首页 > 最新文献

Blockchain-Research and Applications最新文献

英文 中文
DeFi risk assessment: MakerDAO loan portfolio case DeFi风险评估:MakerDAO贷款组合案例
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100259
Ignat Melnikov , Irina Lebedeva , Artem Petrov , Yury Yanovich
Decentralized finance (DeFi) is a rapidly evolving blockchain technology that offers a new perspective on financial services through Web3 applications. DeFi offers developers the flexibility to create financial services using smart contracts, leading to a lack of standardized protocols and challenges in applying traditional finance models for risk assessment, especially in the early stages of adoption. The Maker protocol is a prominent DeFi platform known for its diverse functionalities, including loan services. This study focuses on analyzing the risk associated with Maker's loan portfolio by developing a risk model based on multiple Brownian motions and passage levels, with Brownian motions representing different collateral types and passage levels representing users' collateralization ratios. Through numerical experiments using artificial and real data, we evaluate the model's effectiveness in assessing risk within the loan portfolio. While our findings demonstrate the model's potential for assessing risk within a single DeFi project, it is important to acknowledge that the model's assumptions may not be fully applicable to real-world data. This research underscores the importance of developing project-specific risk assessment models for individual DeFi projects and encourages further exploration of other DeFi protocols.
去中心化金融(DeFi)是一种快速发展的区块链技术,它通过Web3应用程序为金融服务提供了新的视角。DeFi为开发人员提供了使用智能合约创建金融服务的灵活性,导致缺乏标准化协议,并且在应用传统金融模型进行风险评估方面存在挑战,特别是在采用的早期阶段。Maker协议是一个著名的DeFi平台,以其多种功能而闻名,包括贷款服务。本研究重点分析了Maker贷款组合的风险,建立了基于多个布朗运动和通道水平的风险模型,其中布朗运动代表不同的抵押品类型,通道水平代表用户的抵押比率。通过使用人工数据和真实数据的数值实验,我们评估了该模型在评估贷款组合风险方面的有效性。虽然我们的研究结果证明了该模型在单个DeFi项目中评估风险的潜力,但重要的是要承认该模型的假设可能并不完全适用于现实世界的数据。本研究强调了为单个DeFi项目开发特定于项目的风险评估模型的重要性,并鼓励进一步探索其他DeFi协议。
{"title":"DeFi risk assessment: MakerDAO loan portfolio case","authors":"Ignat Melnikov ,&nbsp;Irina Lebedeva ,&nbsp;Artem Petrov ,&nbsp;Yury Yanovich","doi":"10.1016/j.bcra.2024.100259","DOIUrl":"10.1016/j.bcra.2024.100259","url":null,"abstract":"<div><div>Decentralized finance (DeFi) is a rapidly evolving blockchain technology that offers a new perspective on financial services through Web3 applications. DeFi offers developers the flexibility to create financial services using smart contracts, leading to a lack of standardized protocols and challenges in applying traditional finance models for risk assessment, especially in the early stages of adoption. The Maker protocol is a prominent DeFi platform known for its diverse functionalities, including loan services. This study focuses on analyzing the risk associated with Maker's loan portfolio by developing a risk model based on multiple Brownian motions and passage levels, with Brownian motions representing different collateral types and passage levels representing users' collateralization ratios. Through numerical experiments using artificial and real data, we evaluate the model's effectiveness in assessing risk within the loan portfolio. While our findings demonstrate the model's potential for assessing risk within a single DeFi project, it is important to acknowledge that the model's assumptions may not be fully applicable to real-world data. This research underscores the importance of developing project-specific risk assessment models for individual DeFi projects and encourages further exploration of other DeFi protocols.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100259"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144190436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function 基于变色龙哈希函数的原子和隐私保护循环交叉链协议
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100262
Mengyan Li, Maoning Wang, Meijiao Duan
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze transaction paths, thereby causing privacy breaches and financial loss to users in some sensitive scenarios. To prevent payment path leakage, a privacy-preserving cyclic cross-chain protocol is proposed herein. This protocol primarily uses the Chameleon Hash (CH) protocol to obscure the correlation between users in the path, ensuring the privacy of cross-chain swaps. The protocol is divided into pre-swap, commit, and decommit phases. The pre-swap phase is firstly executed to determine the swap order. Then, users ensure atomicity via serial asset locking in the commit phase, and each receiver obtains swap assets from the corresponding sender via CH collision in the decommit phase. The security proof under the Universally Composable (UC) system demonstrates the correctness and usability of the protocol. In summary, the entire protocol ensures the atomicity and privacy of cross-chain swaps, providing a new principle and method to solve the privacy leakage problem caused by transaction path analysis.
