期刊文献+
共找到985篇文章
< 1 2 50 >
每页显示 20 50 100
Cross-chain mapping blockchain:Scalable data management in massive IoT networks
1
作者 Wenjian Hu Yao Yu +3 位作者 Xin Hao Phee Lep Yeoh Lei Guo Yonghui Li 《Digital Communications and Networks》 2025年第4期1124-1139,共16页
We propose a Cross-Chain Mapping Blockchain(CCMB)for scalable data management in massive Internet of Things(IoT)networks.Specifically,CCMB aims to improve the scalability of securely storing,tracing,and transmitting I... We propose a Cross-Chain Mapping Blockchain(CCMB)for scalable data management in massive Internet of Things(IoT)networks.Specifically,CCMB aims to improve the scalability of securely storing,tracing,and transmitting IoT behavior and reputation data based on our proposed cross-mapped Behavior Chain(BChain)and Reputation Chain(RChain).To improve off-chain IoT data storage scalability,we show that our lightweight CCMB architecture efficiently utilizes available fog-cloud resources.The scalability of on-chain IoT data tracing is enhanced using our Mapping Smart Contract(MSC)and cross-chain mapping design to perform rapid Reputation-to-Behavior(R2B)traceability queries between BChain and RChain blocks.To maximize off-chain to on-chain throughput,we optimize the CCMB block settings and producers based on a general Poisson Point Process(PPP)network model.The constrained optimization problem is formulated as a Markov Decision Process(MDP),and solved using a dual-network Deep Reinforcement Learning(DRL)algorithm.Simulation results validate CCMB’s scalability advantages in storage,traceability,and throughput.In specific massive IoT scenarios,CCMB can reduce the storage footprint by 50%and traceability query time by 90%,while improving system throughput by 55%compared to existing benchmarks. 展开更多
关键词 Blockchain cross-chain mappings Data management Internet of things Deep reinforcement learning
在线阅读 下载PDF
Analysis and Design of an ROS Attack-Resistant Adaptor Signature Scheme for Multiparty Cyclic Cross-Chain
2
作者 Mengyan Li Maoning Wang Meijiao Duan 《国际计算机前沿大会会议论文集》 2025年第1期459-485,共27页
To increase the interoperability and privacy of digital asset transactions in multiparty cross-chain scenarios,Chen et al.proposed a cross-chain protocol based on multi-signatures and adaptor signatures that does not ... To increase the interoperability and privacy of digital asset transactions in multiparty cross-chain scenarios,Chen et al.proposed a cross-chain protocol based on multi-signatures and adaptor signatures that does not rely on smart contracts but instead depends on underlying scripts and signatures.However,since the protocol was designed without considering concurrent execution scenarios,it may still be vulnerable to certain types of attacks,posing potential security risks in practical applications.Therefore,this paper first presents an ROS attack against Chen et al.’s scheme,in which ROS attack was originally proposed by Benhamouda et al.in 2022 against the Schnorr-type threshold and multi-signatures and our attack exploits the random numbers generated by users in the offline-tolerant mechanism.By using a system of equations construction method,it is possible to forge valid signatures for arbitrary messages.Subsequently,the existing Chen et al.’s scheme is improved by establishing a nonlinear dependency between the random number and the message,without introducing additional interaction rounds or random parameters.This improvement eliminates the solvability of the linear system of equations in the ROS attack,thereby defending against this type of attack.Furthermore,security definitions and proofs are provided,detailing the complete properties of the improved adaptor signature scheme.Therefore,the proposed scheme in this paper enhances the theoretical security strength while maintaining the functionality and efficiency of Chen et al.’s scheme,and hence has more effective practicality. 展开更多
关键词 Blockchain cross-chain Swap Ad aptorSignature·Multi-Signature
原文传递
A Blockchain Cross-Chain Transaction Protection Scheme Based on FHE
3
作者 Hongliang Tian Zuoqing Li 《Computers, Materials & Continua》 2025年第3期3983-4002,共20页
Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection sche... Low data encryption efficiency and inadequate security are two issues with the current blockchain cross-chain transaction protection schemes.To address these issues,a blockchain cross-chain transaction protection scheme based on Fully Homomorphic Encryption(FHE)is proposed.In the proposed scheme,the functional relationship is established by Box-Muller,Discrete Gaussian Distribution Function(DGDF)and Uniform Random Distribution Func-tion(URDF)are used to improve the security and efficiency of key generation.Subsequently,the data preprocessing function is introduced to perform cleaning,deduplication,and normalization operations on the transaction data of multi-key signature,and it is classified into interactive data and asset data,so as to perform different homomorphic operations in the FHE encryption stage.Ultimately,in the FHE encryption stage,homomorphic multiplication and homomorphic addition are used targeted for the interactive data and asset data,thereby reducing the computational complexity and enhancing the FHE encryption efficiency.The significance of the proposed scheme is proved by experimental results:Firstly,the multi-key generation function and its specific sampling method and transformation ensure the security and efficiency of key generation.Data preprocessing can also accelerate the FHE encryption process by eliminating invalid data and redundancy,so the FHE encryption efficiency is significantly improved.Secondly,the FHE encryption method based on discrete logarithm problem enhances the security of transaction data and can effectively resist multiple attacks.In addition,the preprocessed data also has good performance in capacity storage.The proposed scheme has significant impacts on key indicators such as encryption efficiency and security,it provides a new reference for blockchain cross-chain transaction protection technology and has an important impact on the security improvement of various cross-chain transaction data. 展开更多
