首页 > 最新文献

Blockchain-Research and Applications最新文献

英文 中文
SmartZKCP: Towards practical data exchange marketplace against active attacks SmartZKCP:针对主动攻击的实用数据交换市场
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100272
Xuanming Liu , Jiawen Zhang , Yinghao Wang , Xinpeng Yang , Xiaohu Yang
The trading of data is becoming increasingly important as it holds substantial value. A blockchain-based data marketplace can provide a secure and transparent platform for data exchange. To facilitate this, developing a fair data exchange protocol for digital goods has garnered considerable attention in recent decades. The Zero Knowledge Contingent Payment (ZKCP) protocol enables trustless fair exchanges with the aid of blockchain and zero-knowledge proofs. However, applying this protocol in a practical data marketplace is not trivial.
In this paper, several potential attacks are identified when applying the ZKCP protocol in a practical public data marketplace. To address these issues, we propose SmartZKCP, an enhanced solution that offers improved security measures and increased performance. The protocol is formalized to ensure fairness and secure against potential attacks. Moreover, SmartZKCP offers efficiency optimizations and minimized communication costs. Evaluation results show that SmartZKCP is both practical and efficient, making it applicable in a data exchange marketplace.
数据交易正变得越来越重要,因为它具有巨大的价值。基于区块链的数据市场可以为数据交换提供安全透明的平台。为了促进这一点,近几十年来,为数字产品开发公平的数据交换协议已经引起了相当大的关注。零知识或有支付(ZKCP)协议借助区块链和零知识证明实现了无需信任的公平交换。然而,在实际的数据市场中应用该协议并非易事。在本文中,在实际的公共数据市场中应用ZKCP协议时,确定了几种潜在的攻击。为了解决这些问题,我们提出了SmartZKCP,这是一种增强的解决方案,提供了改进的安全措施和更高的性能。该协议是形式化的,以确保公平和安全,防止潜在的攻击。此外,SmartZKCP提供效率优化和最小化通信成本。评估结果表明,SmartZKCP既实用又高效,适用于数据交换市场。
{"title":"SmartZKCP: Towards practical data exchange marketplace against active attacks","authors":"Xuanming Liu ,&nbsp;Jiawen Zhang ,&nbsp;Yinghao Wang ,&nbsp;Xinpeng Yang ,&nbsp;Xiaohu Yang","doi":"10.1016/j.bcra.2024.100272","DOIUrl":"10.1016/j.bcra.2024.100272","url":null,"abstract":"<div><div>The trading of data is becoming increasingly important as it holds substantial value. A blockchain-based data marketplace can provide a secure and transparent platform for data exchange. To facilitate this, developing a fair data exchange protocol for digital goods has garnered considerable attention in recent decades. The Zero Knowledge Contingent Payment (ZKCP) protocol enables trustless fair exchanges with the aid of blockchain and zero-knowledge proofs. However, applying this protocol in a practical data marketplace is not trivial.</div><div>In this paper, several potential attacks are identified when applying the ZKCP protocol in a practical public data marketplace. To address these issues, we propose SmartZKCP, an enhanced solution that offers improved security measures and increased performance. The protocol is formalized to ensure fairness and secure against potential attacks. Moreover, SmartZKCP offers efficiency optimizations and minimized communication costs. Evaluation results show that SmartZKCP is both practical and efficient, making it applicable in a data exchange marketplace.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100272"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144270707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace 基于b区块链的三方网络威胁情报服务市场有效激励机制
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100263
Yuan Zhou , Yaoyao Zhang , Qinglin Yang , Yuan Liu , Chunming Rong , Zhihong Tian
The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment. To create a trustworthy CTI marketplace environment, consortium-blockchain-based CTI service platforms have been widely proposed, where the blockchain system becomes the third role, crucially impacting the CTI service quality. How to sustainably promote CTI service quality in this tripartite marketplace is a challenging issue, which has not been well investigated in the literature. In this study, we propose a two-stage tripartite dynamic game-model-based incentive mechanism, where the participation incentives of the three parties are promoted under the constraints of Individual Rationality (IR) and Incentive Compatibility (IC). The sustainability of CTI service is quantitatively formalized through the CTI market demand, which impacts the future profits of the three parties. The Nash equilibrium of the proposed incentive mechanism is solved, where the CTI requester offers an optimal price to achieve effective defense against cyber attacks, and the blockchain platform and CTI service providers collaboratively contribute high-quality CTI services. Empirical experimental results show that the higher the quality of CTI services provided in the marketplace, the greater the market demand for CTI, resulting in a sustainable CTI marketplace.
