首页 > 最新文献

2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)最新文献

英文 中文
Shellproof: More Efficient Zero-Knowledge Proofs for Confidential Transactions in Blockchain 防壳:区块链中机密交易的更有效的零知识证明
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169437
Xianfeng Li, Chongjian Xu, Qinglin Zhao
Blockchain-based cryptocurrencies enable decentralization in transaction systems. The transaction details of traditional cryptocurrencies, e.g. Bitcoin, are public to everyone, which can be a problem in confidential scenarios. To deal with the confidential problem, some current cryptocurrencies adopt confidential transactions to hide the details in proofs. Among all confidential transaction implementations, Bulletproof is the most efficient approach without a trusted setup. In this paper, we analyze Bulletproof’s design and show that the computation cost can be further reduced. Based on our analysis, we propose Shellproof, which is only half of the computation cost of Bulletproof. Experimental results show Shellproof can preserve the advantages of Bulletproof and is much more efficient than Bulletproof.
基于区块链的加密货币实现了交易系统的去中心化。传统加密货币(如比特币)的交易细节对所有人都是公开的,这在保密情况下可能是一个问题。为了解决保密问题,目前一些加密货币采用保密交易来隐藏证明中的细节。在所有机密事务实现中,防弹是不需要可信设置的最有效的方法。本文对Bulletproof的设计进行了分析,表明其计算成本可以进一步降低。根据我们的分析,我们提出了Shellproof,它的计算成本只有Bulletproof的一半。实验结果表明,防弹技术既保留了防弹技术的优点,又大大提高了防弹技术的效率。
{"title":"Shellproof: More Efficient Zero-Knowledge Proofs for Confidential Transactions in Blockchain","authors":"Xianfeng Li, Chongjian Xu, Qinglin Zhao","doi":"10.1109/ICBC48266.2020.9169437","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169437","url":null,"abstract":"Blockchain-based cryptocurrencies enable decentralization in transaction systems. The transaction details of traditional cryptocurrencies, e.g. Bitcoin, are public to everyone, which can be a problem in confidential scenarios. To deal with the confidential problem, some current cryptocurrencies adopt confidential transactions to hide the details in proofs. Among all confidential transaction implementations, Bulletproof is the most efficient approach without a trusted setup. In this paper, we analyze Bulletproof’s design and show that the computation cost can be further reduced. Based on our analysis, we propose Shellproof, which is only half of the computation cost of Bulletproof. Experimental results show Shellproof can preserve the advantages of Bulletproof and is much more efficient than Bulletproof.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Formalizing Correct-by-Construction Casper in Coq Coq中按结构更正Casper的正规化
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169468
Elaine Li, Traian-Florin Serbanuta, Denisa Diaconescu, Vlad-Andrei Zamfir, Grigore Roşu
Correct-by-Construction Casper (CBC Casper) is an Ethereum candidate consensus protocol undergoing active design and development. We present a formalization of CBC Casper using the Coq proof assistant that includes a model of the consensus protocol and proofs of safety and non-triviality protocol properties. We leverage Coq's type classes to model CBC Casper at various levels of abstraction. In doing so, we 1) illuminate the assumptions that each protocol property depends on, and 2) reformulate the protocol in general, mathematical terms. We highlight two advantages of our approach: 1) from a proof engineering perspective, it enables a clean separation of concerns between theory and implementation; 2) from a protocol engineering perspective, it provides a rigorous, foundational understanding of the protocol conducive to finding and proving stronger properties. We detail one such new property: strong non-triviality.
