首页 > 最新文献

IET Blockchain最新文献

英文 中文
Development and Research of the Methodology for Improving the Proof-of-Work Blockchain Technology by Implementing Dynamic Clustering of Network Nodes
Pub Date : 2025-03-04 DOI: 10.1049/blc2.70006
Diana Soloviova, Svitlana Antoshchuk, Viktor Boltenkov

In this paper, a methodology for optimizing the proof-of-work (PoW) blockchain technology based on dynamic node clustering to reduce transaction time is proposed. A blockchain network modeling system that implements the approach of dynamic node distribution into clusters, allowing the system to be divided into subsystems was developed and implemented. An alternative consensus concept for more efficient interaction between network nodes was proposed. The results of the study demonstrate that the cluster structure improves network performance: it increases the number of transactions per second by 0.02 transactions, reduces the average transaction time by 1.67 s, increases throughput by 0.2 transactions, reduces latency by 1.667 s, and significantly reduces the overall energy consumption of the system (reduction by 5122 energy units). These data confirm the potential of the proposed approach for a wide range of practical applications.

{"title":"Development and Research of the Methodology for Improving the Proof-of-Work Blockchain Technology by Implementing Dynamic Clustering of Network Nodes","authors":"Diana Soloviova,&nbsp;Svitlana Antoshchuk,&nbsp;Viktor Boltenkov","doi":"10.1049/blc2.70006","DOIUrl":"https://doi.org/10.1049/blc2.70006","url":null,"abstract":"<p>In this paper, a methodology for optimizing the proof-of-work (PoW) blockchain technology based on dynamic node clustering to reduce transaction time is proposed. A blockchain network modeling system that implements the approach of dynamic node distribution into clusters, allowing the system to be divided into subsystems was developed and implemented. An alternative consensus concept for more efficient interaction between network nodes was proposed. The results of the study demonstrate that the cluster structure improves network performance: it increases the number of transactions per second by 0.02 transactions, reduces the average transaction time by 1.67 s, increases throughput by 0.2 transactions, reduces latency by 1.667 s, and significantly reduces the overall energy consumption of the system (reduction by 5122 energy units). These data confirm the potential of the proposed approach for a wide range of practical applications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70006","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143554260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks
Pub Date : 2025-03-01 DOI: 10.1049/blc2.70005
Prerna Arote, Joy Kuri

The Payment Channel Network is widely recognized as one of the most effective solutions for handling off-chain transactions and addressing blockchain scalability challenges. In the Lightning Network, a popular off-chain mechanism, multi-hop payments are facilitated through Hashed Time-Locked Contracts (HTLCs). However, despite its broad adoption, HTLCs are susceptible to various attacks, such as Fakey, Griefing, and Wormhole attacks. In these attacks, adversaries aim to disrupt transaction throughput by exhausting channel capacity or stealing routing fees from honest nodes along the payment path. We propose a scheme called CommTLC, which leverages Pedersen commitments and signatures to detect and punish/prevent adversaries in Fakey, Griefing and Wormhole attacks. We implement the proposed scheme and analyse its security within the universal composability (UC) framework. Additionally, we compare the performance of CommTLC with the latest schemes, MAPPCN-OR and EAMHL+. The results demonstrate that CommTLC outperforms both MAPPCN-OR and EAMHL+ in communication overhead, with only a slight increase in computational overhead compared to MAPPCN-OR. Furthermore, the adversary detection time for Fakey, Griefing and Wormhole attacks using CommTLC is reduced to just a few milliseconds—specifically, less than 112 ms for a payment path involving five users.

