The risk assessment system has been applied to the information security,energy,medical and other industries.Through the risk assessment system,it is possible to quantify the possibility of the impact or loss caused by...The risk assessment system has been applied to the information security,energy,medical and other industries.Through the risk assessment system,it is possible to quantify the possibility of the impact or loss caused by an event before or after an event,thereby avoiding the risk or reducing the loss.However,the existing risk assessment system architecture is mostly a centralized architecture,which could lead to problems such as data leakage,tampering,and central cheating.Combined with the technology of block chain,which has the characteristics of decentralization,security and credibility,collective maintenance,and untamperability.This paper proposes a new block chainbased risk assessment system architecture and a consensus mechanism algorithm based on DPOS improvement.This architecture uses an improved consensus mechanism to achieve a safe and efficient risk assessment solving the problem of data tampering in the risk assessment process,avoiding data leakage caused by improper data storage.A convenient,safe and fast risk assessment is achieved in conjunction with the improved consensus mechanism.In addition,by comparing existing risk assessment architecture,the advantages and impacts of the new block chain-based risk assessment system architecture are analyzed.展开更多
Supply chain finance has played a positive role in solving the financing difficulties of small and medium-sized enterprises.However,in the actual implementation process,there are still problems such as information asy...Supply chain finance has played a positive role in solving the financing difficulties of small and medium-sized enterprises.However,in the actual implementation process,there are still problems such as information asymmetry,doubts about the authenticity of trade background,and high operational risks,which seriously restrict the development of supply chain finance.However,block chain technology has the characteristics of de-centralization,data transparency,common maintenance and non-tampering.Applying this technology to supply chain finance can effectively solve the existing problems.Based on the research on the development status of traditional supply chain finance,this paper puts forward a new development mode of supply chain finance based on block chain technology,and through the analysis of typical cases,finally gives some policy suggestions for the development of block chain supply chain finance.展开更多
Objective To analyze the current problems in drug traceability and supply chain management,and build the drug traceability system based on the block chain technology so as to provide authenticity assurance for the rea...Objective To analyze the current problems in drug traceability and supply chain management,and build the drug traceability system based on the block chain technology so as to provide authenticity assurance for the real data in the whole life cycle of drugs.Methods A new drug regulatory traceability protocol was designed based on block chain technology.The database of drug production,circulation and use was linked closely.A traceability system was set up according to the traceability protocol,and the consensus complexity and safety performance of the system were analyzed.Results and Conclusion The distributed account book and tamper-proof functions of the block chain platform were used to establish a double-chain system based on the combination of public chain and private chain,which could make the data of drugs more reliable,transparent and traceable with good application value.The establishment of a double-chain traceability system is studied so that drug market license holders,manufacturers,operating enterprises and users can verify the data to form an interconnected drug traceability data chain.展开更多
In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which can...In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility.展开更多
Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, ...Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, the IoMT. Recently, the shift in paradigm from manual data storage toelectronic health recording on fog, edge, and cloud computing has been noted.These advanced computing technologies have facilitated medical services withminimum cost and available conditions. However, the IoMT raises a highconcern on network security and patient data privacy in the health caresystem. The main issue is the transmission of health data with high security inthe fog computing model. In today’s market, the best solution is blockchaintechnology. This technology provides high-end security and authenticationin storing and transferring data. In this research, a blockchain-based fogcomputing model is proposed for the IoMT. The proposed technique embedsa block chain with the yet another consensus (YAC) protocol building securityinfrastructure into fog computing for storing and transferring IoMT data inthe network. YAC is a consensus protocol that authenticates the input datain the block chain. In this scenario, the patients and their family membersare allowed to access the data. The empirical outcome of the proposedtechnique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed. The technique also exhibitshigh reliability and efficiency in accessing data with secure transmission. Theproposed technique achieves 95% reliability in transferring a large number offiles up to 10,000.展开更多
