期刊文献+
共找到8篇文章
< 1 >
每页显示 20 50 100
High-Level Security Dimension Evaluation of Blockchain BaaS System and Key Technology
1
作者 Chen Wanfa Zheng Qing’an +2 位作者 Chen Shuzhen Fu Hongyi Chen Liang 《China Communications》 SCIE CSCD 2024年第6期176-191,共16页
In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applicat... In recent years,blockchain technology integration and application has gradually become an important driving force for new technological innovation and industrial transformation.While blockchain technology and applications are developing rapidly,the emerging security risks and obstacles have gradually become prominent.Attackers can still find security issues in blockchain systems and conduct attacks,causing increasing losses from network attacks every year.In response to the current demand for blockchain application security detection and assessment in all industries,and the insufficient coverage of existing detection technologies such as smart contract detectiontechnology,this paper proposes a blockchain core technology security assessment system model,and studies the relevant detection and assessment key technologies and systems.A security assessment scheme based on a smart contract and consensus mechanism detection scheme is designed.And the underlying blockchain architecture supports the traceability of detection results using super blockchains.Finally,the functionality and performance of the system were tested,and the test results show that the model and solutions proposed in this paper have good feasibility. 展开更多
关键词 blockchain security consensus mechanis smart contract
在线阅读 下载PDF
Hydraulic fracture initiation theory for a horizontal well in a coal seam 被引量:19
2
作者 Hou Bing Chen Mian +2 位作者 Wang Zheng Yuan Jianbo Liu Ming 《Petroleum Science》 SCIE CAS CSCD 2013年第2期219-225,共7页
A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experim... A series of experiments were pertbrmed to determine rock mechanical parameters related to hydraulic fracturing of coal. The effect of confining pressure and pore pressure on the strength of coal was stt, died. Experimental results show that the coal seam in the study areas has a relatively low elastic modulus, high Poisson's ratio, high fragility and is easily broken and compressed. The coal seam is considered as a transversely isotropic medium, since the physical properties in the direction of bedding plane and orthogonal to the bedding plane vary markedly. Based on the generalized plane strain model, stress distribution for an arbitrarily orientated wellbore in the coal seam was determined. In a horizontal well, hydraulic fracturing was lbund to initiate in the coal seam mass due to tensile failure, or from cleats due to shear or tensile failure. For those coal seams with abundant natural cleats, hydraulic fracture initiation can be induced by any of these mechanisms. In this study, hydraulic fracture initiation criteria tbr a horizontal well in a coal seam were established. 展开更多
关键词 Hydraulic fracturing coal seam transversely isotropic fracture initiation CLEAT naturalfracture
在线阅读 下载PDF
A (2, 3) quantum threshold scheme based on Greenberger-Horne-Zeilinger state 被引量:2
3
作者 李渊 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第10期2875-2879,共5页
In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. T... In this paper, by using properties of quantum controlled-not manipulation and entanglement states, we have designed a novel (2, 3) quantum threshold scheme based on the Greenberger- Horne -Zeilinger (GHZ) state. The proposed scheme involves two phases, i.e. a secret sharing phase and a secret phase. Detailed proofs show that the proposed scheme is of unconditional security. Since the secret is shared among three participants, the proposed scheme may be applied to quantum key distribution and secret sharing. 展开更多
关键词 quantum threshold controlled-not manipulation secret sharing GHZ state
在线阅读 下载PDF
Quantum quasi-cyclic low-density parity-check error-correcting codes 被引量:1
4
作者 李渊 曾贵华 Moon Ho Leeb 《Chinese Physics B》 SCIE EI CAS CSCD 2009年第10期4154-4160,共7页
In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some ne... In this paper, we propose the approach of employing circulant permutation matrices to construct quantum quasicyclic (QC) low-density parity-check (LDPC) codes. Using the proposed approach one may construct some new quantum codes with various lengths and rates of no cycles-length 4 in their Tanner graphs. In addition, these constructed codes have the advantages of simple implementation and low-complexity encoding. Finally, the decoding approach for the proposed quantum QC LDPC is investigated. 展开更多
关键词 quantum LDPC code quasi-cycliC circulant permutation matrix CSS code
在线阅读 下载PDF
Sharing of Encrypted Lock Keys in the Blockchain-Based Renting House System from Time- and Identity-Based Proxy Reencryption 被引量:1
5
作者 Zhiwei Wang Liping Qian +1 位作者 Danwei Chen Guozi sun 《China Communications》 SCIE CSCD 2022年第5期164-177,共14页