{"title":"CommTLC: An Alternative to Reduce the Attack Surface of HTLCs in Lightning Networks","authors":"Prerna Arote,&nbsp;Joy Kuri","doi":"10.1049/blc2.70005","DOIUrl":"https://doi.org/10.1049/blc2.70005","url":null,"abstract":"<p>The Payment Channel Network is widely recognized as one of the most effective solutions for handling off-chain transactions and addressing blockchain scalability challenges. In the Lightning Network, a popular off-chain mechanism, multi-hop payments are facilitated through Hashed Time-Locked Contracts (HTLCs). However, despite its broad adoption, HTLCs are susceptible to various attacks, such as Fakey, Griefing, and Wormhole attacks. In these attacks, adversaries aim to disrupt transaction throughput by exhausting channel capacity or stealing routing fees from honest nodes along the payment path. We propose a scheme called CommTLC, which leverages Pedersen commitments and signatures to detect and punish/prevent adversaries in Fakey, Griefing and Wormhole attacks. We implement the proposed scheme and analyse its security within the universal composability (UC) framework. Additionally, we compare the performance of CommTLC with the latest schemes, MAPPCN-OR and EAMHL+. The results demonstrate that CommTLC outperforms both MAPPCN-OR and EAMHL+ in communication overhead, with only a slight increase in computational overhead compared to MAPPCN-OR. Furthermore, the adversary detection time for Fakey, Griefing and Wormhole attacks using CommTLC is reduced to just a few milliseconds—specifically, less than 112 ms for a payment path involving five users.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70005","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143527691","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark-Based Grid Environment
Pub Date : 2025-02-14 DOI: 10.1049/blc2.70004
Gangasandra Mahadevaiah Kiran, Narasimaiah Nalini

Grid computing is an emerging technology that enables the heterogeneous collection of data and provision of services to users. Due to the high amount of incoming heterogeneous requests, grid computing needs efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements. For that purpose, we proposed the SprakGrid method to reduce execution time and satisfy SLA, and QoS requirements. The proposed work includes four consecutive phases which are explained as follows, in first we perform user authentication to ensure the legitimacy of the users using the elliptic curve-based chaos theory algorithm which generates a secret key and stores it in the blockchain. In the second we perform query scheduling for resource discovery using the soft actor critic algorithm by considering 3P's parameters which is performed by spark environment that schedules optimal resources based on the service request. Third, we perform a risk assessment and request dropping, in which the risk nodes of workers are evaluated by the master node. To address the resource wastage by attackers, this research dynamically evaluates the risk value using Shannon entropy. Based on the risk assessment the requests are classified into two classes such as normal and malicious. Fourth we perform service live migration, in which the malicious requests are dropped and normal requests are migrated from the source node to the target node using multi-constraints based emperor penguin optimization. Finally, simulation is performed by GridSim and the simulation results demonstrate that the proposed SparkGrid method achieves superior performance compared to other state-of-the-art methods.

{"title":"SparkGrid: Blockchain Assisted Secure Query Scheduling and Dynamic Risk Assessment for Live Migration of Services in Apache Spark-Based Grid Environment","authors":"Gangasandra Mahadevaiah Kiran,&nbsp;Narasimaiah Nalini","doi":"10.1049/blc2.70004","DOIUrl":"https://doi.org/10.1049/blc2.70004","url":null,"abstract":"<p>Grid computing is an emerging technology that enables the heterogeneous collection of data and provision of services to users. Due to the high amount of incoming heterogeneous requests, grid computing needs efficient scheduling to reduce execution time and satisfy service level agreement (SLA) and quality of service (QoS) requirements. For that purpose, we proposed the SprakGrid method to reduce execution time and satisfy SLA, and QoS requirements. The proposed work includes four consecutive phases which are explained as follows, in first we perform user authentication to ensure the legitimacy of the users using the elliptic curve-based chaos theory algorithm which generates a secret key and stores it in the blockchain. In the second we perform query scheduling for resource discovery using the soft actor critic algorithm by considering 3P's parameters which is performed by spark environment that schedules optimal resources based on the service request. Third, we perform a risk assessment and request dropping, in which the risk nodes of workers are evaluated by the master node. To address the resource wastage by attackers, this research dynamically evaluates the risk value using Shannon entropy. Based on the risk assessment the requests are classified into two classes such as normal and malicious. Fourth we perform service live migration, in which the malicious requests are dropped and normal requests are migrated from the source node to the target node using multi-constraints based emperor penguin optimization. Finally, simulation is performed by GridSim and the simulation results demonstrate that the proposed SparkGrid method achieves superior performance compared to other state-of-the-art methods.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70004","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143404484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A research and enhancement strategy for detecting counterfeit medications utilizing blockchain technology
Pub Date : 2025-02-05 DOI: 10.1049/blc2.70003
Sumit Kumar, Ritika Mehra, Himani Sivaraman, Umang Garg