CTI (Cyber Threat Intelligence,网络威胁情报)市场是CTI服务请求者对抗高级网络攻击的新兴平台,CTI服务提供商用于支付。为了创造一个值得信赖的CTI市场环境,基于联盟区块链的CTI服务平台被广泛提出,其中区块链系统成为第三个角色,对CTI服务质量产生了至关重要的影响。如何在这个三方市场中持续提升CTI服务质量是一个具有挑战性的问题,文献中尚未有很好的研究。在本研究中,我们提出了一个基于两阶段三方动态博弈模型的激励机制,在个体理性(IR)和激励兼容性(IC)的约束下,三方的参与激励得以提升。CTI业务的可持续性通过CTI市场需求进行量化形式化,影响三方未来的利润。解决了所提激励机制的纳什均衡,即CTI请求方提供最优价格以实现对网络攻击的有效防御,区块链平台和CTI服务提供商协同提供高质量的CTI服务。实证研究结果表明,市场提供的CTI服务质量越高,市场对CTI的需求就越大,从而形成一个可持续的CTI市场。
{"title":"A blockchain based efficient incentive mechanism in tripartite cyber threat intelligence service marketplace","authors":"Yuan Zhou ,&nbsp;Yaoyao Zhang ,&nbsp;Qinglin Yang ,&nbsp;Yuan Liu ,&nbsp;Chunming Rong ,&nbsp;Zhihong Tian","doi":"10.1016/j.bcra.2024.100263","DOIUrl":"10.1016/j.bcra.2024.100263","url":null,"abstract":"<div><div>The Cyber Threat Intelligence (CTI) marketplace is an emerging platform for CTI service requesters to countermeasure advanced cyber attacks, where CTI service providers are employed on payment. To create a trustworthy CTI marketplace environment, consortium-blockchain-based CTI service platforms have been widely proposed, where the blockchain system becomes the third role, crucially impacting the CTI service quality. How to sustainably promote CTI service quality in this tripartite marketplace is a challenging issue, which has not been well investigated in the literature. In this study, we propose a two-stage tripartite dynamic game-model-based incentive mechanism, where the participation incentives of the three parties are promoted under the constraints of Individual Rationality (IR) and Incentive Compatibility (IC). The sustainability of CTI service is quantitatively formalized through the CTI market demand, which impacts the future profits of the three parties. The Nash equilibrium of the proposed incentive mechanism is solved, where the CTI requester offers an optimal price to achieve effective defense against cyber attacks, and the blockchain platform and CTI service providers collaboratively contribute high-quality CTI services. Empirical experimental results show that the higher the quality of CTI services provided in the marketplace, the greater the market demand for CTI, resulting in a sustainable CTI marketplace.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100263"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DeFi risk assessment: MakerDAO loan portfolio case DeFi风险评估:MakerDAO贷款组合案例
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100259
Ignat Melnikov , Irina Lebedeva , Artem Petrov , Yury Yanovich
Decentralized finance (DeFi) is a rapidly evolving blockchain technology that offers a new perspective on financial services through Web3 applications. DeFi offers developers the flexibility to create financial services using smart contracts, leading to a lack of standardized protocols and challenges in applying traditional finance models for risk assessment, especially in the early stages of adoption. The Maker protocol is a prominent DeFi platform known for its diverse functionalities, including loan services. This study focuses on analyzing the risk associated with Maker's loan portfolio by developing a risk model based on multiple Brownian motions and passage levels, with Brownian motions representing different collateral types and passage levels representing users' collateralization ratios. Through numerical experiments using artificial and real data, we evaluate the model's effectiveness in assessing risk within the loan portfolio. While our findings demonstrate the model's potential for assessing risk within a single DeFi project, it is important to acknowledge that the model's assumptions may not be fully applicable to real-world data. This research underscores the importance of developing project-specific risk assessment models for individual DeFi projects and encourages further exploration of other DeFi protocols.
