[1] NAKAMOTO S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2023-04-25]. https://organicdesign.nz/files/8/89/Bitcoin.pdf. [2] GARAY J, KIAYIAS A, LEONARDOS N. The Bitcoin backbone protocol:analysis and applications[C]//Proceedings of Annual International Conference on the Theory and Applications of Cryptographic Techniques. Berlin, Germany:Springer, 2015:281-310. [3] SWAN M. Blockchain:blueprint for a new economy[M]. New York, USA:O'Reilly Media, Inc,2015. [4] GÖBEL J, KRZESINSKI A E. Increased block size and Bitcoin blockchain dynamics[C]//Proceedings of the 27th International Telecommunication Networks and Applications Conference. Washington D. C., USA:IEEE Press, 2017:1-6. [5] GERVAIS A, KARAME G O, WVST K, et al. On the security and performance of proof of work blockchains[C]//Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. New York, USA:ACM Press, 2016:3-16. [6] KIAYIAS A, RUSSELL A, DAVID B, et al. PPCoin:peer-to-peer crypto-currency with proof-of-stake[C]//Proceedings of Conference on Computer and Communications Security. New York, USA:ACM Press, 2016:1-27. [7] 王劲松,杨唯正,赵泽宁,等.基于有向无环图的区块链技术综述[J].计算机工程, 2022, 48(6):11-23. WANG J S, YANG W Z, ZHAO Z N, et al. Survey of directed acyclic graph based blockchain technology[J]. Computer Engineering, 2022, 48(6):11-23.(in Chinese) [8] SERGIO D L. DagCoin:a cryptocurrency without blocks[EB/OL].[2023-04-25]. https://bitslog.com/2015/09/11/dagcoin. [9] FAN C X, GHAEMI S, KHAZAEI H, et al. Performance analysis of the IOTA DAG-based distributed ledger[J]. ACM Transactions on Modeling and Performance Evaluation of Computing Systems, 2021,6(3):10. [10] CHURYUMOV A. Byteball:a decentralized system for storage and transfer of value[EB/OL].[2023-04-25]. https://byteball.org/Byteball.pdf. [11] LI C X, LI P L, ZHOU D, et al. Scaling Nakamoto consensus to thousands of transactions per second[EB/OL].[2023-04-25]. https://arxiv.org/pdf/1805.03870. [12] ROCKET T. Snowflake to Avalanche:a novel metastable consensus protocol family for cryptocurrencies[EB/OL].[2023-04-25]. https://www.avalabs.org/whitepapers. [13] LEEMON B. The swirlds Hashgraph consensus algorithm:Fair, fast, Byzantine fault tolerance[EB/OL].[2023-04-25]. http://www.leemon.com/papers/2016b.pdf. [14] FU X, WANG H M, SHI P C, et al. Jointgraph:a DAG-based efficient consensus algorithm for consortium blockchains[J]. Software:Practice and Experience, 2021, 51(10):1987-1999. [15] FU X, WANG H M, SHI P C, et al. Teegraph:a Blockchain consensus algorithm based on TEE and DAG for data sharing in IoT[J]. Journal of Systems Architecture, 2022, 122:102344. [16] 陈思伦.基于盲签名改进的Hashgraph共识算法研究与实现[D].郑州:郑州大学, 2020. CHEN S L. Research and implementation based on improved Hashgraph consensus algorithm[D].Zhengzhou:Zhengzhou University, 2020.(in Chinese) [17] 贾立圆.基于Hashgraph区块链模型的关键技术研究与实现[D].北京:北京工业大学, 2021. JIA L Y. Research and implementation of key technologies based on Hashgraph blockchain madel[D].Beijing:Beijing University of Technology, 2021.(in Chinese) [18] CHOI S M, PARK J, NGUYEN Q, et al. OPERA:reasoning about continuous common knowledge in asynchronous distributed systems[EB/OL].[2023-04-25]. http://arxiv.org/abs/1810.02186. [19] NGUYEN Q, CRONJE A, KONG M, et al. StakeDAG:stake-based consensus for scalable trustless systems[EB/OL].[2023-04-25]. http://arxiv.org/abs/1907.03655. [20] NGUYEN Q, CRONJE A, KONG M, et al. StairDAG:cross-DAG validation for scalable BFT consensus[EB/OL].[2023-04-25]. http://arxiv.org/abs/1908.11810. [21] CASTRO M, LISKOV B. Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems, 2002, 20:398-461. [22] 张奇文,王志强,张逸谦.基于Gossip协议的信任收集共识算法研究[J].计算机科学, 2020, 47(S1):391-394. ZHANG Q W, WANG Z Q, ZHANG Y Q. Research on trust collection consensus algorithm based on Gossip protocol[J]. Computer Science, 2020, 47(S1):391-394.(in Chinese) [23] 张仕将,柴晶,陈泽华,等.基于Gossip协议的拜占庭共识算法[J].计算机科学, 2018, 45(2):20-24. ZHANG S J, CHAI J, CHEN Z H, et al. Byzantine consensus algorithm based on Gossip protocol[J]. Computer Science, 2018, 45(2):20-24.(in Chinese) [24] 周锐,王晓明.基于同态哈希函数的云数据完整性验证算法[J].计算机工程, 2014, 40(6):64-69. ZHOU R, WANG X M. Integrity verifying algorithm for cloud data based on homomorphic hash function[J]. Computer Engineering, 2014, 40(6):64-69.(in Chinese) [25] 孙光昊.基于可信中心节点的安全网络编码理论与应用研究[D].南宁:广西大学, 2013. SUN G H. Secure network coding theory and its applications based on trust centre[D].Nanning:Guangxi University, 2013.(in Chinese) [26] 韩明轩,蒋文保,郭阳楠.基于报文哈希链的签名认证方法[J].计算机应用研究, 2022, 39(4):1183-1189. HAN M X, JIANG W B, GUO Y N. Signature and authentication method based on message hash chain[J]. Application Research of Computers, 2022, 39(4):1183-1189.(in Chinese) |