The production, distribution of the counterfeit drugs are the major issue in today's world. These drugs create a big economic crunch in today's economic world. The major concern now days the counterfeit of drug is increasing day by day. Counterfeit refers to the fake medicine which is now increasing. In 2020 where all the countries are suffering from counterfeit of medicine. The article discusses about how the secure transaction of drug can be made to the all suppliers. Blockchain is a distributed technology where all the transaction made is transparent. All the transaction made in blockchain will be stored with all the network that relate to the blockchain network. Blockchain contain the concept of hash function. Hash function works like linked list it contains the address of previous node and the next node also. Hash function contain the hexadecimal value. With the implementation of blockchain technology and hyperledger framework it can be able to detect the counterfeit of drug in the early stage. If it is found in the early stage the supply of counterfeit of drug in the pharmaceutical industry like hospitals, pharmacy shops can be stopped. To make the supply of drug secure the hyperledger framework of blockchain is implemented.

{"title":"A research and enhancement strategy for detecting counterfeit medications utilizing blockchain technology","authors":"Sumit Kumar,&nbsp;Ritika Mehra,&nbsp;Himani Sivaraman,&nbsp;Umang Garg","doi":"10.1049/blc2.70003","DOIUrl":"https://doi.org/10.1049/blc2.70003","url":null,"abstract":"<p>The production, distribution of the counterfeit drugs are the major issue in today's world. These drugs create a big economic crunch in today's economic world. The major concern now days the counterfeit of drug is increasing day by day. Counterfeit refers to the fake medicine which is now increasing. In 2020 where all the countries are suffering from counterfeit of medicine. The article discusses about how the secure transaction of drug can be made to the all suppliers. Blockchain is a distributed technology where all the transaction made is transparent. All the transaction made in blockchain will be stored with all the network that relate to the blockchain network. Blockchain contain the concept of hash function. Hash function works like linked list it contains the address of previous node and the next node also. Hash function contain the hexadecimal value. With the implementation of blockchain technology and hyperledger framework it can be able to detect the counterfeit of drug in the early stage. If it is found in the early stage the supply of counterfeit of drug in the pharmaceutical industry like hospitals, pharmacy shops can be stopped. To make the supply of drug secure the hyperledger framework of blockchain is implemented.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70003","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Medical data analysis and transaction type prediction using machine learning and blockchain technology
Pub Date : 2025-01-29 DOI: 10.1049/blc2.70001
Shruti Maheshwari, Pramod Kumar Jain, Noor T. Al-Sharify, Swagata Ghosh, Dhanraj Dubey, Gagandeep Kaur

In the world of healthcare, joining machine learning with block chain tech offers a smart path for future predictions. The study aims on guessing what kinds of transactions happen in healthcare data stored on a block chain. Machine learning is used to sort these transactions right. This helps make healthcare tasks work on their own and do better. Health data is taken from block chains, looked at it closely, and ran various algorithms on it. Using features such as operation, date, and symbolic indicators, logistic regression, decision tree, random forest, and support vector machine are applied to classify transaction types. The decision tree algorithm achieved the highest accuracy at 89.29%, followed by random forest at 67.86%, logistic regression at 33.93%, and support vector machine at 39.29%. The findings demonstrate the effectiveness of machine learning in improving transaction classification within secure, decentralized medical data environments.

