期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey
1
作者 Li Duan Yangyang Sun +3 位作者 Wei Ni Weiping Ding Jiqiang Liu Wei Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第8期1647-1667,共21页
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc... The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward. 展开更多
关键词 Blockchain cross-chain DEFENSE distributed private key control hash-locking NOTARY security threats sidechain/relay
下载PDF
Research on cross-chain and interoperability for blockchain system
2
作者 Li Ming Qiu Honglin +2 位作者 Xu Quanqing Song Wenpeng Liu Baixiang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第5期1-17,26,共18页
At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘va... At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains. 展开更多
关键词 blockchain distributed ledger technology cross-chain INTEROPERABILITY hash-locking NOTARY RELAY multi-chain
原文传递
一种改进的RFID双向认证协议 被引量:1
3
作者 郑欣 《网络安全技术与应用》 2021年第2期4-5,共2页
通过研究RFID认证协议,发现了一些安全问题,对此提出了一种基于hash函数的双向认证协议。该协议通过随机数和秘密值的计算来完成数据库、标签和读卡器之间的认证,有效防止了窃听、重放攻击、假冒攻击等常见攻击。
关键词 RFID HASH函数 安全分析 hash-lock
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部