Journal of Information Security Research ›› 2018, Vol. 4 ›› Issue (4): 369-379.
Previous Articles Next Articles
Received:
2018-04-20
Online:
2018-04-15
Published:
2018-04-20
杨宇光,张树新
通讯作者:
张树新
作者简介:
杨宇光
1976年生,博士,教授,主要研究领域为信息安全及信息安全与其他学科的交叉学科
张树新
1993年生,硕士研究生,主要研究领域为信息安全及区块链
杨宇光 张树新. 区块链共识机制综述[J]. 信息安全研究, 2018, 4(4): 369-379.
[1] Nakamoto S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. 2008[2018-03-20]. https://bitcoin.org/bitcoin.pdf [2] Bitcoin Core.integration/staging tree [CP].GitHub,2009[2018-03-20], https://github.com/bitcoin/bitcoin [3] W. Dai. b-money[EB/OL]. 1998[2018-03-20]. http://www.weidai.com/bmoney.txt [4] Back A. Hashcash-A Denial of Service Counter-Measure[C]// USENIX Technical Conference. 2002 [5] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4):481-494. [6] ADEPT: An IoT Practitioner Perspective DRAFT COPY FOR ADVANCE REVIEW[EB/OL]. IBM,2015[2018-03-19]. ibm.biz/devicedemocracy [7] 蔡维德, 赵梓皓, 张弛,等. 英国央行数字货币RSCoin探讨[J]. 金融电子化, 2016(10):78-81. [8] Two-phase commit protocol[EB/OL]. Wikipedia,(2018-1-23) [2018-03-23].https://en.wikipedia.org/wiki/Two-phase_commit_protocol [9] Underwood S. Blockchain Beyond Bitcoin[J]. Communications of the Acm, 2016, 59(11):15-17 [10] Baliga, Arati. Understanding Blockchain Consensus Models[EB/OL]. Persistent Systems Ltd, 2017[2018-03-21]. https://www.persistent.com/wp-content/uploads/2017/04/WP-Understanding-Blockchain-Consensus-Models.pdf [11] Fischer M J, Lynch N A, Paterson M S. Impossibility of distributed consensus with one faulty process[C]// ACM Sigact-Sigmod Symposium on Principles of Database Systems. ACM, 1983:1-7 [12] Lamport L, Shostak R, Pease M. The Byzantine Generals Problem[J]. ACM Transactions on Programming Languages and Systems, 1982, 4(3): 382–401 [13] Lamport L,. The part-time parliament[J]. ACM Transactions on Computer Systems, 1998, 16(2): 133–169[2018-03-19] [14] Ongaro D, Ousterhout J. In search of an understandable consensus algorithm[C]// Usenix Conference on Usenix Technical Conference. USENIX Association, 2014:305-320 [15] Castro M O T D. Practical byzantine fault tolerance[M]. Massachusetts Institute of Technology, 2000[2018-03-23] [16] Schwartz D, Youngs N, Britto A. The Ripple Protocol Consensus Algorithm[EB/OL]. Ripple Labs Inc, 2014[2018-03-22]. https://ripple.com/files/ripple_consensus_whitepaper.pdf [17] 周邺飞. 区块链核心技术演进之路——共识机制演进(1)[J]. 计算机教育, 2017(4):155-158 [18] Antonopoulos A M. Mastering Bitcoin: Unlocking Digital Crypto-Currencies[M]. O'Reilly Media, Inc. 2014 [19] Houy N. It Will Cost You Nothing to 'Kill' a Proof-of-Stake Crypto-Currency[J]. Social Science Electronic Publishing, 2014, 34(2)[2018-03-22] [20] Ren, Larry. Proof of stake velocity: Building the social currency of the digital age[EB/OL]. Reddcoin, 2014[2018-03-23]. https://www.reddcoin.com/papers/PoSV.pdf [21] Delegated Proof of Stake Consensus[EB/OL].BitShares,[2018-03-22]. https://bitshares.org/technology/delegated-proof-of-stake-consensus/ [22] Waves platform[EB/OL]. Wikipedia,(2018-3-19)[2018-03-23]. https://en.wikipedia.org/wiki/Waves_platform [23] Bentov I, Lee C, Mizrahi A, et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake[J]. ACM SIGMETRICS Performance Evaluation Review, 2014, 42(3): 34–37 [24] Casper Proof of Stake FAQ[EB/OL]. Ethereum Community,(2018-03-04)[2018-03-23]. https://github.com/ethereum/wiki/wiki/Proof-of-Stake-FAQ [25] NEM(cryptocurrency)[EB/OL]. Wikipedia,(2018-03-08)[2018-03-23]. https://en.wikipedia.org/wiki/NEM_(cryptocurrency) [26] Kwon,Jae. Tendermint: Consensus without Mining[EB/OL]. (2014)[2018-03-23]. https://www.github.com/tendermint/tendermint/wiki [27] Wustrow E, Vandersloot B. DDoSCoin: cryptocurrency with a malicious proof-of-work[C]// Usenix Conference on Offensive Technologies. USENIX Association, 2016:168-177 [28] P4Titan. Slimcoin A Peer-to-Peer Crypto-Currency with Proof-of-Burn,Mining without Powerful Hardware[EB/OL]. 