In the shipping industry, significant part of the documents exchange still have the traditional paper form, mainly due to security concerns, despite the size and modernization efforts of this market. We explore the ad...In the shipping industry, significant part of the documents exchange still have the traditional paper form, mainly due to security concerns, despite the size and modernization efforts of this market. We explore the adoption of the blockchain and Distributed Ledger Technologies to address document exchange in a fast and secure way.展开更多
Block chain is widely used in the financial field for its characteristics of decentralization, anonymity and trust. Electronic money payment is an important application hotspot. Ring signature is widely used in strong...Block chain is widely used in the financial field for its characteristics of decentralization, anonymity and trust. Electronic money payment is an important application hotspot. Ring signature is widely used in strong anonymous authentication such as electronic cash and electronic voting because of its unconditional anonymity, spontaneity and flexible group structure. Among them, the correlation ring signature can prove whether two signatures are issued by the same person without revealing the identity of the real signer. Therefore, the signature right breach can be avoided based on the premise of guaranteeing anonymity, such as repeated voting, electronic money repetition cost and so on. Most of the existing correlation ring signature security is based on the discrete logarithm problem, and most of the schemes result in the degradation of anonymity because of strong association. These methods do not apply to the block chain electronic currency transaction scene with strong anonymity. Therefore, this paper first proposes a blockchain-based electronic currency transaction security model. The model ensures not only the anonymity of both parties but also a certain degree of traceability. In order to support these two characteristics, this paper proposes an association ring signature method based on large integer decomposition problem. This method has strong anonymity and can be applied to blockchain scenes. On the other hand, it can be converted into group signatures in specific scenarios. It is therefore traceable. Finally, the adaptive selection message of the scheme and the unforgeability under the selection of public key attack are proved under the random oracle model.展开更多
The chain dynamics of a pair of diblock poly(styrene-b-butadiene) (PS210-b-PB960) and triblock poly(styrene-b-butadiene-b-styrene) (PS200-b-PB1815-b-PS200) copolymers in both dilute and semidilute toluene solutions ha...The chain dynamics of a pair of diblock poly(styrene-b-butadiene) (PS210-b-PB960) and triblock poly(styrene-b-butadiene-b-styrene) (PS200-b-PB1815-b-PS200) copolymers in both dilute and semidilute toluene solutions has been comparatively studied by dynamic laser light scattering. As expected, the mutual diffusion of individual chain changes into a fast cooperative diffusion of the chain segments ('blobs') between two neighboring entanglement points for both the copolymers as the solution changes from dilute to semidilute. Further increases of the concentration lead to a second slow relaxation mode. For the triblock chains, there exists an additional middle relaxation between the fast and the slow modes. The concentration (c) dependent study of the average characteristic decay time of the fast mode ((tau(f))) reveals that 1/(tau(f)) - c(-a) with 0.33 < alpha < 0.44, much smaller than 0.75 predicted or 0.72 observed for linear homopolymer chains in good solvent. It implies that the solvent quality of toluene for PB might not be as good as that for PS. Due to such a difference in solubility, it is reasonable to speculate that the PB and PS blocks are transiently segregated in semidilute solution. The relaxation of these transient PB and PS richer domains leads to the observed slow relaxation. Such a speculation is supported by the appearance of an additional slow relaxation mode in the study of polyisoprene-b-polystyrene-b-polyisoprene in semidilute solution in cyclohexane, a non-selective solvent, in which we alternated the solubility difference by a variation of the solution temperature.展开更多
The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful...The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow vehicles.Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards.This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore curve.The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a journey.Crucially,the Certification Authority remains unaware of the specific route design,ensuring privacy.The method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU information.Real-world performance evaluations affirm the effectiveness of the proposed model.展开更多
