期刊文献+

轻量级区块链技术综述 被引量:12

Survey on Lightweight Blockchain Technology
下载PDF
导出
摘要 传统的区块链技术为了保证交易账本的全网共识和不可篡改性,要求矿工节点具有强大的计算能力和足够的存储空间,这就限制了资源受限的设备加入区块链.近几年,区块链技术已经拓展到金融经济、医疗健康、物联网、供应链等多个领域,但是这些应用场景存在大量算力弱、存储容量低的设备,这给区块链的应用带来了巨大挑战.为此轻量级的区块链技术应运而生.从轻量级计算和轻量级存储两方面出发,总结当前轻量级区块链的研究现状,对比分析各个方案的优缺点.最后展望未来轻量级区块链的发展. In order to ensure the network-wide consensus and tamper proof of the transaction ledger,the miner nodes are required to possess strong computing and storage resource in the traditional blockchain technology.It greatly limits the resource-constrained devices to join in the blockchain systems.In recent years,blockchain technology has been expanded in many fields,such as financial economy,health care,Internet of Things,supply chain,etc.However,there is a large number of devices with weak computing power and low storage capacity in these application scenarios,which brings great challenges to the application of blockchain.Therefore,lightweight blockchain technology is emerging.This study summarizes some related works of lightweight blockchain from the two aspects of lightweight computing and storage.Their advantages and disadvantages are compared and analyzed.Finally,the future development of the lightweight blockchain systems is prospected.
作者 谢晴晴 董凡 XIE Qing-Qing;DONG Fan(School of Computer Science and Communication Engineering,Jiangsu University,Zhenjiang 212013,China;Jiangsu Key Laboratory for Industrial Network Security Technology,Jiangsu University,Zhenjiang 212013,China)
出处 《软件学报》 EI CSCD 北大核心 2023年第1期33-49,共17页 Journal of Software
基金 国家自然科学基金青年基金(62002139,61902157) 江苏省自然科学基金(BK20200886) 中国博士后科学基金(2019M651738,2019M661753)。
关键词 轻量级区块链 共识机制 轻量级计算 轻量级存储 lightweight blockchain consensus mechanism lightweight computing lightweight storage
  • 相关文献

参考文献4

二级参考文献24

  • 1Beresford, Alastair R.,Stajano, Frank.Location privacy in pervasive computing. IEEE Pervasive Computing . 2003
  • 2Bellovin S M,Merritt M.Encrypted key exchange: Password-based protocols secure against dictionary attacks. Proceedings of the IEEE Symposium on Research in Security and Privacy . 1992
  • 3Boneh D,Gentry C,Lynn B,et al.Aggregate and verifiably encrypted signatures from bilinear maps. Advances in Cryptology-EUROCRYPT’03 . 2003
  • 4Rolf H. Weber.Internet of Things – New security and privacy challenges[J]. Computer Law and Security Review: The International Journal of Technology and Practice . 2010 (1)
  • 5Benjamin Fabian,Oliver Günther.Security challenges of the EPCglobal network[J]. Communications of the ACM . 2009 (7)
  • 6Dibyendu Chakrabarti,Subhamoy Maitra,Bimal Roy.A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design[J]. International Journal of Information Security . 2006 (2)
  • 7Juels A,Rivest RL,Szydlo M.The blocker tag:Selective blocking of RFID tags for consumer privacy. Proceedings of the 10th ACM Conference on Computerand Communications Security(CCS 2003) . 2003
  • 8BAUER K,LEE H.A distributed authentication scheme for a wire-less sensing system. ACM Transactions on Information and Sys-tem Security . 2008
  • 9Bellare M,Canetti R,Krawczyk H.Keyed Hash Functions and Message Authentication. Advances in Cryptology-CRYPIO’96 . 1996
  • 10C.Floerkemeier,M.Langheinrich,E.Fleisch,F.Mattern,S.E.Sarma."The Internet of Things,". First international conference,IOT 2008 . 2008

共引文献432

同被引文献105

引证文献12

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部