去中心化金融(DeFi)是一种快速发展的区块链技术,它通过Web3应用程序为金融服务提供了新的视角。DeFi为开发人员提供了使用智能合约创建金融服务的灵活性,导致缺乏标准化协议,并且在应用传统金融模型进行风险评估方面存在挑战,特别是在采用的早期阶段。Maker协议是一个著名的DeFi平台,以其多种功能而闻名,包括贷款服务。本研究重点分析了Maker贷款组合的风险,建立了基于多个布朗运动和通道水平的风险模型,其中布朗运动代表不同的抵押品类型,通道水平代表用户的抵押比率。通过使用人工数据和真实数据的数值实验,我们评估了该模型在评估贷款组合风险方面的有效性。虽然我们的研究结果证明了该模型在单个DeFi项目中评估风险的潜力,但重要的是要承认该模型的假设可能并不完全适用于现实世界的数据。本研究强调了为单个DeFi项目开发特定于项目的风险评估模型的重要性,并鼓励进一步探索其他DeFi协议。
{"title":"DeFi risk assessment: MakerDAO loan portfolio case","authors":"Ignat Melnikov ,&nbsp;Irina Lebedeva ,&nbsp;Artem Petrov ,&nbsp;Yury Yanovich","doi":"10.1016/j.bcra.2024.100259","DOIUrl":"10.1016/j.bcra.2024.100259","url":null,"abstract":"<div><div>Decentralized finance (DeFi) is a rapidly evolving blockchain technology that offers a new perspective on financial services through Web3 applications. DeFi offers developers the flexibility to create financial services using smart contracts, leading to a lack of standardized protocols and challenges in applying traditional finance models for risk assessment, especially in the early stages of adoption. The Maker protocol is a prominent DeFi platform known for its diverse functionalities, including loan services. This study focuses on analyzing the risk associated with Maker's loan portfolio by developing a risk model based on multiple Brownian motions and passage levels, with Brownian motions representing different collateral types and passage levels representing users' collateralization ratios. Through numerical experiments using artificial and real data, we evaluate the model's effectiveness in assessing risk within the loan portfolio. While our findings demonstrate the model's potential for assessing risk within a single DeFi project, it is important to acknowledge that the model's assumptions may not be fully applicable to real-world data. This research underscores the importance of developing project-specific risk assessment models for individual DeFi projects and encourages further exploration of other DeFi protocols.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100259"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144190436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function 基于变色龙哈希函数的原子和隐私保护循环交叉链协议
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100262
Mengyan Li, Maoning Wang, Meijiao Duan
Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze transaction paths, thereby causing privacy breaches and financial loss to users in some sensitive scenarios. To prevent payment path leakage, a privacy-preserving cyclic cross-chain protocol is proposed herein. This protocol primarily uses the Chameleon Hash (CH) protocol to obscure the correlation between users in the path, ensuring the privacy of cross-chain swaps. The protocol is divided into pre-swap, commit, and decommit phases. The pre-swap phase is firstly executed to determine the swap order. Then, users ensure atomicity via serial asset locking in the commit phase, and each receiver obtains swap assets from the corresponding sender via CH collision in the decommit phase. The security proof under the Universally Composable (UC) system demonstrates the correctness and usability of the protocol. In summary, the entire protocol ensures the atomicity and privacy of cross-chain swaps, providing a new principle and method to solve the privacy leakage problem caused by transaction path analysis.