联邦学习和群智学习等协作学习技术,能够在保护数据隐私的条件下充分利用分布在各地的分布式数据深度挖掘数据中所蕴含的知识,拥有非常广阔的应用前景,尤其是在强调隐私惯例和道德约束的医疗健康领域.任何协作工作都需要选择可靠的参与...联邦学习和群智学习等协作学习技术,能够在保护数据隐私的条件下充分利用分布在各地的分布式数据深度挖掘数据中所蕴含的知识,拥有非常广阔的应用前景,尤其是在强调隐私惯例和道德约束的医疗健康领域.任何协作工作都需要选择可靠的参与方,协作学习中全局模型的性能在很大程度上取决于参与方的选择.然而,现有研究在选择参与方时都没有对不同机构医疗数据中存在的异质性加以直接关注.导致包含稳定性在内的全局模型的性能难以得到保障.提出了从信誉的角度尝试探索求解该问题.以迭代协作学习的方式尽可能挑选出具有良好信誉的参与方进行协作学习,以获得稳定可靠的高性能全局模型.首先,提出了一个描述医疗机构数据质量的AI信誉值指标AMP(AI medical promise),以帮助其在医疗领域中形成良好的AI生态.其次,建立了一个基于后向选择的迭代协作学习(colback-learning)框架.在单次协作学习任务中,利用后向选择方法以多项式时间复杂度迭代计算出性能良好且稳定的全局模型,完成AMP计算和积累.在AMP信誉值计算中,制定了一个综合考虑全局性能指标的评分函数,以针对医疗领域更有效地指导全局模型的训练.最后,使用真实医疗数据模拟多样化的协作学习场景.实验表明,colback-learning能够选择可靠参与方训练得到性能良好的全局模型,模型的性能稳定性比现有最好的参与方选择方法提高了1.3~6倍.全局模型的可解释性与集中式学习保持了较高的一致性.展开更多
共识机制是区块链技术的重要组成部分,针对委托权益证明(delegated proof of stake,DPoS)共识机制中对恶意节点不能及时有效处理的问题,提出了一种基于支持向量机的DPoS共识机制改进方案(SVM-DPoS)。首先构建基于SVM的节点判别模型,通...共识机制是区块链技术的重要组成部分,针对委托权益证明(delegated proof of stake,DPoS)共识机制中对恶意节点不能及时有效处理的问题,提出了一种基于支持向量机的DPoS共识机制改进方案(SVM-DPoS)。首先构建基于SVM的节点判别模型,通过训练好的模型分析节点的行为动机,根据判别结果及时剔除恶意节点;其次基于固定协商出块顺序优化传统算法的出块流程,提升出块效率,进一步提高了整个区块链网络的运行效率。在公开数据集上的实验结果表明,与已有的几种方法相比,改进后的共识机制能够快速剔除恶意节点,不仅维护了系统稳定性,而且增强了对恶意行为的防范能力,从而在保障区块链网络正常运行的同时,提高了整体共识的安全性。展开更多
基金supported by the National Key Research and Development Project of China(No.2017YFB0802302)the National Natural Science Foundation of China(No.61572086,No.61402058)+4 种基金the Innovation Team of Quantum Security Communication of Sichuan Province(No.17TD0009)the Academic and Technical Leaders Training Funding Support Projects of Sichuan Province(No.2016120080102643)the Application Foundation Project of Sichuan Province(No.2017JY0168)the Key Research and Development Project of Sichuan Province(No.2018TJPT0012)the Science and Technology Support Project of Sichuan Province(No.2016FZ0112,No.2018GZ0204).
文摘The risk assessment system has been applied to the information security,energy,medical and other industries.Through the risk assessment system,it is possible to quantify the possibility of the impact or loss caused by an event before or after an event,thereby avoiding the risk or reducing the loss.However,the existing risk assessment system architecture is mostly a centralized architecture,which could lead to problems such as data leakage,tampering,and central cheating.Combined with the technology of block chain,which has the characteristics of decentralization,security and credibility,collective maintenance,and untamperability.This paper proposes a new block chainbased risk assessment system architecture and a consensus mechanism algorithm based on DPOS improvement.This architecture uses an improved consensus mechanism to achieve a safe and efficient risk assessment solving the problem of data tampering in the risk assessment process,avoiding data leakage caused by improper data storage.A convenient,safe and fast risk assessment is achieved in conjunction with the improved consensus mechanism.In addition,by comparing existing risk assessment architecture,the advantages and impacts of the new block chain-based risk assessment system architecture are analyzed.
基金Shandong Key Research and Development Project(Soft Science):2019RKC20001。
文摘Supply chain finance has played a positive role in solving the financing difficulties of small and medium-sized enterprises.However,in the actual implementation process,there are still problems such as information asymmetry,doubts about the authenticity of trade background,and high operational risks,which seriously restrict the development of supply chain finance.However,block chain technology has the characteristics of de-centralization,data transparency,common maintenance and non-tampering.Applying this technology to supply chain finance can effectively solve the existing problems.Based on the research on the development status of traditional supply chain finance,this paper puts forward a new development mode of supply chain finance based on block chain technology,and through the analysis of typical cases,finally gives some policy suggestions for the development of block chain supply chain finance.
文摘Objective To analyze the current problems in drug traceability and supply chain management,and build the drug traceability system based on the block chain technology so as to provide authenticity assurance for the real data in the whole life cycle of drugs.Methods A new drug regulatory traceability protocol was designed based on block chain technology.The database of drug production,circulation and use was linked closely.A traceability system was set up according to the traceability protocol,and the consensus complexity and safety performance of the system were analyzed.Results and Conclusion The distributed account book and tamper-proof functions of the block chain platform were used to establish a double-chain system based on the combination of public chain and private chain,which could make the data of drugs more reliable,transparent and traceable with good application value.The establishment of a double-chain traceability system is studied so that drug market license holders,manufacturers,operating enterprises and users can verify the data to form an interconnected drug traceability data chain.
