期刊文献+

区块链核心技术探究 被引量:7

Research on Key Technologies of Blockchain
下载PDF
导出
摘要 2020年国家将区块链正式列为新基建,习近平总书记在2019年中央政治局第十八次集体学习时强调,要把区块链作为核心技术自主创新的重要突破口,加快推动区块链技术和产业创新发展.区块链是集体共享的分布式数据库,具备“去中心化”“不可伪造”“全程留痕”“可以追溯”“公开透明”“集体维护”等特征,区块链技术已成为多领域关注和研究的热点.在梳理区块链技术发展的基础上,对区块链的四大核心技术及区块链的应用进行了深入阐述,为进一步学习研究区块链技术提供启发和参考. In 2020,China has officially put the blockchain as a new capital construction.General Secretary Xi Jinping has stressed in 2019 at the 18th Group study of the Political Bureau of the CPC Central Committee that the blockchain should be regarded as an important breakthrough for independent innovation of core technologies and accelerate the development of blockchain technology and industrial innovation.Blockchain is a collective shared distributed database,which has the characteristics of decentralization,unforgeability,whole process trace,traceability,openness and transparency as well as collective maintenance.Blockchain technology has become a hot topic in many fields.On the basis of combing the development of blockchain technology,the four core technologies of blockchain and the application of blockchain are elaborated in depth,providing inspiration and reference for further study and research of blockchain technology.
作者 贺元香 夏甜 史宝明 HE Yuan-xiang;XIA Tian;SHI Bao-ming(School of Digital Media,Lanzhou University of Arts and Science,Lanzhou 730000,China;ChainUP,Beijing 100000,China)
出处 《兰州文理学院学报(自然科学版)》 2020年第6期92-98,共7页 Journal of Lanzhou University of Arts and Science(Natural Sciences)
基金 2020年兰州文理学院科研项目(2020FWDF10) 2020年甘肃省“大学生创新创业计划”项目(S202011562037)。
关键词 区块链 去中心化 共识机制 智能合约 blockchain decentralization consensus mechanism smart contract
  • 相关文献

参考文献8

二级参考文献58

  • 1王飞跃.人工社会、计算实验、平行系统——关于复杂社会经济系统计算研究的讨论[J].复杂系统与复杂性科学,2004,1(4):25-35. 被引量:234
  • 2王飞跃.计算实验方法与复杂系统行为分析和决策评估[J].系统仿真学报,2004,16(5):893-897. 被引量:147
  • 3王飞跃,蒋正华,戴汝为.人口问题与人工社会方法:人工人口系统的设想与应用[J].复杂系统与复杂性科学,2005,2(1):1-9. 被引量:18
  • 4余敏,李战怀,张龙波.P2P数据管理[J].软件学报,2006,17(8):1717-1730. 被引量:17
  • 5Bellare M, Neven G. Transitive signatures based on factoring and RSA. In: Zheng Y, ed. Proc. of the Advances in CryptologyASIACRYPT 2002. LNCS 2501, Berlin, Heidelberg: Springer-Verlag, 2002. 397-4 14.
  • 6Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem. In: Biham E, ed. Proc. of the Advances in Cryptology-EUROCRYPT 2003. LNCS 2656, Berlin, Heidelberg: Springer-Verlag, 2003. 401-415.
  • 7Koeune F. Careful design and integration of cryptographic primitives with contributions to timing attack, padding schemes and random number generators [Ph.D. Thesis]. Louvain-la-Neuve: Universite Catholique de Louvain, 2001.
  • 8Gennaro R, Halevi S, Rabin T. Secure Hash-and-sign signatures without the random oracle. In: Stern J, ed. Proc. of the Advances in Cryptology-EUROCRYPT'99. LNCS 1592, Berlin, Heidelberg: Springer-Verlag, 1999.123-139.
  • 9Cramer R, Shoup V. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In: Krawczyk H, ed. Proc. of the Advances in Cryptology-Crypto'98. LNCS 1462, Berlin, Heidelberg: Springer-Verlag, 1998. 13-25.
  • 10Needham R, Schroeder M. Using encryption for authentication in large networks of computers. Communications of the ACM, 1978,21 (12) :993 -999.

共引文献3348

同被引文献56

引证文献7

二级引证文献16

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部