首页 > 最新文献

Cryptographic Primitives in Blockchain Technology最新文献

英文 中文
Bitcoin
Pub Date : 2020-09-10 DOI: 10.1093/oso/9780198862840.003.0007
Andreas Bolfing
Bitcoin was proposed by Nakamoto (2008) as the first electronic payment system, which fully relies on cryptographic primitives in order to work over a purely peer-to-peer system, where everyone can participate in spending funds to other users without the need for a trusted third party. This chapter first introduces the basic ideas of Satoshi Nakamoto, who defined an electronic coin as a chain of digital signatures. It explains how the addresses in Bitcoin are derived, and how the elliptic curve cryptography (ECC) key pair is used in order to transact funds from one user to another. For this, it shows how the transactions are constructed in Bitcoin, based on the most common transaction, which is the Pay-to-Public-Key-Hash transaction. The last section then shows how the transactions are permanently stored in the public ledger, the blockchain, and how the miners solve the Proof-of-Work in order to safeguard the records.
比特币是由中本聪(2008)提出的,作为第一个电子支付系统,它完全依赖于加密原语,以便在一个纯粹的点对点系统上工作,每个人都可以参与向其他用户支付资金,而不需要可信的第三方。本章首先介绍了中本聪的基本思想,他将电子货币定义为数字签名链。它解释了比特币中的地址是如何衍生的,以及如何使用椭圆曲线加密(ECC)密钥对来从一个用户到另一个用户进行资金交易。为此,它展示了如何基于最常见的交易(即付费到公钥哈希交易)在比特币中构建交易。最后一节展示了交易如何永久存储在公共分类账区块链中,以及矿工如何解决工作量证明以保护记录。
{"title":"Bitcoin","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0007","DOIUrl":"https://doi.org/10.1093/oso/9780198862840.003.0007","url":null,"abstract":"Bitcoin was proposed by Nakamoto (2008) as the first electronic payment system, which fully relies on cryptographic primitives in order to work over a purely peer-to-peer system, where everyone can participate in spending funds to other users without the need for a trusted third party. This chapter first introduces the basic ideas of Satoshi Nakamoto, who defined an electronic coin as a chain of digital signatures. It explains how the addresses in Bitcoin are derived, and how the elliptic curve cryptography (ECC) key pair is used in order to transact funds from one user to another. For this, it shows how the transactions are constructed in Bitcoin, based on the most common transaction, which is the Pay-to-Public-Key-Hash transaction. The last section then shows how the transactions are permanently stored in the public ledger, the blockchain, and how the miners solve the Proof-of-Work in order to safeguard the records.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124458850","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Distributed Systems 分布式系统
Pub Date : 2020-09-10 DOI: 10.1093/oso/9780198862840.003.0005
Andreas Bolfing
Chapter 5 considers distributed systems by their properties. The first section studies the classification of software systems, which is usually distinguished in centralized, decentralized and distributed systems. It studies the differences between these three major approaches, showing there is a rather multidimensional classification instead of a linear one. The most important case are distributed systems that enable spreading of computational tasks across several autonomous, independently acting computational entities. A very important result of this case is the CAP theorem that considers the trade-off between consistency, availability and partition tolerance. The last section deals with the possibility to reach consensus in distributed systems, discussing how fault tolerant consensus mechanisms enable mutual agreement among the individual entities in presence of failures. One very special case are so-called Byzantine failures that are discussed in great detail. The main result is the so-called FLP Impossibility Result which states that there is no deterministic algorithm that guarantees solution to the consensus problem in the asynchronous case. The chapter concludes by considering practical solutions that circumvent the impossibility result in order to reach consensus.
