1 |
张亮, 刘百祥, 张如意, 等. 区块链技术综述. 计算机工程, 2019, 45 (5): 1- 12.
doi: 10.19678/j.issn.1000-3428.0053554
|
|
ZHANG L, LIU B X, ZHANG R Y, et al. Overview of blockchain technology. Computer Engineering, 2019, 45 (5): 1- 12.
doi: 10.19678/j.issn.1000-3428.0053554
|
2 |
王群, 李馥娟, 倪雪莉, 等. 区块链共识算法及应用研究. 计算机科学与探索, 2022, 16 (6): 1214- 1242.
|
|
WANG Q, LI F J, NI X L, et al. Survey on blockchain consensus algorithms and application. Journal of Frontiers of Computer Science and Technology, 2022, 16 (6): 1214- 1242.
|
3 |
谭敏生, 杨杰, 丁琳, 等. 区块链共识机制综述. 计算机工程, 2020, 46 (12): 1- 11.
doi: 10.19678/j.issn.1000-3428.0059070
|
|
TAN M S, YANG J, DING L, et al. Review of consensus mechanism of blockchain. Computer Engineering, 2020, 46 (12): 1- 11.
doi: 10.19678/j.issn.1000-3428.0059070
|
4 |
DWORK C, NAOR M. Pricing via processing or combatting junk mail. Berlin, Germany: Springer, 2007.
|
5 |
LASZKA A, JOHNSON B, GROSSKLAGS J. When bitcoin mining pools run dry. Berlin, Germany: Springer, 2015.
|
6 |
EYAL I, SIRER E G. Majority is not enough: bitcoin mining is vulnerable. Berlin, Germany: Springer, 2014.
|
7 |
|
8 |
|
9 |
CHATZIGIANNIS P, BALDIMTSI F, GRIVA I, et al. Diversification across mining pools: optimal mining strategies under PoW. Journal of Cybersecurity, 2022, 8 (1): 1- 15.
|
10 |
LI X P, LI Z. A performance measurement and optimization mechanism for blockchain mining pool system[C]//Proceedings of the 3rd International Conference on Blockchain Technology and Applications. New York, USA: ACM Press, 2020: 27-33.
|
11 |
邸剑, 吝伟华. 区块链中矿池选择策略的研究与分析. 计算机应用研究, 2020, 37 (6): 1804- 1807.
|
|
DI J, LIN W H. Research and analysis of mining pool selection strategy in blockchain. Application Research of Computers, 2020, 37 (6): 1804- 1807.
|
12 |
唐长兵, 杨珍, 郑忠龙, 等. PoW共识算法中的博弈困境分析与优化. 自动化学报, 2017, 43 (9): 1520- 1531.
|
|
TANG C B, YANG Z, ZHENG Z L, et al. Game dilemma analysis and optimization of PoW consensus algorithm. Acta Automatica Sinica, 2017, 43 (9): 1520- 1531.
|
13 |
|
14 |
|
15 |
|
16 |
|
17 |
|
18 |
GIAKKOUPIS G, KERMARREC A M, WOELFEL P. Gossip protocols for renaming and sorting[C]//Proceedings of the 27th International Symposium. Berlin, Germany: Springer, 2013: 194-208.
|
19 |
|
20 |
ANDROULAKI E, BARGER A, BORTNIKOV V, et al. Hyperledger Fabric: a distributed operating system for permissioned blockchains[EB/OL]. [2023-06-27]. https://arxiv.org/abs/1801.10228.pdf.
|
21 |
KUSHWAHA R, KULKARNI S, SINGH Y N. Generalized distance metric for different DHT routing algorithms in peer-to-peer networks[EB/OL]. [2023-06-27]. https://arxiv.org/abs/2303.13965.pdf.
|
22 |
RATNASAMY S, FRANCIS P, HANDLEY M, et al. A scalable content-addressable network. ACM SIGCOMM Computer Communication Review, 2001, 31 (4): 161- 172.
doi: 10.1145/964723.383072
|
23 |
MAYMOUNKOV P, MAZIÈRES D. Kademlia: a peer-to-peer information system based on the XOR metric. Berlin, Germany: Springer, 2002.
|
24 |
|
25 |
KLONOWSKI M, PIOTROWSKA A M. Light-weight and secure aggregation protocols based on Bloom filters. Computers & Security, 2018, 72, 107- 121.
|
26 |
|
27 |
武岳, 李军祥. 区块链P2P网络协议演进过程. 计算机应用研究, 2019, 36 (10): 2881-2886, 2929.
|
|
WU Y, LI J X. Evolution process of blockchain P2P network protocol. Application Research of Computers, 2019, 36 (10): 2881-2886, 2929.