近年来,基于区块链的数字资产越来越多,需要跨链交换。哈希时间锁合约(HTLC)是一种广泛使用的交换协议;但是,简单的散列时间锁可以允许攻击者分析事务路径,从而在某些敏感场景中给用户造成隐私泄露和经济损失。为了防止支付路径泄露,本文提出了一种保护隐私的循环跨链协议。该协议主要使用变色龙哈希(Chameleon Hash, CH)协议来模糊路径中用户之间的相关性,确保跨链交换的隐私性。该协议分为预交换、提交和解除提交阶段。首先执行预交换阶段以确定交换顺序。然后,用户在提交阶段通过串行资产锁定确保原子性,每个接收方在解提交阶段通过CH碰撞从相应的发送方获得交换资产。通用可组合(UC)系统下的安全性证明证明了该协议的正确性和可用性。综上所述,整个协议保证了跨链交换的原子性和隐私性,为解决交易路径分析带来的隐私泄露问题提供了新的原理和方法。
{"title":"Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function","authors":"Mengyan Li,&nbsp;Maoning Wang,&nbsp;Meijiao Duan","doi":"10.1016/j.bcra.2024.100262","DOIUrl":"10.1016/j.bcra.2024.100262","url":null,"abstract":"<div><div>Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze transaction paths, thereby causing privacy breaches and financial loss to users in some sensitive scenarios. To prevent payment path leakage, a privacy-preserving cyclic cross-chain protocol is proposed herein. This protocol primarily uses the Chameleon Hash (CH) protocol to obscure the correlation between users in the path, ensuring the privacy of cross-chain swaps. The protocol is divided into pre-swap, commit, and decommit phases. The pre-swap phase is firstly executed to determine the swap order. Then, users ensure atomicity via serial asset locking in the commit phase, and each receiver obtains swap assets from the corresponding sender via CH collision in the decommit phase. The security proof under the Universally Composable (UC) system demonstrates the correctness and usability of the protocol. In summary, the entire protocol ensures the atomicity and privacy of cross-chain swaps, providing a new principle and method to solve the privacy leakage problem caused by transaction path analysis.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100262"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta reinforcement learning based dynamic tuning for blockchain systems in diverse network environments 基于元强化学习的区块链系统在不同网络环境下的动态调谐
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100261
Yue Pei , Mengxiao Zhu , Chen Zhu , Weihu Song , Yi Sun , Lei Li , Haogang Zhu
The evolution of blockchain technology across various areas has highlighted the importance of optimizing blockchain systems' performance, especially in fluctuating network bandwidth conditions. We observe that the performance of blockchain systems exhibits variations, and the optimal parameter configuration shifts accordingly when changes in network bandwidth occur. Current methods in blockchain optimization require establishing fixed mappings between various environments and their optimal parameters. However, this process exhibits poor sample efficiency and lacks the ability for fast adaptation to novel bandwidth environments. In this paper, we propose MetaTune, a meta-Reinforcement-Learning (meta-RL)-based dynamic tuning method for blockchain systems. MetaTune can quickly adapt to unknown bandwidth changes and automatically configure optimized parameters. Through empirical evaluations of a real-world blockchain system, ChainMaker, we demonstrate that MetaTune significantly reduces the training samples needed for generalization across different bandwidth environments compared to non-adaptive methods. Our findings suggest that MetaTune offers a promising approach for efficiently optimizing blockchain systems in dynamic network environments.