{"title":"Medical data analysis and transaction type prediction using machine learning and blockchain technology","authors":"Shruti Maheshwari,&nbsp;Pramod Kumar Jain,&nbsp;Noor T. Al-Sharify,&nbsp;Swagata Ghosh,&nbsp;Dhanraj Dubey,&nbsp;Gagandeep Kaur","doi":"10.1049/blc2.70001","DOIUrl":"https://doi.org/10.1049/blc2.70001","url":null,"abstract":"<p>In the world of healthcare, joining machine learning with block chain tech offers a smart path for future predictions. The study aims on guessing what kinds of transactions happen in healthcare data stored on a block chain. Machine learning is used to sort these transactions right. This helps make healthcare tasks work on their own and do better. Health data is taken from block chains, looked at it closely, and ran various algorithms on it. Using features such as operation, date, and symbolic indicators, logistic regression, decision tree, random forest, and support vector machine are applied to classify transaction types. The decision tree algorithm achieved the highest accuracy at 89.29%, followed by random forest at 67.86%, logistic regression at 33.93%, and support vector machine at 39.29%. The findings demonstrate the effectiveness of machine learning in improving transaction classification within secure, decentralized medical data environments.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70001","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120820","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in healthcare: Bridging the business value and patient benefit
Pub Date : 2025-01-28 DOI: 10.1049/blc2.70000
Pavlina Kröckel, Nilmini Wickramasinghe, Jule van de Logt, Amir Andargoli, Nalika Ulapane, Freimut Bodendorf

In today's rapidly evolving technological landscape, the healthcare industry is a pivotal sector that demands continuous innovation. Although extensive research on blockchain technology exists, the literature has predominantly emphasized technical aspects and specific applications within industries. However, a comprehensive exploration of blockchain's business and patient value in healthcare remains limited. This study aims to address this gap by conducting a systematic literature review using the PRISMA framework, analyzing highly cited articles from reputable journals. The findings highlight blockchain's potential to revolutionize patient care and optimize business practices within the healthcare sector. This research provides valuable insights for stakeholders, emphasizing the transformative power of blockchain technology to foster innovation, particularly in public healthcare institutions. The results are presented through a value chain analysis and a mindmap, offering a clear framework that can guide researchers and developers in considering the value of blockchain use cases from multiple perspectives.

{"title":"Blockchain in healthcare: Bridging the business value and patient benefit","authors":"Pavlina Kröckel,&nbsp;Nilmini Wickramasinghe,&nbsp;Jule van de Logt,&nbsp;Amir Andargoli,&nbsp;Nalika Ulapane,&nbsp;Freimut Bodendorf","doi":"10.1049/blc2.70000","DOIUrl":"https://doi.org/10.1049/blc2.70000","url":null,"abstract":"<p>In today's rapidly evolving technological landscape, the healthcare industry is a pivotal sector that demands continuous innovation. Although extensive research on blockchain technology exists, the literature has predominantly emphasized technical aspects and specific applications within industries. However, a comprehensive exploration of blockchain's business and patient value in healthcare remains limited. This study aims to address this gap by conducting a systematic literature review using the PRISMA framework, analyzing highly cited articles from reputable journals. The findings highlight blockchain's potential to revolutionize patient care and optimize business practices within the healthcare sector. This research provides valuable insights for stakeholders, emphasizing the transformative power of blockchain technology to foster innovation, particularly in public healthcare institutions. The results are presented through a value chain analysis and a mindmap, offering a clear framework that can guide researchers and developers in considering the value of blockchain use cases from multiple perspectives.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70000","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Empowering the adoption of blockchain-based cryptocurrency as a payment method: A user-friendly educational approach
Pub Date : 2025-01-28 DOI: 10.1049/blc2.70002
Ahmed Alrehaili, Martin White, Natalia Beloff

