-
81
Information transmission mechanism of Blockchain technology based on named-data networking
Published 2018-01-01“…Recent researches on blockchain have been greatly concerned by academia and industry,while the communication based on TCP/IP protocol was not enough for broadcasting a large volume of data in blockchain technology.Therefore,a novel node model supporting push service for blockchain technology and a special procedure reading-writing the table of the node model were designed based on the named-data networking,which was a distributed network architecture supporting data transmission naturally.And then the information transmission architecture of blockchain technology via named-data networking was proposed.With the aggregation of the requests and data caching,this architecture could reduce the traffic redundancy and accelerate the communication speed.Meanwhile,a use case of bitcoin based on the proposed architecture was given,in order to better understand the architecture.A numerical simulation was used to verify the performance advantages of the proposed scheme.In addition,some related future research directions were presented.…”
Get full text
Article -
82
Decentralised Finance (DeFi) — How Tokenisation is Changing the Financial Industry
Published 2021-08-01“…This trend not only affects payment systems based on controversial crypto currencies such as Bitcoin, but also exchange platforms, capital markets solutions and corporate financing. …”
Get full text
Article -
83
Possibilities in Blockchain technology application
Published 2023-01-01“…Although it is a relatively new technology (first theoretical work dates from 2008), developed and applied primarily in payment systems (Bitcoin), it appeared that its potentials are far beyond it. …”
Get full text
Article -
84
Blockchain-based payment channel network: challenges and recent advances
Published 2024-10-01“…As the most well-known work on payment channel networks, the Lightning Network is deployed on Bitcoin, and its demonstration of efficient performance and high economic benefits in practical operation has triggered a great deal of attention and research. …”
Get full text
Article -
85
A blockchain architecture with master-slave blockchain
Published 2021-06-01“…With the continuous development of blockchain technology, different chains are derived due to different adaptation scenarios.Each chain has its own characteristics, such as public chains like bitcoin and ethereum, a large number of private chains and alliance chains.But as far as the current Internet is concerned, the implementation of many application scenarios on traditional blockchains has become particularly inconvenient.A master-slave blockchain (MSBC) architecture was proposed, which was mainly composed of a master block, a subordinate master block and a subordinate micro block.The master chain was composed of master blocks.Each master block has a slave master block and multiple slave micro block on its side chain.In addition, the master block and the master block were directly connected by the Hash of the previous block, the master block and the slave master block were connected by the Hash of the unique information, and the slave micro block and the previous block (whatever the slave master block or the slave micro block) was also connected by the Hash of the previous block.In talent chain, this kind of structure could put a person’s fixed resume information on the master chain, but updated resume information constantly on the slave side chain.MSBC architecture was more scalable, and it could improve the efficiency of data query.The experimental results show that the framework in the similar applications such as talent chain is feasible and the query efficiency has been improved greatly.…”
Get full text
Article -
86
Research on Multiparty Payment Technology Based on Blockchain and Smart Contract Mechanism
Published 2022-01-01“…Therefore, many users are willing to conduct transactions in blockchain cryptocurrency systems such as Bitcoin and Ethereum. However, the throughput of traditional blockchain is extremely low, and the transaction is so delayed. …”
Get full text
Article -
87
Research on Multistage Dynamic Trading Model Based on Gray Model and Auto-Regressive Integrated Moving Average Model
Published 2023-01-01“…The results show that by solving the quantitative portfolio trading model established in this paper and analyzing the sensitivity and robustness of the model, the price of gold and Bitcoin, two volatile assets, can be accurately predicted, and the best investment portfolio trading strategy can be effectively worked out on the premise of considering the risk level.…”
Get full text
Article -
88
Hayekian Hurdles: Challenges to Cryptocurrency as a Viable Basis for a New Monetary Order
Published 2025-01-01“…While cryptocurrencies reflect some aspects of Hayek’s model, their instability—especially in Bitcoin-like assets—undermines their role as a reliable alternative to fiat money. …”
Get full text
Article -
89
Libra
Published 2020-12-01“…O objetivo do trabalho é analisar as características dessa nova criptomoeda, destacando as principais diferenças em relação à bitcoin, uma vez que foi apresentada como uma resposta à volatilidade daquela e de outras criptomoedas, bem como de que forma o mercado e as parceiras da Associação Libra estão se posicionando quanto ao Projeto de implantação e formas de transações apresentadas em razão da falta de credibilidade de seu criador - Facebook. …”
Get full text
Article -
90
Can cryptos hedge against inflation? Evidence from biwavelet analysis
Published 2024-10-01“…Specifically, we investigate the co-movement between the Consumer Price Index (CPI) in the US, Euro, and Japan, and the returns as well as volatilities of four key cryptocurrencies (Bitcoin, Ethereum, Litecoin, and Ripple). In doing so, we adopt the biwavelet coherence framework using monthly data spanning over the period from September 2015 to May 2023. …”