区块链技术在各个领域的发展突出了优化区块链系统性能的重要性,特别是在波动的网络带宽条件下。我们观察到区块链系统的性能表现出变化,当网络带宽发生变化时,最优参数配置也会发生相应的变化。目前区块链优化方法需要在各种环境及其最优参数之间建立固定的映射关系。然而,该方法的采样效率较差,缺乏对新带宽环境的快速适应能力。在本文中,我们提出了一种基于元强化学习(meta-RL)的区块链系统动态调谐方法MetaTune。MetaTune可以快速适应未知的带宽变化,自动配置优化参数。通过对现实世界的区块链系统ChainMaker的经验评估,我们证明了与非自适应方法相比,MetaTune显着减少了在不同带宽环境下泛化所需的训练样本。我们的研究结果表明,MetaTune为在动态网络环境中有效优化区块链系统提供了一种有前途的方法。
{"title":"Meta reinforcement learning based dynamic tuning for blockchain systems in diverse network environments","authors":"Yue Pei ,&nbsp;Mengxiao Zhu ,&nbsp;Chen Zhu ,&nbsp;Weihu Song ,&nbsp;Yi Sun ,&nbsp;Lei Li ,&nbsp;Haogang Zhu","doi":"10.1016/j.bcra.2024.100261","DOIUrl":"10.1016/j.bcra.2024.100261","url":null,"abstract":"<div><div>The evolution of blockchain technology across various areas has highlighted the importance of optimizing blockchain systems' performance, especially in fluctuating network bandwidth conditions. We observe that the performance of blockchain systems exhibits variations, and the optimal parameter configuration shifts accordingly when changes in network bandwidth occur. Current methods in blockchain optimization require establishing fixed mappings between various environments and their optimal parameters. However, this process exhibits poor sample efficiency and lacks the ability for fast adaptation to novel bandwidth environments. In this paper, we propose MetaTune, a meta-Reinforcement-Learning (meta-RL)-based dynamic tuning method for blockchain systems. MetaTune can quickly adapt to unknown bandwidth changes and automatically configure optimized parameters. Through empirical evaluations of a real-world blockchain system, ChainMaker, we demonstrate that MetaTune significantly reduces the training samples needed for generalization across different bandwidth environments compared to non-adaptive methods. Our findings suggest that MetaTune offers a promising approach for efficiently optimizing blockchain systems in dynamic network environments.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100261"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: On the security of non-fungible tokens SoK:关于不可替代代币的安全性
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100268
Kai Ma , Jintao Huang , Ningyu He , Zhuo Wang , Haoyu Wang
Non-Fungible Tokens (NFTs) drive the prosperity of the Web3 ecosystem. By May 2024, the total market value of NFT projects reached approximately $69 billion. Accompanying the success of NFTs are various security issues, i.e., attacks and scams are prevalent in the ecosystem. While NFTs have attracted significant attention from both industry and academia, there is a lack of understanding of the kinds of NFT security issues. The discovery, in-depth analysis, and systematic categorization of these security issues are of significant importance for the prosperous development of the NFT ecosystem. To fill this gap, we perform a systematic literature review related to NFT security and identify 176 incidents from 248 security reports and 35 academic papers until May 1st, 2024. Through manual analysis of the compiled security incidents, we classify them into 12 major categories. Then, we explore potential solutions and mitigation strategies. Drawing from these analyses, we establish the first NFT security reference frame. In addition, we extract the characteristics of NFT security issues, i.e., the prevalence, severity, and intractability. We highlight the gap between industry and academia for NFT security and provide further research directions for the community. This paper, as the first Systematization of Knowledge (SoK) of NFT security, systematically explores security issues within the NFT ecosystem, shedding light on their root causes, real-world attacks, and potential ways to address them. Our findings will contribute to future research on NFT security.