Organizations are adopting technological innovations to transform payment systems due to challenges with traditional methods, such as slow speed and high fees. These challenges have prompted a shift towards blockchain-based cryptocurrencies. However, cryptocurrency adoption for payments remains limited, especially in Saudi Arabia. This study adapts the technology acceptance model to explore cryptocurrency adoption through the blockchain-based cryptocurrency as a payment method in Saudi Arabia (BCAP-SA) model. Factors within the model are assessed using an experimental vignette-task methodology and surveys. A key component is an educational package, offering comprehensive materials to explain blockchain technology. The findings confirm the reliability of surveys. Most model factors are statistically significant in influencing users’ intention to use cryptocurrency. The study finds that perceived ease of use, perceived usefulness, and perceived trust significantly impact participants’ intentions. Additionally, low transaction fees and age are the most influential factors on the technology acceptance model's core constructs. Statistical analysis indicates that decentralization and anonymity were insignificant and thus excluded from the revised BCAP-SA model. These findings highlight the potential to enhance cryptocurrency adoption in Saudi Arabia. The study's insights can guide strategies to promote wider cryptocurrency usage in the region.

{"title":"Empowering the adoption of blockchain-based cryptocurrency as a payment method: A user-friendly educational approach","authors":"Ahmed Alrehaili,&nbsp;Martin White,&nbsp;Natalia Beloff","doi":"10.1049/blc2.70002","DOIUrl":"https://doi.org/10.1049/blc2.70002","url":null,"abstract":"<p>Organizations are adopting technological innovations to transform payment systems due to challenges with traditional methods, such as slow speed and high fees. These challenges have prompted a shift towards blockchain-based cryptocurrencies. However, cryptocurrency adoption for payments remains limited, especially in Saudi Arabia. This study adapts the technology acceptance model to explore cryptocurrency adoption through the blockchain-based cryptocurrency as a payment method in Saudi Arabia (BCAP-SA) model. Factors within the model are assessed using an experimental vignette-task methodology and surveys. A key component is an educational package, offering comprehensive materials to explain blockchain technology. The findings confirm the reliability of surveys. Most model factors are statistically significant in influencing users’ intention to use cryptocurrency. The study finds that perceived ease of use, perceived usefulness, and perceived trust significantly impact participants’ intentions. Additionally, low transaction fees and age are the most influential factors on the technology acceptance model's core constructs. Statistical analysis indicates that decentralization and anonymity were insignificant and thus excluded from the revised BCAP-SA model. These findings highlight the potential to enhance cryptocurrency adoption in Saudi Arabia. The study's insights can guide strategies to promote wider cryptocurrency usage in the region.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.70002","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143120317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and implementation of solvency proof system based on zero knowledge proofs
Pub Date : 2025-01-24 DOI: 10.1049/blc2.12089
Siyu Chen, Renhong Diao, Jiali Xu

The aim of this study is to design and implement a system that allows centralized blockchain institutions to prove their solvency. This system ensures that institutions do not misappropriate user assets and enhances trust between users and institutions. The article introduces the Groth-16 zero-knowledge proof algorithm from ZK-SNARK (zero-knowledge succinct non-interactive argument of knowledge). The R1CS arithmetic circuit in the Groth-16 algorithm effectively guarantees the authenticity and tamper-resistance of the system's raw data sources. Additionally, it combines the use of Merkle Sum Trees and Sparse Merkle trees. The former enables users to perform distributed verification of solvency proofs, while the latter effectively hides the overall number of users. Finally, users verify the balances and the private key signatures of addresses in the institution's bulletin board. Together, these components form a comprehensive and distributed solvency proof solution. This solution is a pioneering solution in the field of blockchain solvency proofs and provides a secure, efficient, and privacy-preserving method for centralized cryptocurrency service providers or Web3 enterprise custodians. It effectively addresses the challenge of proving an institution's possession of sufficient reserves to cover user assets without compromising user privacy or disclosing the institution's scale.