2014[2018-03-23]. http://www.doc.ic.ac.uk/~ids/realdotdot/crypto_papers_etc_worth_reading/proof_of_burn/slimcoin_whitepaper.pdf [29] Jansen R. A TorPath to TorCoin:Proof-of-Bandwidth Altcoins for Compensating Relays[J]. 2014[2018-03-23] [30] Burstcoin-The green innovative cryptocurrency[EB/OL]. BurstProject,2017[2018-03-23]. https://www.burst-coin.org/proof-of-capacity [31] Ethan Heilman, Alison Kendler, Aviv Zohar. Eclipse attacks on Bitcoin's peer-to-peer network[C]// Usenix Conference on Security Symposium. USENIX Association, 2015:129-144 [32] Eyal I, Sirer E G. Majority Is Not Enough: Bitcoin Mining Is Vulnerable[J]. 2013,8437:436-454 [33] 全球算力分布[EB/OL]. 区块网(2018-03-20).http://qukuai.com/pools [34] Ball, Marshall, et al. Proofs of Useful Work[J]. IACR Cryptology ePrint Archive2017 (2017):203[2018-03-23] [35] Wacław Banasik, Stefan Dziembowski, Daniel Malinowski. Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts[C]//European Symposium on Research in Computer Security. Springer International Publishing, 2016:261-280 [36] Baird, Leemon. Hashgraph consensus: fair, fast, byzantine fault tolerance[J].Swirlds Tech Report, 2016[2018-03-23] |
[1] | . A Transaction Representation Model in Blockchain [J]. Journal of Information Security Research, 2021, 7(3): 233-241. |
[2] | . Research on the Application of Commercial Cryptography for Satellite Internet [J]. Journal of Information Security Research, 2021, 7(3): 263-267. |
[3] | . Research on Dual-blockchain Model for Medical Privacy Protection [J]. Journal of Information Security Research, 2021, 7(2): 136-144. |
[4] | . Multi-source network data privacy protection method based on blockchain technology [J]. Journal of Information Security Research, 2021, 7(1): 86-89. |
[5] | . A Government Affairs Cloud Cryptography Application based on Cryptography Cloud [J]. Journal of Information Security Research, 2020, 6(9): 0-0. |
[6] | . Research on Security of 5G Mobile Communication Network [J]. Journal of Information Security Research, 2020, 6(8): 699-704. |
[7] | . Research on enterprise information security system based on block chain [J]. Journal of Information Security Research, 2020, 6(8): 727-732. |
[8] | . Prospects for the Development of Cyberspace Identity Management System [J]. Journal of Information Security Research, 2020, 6(7): 602-607. |
[9] | . Research on the Innovative Application of Blockchain Technology in Government Governance in the Era of Digital Economy [J]. Journal of Information Security Research, 2020, 6(5): 468-472. |
[10] | . Identity Authentication Method Based on Blockchain Technology in Telecommuting [J]. Journal of Information Security Research, 2020, 6(4): 317-326. |
[11] | . Research on Blockchain of China Based on Bibliometric [J]. Journal of Information Security Research, 2020, 6(12): 1074-1081. |
[12] | . Research on Evidence Attribute of Blockchain Information [J]. Journal of Information Security Research, 2020, 6(12): 1082-1087. |
[13] | . Thoughts on Several Issues of Commercial Cryptography Application and Innovation Development [J]. Journal of Information Security Research, 2020, 6(11): 0-0. |
[14] | . Research on Mechanism and Method of Blockchain Governance [J]. Journal of Information Security Research, 2020, 6(11): 0-0. |
[15] | . A Survey On Blockchain Network Layer Attacks And Countermeasures [J]. Journal of Information Security Research, 2020, 6(11): 0-0. |
Viewed | ||||||||||||||||||||||||||||||||||||||||||||||||||
Full text 378
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||
Abstract 382
|
|
|||||||||||||||||||||||||||||||||||||||||||||||||