Get full text
Article -
91
Overview of blockchain assets theft attacks and defense technology
Published 2023-02-01“…Since Satoshi Nakamoto’s introduction of Bitcoin as a peer-to-peer electronic cash system, blockchain technology has been developing rapidly especially in the fields of digital assets transferring and electronic currency payments.Ethereum introduced smart contract code, giving it the ability to synchronize and preserve the execution status of smart contract programs, automatically execute transaction conditions and eliminate the need for intermediaries.Web3.0 developers can use Ethereum’s general-purpose programmable blockchain platform to build more powerful decentralized applications.Ethereum’s characteristics, such as central-less control, public and transparent interaction data guaranteed by smart contracts, and user-controlled data, have attracted more attentions.With the popularization and application of blockchain technology, more and more users are storing their digital assets on the blockchain.Due to the lack of regulatory and governance authority, public chain systems such as Ethereum are gradually becoming a medium for hackers to steal digital assets.Generally, fraud and phishing attacks are committed using blockchain to steal digital assets held by blockchain users.This article aims to help readers develop the concept of blockchain asset security and prevent asset theft attacks implemented using blockchain at the source.The characteristics and implementation scenarios of various attacks were effectively studied by summarizing the asset theft attack schemes that hackers use in the blockchain environment and abstracting research methods for threat models.Through an in-depth analysis of typical attack methods, the advantages and disadvantages of different attacks were compared, and the fundamental reasons why attackers can successfully implement attacks were analyzed.In terms of defense technology, defense schemes were introduced such as targeted phishing detection, token authorization detection, token locking, decentralized token ownership arbitration, smart contract vulnerability detection, asset isolation, supply chain attack detection, and signature data legitimacy detection, which combine attack cases and implementation scenarios.The primary process and plans for implementation of each type of defense plan were also given.And then it is clear which protective measures can protect user assets in different attack scenarios.…”
Get full text
Article -
92
Physical One‐Way Functions for Decentralized Consensus Via Proof of Physical Work
Published 2025-02-01“…Abstract Decentralized consensus on the state of the Bitcoin blockchain is ensured by proof of work. It relies on digital one‐way functions and is associated with an enormous environmental impact. …”
Get full text
Article -
93
Detection method of mixed coin transaction based on CoinJoin——take the Wasabi platform as an example
Published 2023-12-01“…Designed to enhance the privacy of user transactions, mixed coin technology has created disruptions to the address clustering rules typically used for cryptocurrency regulation.Consequently, hackers have begun utilizing mixed coin technology as a tool for money laundering and fund evasion, which has raised concerns among financial regulators regarding the detection of mixed coin transactions.Currently, most detection methods for mixed coin transactions rely on data analysis and statistics, lacking a comprehensive understanding of the internal workings of these transactions.This lack of knowledge may undermine the credibility and effectiveness of detection methods due to the absence of reliable verification data.CoinJoin, a decentralized mixed coin concept, represents one approach, and commercial implementations like Wasabi have gained popularity.Drawing from the characteristics of CoinJoin and its restriction on the size of anonymous transaction sets and mixed coin amounts, a general detection method for CoinJoin mixed coin transactions was devised.Such transactions typically involved multiple inputs and outputs, with more output items than UTXOs in the input, and a high occurrence of duplicate values among the output amounts.A basic detection method for Wasabi was developed by combining the generic detection method for CoinJoin with specific features of Wasabi, as identified in related studies, to complete the detection process.A trusted validation dataset was acquired from the Wasabi platform service interface, and this dataset was analyzed to achieve two objectives.First, the alignment of rule parameters in the Wasabi base detection method was accomplished.Second, a new metric was proposed, measuring the ratio of the highest frequency of duplicate values in the output amount of transactions to the number of UTXOs in the input.This metric assessed the level of user participation in mixed coin transactions, providing a measure of user freedom.Using these two approaches, significant progress is made in the detection of mixed coin transactions.The experiments show that the recall rate of Wasabi’s basic detection method is 94.2% and the accuracy rate is 67.2%.After the analytical feedback from the credible validation dataset, the recall rate of the improved detection method reaches 100% and the accuracy rate is above 99%.The total market size of the entire CoinJoin type of mixed coin transactions was evaluated and predicted based on a common test methodology.It is concluded that the number of CoinJoin mixed coin transactions in today’s mixed coin market represents 1.9 per 1 000 of all Bitcoin transactions and 3.7 per 1 000 of the transaction value at most.…”
Get full text
Article