近年来,基于区块链的数字资产越来越多,需要跨链交换。哈希时间锁合约(HTLC)是一种广泛使用的交换协议;但是,简单的散列时间锁可以允许攻击者分析事务路径,从而在某些敏感场景中给用户造成隐私泄露和经济损失。为了防止支付路径泄露,本文提出了一种保护隐私的循环跨链协议。该协议主要使用变色龙哈希(Chameleon Hash, CH)协议来模糊路径中用户之间的相关性,确保跨链交换的隐私性。该协议分为预交换、提交和解除提交阶段。首先执行预交换阶段以确定交换顺序。然后,用户在提交阶段通过串行资产锁定确保原子性,每个接收方在解提交阶段通过CH碰撞从相应的发送方获得交换资产。通用可组合(UC)系统下的安全性证明证明了该协议的正确性和可用性。综上所述,整个协议保证了跨链交换的原子性和隐私性,为解决交易路径分析带来的隐私泄露问题提供了新的原理和方法。
{"title":"Atomic and privacy-preserving cyclic cross-chain protocol based on chameleon hash function","authors":"Mengyan Li,&nbsp;Maoning Wang,&nbsp;Meijiao Duan","doi":"10.1016/j.bcra.2024.100262","DOIUrl":"10.1016/j.bcra.2024.100262","url":null,"abstract":"<div><div>Blockchain-based digital assets have increasingly emerged in recent years, necessitating cross-chain swaps. Hash Time-Lock Contract (HTLC) is a widely used protocol for such swaps; however, simple hash time locks can allow attackers to analyze transaction paths, thereby causing privacy breaches and financial loss to users in some sensitive scenarios. To prevent payment path leakage, a privacy-preserving cyclic cross-chain protocol is proposed herein. This protocol primarily uses the Chameleon Hash (CH) protocol to obscure the correlation between users in the path, ensuring the privacy of cross-chain swaps. The protocol is divided into pre-swap, commit, and decommit phases. The pre-swap phase is firstly executed to determine the swap order. Then, users ensure atomicity via serial asset locking in the commit phase, and each receiver obtains swap assets from the corresponding sender via CH collision in the decommit phase. The security proof under the Universally Composable (UC) system demonstrates the correctness and usability of the protocol. In summary, the entire protocol ensures the atomicity and privacy of cross-chain swaps, providing a new principle and method to solve the privacy leakage problem caused by transaction path analysis.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100262"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta reinforcement learning based dynamic tuning for blockchain systems in diverse network environments 基于元强化学习的区块链系统在不同网络环境下的动态调谐
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100261
Yue Pei , Mengxiao Zhu , Chen Zhu , Weihu Song , Yi Sun , Lei Li , Haogang Zhu
The evolution of blockchain technology across various areas has highlighted the importance of optimizing blockchain systems' performance, especially in fluctuating network bandwidth conditions. We observe that the performance of blockchain systems exhibits variations, and the optimal parameter configuration shifts accordingly when changes in network bandwidth occur. Current methods in blockchain optimization require establishing fixed mappings between various environments and their optimal parameters. However, this process exhibits poor sample efficiency and lacks the ability for fast adaptation to novel bandwidth environments. In this paper, we propose MetaTune, a meta-Reinforcement-Learning (meta-RL)-based dynamic tuning method for blockchain systems. MetaTune can quickly adapt to unknown bandwidth changes and automatically configure optimized parameters. Through empirical evaluations of a real-world blockchain system, ChainMaker, we demonstrate that MetaTune significantly reduces the training samples needed for generalization across different bandwidth environments compared to non-adaptive methods. Our findings suggest that MetaTune offers a promising approach for efficiently optimizing blockchain systems in dynamic network environments.