不可替代代币(nft)推动了Web3生态系统的繁荣。到2024年5月,NFT项目的总市值达到约690亿美元。伴随着nft的成功而来的是各种安全问题,即攻击和诈骗在生态系统中普遍存在。虽然NFT已经引起了工业界和学术界的极大关注,但人们对NFT安全问题的种类缺乏了解。这些安全问题的发现、深入分析和系统分类对NFT生态系统的繁荣发展具有重要意义。为了填补这一空白,我们进行了与NFT安全相关的系统文献综述,并从248份安全报告和35篇学术论文中确定了176起事件,直至2024年5月1日。通过手工分析已编译的安全事件,我们将其分为12大类。然后,我们探讨了潜在的解决方案和缓解策略。根据这些分析,我们建立了第一个NFT安全参考框架。此外,我们还提取了NFT安全问题的特征,即普遍性、严重性和难治性。我们强调了工业界和学术界在NFT安全方面的差距,并为社区提供了进一步的研究方向。本文作为NFT安全的第一个系统化知识(SoK),系统地探讨了NFT生态系统中的安全问题,揭示了它们的根本原因、现实世界的攻击以及解决它们的潜在方法。我们的研究结果将有助于对NFT安全性的进一步研究。
{"title":"SoK: On the security of non-fungible tokens","authors":"Kai Ma ,&nbsp;Jintao Huang ,&nbsp;Ningyu He ,&nbsp;Zhuo Wang ,&nbsp;Haoyu Wang","doi":"10.1016/j.bcra.2024.100268","DOIUrl":"10.1016/j.bcra.2024.100268","url":null,"abstract":"<div><div>Non-Fungible Tokens (NFTs) drive the prosperity of the Web3 ecosystem. By May 2024, the total market value of NFT projects reached approximately $69 billion. Accompanying the success of NFTs are various security issues, i.e., attacks and scams are prevalent in the ecosystem. While NFTs have attracted significant attention from both industry and academia, there is a lack of understanding of the kinds of NFT security issues. The discovery, in-depth analysis, and systematic categorization of these security issues are of significant importance for the prosperous development of the NFT ecosystem. To fill this gap, we perform a systematic literature review related to NFT security and identify 176 incidents from 248 security reports and 35 academic papers until May 1st, 2024. Through manual analysis of the compiled security incidents, we classify them into 12 major categories. Then, we explore potential solutions and mitigation strategies. Drawing from these analyses, we establish the first NFT security reference frame. In addition, we extract the characteristics of NFT security issues, i.e., the prevalence, severity, and intractability. We highlight the gap between industry and academia for NFT security and provide further research directions for the community. This paper, as the first Systematization of Knowledge (SoK) of NFT security, systematically explores security issues within the NFT ecosystem, shedding light on their root causes, real-world attacks, and potential ways to address them. Our findings will contribute to future research on NFT security.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100268"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph neural network-based transaction link prediction method for public blockchain in heterogeneous information networks 异构信息网络中基于图神经网络的公共区块链交易链路预测方法
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100265
Zening Zhao , Jinsong Wang , Jiajia Wei
Public blockchain has outstanding performance in transaction privacy protection because of its anonymity. The data openness brings feasibility to transaction behavior analysis. At present, the transaction data of the public chain are huge, including complex trading objects and relationships. It is difficult to extract attributes and predict transaction behavior by traditional methods. To solve these problems, we extract transaction features to construct an Ethereum transaction heterogeneous information network (HIN) and propose a graph neural network (GNN)-based transaction prediction method for public blockchains in HINs, which can divide the network into subgraphs according to connectivity and increase the accuracy of the prediction results of transaction behavior. Experiments show that the execution time consumption of the proposed transaction subgraph division method is reduced by 70.61% on average compared with that of the search method. The accuracy of the proposed behavior prediction method also improves compared with that of the traditional random walk method, with an average accuracy of 83.82%.
Public区块链由于其匿名性,在交易隐私保护方面表现突出。数据的开放性为交易行为分析带来了可行性。目前,公链的交易数据庞大,交易对象和交易关系复杂。传统方法难以提取交易属性和预测交易行为。为了解决这些问题,我们提取交易特征,构建以太坊交易异构信息网络(HIN),并提出了一种基于图神经网络(GNN)的HIN中公链交易预测方法,该方法可以根据连通性将网络划分为子图,提高交易行为预测结果的准确性。实验表明,与搜索方法相比,所提出的事务子图划分方法的执行时间平均减少了70.61%。与传统的随机行走方法相比,所提出的行为预测方法的准确率也有所提高,平均准确率为83.82%。
{"title":"Graph neural network-based transaction link prediction method for public blockchain in heterogeneous information networks","authors":"Zening Zhao ,&nbsp;Jinsong Wang ,&nbsp;Jiajia Wei","doi":"10.1016/j.bcra.2024.100265","DOIUrl":"10.1016/j.bcra.2024.100265","url":null,"abstract":"<div><div>Public blockchain has outstanding performance in transaction privacy protection because of its anonymity. The data openness brings feasibility to transaction behavior analysis. At present, the transaction data of the public chain are huge, including complex trading objects and relationships. It is difficult to extract attributes and predict transaction behavior by traditional methods. To solve these problems, we extract transaction features to construct an Ethereum transaction heterogeneous information network (HIN) and propose a graph neural network (GNN)-based transaction prediction method for public blockchains in HINs, which can divide the network into subgraphs according to connectivity and increase the accuracy of the prediction results of transaction behavior. Experiments show that the execution time consumption of the proposed transaction subgraph division method is reduced by 70.61% on average compared with that of the search method. The accuracy of the proposed behavior prediction method also improves compared with that of the traditional random walk method, with an average accuracy of 83.82%.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100265"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based collusion-resistant and traceable broadcast encryption scheme 一种基于区块链的抗合谋和可追踪的广播加密方案
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-21 DOI: 10.1016/j.bcra.2025.100311
Tianqi Zhou , Kai Zhao , Wenying Zheng
Blockchain, as a rapidly developing technology nowadays, involves multi-party collaboration scenarios. However, as the number of users grows, security issues in blockchain systems also increase, driving the need for features such as collusion resistance and traceability. To meet the needs of multi-party collaboration on the blockchain, we propose a blockchain-based collusion-resistant and a traceable broadcast encryption scheme. On the one hand, the traitor tracing scheme is adopted to effectively enable accountability for malicious users. On the other hand, the SM2 public key encryption algorithm is deployed to satisfy high security requirements with relatively low computational costs. Security analysis demonstrates that the proposed scheme has the same level of security as the SM2 algorithm. Performance evaluation shows that the proposed scheme is superior to the relevant schemes and maintains functionalities such as collusion-resistant and traitor tracing.