|
28 |
DEMERS A, GREENE D, HOUSER C, et al. Epidemic algorithms for replicated database maintenance. ACM SIGOPS Operating Systems Review, 1988, 22 (1): 8- 32.
doi: 10.1145/43921.43922
|
29 |
BERENDEA N, MERCIER H, ONICA E, et al. Fair and efficient gossip in Hyperledger Fabric[C]//Proceedings of the 40th International Conference on Distributed Computing Systems. Washington D. C., USA: IEEE Press, 2020: 190-200.
|
30 |
|
31 |
|
32 |
LUU L, VELNER Y, TEUTSCH J, et al. Smartpool: practical decentralized pooled mining[C]//Proceedings of the 26th USENIX Security Symposium. Berkeley, USA: USENIX Association, 2017: 1409-1426.
|
33 |
|
34 |
|
35 |
|
36 |
|
37 |
|
38 |
|
39 |
|
40 |
|
41 |
魏松杰, 吕伟龙, 李莎莎. 区块链公链应用的典型安全问题综述. 软件学报, 2022, 33 (1): 324- 355.
|
|
WEI S J, LÜ W L, LI S S. Overview on typical security problems in public blockchain applications. Journal of Software, 2022, 33 (1): 324- 355.
|
42 |
|
43 |
王贺立, 闫巧. 基于交易记录特征的自私挖矿检测方案. 网络与信息安全学报, 2023, 9 (2): 104- 114.
|
|
WANG H L, YAN Q. Selfish mining detection scheme based on the characters of transactions. Chinese Journal of Network and Information Security, 2023, 9 (2): 104- 114.
|
44 |
NAYAK K, KUMAR S, MILLER A, et al. Stubborn mining: generalizing selfish mining and combining with an eclipse attack[C]//Proceedings of 2016 IEEE European Symposium on Security and Privacy. Washington D. C., USA: IEEE Press, 2016: 305-320.
|
45 |
|
46 |
SAPIRSHTEIN A, SOMPOLINSKY Y, ZOHAR A. Optimal selfish mining strategies in bitcoin. Berlin, Germany: Springer, 2017.
|
47 |
HEILMAN E, KENDLER A, ZOHAR A. Eclipse attacks on Bitcoin's peer-to-peer network[C]//Proceedings of the 24th USENIX Conference on Security Symposium. Washington D. C., USA: IEEE Press, 2015: 129-144.
|
48 |
阮娜, 刘汉卿, 斯雪明. 采用工作量证明共识机制的区块链中挖矿攻击者间的"鲶鱼效应". 计算机学报, 2021, 44 (1): 177- 192.
|
|
RUAN N, LIU H Q, SI X M. Catfish effect between selfish miners in proof-of-work based blockchain. Chinese Journal of Computers, 2021, 44 (1): 177- 192.
|
49 |
LEE S, KIM S. Rethinking selfish mining under pooled mining. ICT Express, 2023, 9 (3): 356- 361.
doi: 10.1016/j.icte.2022.03.003
|
50 |
NIKHALAT-JAHROMI A, SAGHIRI A M, MEYBODI M R. Nik defense: an artificial intelligence based defense mechanism against selfish mining in bitcoin[EB/OL]. [2023-06-27]. https://arxiv.org/abs/2301.11463.pdf.
|
51 |
SINGH S, SALIM M, CHO M, et al. Smart contract-based pool hopping attack prevention for blockchain networks. Symmetry, 2019, 11 (7): 941.
doi: 10.3390/sym11070941
|
52 |
|
53 |
LIU K Y, OHSAWA Y. Auction based rewards distribution method in pool mining[C]//Proceedings of the 1st International Electronics Communication Conference. New York, USA: ACM Press, 2019: 103-110.
|
54 |
|
55 |
|
56 |
|
57 |
|
58 |
|
59 |
BAG S, RUJ S, SAKURAI K. Bitcoin block withholding attack: analysis and mitigation. IEEE Transactions on Information Forensics and Security, 2017, 12 (8): 1967- 1978.
doi: 10.1109/TIFS.2016.2623588
|
60 |
|
61 |
BAG S, SAKURAI K. Yet another note on block withholding attack on bitcoin mining pools. Berlin, Germany: Springer, 2016.
|
62 |
田国华, 胡云瀚, 陈晓峰. 区块链系统攻击与防御技术研究进展. 软件学报, 2021, 32 (5): 1495- 1525.
|
|
TIAN G H, HU Y H, CHEN X F. Research progress on attack and defense techniques in block-chain system. Journal of Software, 2021, 32 (5): 1495- 1525.
|
63 |
|
64 |
|