区块链技术在各个领域的发展突出了优化区块链系统性能的重要性,特别是在波动的网络带宽条件下。我们观察到区块链系统的性能表现出变化,当网络带宽发生变化时,最优参数配置也会发生相应的变化。目前区块链优化方法需要在各种环境及其最优参数之间建立固定的映射关系。然而,该方法的采样效率较差,缺乏对新带宽环境的快速适应能力。在本文中,我们提出了一种基于元强化学习(meta-RL)的区块链系统动态调谐方法MetaTune。MetaTune可以快速适应未知的带宽变化,自动配置优化参数。通过对现实世界的区块链系统ChainMaker的经验评估,我们证明了与非自适应方法相比,MetaTune显着减少了在不同带宽环境下泛化所需的训练样本。我们的研究结果表明,MetaTune为在动态网络环境中有效优化区块链系统提供了一种有前途的方法。
{"title":"Meta reinforcement learning based dynamic tuning for blockchain systems in diverse network environments","authors":"Yue Pei ,&nbsp;Mengxiao Zhu ,&nbsp;Chen Zhu ,&nbsp;Weihu Song ,&nbsp;Yi Sun ,&nbsp;Lei Li ,&nbsp;Haogang Zhu","doi":"10.1016/j.bcra.2024.100261","DOIUrl":"10.1016/j.bcra.2024.100261","url":null,"abstract":"<div><div>The evolution of blockchain technology across various areas has highlighted the importance of optimizing blockchain systems' performance, especially in fluctuating network bandwidth conditions. We observe that the performance of blockchain systems exhibits variations, and the optimal parameter configuration shifts accordingly when changes in network bandwidth occur. Current methods in blockchain optimization require establishing fixed mappings between various environments and their optimal parameters. However, this process exhibits poor sample efficiency and lacks the ability for fast adaptation to novel bandwidth environments. In this paper, we propose MetaTune, a meta-Reinforcement-Learning (meta-RL)-based dynamic tuning method for blockchain systems. MetaTune can quickly adapt to unknown bandwidth changes and automatically configure optimized parameters. Through empirical evaluations of a real-world blockchain system, ChainMaker, we demonstrate that MetaTune significantly reduces the training samples needed for generalization across different bandwidth environments compared to non-adaptive methods. Our findings suggest that MetaTune offers a promising approach for efficiently optimizing blockchain systems in dynamic network environments.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100261"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144338980","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SoK: On the security of non-fungible tokens SoK:关于不可替代代币的安全性
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100268
Kai Ma , Jintao Huang , Ningyu He , Zhuo Wang , Haoyu Wang
Non-Fungible Tokens (NFTs) drive the prosperity of the Web3 ecosystem. By May 2024, the total market value of NFT projects reached approximately $69 billion. Accompanying the success of NFTs are various security issues, i.e., attacks and scams are prevalent in the ecosystem. While NFTs have attracted significant attention from both industry and academia, there is a lack of understanding of the kinds of NFT security issues. The discovery, in-depth analysis, and systematic categorization of these security issues are of significant importance for the prosperous development of the NFT ecosystem. To fill this gap, we perform a systematic literature review related to NFT security and identify 176 incidents from 248 security reports and 35 academic papers until May 1st, 2024. Through manual analysis of the compiled security incidents, we classify them into 12 major categories. Then, we explore potential solutions and mitigation strategies. Drawing from these analyses, we establish the first NFT security reference frame. In addition, we extract the characteristics of NFT security issues, i.e., the prevalence, severity, and intractability. We highlight the gap between industry and academia for NFT security and provide further research directions for the community. This paper, as the first Systematization of Knowledge (SoK) of NFT security, systematically explores security issues within the NFT ecosystem, shedding light on their root causes, real-world attacks, and potential ways to address them. Our findings will contribute to future research on NFT security.