文摘In recent years, the rapid innovation and development of financial industry has made financial enterprises have a lot of information. However, the large amount of information is tampered with and fragmented, which cannot be shared. With the constant innovation of science and technology, it is the most effective way to solve the information lag and asymmetry of financial products. This article aims to start from the problem of asymmetric information of financial products, the analysis of the emerging block chain technology applied in the financial sector, and with the development of asset securitization information known as the typical scenario for the first time, a concrete analysis information game process, and discuss about the application of chain blocks in securitization feasibility.
文摘Internet of Medical Things (IoMT) is a breakthrough technologyin the transfer of medical data via a communication system. Wearable sensordevices collect patient data and transfer them through mobile internet, thatis, the IoMT. Recently, the shift in paradigm from manual data storage toelectronic health recording on fog, edge, and cloud computing has been noted.These advanced computing technologies have facilitated medical services withminimum cost and available conditions. However, the IoMT raises a highconcern on network security and patient data privacy in the health caresystem. The main issue is the transmission of health data with high security inthe fog computing model. In today’s market, the best solution is blockchaintechnology. This technology provides high-end security and authenticationin storing and transferring data. In this research, a blockchain-based fogcomputing model is proposed for the IoMT. The proposed technique embedsa block chain with the yet another consensus (YAC) protocol building securityinfrastructure into fog computing for storing and transferring IoMT data inthe network. YAC is a consensus protocol that authenticates the input datain the block chain. In this scenario, the patients and their family membersare allowed to access the data. The empirical outcome of the proposedtechnique indicates high reliability and security against dangerous threats.The major advantages of using the blockchain model are high transparency,good traceability, and high processing speed. The technique also exhibitshigh reliability and efficiency in accessing data with secure transmission. Theproposed technique achieves 95% reliability in transferring a large number offiles up to 10,000.
文摘In the shipping industry, significant part of the documents exchange still have the traditional paper form, mainly due to security concerns, despite the size and modernization efforts of this market. We explore the adoption of the blockchain and Distributed Ledger Technologies to address document exchange in a fast and secure way.
基金Supported by the National Natural Science Foundation of China(U1304614,U1204703)the Construct Program of the Key Discipline in Zhengzhou Normal UniversityAid Program for Science and Technology Innovative Research Team of Zhengzhou Normal University,Henan Province Education Science Plan General Topic((2018)-JKGHYB-0279)
文摘Block chain is widely used in the financial field for its characteristics of decentralization, anonymity and trust. Electronic money payment is an important application hotspot. Ring signature is widely used in strong anonymous authentication such as electronic cash and electronic voting because of its unconditional anonymity, spontaneity and flexible group structure. Among them, the correlation ring signature can prove whether two signatures are issued by the same person without revealing the identity of the real signer. Therefore, the signature right breach can be avoided based on the premise of guaranteeing anonymity, such as repeated voting, electronic money repetition cost and so on. Most of the existing correlation ring signature security is based on the discrete logarithm problem, and most of the schemes result in the degradation of anonymity because of strong association. These methods do not apply to the block chain electronic currency transaction scene with strong anonymity. Therefore, this paper first proposes a blockchain-based electronic currency transaction security model. The model ensures not only the anonymity of both parties but also a certain degree of traceability. In order to support these two characteristics, this paper proposes an association ring signature method based on large integer decomposition problem. This method has strong anonymity and can be applied to blockchain scenes. On the other hand, it can be converted into group signatures in specific scenarios. It is therefore traceable. Finally, the adaptive selection message of the scheme and the unforgeability under the selection of public key attack are proved under the random oracle model.
基金The financial support of the Hong Kong Special Administration Region Earmarked Grants (CUHK4257/01P, 2160174), theSpecial Funds for Major State Basic Research Projects (G1999064800), the CAS Bai Ren Project and the National ScienceFoundation of China (NSFC) are gratefully acknowledged.