To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secu... To design an efficient protocol for sharing the encrypted lock keys in the renting house system,we introduce a new notion called time-and identitybased proxy reencryption(TIPRE)and the blockchain platform.Our CPA secure TIPRE scheme is constructed from Green et al.’s identity-based proxy reencryption scheme by adding the time property.In every time period,a time stamp authority generates a public key embedded with the current time stamp for each user.In our protocol for the renting house system,the TIPRE scheme is the primary building block,and the blockchain platform serves instead of a trusted third party,such as a real estate agency between landlords and tenants.The TIPRE scheme allows the landlord to change the lock key at each time period for safety.The blockchain platform allows the landlords and tenants to directly interact,and all of the interactions are recorded in the blockchain database to provide the desired security requirements,such as nonrepudiation and unforgeability.Finally,we provide the secure analysis of our protocol and test its performance by implementing it in the MacBook Pro and the Intel Edison development platforms. 展开更多
关键词 identity-based proxy reencryption time stamp renting houses system blockchain
在线阅读 下载PDF
A Motivate Mechanism for Large-Scale P2P Content Delivery System
6
作者 ZHENG Yi HUANG Dan +2 位作者 YANG Yansong HUANG Yan CHEN Changjia 《China Communications》 SCIE CSCD 2014年第A02期118-127,共10页
For lack of effective resource adjustment method, the supply-demand relationship of each resource in P2P content delivery system are often unbalanced. Especially after a popular content releasing, a burst of downloade... For lack of effective resource adjustment method, the supply-demand relationship of each resource in P2P content delivery system are often unbalanced. Especially after a popular content releasing, a burst of downloaders often can't find sufficient uploaders and their request may starve the upload capacity of server. Therefore the overall system QoS may be degraded. To tackle such issue, this paper proposes a download rate accelerate mechanism, called motivate mechanism. With it, the system can quickly find out the files becoming insufficient by monitoring the operating status of the files hourly, Then it promptly increase the number of copies of those files by using free rider nodes so that the whole system QoS is maintained and the system performance is improved. The experiment results on the practical operating system of Tencent demonstrated that the proposed mechanism increases the download rate, saves the traffic on the server and optimizes the system performance. 展开更多
关键词 p2p content delivery system motivatemechanism user behaviour free-rider performanceoptimization
在线阅读 下载PDF
Novel Quantum Secret Sharing and Controlled Communication Schemes Based on Einstein-Podolsky-Rosen Correlations
7
作者 李渊 曾贵华 《Chinese Physics Letters》 SCIE CAS CSCD 2009年第1期25-28,共4页
Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein- Podolsky Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propos... Employing quantum registers, we first proposed a novel (2, 3) quantum threshold scheme based on Einstein- Podolsky Rosen (EPR) correlations in this letter. Motivated by the present threshold scheme, we also propose a controlled communication scheme to transmit the secret message with a controller. In the communication protocol, the encoded quantum message carried by particles sequence, is transmitted by legitimate communicators. 展开更多
在线阅读 下载PDF
Research and Implementation of Trusted Blockchain Core Technology Based on State Secret Algorithm
8
作者 Zheng Qingan Meng Jialin +2 位作者 Wu Junjie Li Jingtao Lin Haonan 《China Communications》 2025年第4期143-160,共18页
With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state s... With the rapid development of blockchain technology,the Chinese government has proposed that the commercial use of blockchain services in China should support the national encryption standard,also known as the state secret algorithm GuoMi algorithm.The original Hyperledger Fabric only supports internationally common encryption algorithms,so it is particularly necessary to enhance support for the national encryption standard.Traditional identity authentication,access control,and security audit technologies have single-point failures,and data can be easily tampered with,leading to trust issues.To address these problems,this paper proposes an optimized and application research plan for Hyperledger Fabric.We study the optimization model of cryptographic components in Hyperledger Fabric,and based on Fabric's pluggable mechanism,we enhance the Fabric architecture with the national encryption standard.In addition,we research key technologies involved in the secure application protocol based on the blockchain.We propose a blockchain-based identity authentication protocol,detailing the design of an identity authentication scheme based on blockchain certificates and Fabric CA,and use a dual-signature method to further improve its security and reliability.Then,we propose a flexible,dynamically configurable real-time access control and security audit mechanism based on blockchain,further enhancing the security of the system. 展开更多
关键词 access control authentication Hyperledger Fabric security audit state secret algorithm
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部