{"title":"Design and implementation of solvency proof system based on zero knowledge proofs","authors":"Siyu Chen,&nbsp;Renhong Diao,&nbsp;Jiali Xu","doi":"10.1049/blc2.12089","DOIUrl":"https://doi.org/10.1049/blc2.12089","url":null,"abstract":"<p>The aim of this study is to design and implement a system that allows centralized blockchain institutions to prove their solvency. This system ensures that institutions do not misappropriate user assets and enhances trust between users and institutions. The article introduces the Groth-16 zero-knowledge proof algorithm from ZK-SNARK (zero-knowledge succinct non-interactive argument of knowledge). The R1CS arithmetic circuit in the Groth-16 algorithm effectively guarantees the authenticity and tamper-resistance of the system's raw data sources. Additionally, it combines the use of Merkle Sum Trees and Sparse Merkle trees. The former enables users to perform distributed verification of solvency proofs, while the latter effectively hides the overall number of users. Finally, users verify the balances and the private key signatures of addresses in the institution's bulletin board. Together, these components form a comprehensive and distributed solvency proof solution. This solution is a pioneering solution in the field of blockchain solvency proofs and provides a secure, efficient, and privacy-preserving method for centralized cryptocurrency service providers or Web3 enterprise custodians. It effectively addresses the challenge of proving an institution's possession of sufficient reserves to cover user assets without compromising user privacy or disclosing the institution's scale.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12089","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143118621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Towards quantum-safe blockchain: Exploration of PQC and public-key recovery on embedded systems
Pub Date : 2025-01-17 DOI: 10.1049/blc2.12094
Dominik Marchsreiter

Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public-key cryptography makes it vulnerable to quantum computing threats. This article addresses the urgent need for quantum-safe blockchain solutions by integrating post-quantum cryptography (PQC) into blockchain frameworks. Utilizing algorithms from the NIST PQC standardization process, it is aimed to fortify blockchain security and resilience, particularly for IoT and embedded systems. Despite the importance of PQC, its implementation in blockchain systems tailored for embedded environments remains underexplored. A quantum-secure blockchain architecture is proposed, evaluating various PQC primitives and optimizing transaction sizes through techniques such as public-key recovery for Falcon, achieving up to 17% reduction in transaction size. The analysis identifies Falcon-512 as the most suitable algorithm for quantum-secure blockchains in computer-based environments and XMSS as a viable but unsatisfactory stateful alternative. However, for embedded-based blockchains, Dilithium demonstrates a higher transactions-per-second (TPS) rate compared to Falcon, primarily due to Falcon's slower signing performance on ARM CPUs. This highlights the signing time as a critical limiting factor within embedded blockchains. Additionally, smart contract functionality is integrated, assessing the impact of PQC on smart contract authentication. The findings demonstrate the feasibility and practicality, paving the way for robust and future-proof IoT applications.

{"title":"Towards quantum-safe blockchain: Exploration of PQC and public-key recovery on embedded systems","authors":"Dominik Marchsreiter","doi":"10.1049/blc2.12094","DOIUrl":"https://doi.org/10.1049/blc2.12094","url":null,"abstract":"<p>Blockchain technology ensures accountability, transparency, and redundancy, but its reliance on public-key cryptography makes it vulnerable to quantum computing threats. This article addresses the urgent need for quantum-safe blockchain solutions by integrating post-quantum cryptography (PQC) into blockchain frameworks. Utilizing algorithms from the NIST PQC standardization process, it is aimed to fortify blockchain security and resilience, particularly for IoT and embedded systems. Despite the importance of PQC, its implementation in blockchain systems tailored for embedded environments remains underexplored. A quantum-secure blockchain architecture is proposed, evaluating various PQC primitives and optimizing transaction sizes through techniques such as public-key recovery for Falcon, achieving up to 17% reduction in transaction size. The analysis identifies Falcon-512 as the most suitable algorithm for quantum-secure blockchains in computer-based environments and XMSS as a viable but unsatisfactory stateful alternative. However, for embedded-based blockchains, Dilithium demonstrates a higher transactions-per-second (TPS) rate compared to Falcon, primarily due to Falcon's slower signing performance on ARM CPUs. This highlights the signing time as a critical limiting factor within embedded blockchains. Additionally, smart contract functionality is integrated, assessing the impact of PQC on smart contract authentication. The findings demonstrate the feasibility and practicality, paving the way for robust and future-proof IoT applications.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12094","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143116147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain in the banking industry: Unravelling thematic drivers and proposing a technological framework through systematic review with bibliographic network mapping
Pub Date : 2025-01-02 DOI: 10.1049/blc2.12093
S. M. Masudur Rahman, Abu Naser Mohammad Saif, Sadman Kabir, Md. Fakhrudoza Bari, Md. Mahabub Alom, Md. Johir Rayhan, Fangfang Zan, Mingyue Chu, Ashis Talukder