不可替代代币(nft)推动了Web3生态系统的繁荣。到2024年5月,NFT项目的总市值达到约690亿美元。伴随着nft的成功而来的是各种安全问题,即攻击和诈骗在生态系统中普遍存在。虽然NFT已经引起了工业界和学术界的极大关注,但人们对NFT安全问题的种类缺乏了解。这些安全问题的发现、深入分析和系统分类对NFT生态系统的繁荣发展具有重要意义。为了填补这一空白,我们进行了与NFT安全相关的系统文献综述,并从248份安全报告和35篇学术论文中确定了176起事件,直至2024年5月1日。通过手工分析已编译的安全事件,我们将其分为12大类。然后,我们探讨了潜在的解决方案和缓解策略。根据这些分析,我们建立了第一个NFT安全参考框架。此外,我们还提取了NFT安全问题的特征,即普遍性、严重性和难治性。我们强调了工业界和学术界在NFT安全方面的差距,并为社区提供了进一步的研究方向。本文作为NFT安全的第一个系统化知识(SoK),系统地探讨了NFT生态系统中的安全问题,揭示了它们的根本原因、现实世界的攻击以及解决它们的潜在方法。我们的研究结果将有助于对NFT安全性的进一步研究。
{"title":"SoK: On the security of non-fungible tokens","authors":"Kai Ma ,&nbsp;Jintao Huang ,&nbsp;Ningyu He ,&nbsp;Zhuo Wang ,&nbsp;Haoyu Wang","doi":"10.1016/j.bcra.2024.100268","DOIUrl":"10.1016/j.bcra.2024.100268","url":null,"abstract":"<div><div>Non-Fungible Tokens (NFTs) drive the prosperity of the Web3 ecosystem. By May 2024, the total market value of NFT projects reached approximately $69 billion. Accompanying the success of NFTs are various security issues, i.e., attacks and scams are prevalent in the ecosystem. While NFTs have attracted significant attention from both industry and academia, there is a lack of understanding of the kinds of NFT security issues. The discovery, in-depth analysis, and systematic categorization of these security issues are of significant importance for the prosperous development of the NFT ecosystem. To fill this gap, we perform a systematic literature review related to NFT security and identify 176 incidents from 248 security reports and 35 academic papers until May 1st, 2024. Through manual analysis of the compiled security incidents, we classify them into 12 major categories. Then, we explore potential solutions and mitigation strategies. Drawing from these analyses, we establish the first NFT security reference frame. In addition, we extract the characteristics of NFT security issues, i.e., the prevalence, severity, and intractability. We highlight the gap between industry and academia for NFT security and provide further research directions for the community. This paper, as the first Systematization of Knowledge (SoK) of NFT security, systematically explores security issues within the NFT ecosystem, shedding light on their root causes, real-world attacks, and potential ways to address them. Our findings will contribute to future research on NFT security.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100268"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144470084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph neural network-based transaction link prediction method for public blockchain in heterogeneous information networks 异构信息网络中基于图神经网络的公共区块链交易链路预测方法
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-06-01 DOI: 10.1016/j.bcra.2024.100265
Zening Zhao , Jinsong Wang , Jiajia Wei
Public blockchain has outstanding performance in transaction privacy protection because of its anonymity. The data openness brings feasibility to transaction behavior analysis. At present, the transaction data of the public chain are huge, including complex trading objects and relationships. It is difficult to extract attributes and predict transaction behavior by traditional methods. To solve these problems, we extract transaction features to construct an Ethereum transaction heterogeneous information network (HIN) and propose a graph neural network (GNN)-based transaction prediction method for public blockchains in HINs, which can divide the network into subgraphs according to connectivity and increase the accuracy of the prediction results of transaction behavior. Experiments show that the execution time consumption of the proposed transaction subgraph division method is reduced by 70.61% on average compared with that of the search method. The accuracy of the proposed behavior prediction method also improves compared with that of the traditional random walk method, with an average accuracy of 83.82%.
Public区块链由于其匿名性,在交易隐私保护方面表现突出。数据的开放性为交易行为分析带来了可行性。目前,公链的交易数据庞大,交易对象和交易关系复杂。传统方法难以提取交易属性和预测交易行为。为了解决这些问题,我们提取交易特征,构建以太坊交易异构信息网络(HIN),并提出了一种基于图神经网络(GNN)的HIN中公链交易预测方法,该方法可以根据连通性将网络划分为子图,提高交易行为预测结果的准确性。实验表明,与搜索方法相比,所提出的事务子图划分方法的执行时间平均减少了70.61%。与传统的随机行走方法相比,所提出的行为预测方法的准确率也有所提高,平均准确率为83.82%。