CBC Casper (Correct-by-Construction Casper)是一个正在积极设计和开发的以太坊候选共识协议。我们使用Coq证明助手提出了CBC Casper的形式化,其中包括共识协议的模型以及安全性和非琐碎性协议属性的证明。我们利用Coq的类型类在不同的抽象层次上对CBC Casper建模。在此过程中,我们1)阐明了每个协议属性所依赖的假设,2)用一般的数学术语重新表述了协议。我们强调了我们的方法的两个优点:1)从证明工程的角度来看,它使理论和实现之间的关注点清晰分离;2)从协议工程的角度来看,它提供了对协议的严格、基础的理解,有助于发现和证明更强的属性。我们详细介绍一个这样的新性质:强非平凡性。
{"title":"Formalizing Correct-by-Construction Casper in Coq","authors":"Elaine Li, Traian-Florin Serbanuta, Denisa Diaconescu, Vlad-Andrei Zamfir, Grigore Roşu","doi":"10.1109/ICBC48266.2020.9169468","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169468","url":null,"abstract":"Correct-by-Construction Casper (CBC Casper) is an Ethereum candidate consensus protocol undergoing active design and development. We present a formalization of CBC Casper using the Coq proof assistant that includes a model of the consensus protocol and proofs of safety and non-triviality protocol properties. We leverage Coq's type classes to model CBC Casper at various levels of abstraction. In doing so, we 1) illuminate the assumptions that each protocol property depends on, and 2) reformulate the protocol in general, mathematical terms. We highlight two advantages of our approach: 1) from a proof engineering perspective, it enables a clean separation of concerns between theory and implementation; 2) from a protocol engineering perspective, it provides a rigorous, foundational understanding of the protocol conducive to finding and proving stronger properties. We detail one such new property: strong non-triviality.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121373976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Crypto Terminal: A New Open Device For Securing Blockchain Wallets 加密终端:保护区块链钱包的新开放设备
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169410
P. Urien
This poster introduces the Crypto Terminal, a new open device for securing blockchain wallets. This device includes a processor, a touch screen, a removable smartcard, and a Bluetooth Low Energy (BLE) module. Smartcard is the core security, it manages cryptographic procedures and keys. The terminal is bare metal, i.e. its firmware and the BLE firmware can be erased and uploaded at anytime. The software integrity of the programmer that performs these operations is checked by an innovative integrity probe. A use case is illustrated with a smartphone.
这张海报介绍了加密终端,这是一种用于保护区块链钱包的新开放设备。该设备包括一个处理器、一个触摸屏、一个可移动智能卡和一个低功耗蓝牙(BLE)模块。智能卡是安全的核心,它管理加密程序和密钥。终端是裸机,即其固件和BLE固件可以随时擦除和上传。执行这些操作的程序员的软件完整性通过创新的完整性探针进行检查。用智能手机来说明一个用例。
{"title":"Crypto Terminal: A New Open Device For Securing Blockchain Wallets","authors":"P. Urien","doi":"10.1109/ICBC48266.2020.9169410","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169410","url":null,"abstract":"This poster introduces the Crypto Terminal, a new open device for securing blockchain wallets. This device includes a processor, a touch screen, a removable smartcard, and a Bluetooth Low Energy (BLE) module. Smartcard is the core security, it manages cryptographic procedures and keys. The terminal is bare metal, i.e. its firmware and the BLE firmware can be erased and uploaded at anytime. The software integrity of the programmer that performs these operations is checked by an innovative integrity probe. A use case is illustrated with a smartphone.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Hardening Permissioned Blockchains with Verifiable Randomness 强化具有可验证随机性的许可区块链
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169471
Artem Barger, Yacov Manevich, Hagar Meir
Permissioned blockchains are networks with identifiable participants. A prominent example is Hyperledger Fabric, that introduces the execute-order-validate architecture. The execution phase enables defining application level trust assumption by setting an endorsement policy, namely a set of rules that define the peers (affiliated with organizations) who provide attestation of transaction correctness. Since the organizations hosting those peers might collude or be compromised, the number of organizations required by the endorsement policy is often increased to reduce susceptibility to attacks. However, doing so impairs the performance of the system and is impractical in networks comprising of a large number of organizations. In this paper we propose an alternative endorsement protocol that hardens the system’s security without hindering performance. We provide a quantitative analysis of the suggested technique, and show that by incorporating verified randomness in endorsement policies, attacks that are based on collusion or malicious peers are effectively mitigated with overwhelming probability.
