[1] |
NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System[DB/OL]. (2008-12-10)[2019-07-25]. https://bitcoin.org/bitcoin.pdf.
|
[2] |
杨宇光,张树新. 区块链共识机制综述[J]. 信息安全研究, 2018,4(4):369-379.
|
[3] |
BEN SASSON E, CHIESA A, TROMER E, et al. Succinct non-interactive zero knowledge for a von Neumann architecture[C]// Proceedings of the 23rd USENIX Security Symposium. 2014:781-796.
|
[4] |
LUU L, NARAYANAN V, ZHENG C D, et al. A secure sharding protocol for open blockchains[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016:17-30.
|
[5] |
BEN SASSON E, CHIESA A, GARMAN C, et al. Zerocash: Decentralized anonymous payments from bitcoin[C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. 2014:459-474.
|
[6] |
EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: A scalable blockchain protocol[C]// Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation. 2016:45-59.
|
[7] |
朱建明,丁庆洋,高胜. 基于许可链的SWIFT系统分布式架构[J]. 软件学报, 2019,30(6):1594-1613.
|
[8] |
史锦山,李茹. 物联网下的区块链访问控制综述[J]. 软件学报, 2019,30(6):1632-1648.
|
[9] |
范贤丽,范春晓,吴岳辛. 基于区块链和IPFS技术实现粮食供应链隐私信息保护[J]. 应用科学学报, 2019,37(2):179-190.
|
[10] |
余益民,陈韬伟,段正泰,等. 基于区块链的政务信息资源共享模型研究[J]. 电子政务, 2019(4):58-67.
|
[11] |
TokenClub研究院. 区块链安全研究报告[DB/OL]. (2018-08-20)[2019-07-25]. https://max.book118.com/html/2018/0925/5201103323001314.shtm.
|
[12] |
舒航,张高煜,赵厚宝,等. 区块链技术研究综述[J]. 福建电脑, 2019,35(1):1-3.
|
[13] |
GARAY J, KIAYIAS A, LEONARDOS N. The bitcoin backbone protocol: Analysis and applications[C]// Proceedings of the 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques. 2015:281-310.
|
[14] |
LAMPORT L, SHOSTAK R, PEASE M. The Byzantine generals problem[J]. ACM Transactions on Programming Languages and Systems, 1982,4(3):382-401.
|
[15] |
CASTRO M, LISKOV B. Practical Byzantine fault tolerance[C]// Proceedings of the 3rd Symposium on Operating Systems Design and Implementation. 1999.
|
[16] |
韩璇,刘亚敏. 区块链技术中的共识机制研究[J]. 信息网络安全, 2017(9):147-152.
|
[17] |
袁勇,王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4):481-494.
|
[18] |
张偲. 区块链技术原理、应用及建议[J]. 软件, 2016,37(11):51-54.
|
[19] |
唐长兵,杨珍,郑忠龙,等. PoW共识算法中的博弈困境分析与优化[J]. 自动化学报, 2017,43(9):1520-1531.
|
[20] |
SALEH F. Blockchain Without Waste: Proof-of-Stake[DB/OL]. (2018-06-07)[2019-07-25]. https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3183935.
|
[21] |
夏清,张凤军,左春. 加密数字货币系统共识机制综述[J]. 计算机系统应用, 2017,26(4):1-8.
|
[22] |
刘懿中,刘建伟,张宗洋,等. 区块链共识机制研究综述[J]. 密码学报, 2019,6(4):395-432.
|
[23] |
DOUCEUR J R. The sybil attack[C]// Proceedings of the 1st International Workshop on Peer-to-Peer Systems. 2002:251-260.
|
[24] |
ROWAIHY H, ENCK W, MCDANIEL P, et al. Limiting sybil attacks in structured P2P networks[C]// Proceedings of the 26th IEEE International Conference on Computer Communications. 2007:2596-2600.
|
[25] |
BORISOV N. Computational puzzles as sybil defenses[C]// Proceedings of the 6th IEEE International Conference on Peer-to-peer Computing. 2006:171-176.
|
[26] |
TOSH D K, SHETTY S, LIANG X P, et al. Security implications of blockchain cloud with analysis of block withholding attack[C]// Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing. 2017:458-467.
|
[27] |
ROSENFELD M. Analysis of hashrate-based double spending[J]. arXiv preprint arXiv:1402.2009, 2014.
|
[28] |
EYAL I, SIRER E G. Majority is not enough: Bitcoin mining is vulnerable[C]// Proceedings of 2014 International Conference on Financial Cryptography and Data Security. 2014:436-454.
|
[29] |
斯雪明,徐蜜雪,苑超. 区块链安全研究综述[J]. 密码学报, 2018,5(5):458-469.
|