{"title":"Graph neural network-based transaction link prediction method for public blockchain in heterogeneous information networks","authors":"Zening Zhao ,&nbsp;Jinsong Wang ,&nbsp;Jiajia Wei","doi":"10.1016/j.bcra.2024.100265","DOIUrl":"10.1016/j.bcra.2024.100265","url":null,"abstract":"<div><div>Public blockchain has outstanding performance in transaction privacy protection because of its anonymity. The data openness brings feasibility to transaction behavior analysis. At present, the transaction data of the public chain are huge, including complex trading objects and relationships. It is difficult to extract attributes and predict transaction behavior by traditional methods. To solve these problems, we extract transaction features to construct an Ethereum transaction heterogeneous information network (HIN) and propose a graph neural network (GNN)-based transaction prediction method for public blockchains in HINs, which can divide the network into subgraphs according to connectivity and increase the accuracy of the prediction results of transaction behavior. Experiments show that the execution time consumption of the proposed transaction subgraph division method is reduced by 70.61% on average compared with that of the search method. The accuracy of the proposed behavior prediction method also improves compared with that of the traditional random walk method, with an average accuracy of 83.82%.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100265"},"PeriodicalIF":6.9,"publicationDate":"2025-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144307967","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based collusion-resistant and traceable broadcast encryption scheme 一种基于区块链的抗合谋和可追踪的广播加密方案
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-21 DOI: 10.1016/j.bcra.2025.100311
Tianqi Zhou , Kai Zhao , Wenying Zheng
Blockchain, as a rapidly developing technology nowadays, involves multi-party collaboration scenarios. However, as the number of users grows, security issues in blockchain systems also increase, driving the need for features such as collusion resistance and traceability. To meet the needs of multi-party collaboration on the blockchain, we propose a blockchain-based collusion-resistant and a traceable broadcast encryption scheme. On the one hand, the traitor tracing scheme is adopted to effectively enable accountability for malicious users. On the other hand, the SM2 public key encryption algorithm is deployed to satisfy high security requirements with relatively low computational costs. Security analysis demonstrates that the proposed scheme has the same level of security as the SM2 algorithm. Performance evaluation shows that the proposed scheme is superior to the relevant schemes and maintains functionalities such as collusion-resistant and traitor tracing.
区块链作为当今发展迅速的技术,涉及到多方协作场景。然而,随着用户数量的增长,区块链系统中的安全问题也在增加,从而推动了对抗串通和可追溯性等特性的需求。为了满足区块链上多方协作的需求,我们提出了一种基于区块链的抗合谋和可追踪广播加密方案。一方面,采用叛逆者追踪方案,有效实现对恶意用户的问责。另一方面,采用SM2公钥加密算法,以较低的计算成本满足较高的安全性要求。安全性分析表明,该方案具有与SM2算法相同的安全性。性能评估表明,该方案优于现有方案,并保持了抗合谋和叛逆者跟踪等功能。
{"title":"A blockchain-based collusion-resistant and traceable broadcast encryption scheme","authors":"Tianqi Zhou ,&nbsp;Kai Zhao ,&nbsp;Wenying Zheng","doi":"10.1016/j.bcra.2025.100311","DOIUrl":"10.1016/j.bcra.2025.100311","url":null,"abstract":"<div><div>Blockchain, as a rapidly developing technology nowadays, involves multi-party collaboration scenarios. However, as the number of users grows, security issues in blockchain systems also increase, driving the need for features such as collusion resistance and traceability. To meet the needs of multi-party collaboration on the blockchain, we propose a blockchain-based collusion-resistant and a traceable broadcast encryption scheme. On the one hand, the traitor tracing scheme is adopted to effectively enable accountability for malicious users. On the other hand, the SM2 public key encryption algorithm is deployed to satisfy high security requirements with relatively low computational costs. Security analysis demonstrates that the proposed scheme has the same level of security as the SM2 algorithm. Performance evaluation shows that the proposed scheme is superior to the relevant schemes and maintains functionalities such as collusion-resistant and traitor tracing.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"7 1","pages":"Article 100311"},"PeriodicalIF":5.6,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145947937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Erratum to “A deep decentralized privacy-preservation framework for online social networks” 对“在线社交网络的深度去中心化隐私保护框架”的勘误
IF 6.9 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-05-19 DOI: 10.1016/j.bcra.2025.100299
