本文已被:浏览 13638次 下载 33160次 |
码上扫一扫! |
区块链的网络安全:威胁与对策 |
房卫东,张武雄,潘涛,陈伟,杨旸 |
|
(中国科学院 上海微系统与信息技术研究所 无线传感器网络与通信重点实验室, 上海 中国 201899;上海无线通信研究中心, 上海 中国 201210;神华信息技术有限公司, 北京 中国 100011;中国矿业大学 计算机科学与技术学院, 徐州 中国 221116) |
|
摘要: |
区块链以其特有的安全性,已在许多领域中得到应用。然而,对其网络安全的进一步研究往往被忽略,较为突出的表现之一就是关于这方面的研究成果很少被关注并发表。本文针对区块链数据的完整性、匿名性与隐私保护的安全需求,系统分析了区块链的安全攻击,综述了安全保护技术研究进展,尤其对区块链密码学安全防护技术进行了对比分析。本文对当前区块链安全防护技术的综述工作,将有效地帮助区块链的架构优化与安全算法改进。 |
关键词: 区块链 网络安全 安全攻击 完整性 |
DOI:10.19363/j.cnki.cn10-1380/tn.2018.03.05 |
投稿时间:2017-10-16修订日期:2018-02-04 |
基金项目:本课题得到国家自然科学基金(No.61471346,No.61461136003);上海市自然科学基金(No.17ZR1429100);国家重点研发计划专项(No.2016YFC0801805);上海市科技创新行动计划(No.17511105903,No.17DZ1200302)资助。 |
|
Cyber Security in Blockchain: Threats and Countermeasures |
FANG Weidong,ZHANG Wuxiong,PAN Tao,CHEN Wei,YANG Yang |
Key Laboratory of Wireless Sensor Network & Communication, Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai 201899, China;Shanghai Research Center for Wireless Communication, Shanghai 201210, China;Shenhua Information Technology Co., LTD, Beijing 100011, China;School of Computer Science and Technology, China University of Mining and Technology, Xuzhou 221116, China |
Abstract: |
Since the blockchain has unique security, it has been applied in many areas. However, further research on cyber security is often ignored in blockchain. One of the more prominent phenomena is that, the research results on cyber security are seldom concerned and published. In this paper, based on the following security requirements of blockchain:the integrity, the anonymity and the privacy preservation, we systematically analyze the security attacks in blockchain, and summarize the state-of-the-art research progress of security protection technology, especially the cryptography security protection technology for blockchain. The contributions of this paper will facilitate to optimize the system architecture, and improve the security algorithm for blockchain effectively. |
Key words: blockchain cyber security security attack integrity |