区块链作为当今发展迅速的技术,涉及到多方协作场景。然而,随着用户数量的增长,区块链系统中的安全问题也在增加,从而推动了对抗串通和可追溯性等特性的需求。为了满足区块链上多方协作的需求,我们提出了一种基于区块链的抗合谋和可追踪广播加密方案。一方面,采用叛逆者追踪方案,有效实现对恶意用户的问责。另一方面,采用SM2公钥加密算法,以较低的计算成本满足较高的安全性要求。安全性分析表明,该方案具有与SM2算法相同的安全性。性能评估表明,该方案优于现有方案,并保持了抗合谋和叛逆者跟踪等功能。
{"title":"A blockchain-based collusion-resistant and traceable broadcast encryption scheme","authors":"Tianqi Zhou ,&nbsp;Kai Zhao ,&nbsp;Wenying Zheng","doi":"10.1016/j.bcra.2025.100311","DOIUrl":"10.1016/j.bcra.2025.100311","url":null,"abstract":"<div><div>Blockchain, as a rapidly developing technology nowadays, involves multi-party collaboration scenarios. However, as the number of users grows, security issues in blockchain systems also increase, driving the need for features such as collusion resistance and traceability. To meet the needs of multi-party collaboration on the blockchain, we propose a blockchain-based collusion-resistant and a traceable broadcast encryption scheme. On the one hand, the traitor tracing scheme is adopted to effectively enable accountability for malicious users. On the other hand, the SM2 public key encryption algorithm is deployed to satisfy high security requirements with relatively low computational costs. Security analysis demonstrates that the proposed scheme has the same level of security as the SM2 algorithm. Performance evaluation shows that the proposed scheme is superior to the relevant schemes and maintains functionalities such as collusion-resistant and traitor tracing.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100311"},"PeriodicalIF":5.6,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145947937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Erratum to “A deep decentralized privacy-preservation framework for online social networks” 对“在线社交网络的深度去中心化隐私保护框架”的勘误
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-19 DOI: 10.1016/j.bcra.2025.100299
Samuel Akwasi Frimpong , Mu Han , Emmanuel Kwame Effah , Joseph Kwame Adjei , Isaac Hanson , Percy Brown
{"title":"Erratum to “A deep decentralized privacy-preservation framework for online social networks”","authors":"Samuel Akwasi Frimpong ,&nbsp;Mu Han ,&nbsp;Emmanuel Kwame Effah ,&nbsp;Joseph Kwame Adjei ,&nbsp;Isaac Hanson ,&nbsp;Percy Brown","doi":"10.1016/j.bcra.2025.100299","DOIUrl":"10.1016/j.bcra.2025.100299","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100299"},"PeriodicalIF":6.9,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain smart contracts for decentralized matching of counterparties and automatic settlement of financial derivatives 区块链智能合约,用于交易对手的分散匹配和金融衍生品的自动结算
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-30 DOI: 10.1016/j.bcra.2025.100300
Hua Wang , Jinjing Liu , Jian Zhao
Financial derivatives are widely recognized for their effectiveness in managing interest rate risk, demonstrating the principle of comparative advantage in finance. However, traditional financial derivative transactions are often complex and can expose participants to market and credit risks. To mitigate these risks, reduce transaction costs, and enhance liquidity, this paper proposes a blockchain-based matching mechanism for financial derivatives that uses smart contracts for decentralized counterparty matching and settlement. Smart contracts facilitate secure data sharing among participants, ensuring the integrity and immutability of transaction data. We design a transaction pool mechanism-based smart contracts for counterparty matching and automatic settlement of financial derivatives involving real fiat currencies and introduce an efficient peer-to-peer counterparty matching method, where the entire trading process is conducted on a decentralized blockchain, ensuring greater security and transparency. A prototype implementation based on Ethereum smart contracts validates the effectiveness of our proposed model, demonstrating its potential to streamline and secure financial derivative transactions.
