et al. Security implications of blockchain cloud with analysis of block withholding attack[C]// Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 2017:458-467.
[27]ROSENFELD M. Analysis of hashrate-based double spending[J]. arXiv preprint arXiv:1402.2009, 2014.
[28]EYAL I, SIRER E G. Majority is not enough: Bitcoin mining is vulnerable[C]// Proceedings of 2014 International Conference on Financial Cryptography and Data Security. 2014:436-454.
[29]斯雪明,徐蜜雪,苑超. 区块链安全研究综述[J]. 密码学报, 2018,5(5):458-469.
|