许可区块链是具有可识别参与者的网络。一个突出的例子是Hyperledger Fabric,它引入了执行-订单-验证架构。执行阶段通过设置背书策略来定义应用程序级别的信任假设,即一组定义提供事务正确性证明的对等体(隶属于组织)的规则。由于托管这些对等点的组织可能串通或受到损害,因此通常会增加背书策略所需的组织数量,以减少对攻击的易感性。然而,这样做会损害系统的性能,并且在由大量组织组成的网络中是不切实际的。在本文中,我们提出了一种替代背书协议,该协议在不影响性能的情况下加强了系统的安全性。我们对所建议的技术进行了定量分析,并表明通过在背书策略中加入经过验证的随机性,基于串通或恶意对等体的攻击以压倒性的概率有效地减轻了。
{"title":"Hardening Permissioned Blockchains with Verifiable Randomness","authors":"Artem Barger, Yacov Manevich, Hagar Meir","doi":"10.1109/ICBC48266.2020.9169471","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169471","url":null,"abstract":"Permissioned blockchains are networks with identifiable participants. A prominent example is Hyperledger Fabric, that introduces the execute-order-validate architecture. The execution phase enables defining application level trust assumption by setting an endorsement policy, namely a set of rules that define the peers (affiliated with organizations) who provide attestation of transaction correctness. Since the organizations hosting those peers might collude or be compromised, the number of organizations required by the endorsement policy is often increased to reduce susceptibility to attacks. However, doing so impairs the performance of the system and is impractical in networks comprising of a large number of organizations. In this paper we propose an alternative endorsement protocol that hardens the system’s security without hindering performance. We provide a quantitative analysis of the suggested technique, and show that by incorporating verified randomness in endorsement policies, attacks that are based on collusion or malicious peers are effectively mitigated with overwhelming probability.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
ICBC 2020 Keynotes 工商银行2020主题演讲
Pub Date : 2020-05-01 DOI: 10.1109/icbc48266.2020.9169459
{"title":"ICBC 2020 Keynotes","authors":"","doi":"10.1109/icbc48266.2020.9169459","DOIUrl":"https://doi.org/10.1109/icbc48266.2020.9169459","url":null,"abstract":"","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distributed Fractionalized Data Networks For Data Integrity 用于数据完整性的分布式分块数据网络
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169392
A. Majumdar, Govind Mohan
The world is being transformed by the onset of new high speed 5G Technologies that open the possibility of IoT networks at scale. This demands delivery guarantees and coordinated distributed communications that are resistant to damage and can self-heal under adversity. The speed of change is increasing with increased automation, artificial intelligence, information from multiple sources, integrated systems of systems and emerging quantum technologies. Current distributed consensus checking mechanisms are computationally intensive and fail to scale along with these changes because of the complexity of proof of work calculations or the unnecessary need to bind in domain specific elements such as cryptocurrencies. Furthermore, these mechanisms are brittle in that small changes in messages can cause restarts or failure of integrity checks, or they introduce domain specific elements (e.g. monetary design that has little to do with integrity). We propose distributed ledgers as a pure technology coupled with a strong proof protocol for exchanges, called "Proof of Integrity" without any need for cryptocurrencies or other domain specific elements. Proof of Integrity provides distributed data guarantees and operational continuity through adversity or breakdowns while creating a reliable and trustworthy layer for the application specificity of domain specific elements.
新的高速5G技术的出现正在改变世界,它开启了大规模物联网网络的可能性。这就要求交付保证和协调的分布式通信能够抵抗破坏,并能在逆境中自我修复。随着自动化、人工智能、多源信息、系统的集成系统和新兴量子技术的发展,变化的速度正在加快。目前的分布式共识检查机制是计算密集型的,并且由于工作量证明计算的复杂性或不必要的绑定特定领域元素(如加密货币)而无法随着这些变化而扩展。此外,这些机制是脆弱的,因为消息中的微小变化可能导致重新启动或完整性检查失败,或者它们引入了特定领域的元素(例如与完整性几乎没有关系的货币设计)。我们建议将分布式账本作为一种纯粹的技术,与一种强大的交换证明协议相结合,称为“完整性证明”,而不需要加密货币或其他特定领域的元素。完整性证明提供了分布式数据保证和在逆境或故障时的操作连续性,同时为领域特定元素的应用特异性创建了可靠和可信的层。
{"title":"Distributed Fractionalized Data Networks For Data Integrity","authors":"A. Majumdar, Govind Mohan","doi":"10.1109/ICBC48266.2020.9169392","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169392","url":null,"abstract":"The world is being transformed by the onset of new high speed 5G Technologies that open the possibility of IoT networks at scale. This demands delivery guarantees and coordinated distributed communications that are resistant to damage and can self-heal under adversity. The speed of change is increasing with increased automation, artificial intelligence, information from multiple sources, integrated systems of systems and emerging quantum technologies. Current distributed consensus checking mechanisms are computationally intensive and fail to scale along with these changes because of the complexity of proof of work calculations or the unnecessary need to bind in domain specific elements such as cryptocurrencies. Furthermore, these mechanisms are brittle in that small changes in messages can cause restarts or failure of integrity checks, or they introduce domain specific elements (e.g. monetary design that has little to do with integrity). We propose distributed ledgers as a pure technology coupled with a strong proof protocol for exchanges, called \"Proof of Integrity\" without any need for cryptocurrencies or other domain specific elements. Proof of Integrity provides distributed data guarantees and operational continuity through adversity or breakdowns while creating a reliable and trustworthy layer for the application specificity of domain specific elements.