金融衍生工具在管理利率风险方面的有效性得到了广泛的认可,体现了金融中的比较优势原则。然而,传统的金融衍生品交易往往很复杂,可能使参与者面临市场和信用风险。为了减轻这些风险,降低交易成本,增强流动性,本文提出了一种基于区块链的金融衍生品匹配机制,该机制使用智能合约进行分散的交易对手匹配和结算。智能合约促进参与者之间的安全数据共享,确保交易数据的完整性和不可变性。我们设计了一种基于交易池机制的智能合约,用于交易对手匹配和涉及真实法定货币的金融衍生品自动结算,并引入了一种高效的点对点交易对手匹配方法,整个交易过程在去中心化的区块链上进行,确保了更高的安全性和透明度。基于以太坊智能合约的原型实现验证了我们提出的模型的有效性,展示了其简化和安全金融衍生品交易的潜力。
{"title":"Blockchain smart contracts for decentralized matching of counterparties and automatic settlement of financial derivatives","authors":"Hua Wang ,&nbsp;Jinjing Liu ,&nbsp;Jian Zhao","doi":"10.1016/j.bcra.2025.100300","DOIUrl":"10.1016/j.bcra.2025.100300","url":null,"abstract":"<div><div>Financial derivatives are widely recognized for their effectiveness in managing interest rate risk, demonstrating the principle of comparative advantage in finance. However, traditional financial derivative transactions are often complex and can expose participants to market and credit risks. To mitigate these risks, reduce transaction costs, and enhance liquidity, this paper proposes a blockchain-based matching mechanism for financial derivatives that uses smart contracts for decentralized counterparty matching and settlement. Smart contracts facilitate secure data sharing among participants, ensuring the integrity and immutability of transaction data. We design a transaction pool mechanism-based smart contracts for counterparty matching and automatic settlement of financial derivatives involving real fiat currencies and introduce an efficient peer-to-peer counterparty matching method, where the entire trading process is conducted on a decentralized blockchain, ensuring greater security and transparency. A prototype implementation based on Ethereum smart contracts validates the effectiveness of our proposed model, demonstrating its potential to streamline and secure financial derivative transactions.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 4","pages":"Article 100300"},"PeriodicalIF":5.6,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring the potential of ChatGPT in detecting logical vulnerabilities in smart contracts 探索ChatGPT在检测智能合约中的逻辑漏洞方面的潜力
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-24 DOI: 10.1016/j.bcra.2025.100294
Qingyuan Liu , Meng Wu , Jiachi Chen , Ting Chen , Xi Chen , Renkai Jiang , Yuqiao Yang , Zhangyan Lin , Yuanyao Cheng
With the rapid expansion of blockchain applications, smart contracts are becoming increasingly complex, making the automated detection of contract vulnerabilities more critical than ever. Large language models, due to their advanced code comprehensive ability, are considered to have the potential to undertake the task of automated software vulnerability discovery. Although there have been empirical studies on ChatGPT's automated discovery of contract vulnerabilities, the current empirical research has not addressed how well ChatGPT can detect logical vulnerabilities in smart contracts or whether ChatGPT's detection performance for logical vulnerabilities can be improved. To fill this gap, this study collected and organized seven types of logical vulnerability source codes from 6165 real smart contract audit reports and three datasets, such as Web3Bugs, and used this database to validate ChatGPT's detection capability for logical vulnerabilities. To improve ChatGPT's accuracy in detecting logical vulnerabilities, we fine-tuned ChatGPT with a dataset marked with a specific method, achieving an average accuracy rate of 95% for single vulnerability detection per training session. We improved the original marking method to increase further the number of vulnerabilities that a single model can detect. We used a specific completion marking format, ultimately enabling ChatGPT to detect various logical vulnerabilities. In terms of enhancing model scalability, we found a special training set marking method that allows for the addition of detectable vulnerability types through secondary training.