第5章根据分布式系统的性质来考虑它们。第一部分研究了软件系统的分类,通常分为集中式、分散式和分布式系统。它研究了这三种主要方法之间的差异,表明存在一种多维分类而不是线性分类。最重要的例子是分布式系统,它允许在几个自治的、独立的计算实体之间传播计算任务。这种情况的一个非常重要的结果是CAP定理,它考虑了一致性、可用性和分区容忍度之间的权衡。最后一节讨论在分布式系统中达成共识的可能性,讨论容错共识机制如何在存在故障的情况下使各个实体之间达成相互协议。一个非常特殊的例子是所谓的拜占庭式失败,我们对此进行了详细的讨论。主要结果是所谓的FLP不可能结果,该结果表明在异步情况下,没有确定性算法保证解决共识问题。本章最后考虑了规避不可能结果以达成共识的实际解决办法。
{"title":"Distributed Systems","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0005","DOIUrl":"https://doi.org/10.1093/oso/9780198862840.003.0005","url":null,"abstract":"Chapter 5 considers distributed systems by their properties. The first section studies the classification of software systems, which is usually distinguished in centralized, decentralized and distributed systems. It studies the differences between these three major approaches, showing there is a rather multidimensional classification instead of a linear one. The most important case are distributed systems that enable spreading of computational tasks across several autonomous, independently acting computational entities. A very important result of this case is the CAP theorem that considers the trade-off between consistency, availability and partition tolerance. The last section deals with the possibility to reach consensus in distributed systems, discussing how fault tolerant consensus mechanisms enable mutual agreement among the individual entities in presence of failures. One very special case are so-called Byzantine failures that are discussed in great detail. The main result is the so-called FLP Impossibility Result which states that there is no deterministic algorithm that guarantees solution to the consensus problem in the asynchronous case. The chapter concludes by considering practical solutions that circumvent the impossibility result in order to reach consensus.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134336939","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preliminaries 预赛
Pub Date : 2020-09-10 DOI: 10.1093/oso/9780198862840.003.0002
Andreas Bolfing
Blockchains are heavily based on mathematical concepts, in particular on algebraic structures. This chapter starts with an introduction to the main aspects in number theory, such as the divisibility of integers, prime numbers and Euler’s totient function. Based on these basics, it follows a very detailed introduction to modern algebra, including group theory, ring theory and field theory. The algebraic main results are then applied to describe the structure of cyclic groups and finite fields, which are needed to construct cryptographic primitives. The chapter closes with an introduction to complexity theory, examining the efficiency of algorithms.
区块链在很大程度上基于数学概念,特别是代数结构。本章首先介绍数论的主要方面,如整数的可整除性、素数和欧拉的全局性函数。基于这些基础知识,它将非常详细地介绍现代代数,包括群论、环理论和场论。然后将代数主要结果应用于描述构造密码原语所需的循环群和有限域的结构。本章以复杂性理论的介绍结束,检查算法的效率。
{"title":"Preliminaries","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0002","DOIUrl":"https://doi.org/10.1093/oso/9780198862840.003.0002","url":null,"abstract":"Blockchains are heavily based on mathematical concepts, in particular on algebraic structures. This chapter starts with an introduction to the main aspects in number theory, such as the divisibility of integers, prime numbers and Euler’s totient function. Based on these basics, it follows a very detailed introduction to modern algebra, including group theory, ring theory and field theory. The algebraic main results are then applied to describe the structure of cyclic groups and finite fields, which are needed to construct cryptographic primitives. The chapter closes with an introduction to complexity theory, examining the efficiency of algorithms.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127636533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Introduction to Blockchain Technology 区块链技术简介
Pub Date : 2020-09-10 DOI: 10.1093/oso/9780198862840.003.0006
Andreas Bolfing
This chapter gives an introduction to blockchain technology which was proposed by the pseudonymous Nakamoto (2008) with his well-known Bitcoin paper to enable online payments in a decentralized digital cash system, solving the double-spending problem where someone can make two payments with the same coin. The chapter starts with an informal outline of the application of a blockchain and a brief explanation of how a blockchain network is able to reach consensus about the common state of a transaction history. Furthermore, it introduces the Proof-of-Work (PoW) algorithmwhich needs to be donein order to extend the blockchain with new blocks. Since the PoW is a very costly computational algorithm, the transaction data is stored in previous blocks resistant to modification, and thus the PoW safeguards the order of blocks, forming a tamper-proof history of transactions. As a last step, it examines the double-spending attack, which is a fundamental attack to the integrity of a blockchain based system.