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114894418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Mining blocks in a row: A statistical study of fairness in Bitcoin mining 连续挖矿:比特币挖矿公平性的统计研究
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169436
Sheng-Nan Li, Zhao Yang, C. Tessone
The Bitcoin system keeps its ledger consistent in a blockchain by solving cryptographic problems, in a method called "Proof-of-Work". The conventional wisdom asserts that the mining protocol is incentive-compatible. However, Eyal and Sirer in 2014 have discovered a mining attack strategy called selfish mining (SM), in which a miner (or a mining pool) publishes the blocks it mines selectively instead of immediately. SM strategy would have the impact of wasting resources of honest miners. Scholars proposed various extensions of the SM strategy and approaches to defense the SM attack. Whether selfish mining occurs in practice or not, has been subject of extensive debate. For the first time, in this paper we propose a method to identify selfish miners by detecting anomalies in the properties of consecutive blocks’ statistics. Furthermore, we extend our method to detect the mining cartels, in which miners secretly get together and share timely information. Our results provide evidence that these strategic behaviors take place in practice.
比特币系统通过解决加密问题,以一种称为“工作量证明”的方法,在区块链中保持其分类账的一致性。传统观点认为,挖矿协议是激励兼容的。然而,Eyal和Sirer在2014年发现了一种名为“自私挖矿”(self mining, SM)的挖矿攻击策略,即矿工(或矿池)选择性地发布其挖出的区块,而不是立即发布。SM策略会造成诚实矿工资源的浪费。学者们提出了SM策略的各种扩展和防御SM攻击的方法。自私采矿在实践中是否存在,一直是广泛争论的主题。在本文中,我们首次提出了一种通过检测连续区块统计属性中的异常来识别自私矿工的方法。在此基础上,将该方法扩展到矿工秘密聚集并及时共享信息的挖矿卡特尔的检测中。我们的研究结果为这些战略行为在实践中发生提供了证据。
{"title":"Mining blocks in a row: A statistical study of fairness in Bitcoin mining","authors":"Sheng-Nan Li, Zhao Yang, C. Tessone","doi":"10.1109/ICBC48266.2020.9169436","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169436","url":null,"abstract":"The Bitcoin system keeps its ledger consistent in a blockchain by solving cryptographic problems, in a method called \"Proof-of-Work\". The conventional wisdom asserts that the mining protocol is incentive-compatible. However, Eyal and Sirer in 2014 have discovered a mining attack strategy called selfish mining (SM), in which a miner (or a mining pool) publishes the blocks it mines selectively instead of immediately. SM strategy would have the impact of wasting resources of honest miners. Scholars proposed various extensions of the SM strategy and approaches to defense the SM attack. Whether selfish mining occurs in practice or not, has been subject of extensive debate. For the first time, in this paper we propose a method to identify selfish miners by detecting anomalies in the properties of consecutive blocks’ statistics. Furthermore, we extend our method to detect the mining cartels, in which miners secretly get together and share timely information. Our results provide evidence that these strategic behaviors take place in practice.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Reasonableness discussion and analysis for Hyperledger Fabric configuration Hyperledger Fabric配置的合理性讨论与分析
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169444
Song Hua, Shenbin Zhang, Bingfeng Pi, Jun Sun, K. Yamashita, Yoshihide Nomura
Blockchain, as a distributed ledger technology, becomes more and more popular in both industry and academia. Hyperledger Fabric is permissioned blockchain platform hosted by Linux foundation. Fabric has various components such as peer, ordering service, chaincode and state database. The structure of Fabric network is very complicated to provide reliable permissioned blockchain service. Generally, developers must deal with hundreds of parameters to configure a network. That will cause many reasonableness problems in configurations. In this paper, we focus on how to detect reasonableness problems in Fabric configurations. Firstly, we discuss and provide a reasonableness problem knowledge database based on the perspectives of functionality, security and performance. Secondly, we implemented a detect tool for reasonableness check to Fabric. Finally, we collect 108 sample networks as the testing dataset in the experiment. The result shows our tool can help developers to locate reasonableness problems and understand their network better.