文摘The chain dynamics of a pair of diblock poly(styrene-b-butadiene) (PS210-b-PB960) and triblock poly(styrene-b-butadiene-b-styrene) (PS200-b-PB1815-b-PS200) copolymers in both dilute and semidilute toluene solutions has been comparatively studied by dynamic laser light scattering. As expected, the mutual diffusion of individual chain changes into a fast cooperative diffusion of the chain segments ('blobs') between two neighboring entanglement points for both the copolymers as the solution changes from dilute to semidilute. Further increases of the concentration lead to a second slow relaxation mode. For the triblock chains, there exists an additional middle relaxation between the fast and the slow modes. The concentration (c) dependent study of the average characteristic decay time of the fast mode ((tau(f))) reveals that 1/(tau(f)) - c(-a) with 0.33 < alpha < 0.44, much smaller than 0.75 predicted or 0.72 observed for linear homopolymer chains in good solvent. It implies that the solvent quality of toluene for PB might not be as good as that for PS. Due to such a difference in solubility, it is reasonable to speculate that the PB and PS blocks are transiently segregated in semidilute solution. The relaxation of these transient PB and PS richer domains leads to the observed slow relaxation. Such a speculation is supported by the appearance of an additional slow relaxation mode in the study of polyisoprene-b-polystyrene-b-polyisoprene in semidilute solution in cyclohexane, a non-selective solvent, in which we alternated the solubility difference by a variation of the solution temperature.
文摘The confidentiality of pseudonymous authentication and secure data transmission is essential for the protection of information and mitigating risks posed by compromised vehicles.The Internet of Vehicles has meaningful applications,enabling connected and autonomous vehicles to interact with infrastructure,sensors,computing nodes,humans,and fellow vehicles.Vehicular hoc networks play an essential role in enhancing driving efficiency and safety by reducing traffic congestion while adhering to cryptographic security standards.This paper introduces a privacy-preserving Vehicle-to-Infrastructure authentication,utilizing encryption and the Moore curve.The proposed approach enables a vehicle to deduce the planned itinerary of Roadside Units(RSUs)before embarking on a journey.Crucially,the Certification Authority remains unaware of the specific route design,ensuring privacy.The method involves transforming all Roadside Units(RSUs)in a region into a vector,allowing for instant authentication of a vehicle’s route using RSU information.Real-world performance evaluations affirm the effectiveness of the proposed model.
文摘联邦学习和群智学习等协作学习技术,能够在保护数据隐私的条件下充分利用分布在各地的分布式数据深度挖掘数据中所蕴含的知识,拥有非常广阔的应用前景,尤其是在强调隐私惯例和道德约束的医疗健康领域.任何协作工作都需要选择可靠的参与方,协作学习中全局模型的性能在很大程度上取决于参与方的选择.然而,现有研究在选择参与方时都没有对不同机构医疗数据中存在的异质性加以直接关注.导致包含稳定性在内的全局模型的性能难以得到保障.提出了从信誉的角度尝试探索求解该问题.以迭代协作学习的方式尽可能挑选出具有良好信誉的参与方进行协作学习,以获得稳定可靠的高性能全局模型.首先,提出了一个描述医疗机构数据质量的AI信誉值指标AMP(AI medical promise),以帮助其在医疗领域中形成良好的AI生态.其次,建立了一个基于后向选择的迭代协作学习(colback-learning)框架.在单次协作学习任务中,利用后向选择方法以多项式时间复杂度迭代计算出性能良好且稳定的全局模型,完成AMP计算和积累.在AMP信誉值计算中,制定了一个综合考虑全局性能指标的评分函数,以针对医疗领域更有效地指导全局模型的训练.最后,使用真实医疗数据模拟多样化的协作学习场景.实验表明,colback-learning能够选择可靠参与方训练得到性能良好的全局模型,模型的性能稳定性比现有最好的参与方选择方法提高了1.3~6倍.全局模型的可解释性与集中式学习保持了较高的一致性.
文摘共识机制是区块链技术的重要组成部分,针对委托权益证明(delegated proof of stake,DPoS)共识机制中对恶意节点不能及时有效处理的问题,提出了一种基于支持向量机的DPoS共识机制改进方案(SVM-DPoS)。首先构建基于SVM的节点判别模型,通过训练好的模型分析节点的行为动机,根据判别结果及时剔除恶意节点;其次基于固定协商出块顺序优化传统算法的出块流程,提升出块效率,进一步提高了整个区块链网络的运行效率。在公开数据集上的实验结果表明,与已有的几种方法相比,改进后的共识机制能够快速剔除恶意节点,不仅维护了系统稳定性,而且增强了对恶意行为的防范能力,从而在保障区块链网络正常运行的同时,提高了整体共识的安全性。