IET Blockchain最新文献

筛选
英文 中文
ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator ISTVP:使用无合作者欺诈证明的轻节点独立单一交易验证协议
IET Blockchain Pub Date : 2024-02-13 DOI: 10.1049/blc2.12066
Minghao Lee, Binhao Ma, Di Han, Dejun Wang, Bo Meng
{"title":"ISTVP: Independent single transaction verification protocol for light node using fraud proofs without collaborator","authors":"Minghao Lee, Binhao Ma, Di Han, Dejun Wang, Bo Meng","doi":"10.1049/blc2.12066","DOIUrl":"https://doi.org/10.1049/blc2.12066","url":null,"abstract":"Most blockchain users run light nodes on mobile devices. Due to limited storage and computation, light nodes cannot perform transaction validation. This shortage makes opportunities for malicious nodes to produce blocks containing invalid transactions, which results in the loss of funds for light nodes. Fraud proofs play a significant role in ensuring transaction security for light nodes. However, existing fraud proof schemes require honest collaborators and the processing of entire blocks. To address these limitations, Independent Single Transaction Verification Protocol for Light node Using Fraud Proofs without Collaborator called ISTVP is proposed that enables light nodes to independently verify transactions and generate fraud proofs without relying on collaborators or processing the entire block. To support ISTVP, SVST is introduced, an efficient block structure for single‐transaction verification. SVST not only efficiently indexes historical transaction outputs to improve verification efficiency, but also significantly reduces the storage requirements for verifying transactions to . Furthermore, the authors analyze the security of ISTVP and demonstrate that it satisfies both persistence and liveness, while maintaining the level of security of full node.","PeriodicalId":511998,"journal":{"name":"IET Blockchain","volume":"39 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139780070","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi‐Hop anonymous payment channel network based on onion routing 基于洋葱路由的多跳匿名支付通道网络
IET Blockchain Pub Date : 2024-02-04 DOI: 10.1049/blc2.12065
Caimei Wang, Yudong Ren, Zhize Wu
{"title":"Multi‐Hop anonymous payment channel network based on onion routing","authors":"Caimei Wang, Yudong Ren, Zhize Wu","doi":"10.1049/blc2.12065","DOIUrl":"https://doi.org/10.1049/blc2.12065","url":null,"abstract":"Payment channel networks (PCNs) are one of the most promising off‐chain solutions to the blockchain scalability problem. However, most current payment channel schemes suffer from overly ideal routing assumptions or fail to provide complete path privacy protection. To address the above problems, the multi‐hop anonymous and privacy‐preserving PCN scheme are analyzed and a multi‐hop anonymous PCN based on onion routing is proposed based on it. The scheme removes the routing assumptions of the original scheme, designs an onion routing‐based payment channel network, and modifies the way relay nodes construct elliptic curve discrete logarithmic problems to resist wormhole attacks. Finally, the security analysis shows that the scheme in this paper has atomicity, relational anonymity and resistance to wormhole attacks. The latest bilinear pairing anonymous multi‐hop payment (EAMHL+) scheme is used to compare communication and computing overhead. The results show that the scheme in this paper requires less communication overhead and is more efficient in terms of computational overhead when the average hop number of the payment channel network is 3 hops and the network diameter is 6 hops.","PeriodicalId":511998,"journal":{"name":"IET Blockchain","volume":"17 3","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139867250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A survey on blockchain deployment for biometric systems 生物识别系统区块链部署调查
IET Blockchain Pub Date : 2024-02-01 DOI: 10.1049/blc2.12063
Surbhi Sharma, Rudresh Dwivedi
{"title":"A survey on blockchain deployment for biometric systems","authors":"Surbhi Sharma, Rudresh Dwivedi","doi":"10.1049/blc2.12063","DOIUrl":"https://doi.org/10.1049/blc2.12063","url":null,"abstract":"Blockchain technology has become an emerging area in recent years due to its capacity to improve the security, dependability, and resilience of distributed systems. Research based on this technique has impacted several firms, including banking, healthcare, data processing, remote sensing, and many others. The key characteristics of blockchain technology that make it appealing are data immutability, transparency, privacy, decentralization, and distributed ledgers. However, there is a chance of a privacy breach with sensitive biometric data. The purpose of this investigation is to examine blockchain‐based biometric applications research. It begins by determining the myriad ways that biometrics and blockchain may work together, including the storage and protection of biometric templates, identity management, and biometric authentication systems. Different biometric applications with respect to blockchain technology are also identified, along with the types of biometric data taken into account, features and capabilities of blockchain technology exploited, and blockchain technology frameworks employed. Finally, the authors seek to investigate blockchain concepts in the biometric domain by evaluating their pros and cons and summarizing the methods developed on blockchain for diverse biometric applications. Additionally, the applications of blockchain‐based biometric systems are highlighted before moving on to open research questions and potential future research areas.","PeriodicalId":511998,"journal":{"name":"IET Blockchain","volume":"23 6","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139817946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信