期刊文献+

基于区块链的电动汽车充电网络信任管理机制 被引量:1

Blockchain-Based Trust Management Mechanism for Electric Vehicle Charging Networks
下载PDF
导出
摘要 充电网络建设的滞后已经成为制约电动汽车发展的关键因素,而C2C的商业模式则有望成为其强大的推动力,但由此也产生了为交易双方建立信任机制的问题。针对该问题,提出一种对充电网络的交易主体进行信任评估的方法,并设计了基于双层区块链的信任数据存储系统;同时,还提出了基于“轮盘赌”策略的共识算法,以改善工作量证明(proof of work, PoW)机制在算力损耗和共识效率上的缺陷。实验结果表明,提出的方法能够较好地识别恶意主体,并可以取得较高的共识效率。 The lag in the construction of charging networks has become a key factor restricting the development of electric vehicles, and the C2C business model is expected to become a strong driving force for its development. But from this, the problem of establishing a trust mechanism for both parties to the transaction has also arisen. In response to this problem, this paper proposes a trust evaluation method of transaction subjects of the charging network, and designs a trust data storage system based on a double-layer blockchain. At the same time, a consensus algorithm based on the “roulette” strategy is also proposed to improve the defects of PoW mechanism in computing power loss and consensus efficiency. The experimental results show that the method proposed in this paper can better identify malicious subjects and achieve a higher consensus efficiency.
作者 黄达 刘传 唐郑熠 陈龙辉 胡文瑜 HUANG Da;LIU Chuan;TANG Zhengyi;CHEN Longhui;HU Wenyu(School of Computer Science and Mathematics,Fujian University of Technology,Fuzhou 350118,China;Key Laboratory of Hunan Province for Mobile Business Intelligence,Hunan University of Technology and Business,Changsha 410205,China;Fujian Provincial Key Laboratory of Big Data Mining and Applications,Fujian University of Technology,Fuzhou 350118,China)
出处 《贵州大学学报(自然科学版)》 2022年第6期87-98,共12页 Journal of Guizhou University:Natural Sciences
基金 福建省自然科学基金资助项目(2020J01877) 湖南省重点实验室开放研究基金资助项目(2015TP1002) 国家重点研发计划子课题资助(2018YFC1201103)。
关键词 双层区块链 电动汽车充电站 共识机制 信任管理 double-layer blockchain electric vehicle charging station consensus mechanism trust management
  • 相关文献

参考文献12

二级参考文献57

  • 1A Shamir. How to share a secret [ J ]. Communications of the ACM, 1979, 22(11) :612 -613.
  • 2G R Blakley. Safeguarding cryptographic keys [ C ]. Proceedings of the National Computer Conference, New York, Springer - Verlag, 1979:313 - 317.
  • 3C Asmuth C, J Bloom. A modular approach to key safeguarding [J]. IEEE Trans on Information Theory, 1983, 29(2): 208 - 210.
  • 4J Halpern, V Teague. Rational secret sharing and multiparty com- putation: extended abstract [ C ]. STOC2004, Chicago: ACM Press, 2004:623 -632.
  • 5S Gordon, J Katz. Rational secret sharing revisited [ Jl. SCN, 2006, 4116:229 - 241.
  • 6S Maleka, A Shareef, C Rangan. Rational secret sharing with re- peated games [ C ]. ISPEC2008, New York: Springer-Verlag, 2008:334 - 346.
  • 7W Moses, C Rangan. Rational secret sharing over an asynchronous broadcast channel with information theoretic security [ J ]. IJN- SA2011, 2011,3(6) : 1 -18.
  • 8G Asharov, Y Lindell. Utility dependence in correct and fair ra- tional secret sharing [ J ]. Journal of Cryptology, 2011, 24 ( 1 ) : 157 - 202.
  • 9M Nojoumian, D Stinson, M Grainger. Unconditionally secure so- cial secret sharing scheme[ C]. IET -IFS, Special Issue on Multi - Agent and Distributed Information Security, IET Information Se- curity,2010:202 - 211.
  • 10刘木兰,张志芳.密钥共享体制与安全多方计算[M].北京电子工业出版社,2008.

共引文献92

同被引文献35

引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部