本章介绍了区块链技术,该技术是由化名中本聪(2008)和他著名的比特币论文提出的,用于在分散的数字现金系统中实现在线支付,解决了双重支出问题,即某人可以用同一枚硬币进行两次支付。本章以一个非正式的区块链应用概述开始,并简要解释了区块链网络如何能够就交易历史的共同状态达成共识。此外,它还引入了工作量证明(PoW)算法,需要完成该算法才能用新块扩展区块链。由于PoW是一种非常昂贵的计算算法,交易数据存储在先前的不可修改的块中,因此PoW保护了块的顺序,形成了交易的防篡改历史。作为最后一步,它研究了双重支出攻击,这是对基于区块链的系统完整性的基本攻击。
{"title":"Introduction to Blockchain Technology","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0006","DOIUrl":"https://doi.org/10.1093/oso/9780198862840.003.0006","url":null,"abstract":"This chapter gives an introduction to blockchain technology which was proposed by the pseudonymous Nakamoto (2008) with his well-known Bitcoin paper to enable online payments in a decentralized digital cash system, solving the double-spending problem where someone can make two payments with the same coin. The chapter starts with an informal outline of the application of a blockchain and a brief explanation of how a blockchain network is able to reach consensus about the common state of a transaction history. Furthermore, it introduces the Proof-of-Work (PoW) algorithmwhich needs to be donein order to extend the blockchain with new blocks. Since the PoW is a very costly computational algorithm, the transaction data is stored in previous blocks resistant to modification, and thus the PoW safeguards the order of blocks, forming a tamper-proof history of transactions. As a last step, it examines the double-spending attack, which is a fundamental attack to the integrity of a blockchain based system.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116785993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Conclusions 结论
Pub Date : 2020-09-10 DOI: 10.1093/oso/9780198862840.003.0011
Andreas Bolfing
This final chapter gives a short summary of the contents of the book and represents some important lessons about the security considerations of the cryptography used in blockchain systems.
最后一章简要总结了本书的内容,并代表了关于区块链系统中使用的加密技术的安全考虑的一些重要教训。
{"title":"Conclusions","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0011","DOIUrl":"https://doi.org/10.1093/oso/9780198862840.003.0011","url":null,"abstract":"This final chapter gives a short summary of the contents of the book and represents some important lessons about the security considerations of the cryptography used in blockchain systems.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122330685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic Primitives 加密原语
Pub Date : 2020-09-10 DOI: 10.1093/oso/9780198862840.003.0003
Andreas Bolfing
This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.
本章对密码学进行了非常详细的介绍。首先介绍了密码学的基础知识,介绍了基于单向和陷门函数的公钥加密的概念,并考虑了整数分解、离散对数和椭圆曲线方案这三种主要的公钥加密族。随后介绍了用于构建默克尔树和数字签名方案的哈希函数。由于现代密码方案通常基于椭圆曲线,本章介绍了基于椭圆曲线离散对数问题(ECDLP)的椭圆曲线密码。考虑了ECDLP的硬度和可能的攻击,给出了如何寻找合适的域参数来构造加密强的椭圆曲线。接着讨论了现行标准所推荐的椭圆曲线域参数。最后,介绍了椭圆曲线数字签名算法(ECDSA),即椭圆曲线数字签名方案。
{"title":"Cryptographic Primitives","authors":"Andreas Bolfing","doi":"10.1093/oso/9780198862840.003.0003","DOIUrl":"https://doi.org/10.1093/oso/9780198862840.003.0003","url":null,"abstract":"This chapter provides a very detailed introduction to cryptography. It first explains the cryptographic basics and introduces the concept of public-key encryption which is based on one-way and trapdoor functions, considering the three major public-key encryption families like integer factorization, discrete logarithm and elliptic curve schemes. This is followed by an introduction to hash functions which are applied to construct Merkle trees and digital signature schemes. As modern cryptoschemes are commonly based on elliptic curves, the chapter then introduces elliptic curve cryptography which is based on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It considers the hardness of the ECDLP and the possible attacks against it, showing how to find suitable domain parameters to construct cryptographically strong elliptic curves. This is followed by the discussion of elliptic curve domain parameters which are recommended by current standards. Finally, it introduces the Elliptic Curve Digital Signature Algorithm (ECDSA), the elliptic curve digital signature scheme.","PeriodicalId":202275,"journal":{"name":"Cryptographic Primitives in Blockchain Technology","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114867853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Cryptographic Primitives in Blockchain Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1