随着区块链应用的快速扩展,智能合约变得越来越复杂,使得自动检测合约漏洞比以往任何时候都更加重要。大型语言模型由于其先进的代码综合能力,被认为具有承担自动化软件漏洞发现任务的潜力。虽然已经有关于ChatGPT自动发现合约漏洞的实证研究,但目前的实证研究并没有解决ChatGPT在智能合约中的逻辑漏洞检测能力有多好,也没有解决ChatGPT对逻辑漏洞的检测性能是否可以提高。为了填补这一空白,本研究从6165份真实智能合约审计报告和Web3Bugs等3个数据集中收集整理了7类逻辑漏洞源代码,并利用该数据库验证ChatGPT对逻辑漏洞的检测能力。为了提高ChatGPT检测逻辑漏洞的准确率,我们使用特定方法标记的数据集对ChatGPT进行了微调,每次训练的单个漏洞检测平均准确率达到95%。我们改进了原始的标记方法,以进一步增加单个模型可以检测到的漏洞数量。我们使用了特定的完成标记格式,最终使ChatGPT能够检测各种逻辑漏洞。在增强模型可扩展性方面,我们发现了一种特殊的训练集标记方法,该方法允许通过二次训练添加可检测的漏洞类型。
{"title":"Exploring the potential of ChatGPT in detecting logical vulnerabilities in smart contracts","authors":"Qingyuan Liu ,&nbsp;Meng Wu ,&nbsp;Jiachi Chen ,&nbsp;Ting Chen ,&nbsp;Xi Chen ,&nbsp;Renkai Jiang ,&nbsp;Yuqiao Yang ,&nbsp;Zhangyan Lin ,&nbsp;Yuanyao Cheng","doi":"10.1016/j.bcra.2025.100294","DOIUrl":"10.1016/j.bcra.2025.100294","url":null,"abstract":"<div><div>With the rapid expansion of blockchain applications, smart contracts are becoming increasingly complex, making the automated detection of contract vulnerabilities more critical than ever. Large language models, due to their advanced code comprehensive ability, are considered to have the potential to undertake the task of automated software vulnerability discovery. Although there have been empirical studies on ChatGPT's automated discovery of contract vulnerabilities, the current empirical research has not addressed how well ChatGPT can detect logical vulnerabilities in smart contracts or whether ChatGPT's detection performance for logical vulnerabilities can be improved. To fill this gap, this study collected and organized seven types of logical vulnerability source codes from 6165 real smart contract audit reports and three datasets, such as Web3Bugs, and used this database to validate ChatGPT's detection capability for logical vulnerabilities. To improve ChatGPT's accuracy in detecting logical vulnerabilities, we fine-tuned ChatGPT with a dataset marked with a specific method, achieving an average accuracy rate of 95% for single vulnerability detection per training session. We improved the original marking method to increase further the number of vulnerabilities that a single model can detect. We used a specific completion marking format, ultimately enabling ChatGPT to detect various logical vulnerabilities. In terms of enhancing model scalability, we found a special training set marking method that allows for the addition of detectable vulnerability types through secondary training.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 4","pages":"Article 100294"},"PeriodicalIF":5.6,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145371140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybersecurity challenges in blockchain-based social media networks: A comprehensive review 基于区块链的社交媒体网络中的网络安全挑战:全面审查
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-11 DOI: 10.1016/j.bcra.2025.100290
Muhammad Hasnain , Imran Ghani , David Smith , Ali Daud , Seung Ryul Jeong
Blockchain is a disruptive technology that has attracted considerable attention from scholars. The blockchain underlies cryptocurrencies and has rapidly expanded to other areas, including financial transactions and social media networks. However, concerns regarding the information security of social media users still exist regarding blockchain technology. The literature on blockchain online social media (BOSM) networks is growing rapidly because of their critical role in securing users’ information privacy and security. Cybersecurity remains a challenge faced by users on social media networks. Since the publication of BOSM, blockchain has become a widely discussed method for users’ information security. This comprehensive review identifies peer-reviewed articles on BOSM that underpin smart contracts, social media challenges, and research gaps. In this work, Kitchenham’s review guidelines are followed to conduct an in-depth review of the use of blockchain technology in the social media network literature published between January 2016 and March 2024, which reveals a significant increase in publications over the last eight years. A search of major academic databases, including Springer, ScienceDirect, ACM, IEEE Xplore, World Scientific, Taylor & Francis, and Wiley Online, yielded a final pool of 158 articles. The findings of the review indicate key insights concerning the techniques and applications of blockchain technology and challenges for the public via social media networks such as Twitter, Facebook, and Google+. This paper identifies important challenges such as deploying smart contracts, user information privacy, a lack of platform support, users’ reactions to blockchain technology, privacy protection and compensation, security system validation, online disinformation, scalability, and miscellaneous challenges to blockchain technology. Additionally, this review suggests several future research directions to improve the role of blockchain technology in overcoming the challenges of privacy, security, reliability, scalability, and trust in the area of social media networks.