Samuel Akwasi Frimpong , Mu Han , Emmanuel Kwame Effah , Joseph Kwame Adjei , Isaac Hanson , Percy Brown
{"title":"Erratum to “A deep decentralized privacy-preservation framework for online social networks”","authors":"Samuel Akwasi Frimpong ,&nbsp;Mu Han ,&nbsp;Emmanuel Kwame Effah ,&nbsp;Joseph Kwame Adjei ,&nbsp;Isaac Hanson ,&nbsp;Percy Brown","doi":"10.1016/j.bcra.2025.100299","DOIUrl":"10.1016/j.bcra.2025.100299","url":null,"abstract":"","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 2","pages":"Article 100299"},"PeriodicalIF":6.9,"publicationDate":"2025-05-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144084293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Blockchain smart contracts for decentralized matching of counterparties and automatic settlement of financial derivatives 区块链智能合约,用于交易对手的分散匹配和金融衍生品的自动结算
IF 5.6 3区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-04-30 DOI: 10.1016/j.bcra.2025.100300
Hua Wang , Jinjing Liu , Jian Zhao
Financial derivatives are widely recognized for their effectiveness in managing interest rate risk, demonstrating the principle of comparative advantage in finance. However, traditional financial derivative transactions are often complex and can expose participants to market and credit risks. To mitigate these risks, reduce transaction costs, and enhance liquidity, this paper proposes a blockchain-based matching mechanism for financial derivatives that uses smart contracts for decentralized counterparty matching and settlement. Smart contracts facilitate secure data sharing among participants, ensuring the integrity and immutability of transaction data. We design a transaction pool mechanism-based smart contracts for counterparty matching and automatic settlement of financial derivatives involving real fiat currencies and introduce an efficient peer-to-peer counterparty matching method, where the entire trading process is conducted on a decentralized blockchain, ensuring greater security and transparency. A prototype implementation based on Ethereum smart contracts validates the effectiveness of our proposed model, demonstrating its potential to streamline and secure financial derivative transactions.
金融衍生工具在管理利率风险方面的有效性得到了广泛的认可,体现了金融中的比较优势原则。然而,传统的金融衍生品交易往往很复杂,可能使参与者面临市场和信用风险。为了减轻这些风险,降低交易成本,增强流动性,本文提出了一种基于区块链的金融衍生品匹配机制,该机制使用智能合约进行分散的交易对手匹配和结算。智能合约促进参与者之间的安全数据共享,确保交易数据的完整性和不可变性。我们设计了一种基于交易池机制的智能合约,用于交易对手匹配和涉及真实法定货币的金融衍生品自动结算,并引入了一种高效的点对点交易对手匹配方法,整个交易过程在去中心化的区块链上进行,确保了更高的安全性和透明度。基于以太坊智能合约的原型实现验证了我们提出的模型的有效性,展示了其简化和安全金融衍生品交易的潜力。
{"title":"Blockchain smart contracts for decentralized matching of counterparties and automatic settlement of financial derivatives","authors":"Hua Wang ,&nbsp;Jinjing Liu ,&nbsp;Jian Zhao","doi":"10.1016/j.bcra.2025.100300","DOIUrl":"10.1016/j.bcra.2025.100300","url":null,"abstract":"<div><div>Financial derivatives are widely recognized for their effectiveness in managing interest rate risk, demonstrating the principle of comparative advantage in finance. However, traditional financial derivative transactions are often complex and can expose participants to market and credit risks. To mitigate these risks, reduce transaction costs, and enhance liquidity, this paper proposes a blockchain-based matching mechanism for financial derivatives that uses smart contracts for decentralized counterparty matching and settlement. Smart contracts facilitate secure data sharing among participants, ensuring the integrity and immutability of transaction data. We design a transaction pool mechanism-based smart contracts for counterparty matching and automatic settlement of financial derivatives involving real fiat currencies and introduce an efficient peer-to-peer counterparty matching method, where the entire trading process is conducted on a decentralized blockchain, ensuring greater security and transparency. A prototype implementation based on Ethereum smart contracts validates the effectiveness of our proposed model, demonstrating its potential to streamline and secure financial derivative transactions.</div></div>","PeriodicalId":53141,"journal":{"name":"Blockchain-Research and Applications","volume":"6 4","pages":"Article 100300"},"PeriodicalIF":5.6,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145468052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Blockchain-Research and Applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1