In the new era of adopting and managing new and robust technologies in banking, the use of blockchain technology has significantly transformed overall banking systems. To add new insights to the body of existing knowledge, the authors conducted a systematic review with bibliographic network mapping to identify and analyse the factors contributing to adopting blockchain in the banking industry. Following the latest protocols of the PRISMA flowchart, this study acknowledged 16 relevant publications from 2590 papers in the databases, namely Scopus, ScienceDirect, Web of Science, and IEEE Xplore. The bibliographic data were grouped and analysed using VOSviewer to create network visualization maps that included citation and co-citation, bibliographic coupling, co-authorship, and co-occurrence of terms. Subsequently, significant terms were identified through the analyses and compared with those found in the 16 relevant papers. The aggregate findings suggest that multiple influencing factors have been recognized and later categorized into three thematic drivers: transparency-driven security, collaborative interoperability, and organizational infrastructure. The current research provides valuable insights for policymakers, technologists, researchers, consultants, and practitioners of information systems by proposing a technological framework, which will aid in developing tailored strategies to facilitate the sustainable practice of blockchain in the banking industry to a wider extent.

{"title":"Blockchain in the banking industry: Unravelling thematic drivers and proposing a technological framework through systematic review with bibliographic network mapping","authors":"S. M. Masudur Rahman,&nbsp;Abu Naser Mohammad Saif,&nbsp;Sadman Kabir,&nbsp;Md. Fakhrudoza Bari,&nbsp;Md. Mahabub Alom,&nbsp;Md. Johir Rayhan,&nbsp;Fangfang Zan,&nbsp;Mingyue Chu,&nbsp;Ashis Talukder","doi":"10.1049/blc2.12093","DOIUrl":"https://doi.org/10.1049/blc2.12093","url":null,"abstract":"<p>In the new era of adopting and managing new and robust technologies in banking, the use of blockchain technology has significantly transformed overall banking systems. To add new insights to the body of existing knowledge, the authors conducted a systematic review with bibliographic network mapping to identify and analyse the factors contributing to adopting blockchain in the banking industry. Following the latest protocols of the PRISMA flowchart, this study acknowledged 16 relevant publications from 2590 papers in the databases, namely Scopus, ScienceDirect, Web of Science, and IEEE Xplore. The bibliographic data were grouped and analysed using VOSviewer to create network visualization maps that included citation and co-citation, bibliographic coupling, co-authorship, and co-occurrence of terms. Subsequently, significant terms were identified through the analyses and compared with those found in the 16 relevant papers. The aggregate findings suggest that multiple influencing factors have been recognized and later categorized into three thematic drivers: transparency-driven security, collaborative interoperability, and organizational infrastructure. The current research provides valuable insights for policymakers, technologists, researchers, consultants, and practitioners of information systems by proposing a technological framework, which will aid in developing tailored strategies to facilitate the sustainable practice of blockchain in the banking industry to a wider extent.</p>","PeriodicalId":100650,"journal":{"name":"IET Blockchain","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/blc2.12093","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143110953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
IET Blockchain
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1