b区块链是一项颠覆性技术,引起了学者们的广泛关注。bbb100是加密货币的基础,并迅速扩展到其他领域,包括金融交易和社交媒体网络。然而,关于区块链技术的社交媒体用户的信息安全问题仍然存在。关于b区块链在线社交媒体(BOSM)网络的文献正在迅速增长,因为它们在保护用户信息隐私和安全方面发挥着关键作用。网络安全仍然是社交媒体网络用户面临的一个挑战。自BOSM发布以来,区块链已成为一种被广泛讨论的用户信息安全方法。这项全面的审查确定了关于BOSM的同行评议文章,这些文章支撑了智能合约、社交媒体挑战和研究空白。在这项工作中,遵循Kitchenham的审查指南,对2016年1月至2024年3月期间发表的社交媒体网络文献中区块链技术的使用进行了深入审查,结果显示,在过去八年中,出版物显著增加。搜索主要学术数据库,包括b施普林格,ScienceDirect, ACM, IEEE explore, World Scientific, Taylor &;弗朗西斯和威利在线最终得出了158篇文章。审查的结果表明了有关区块链技术和应用的关键见解,以及通过Twitter、Facebook和谷歌+等社交媒体网络为公众带来的挑战。本文确定了重要的挑战,如部署智能合约、用户信息隐私、缺乏平台支持、用户对区块链技术的反应、隐私保护和补偿、安全系统验证、在线虚假信息、可扩展性和区块链技术的各种挑战。此外,本文提出了几个未来的研究方向,以提高区块链技术在克服社交媒体网络领域的隐私、安全、可靠性、可扩展性和信任方面的挑战。
{"title":"Cybersecurity challenges in blockchain-based social media networks: A comprehensive review","authors":"Muhammad Hasnain ,&nbsp;Imran Ghani ,&nbsp;David Smith ,&nbsp;Ali Daud ,&nbsp;Seung Ryul Jeong","doi":"10.1016/j.bcra.2025.100290","DOIUrl":"10.1016/j.bcra.2025.100290","url":null,"abstract":"<div><div>Blockchain is a disruptive technology that has attracted considerable attention from scholars. The blockchain underlies cryptocurrencies and has rapidly expanded to other areas, including financial transactions and social media networks. However, concerns regarding the information security of social media users still exist regarding blockchain technology. The literature on blockchain online social media (BOSM) networks is growing rapidly because of their critical role in securing users’ information privacy and security. Cybersecurity remains a challenge faced by users on social media networks. Since the publication of BOSM, blockchain has become a widely discussed method for users’ information security. This comprehensive review identifies peer-reviewed articles on BOSM that underpin smart contracts, social media challenges, and research gaps. In this work, Kitchenham’s review guidelines are followed to conduct an in-depth review of the use of blockchain technology in the social media network literature published between January 2016 and March 2024, which reveals a significant increase in publications over the last eight years. A search of major academic databases, including Springer, ScienceDirect, ACM, IEEE Xplore, World Scientific, Taylor &amp; Francis, and Wiley Online, yielded a final pool of 158 articles. The findings of the review indicate key insights concerning the techniques and applications of blockchain technology and challenges for the public via social media networks such as Twitter, Facebook, and Google+. This paper identifies important challenges such as deploying smart contracts, user information privacy, a lack of platform support, users’ reactions to blockchain technology, privacy protection and compensation, security system validation, online disinformation, scalability, and miscellaneous challenges to blockchain technology. Additionally, this review suggests several future research directions to improve the role of blockchain technology in overcoming the challenges of privacy, security, reliability, scalability, and trust in the area of social media networks.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 3","pages":"Article 100290"},"PeriodicalIF":5.6,"publicationDate":"2025-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144723096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Blockchain-Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1