A Survey of Blockchain Security Technologies Based on Attribute-based Cryptography

被引:0
|
作者
Chen L. [1 ,2 ,3 ]
Xiang F. [4 ]
Sun Z.-X. [1 ,2 ,3 ]
机构
[1] Engineering Research Center of Post Big Data Technology and Application of Jiangsu Province, Nanjing University of Posts and Telecommunications, Nanjing
[2] Research and Development Center of Post Industry Technology of the State Posts Bureau (Internet of Things Technology), Nanjing University of Posts and Telecommunications, Nanjing
[3] Engineering Research Center of Broadband Wireless Communication Technology of the Ministry of Education, Nanjing University of Posts and Telecommunications, Nanjing
[4] National Engineering Laboratory for Logistics Information Technology, Shanghai
来源
关键词
Attribute-based encryption; Attribute-based signature; Blockchain security; Cryptography;
D O I
10.12263/DZXB.20191375
中图分类号
学科分类号
摘要
Blockchain is a distributed ledger that integrates key technologies such as distributed storage,peer-to-peer transmission,consensus mechanism,cryptographic algorithm and smart contract.It has the characteristics of decentralization,non-tampering,transparency and so on.In recent years,security problems of blockchain have gradually emerged,hindering the development of blockchain applications.This paper introduces the basic concept and security model of the blockchain,and analyzes the security problems of the blockchain.Then,based on the attribute-based cryptography,the various researches of the blockchain security technology are analyzed from the three aspects of access control,key management,and data privacy protection,and the characteristics of the main solutions are discussed.Finally,we summarize the research progress of the blockchain security technology based on the attribute-based cryptography,and discuss the future research work. © 2021, Chinese Institute of Electronics. All right reserved.
引用
收藏
页码:192 / 200
页数:8
相关论文
共 60 条
  • [1] Nakamoto S., Bitcoin:a peer-to-peer electronic cash system, (2009)
  • [2] Yuan Yong, Wang Feiyue, Blockchain:the state of the art and future trends, IEEE/CAA Journal of Automatica Sinica, 42, pp. 481-494, (2016)
  • [3] Shao Qifeng, Jin Cheqing, Zhang Zhao, Et al., Blockchain:architecture and research progress, Chinese Journal of Computers, 41, pp. 969-988, (2018)
  • [4] Lamport L, Et al., The Byzantine generals problem[J], ACM Trans on Programming Languages and Systems, 4, 3, pp. 382-401, (1982)
  • [5] Zheng ZB, Et al., An overview of blockchain technology:architecture,consensus,and future trends, IEEE Int'l Congress on Big Data, pp. 557-564, (2017)
  • [6] Hinz J, Taylor P., A Note on Optimal Double Spending Attacks, 2, pp. 545-551, (2019)
  • [7] Tasatanattakool P, Techapanupreeda C., Blockchain:challenges and applications, 2018 International Conference on Information Networking (ICOIN), pp. 473-475, (2018)
  • [8] Joshi AP, Han M, Wang Y., A survey on security and privacy issues of blockchain technology[J], Mathematical Foundations of Computing, 1, 2, pp. 121-147, (2018)
  • [9] Takemoto Y, Mt S., Gox files for bankruptcy,hit with lawsuit, (2018)
  • [10] Pang L J, Yang J, Jiang Z T., A survey of research progress and development tendency of attribute-based encryption[J], The Scientific World Journal, 2014, (2014)