区块链作为一种分布式账本技术,在产业界和学术界都越来越受欢迎。Hyperledger Fabric是由Linux基金会托管的许可区块链平台。Fabric有各种组件,如peer、订购服务、链码和状态数据库。Fabric网络的结构非常复杂,无法提供可靠的许可区块链服务。通常,开发人员必须处理数百个参数来配置网络。这将在配置中引起许多合理性问题。本文主要研究如何检测Fabric配置中的合理性问题。首先,我们从功能、安全性和性能的角度讨论并提供了一个合理的问题知识库。其次,我们实现了一个对Fabric进行合理性检查的检测工具。最后,我们收集了108个样本网络作为实验的测试数据集。结果表明,该工具可以帮助开发人员定位合理的问题,更好地了解他们的网络。
{"title":"Reasonableness discussion and analysis for Hyperledger Fabric configuration","authors":"Song Hua, Shenbin Zhang, Bingfeng Pi, Jun Sun, K. Yamashita, Yoshihide Nomura","doi":"10.1109/ICBC48266.2020.9169444","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169444","url":null,"abstract":"Blockchain, as a distributed ledger technology, becomes more and more popular in both industry and academia. Hyperledger Fabric is permissioned blockchain platform hosted by Linux foundation. Fabric has various components such as peer, ordering service, chaincode and state database. The structure of Fabric network is very complicated to provide reliable permissioned blockchain service. Generally, developers must deal with hundreds of parameters to configure a network. That will cause many reasonableness problems in configurations. In this paper, we focus on how to detect reasonableness problems in Fabric configurations. Firstly, we discuss and provide a reasonableness problem knowledge database based on the perspectives of functionality, security and performance. Secondly, we implemented a detect tool for reasonableness check to Fabric. Finally, we collect 108 sample networks as the testing dataset in the experiment. The result shows our tool can help developers to locate reasonableness problems and understand their network better.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129837882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Smart Contract Protocol for Authenticity and Compliance with Anonymity on Hyperledger Fabric 超级账本结构上的真实性和匿名性智能合约协议
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169401
Rishi Saket, N. Singh, Pankaj Dayama, Vinayaka Pandit
We consider a new class of business-to-business (B2B) blockchain applications that require the execution of specific subroutines to simultaneously satisfy authenticity, compliance, and anonymity. Existing blockchain smart contract protocols do not, either directly or with minor modifications, ensure all the three properties. We present the ACAn smart contract protocol guaranteeing authenticity and compliance over a set of anonymous (unlinkable) subroutine executions. ACAn achieves this through a novel combination of zero-knowledge proofs and multiple Merkle-Tree commitments. We specifically focus on implementing ACAn on Hyperledger Fabric, a popular platform for B2B blockchain applications, which processes transactions in the execute-order-commit framework. The latter, however, leads to performance degradation due to read-write conflicts arising out of multiple clients independently executing the ACAn protocol. We propose enhancements to Hyperledger Fabric’s smart contract API to support deferred changes to the shared ledger, allowing us to adapt ACAn so that such conflicts are effectively resolved. Our work provides evidence of significant performance gains due to the proposed enhancements, as well as experimental evaluation of the protocol’s privacy preserving components.
我们考虑了一类新的企业对企业(B2B)区块链应用程序,它需要执行特定的子程序来同时满足真实性、合规性和匿名性。现有的区块链智能合约协议,无论是直接还是稍加修改,都不能确保所有这三个属性。我们提出了ACAn智能合约协议,保证了一组匿名(不可链接)子例程执行的真实性和合规性。ACAn通过零知识证明和多个默克尔树承诺的新颖组合来实现这一点。我们特别专注于在Hyperledger Fabric上实现ACAn, Hyperledger Fabric是B2B区块链应用程序的流行平台,它在执行-订单-提交框架中处理交易。但是,后者会导致性能下降,因为多个客户端独立执行ACAn协议会产生读写冲突。我们建议对Hyperledger Fabric的智能合约API进行增强,以支持对共享账本的延迟更改,从而使我们能够适应ACAn,从而有效解决此类冲突。我们的工作提供了由于提出的增强以及对协议的隐私保护组件的实验评估而显着提高性能的证据。
{"title":"Smart Contract Protocol for Authenticity and Compliance with Anonymity on Hyperledger Fabric","authors":"Rishi Saket, N. Singh, Pankaj Dayama, Vinayaka Pandit","doi":"10.1109/ICBC48266.2020.9169401","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169401","url":null,"abstract":"We consider a new class of business-to-business (B2B) blockchain applications that require the execution of specific subroutines to simultaneously satisfy authenticity, compliance, and anonymity. Existing blockchain smart contract protocols do not, either directly or with minor modifications, ensure all the three properties. We present the ACAn smart contract protocol guaranteeing authenticity and compliance over a set of anonymous (unlinkable) subroutine executions. ACAn achieves this through a novel combination of zero-knowledge proofs and multiple Merkle-Tree commitments. We specifically focus on implementing ACAn on Hyperledger Fabric, a popular platform for B2B blockchain applications, which processes transactions in the execute-order-commit framework. The latter, however, leads to performance degradation due to read-write conflicts arising out of multiple clients independently executing the ACAn protocol. We propose enhancements to Hyperledger Fabric’s smart contract API to support deferred changes to the shared ledger, allowing us to adapt ACAn so that such conflicts are effectively resolved. Our work provides evidence of significant performance gains due to the proposed enhancements, as well as experimental evaluation of the protocol’s privacy preserving components.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Incorruptible Auditing: Blockchain-Powered Graph Database Management 不可破坏的审计:区块链驱动的图形数据库管理
Pub Date : 2020-05-01 DOI: 10.1109/ICBC48266.2020.9169431
Victor Ermolaev, Indrek Klangberg, Y. Madhwal, Silver Vapper, Sjoerd Wels, Y. Yanovich
In modern and interconnected world, information is accumulatively stored digitally, making the process of exchanging, gathering and querying the information much easier. Continuously, it has introduced new challenges about how to ensure its consistency and reliability due to the sheer volume of data. A blockchain-based information system can provide an incorruptible record of history, enabling better auditing and data management practices. The paper describes how to combine an Exonum blockchain and a Neo4j graph database into a system that can provide a verifiable audit trail of data integrity and its modifications for information stored in a graph database.
在互联互通的现代世界中,信息以数字方式积累存储,使得信息的交换、收集和查询过程变得更加容易。由于庞大的数据量,它不断地为如何确保其一致性和可靠性带来新的挑战。基于区块链的信息系统可以提供不可破坏的历史记录,从而实现更好的审计和数据管理实践。本文描述了如何将Exonum区块链和Neo4j图形数据库结合到一个系统中,该系统可以提供数据完整性的可验证审计跟踪及其对存储在图形数据库中的信息的修改。
{"title":"Incorruptible Auditing: Blockchain-Powered Graph Database Management","authors":"Victor Ermolaev, Indrek Klangberg, Y. Madhwal, Silver Vapper, Sjoerd Wels, Y. Yanovich","doi":"10.1109/ICBC48266.2020.9169431","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169431","url":null,"abstract":"In modern and interconnected world, information is accumulatively stored digitally, making the process of exchanging, gathering and querying the information much easier. Continuously, it has introduced new challenges about how to ensure its consistency and reliability due to the sheer volume of data. A blockchain-based information system can provide an incorruptible record of history, enabling better auditing and data management practices. The paper describes how to combine an Exonum blockchain and a Neo4j graph database into a system that can provide a verifiable audit trail of data integrity and its modifications for information stored in a graph database.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
期刊
2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1