关键词 Blockchain cross-chain transactions fully homomorphic encryption(FHE)
在线阅读 下载PDF
A notary group-based cross-chain mechanism 被引量:10
4
作者 Anping Xiong Guihua Liu +2 位作者 Qingyi Zhu Ankui Jing Seng W.Loke 《Digital Communications and Networks》 SCIE CSCD 2022年第6期1059-1067,共9页
As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between... As an emerging distributed technology, blockchain has begun to penetrate into many fields such as finance, healthcare, supply chain, intelligent transportation. However, the interoperability and value exchange between different independent blockchain systems is restricting the expansion of blockchain. In this paper, a notary group-based cross-chain interaction model is proposed to achieve the interoperability between different blockchains. Firstly, a notary election mechanism is proposed to choose one notary from the notary group to act as a bridge for cross-chain transactions. Secondly, a margin pool is introduced to limit the misconduct of the elected notary and ensure the value transfer between the involved blockchains. Moreover, a reputation based incentive mechanism is used to encourage members of the notary group to participate in cross-chain transactions. Ethereum-based experiments demonstrate that the proposed mechanism can provide an acceptable performance for cross-chain transactions and provide a higher security level than ordinary cross-chain mechanisms. 展开更多
关键词 Blockchain cross-chain Notary group Reputation ranking Incentive mechanisms
在线阅读 下载PDF
Attacks Against Cross-Chain Systems and Defense Approaches:A Contemporary Survey 被引量:7
5
作者 Li Duan Yangyang Sun +3 位作者 Wei Ni Weiping Ding Jiqiang Liu Wei Wang 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2023年第8期1647-1667,共21页
The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockc... The blockchain cross-chain is a significant technology for inter-chain interconnection and value transfer among different blockchain networks.Cross-chain overcomes the“information island”problem of the closed blockchain network and is increasingly applied to multiple critical areas such as finance and the internet of things(IoT).Blockchain can be divided into three main categories of blockchain networks:public blockchains,private blockchains,and consortium blockchains.However,there are differences in block structures,consensus mechanisms,and complex working mechanisms among heterogeneous blockchains.The fragility of the cross-chain system itself makes the cross-chain system face some potential security and privacy threats.This paper discusses security defects on the cross-chain implementation mechanism,and discusses the impact of the structural features of blockchain networks on cross-chain security.In terms of cross-chain intercommunication,a cross-chain attack can be divided into a multi-chain combination attack,native chain attack,and inter-chain attack diffusion.Then various security threats and attack paths faced by the cross-chain system are analyzed.At last,the corresponding security defense methods of cross-chain security threats and future research directions for cross-chain applications are put forward. 展开更多
关键词 Blockchain cross-chain DEFENSE distributed private key control hash-locking NOTARY security threats sidechain/relay
在线阅读 下载PDF
Model of decentralized cross-chain energy trading for power systems 被引量:5
6
作者 Shaomin Zhang Cong Hou 《Global Energy Interconnection》 EI CAS CSCD 2021年第3期324-334,共11页
With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficien... With the development of the energy Internet, more distributed generators are connected to the power grid, resulting in numerous heterogeneous energy networks. However, different energy networks cannot perform efficient energy trading in the centralized management mode, this deeply affecting the complementary ability of heterogeneous energy, resulting in the islanded energy phenomenon. In this model, the same energy on the chain is traded within the chain, and the heterogeneous energy on different chains is traded across chains. To trade energy between heterogeneous energy networks more efficiently, the blockchain-based cross-chain model is proposed based on the existing infrastructure. Heterogeneous energy nodes are assigned to different energy sub-chains and cross-chain energy transactions are performed through a relay-chain, which utilizes the improved Boneh–Lynn–Shacham signature scheme consensus algorithm based on the proof-of-stake and practical Byzantine fault tolerance. The experimental simulations on energy trading efficiency, throughput, and security, show its superiority over existing systems. Further, the simulation results provide a reference for the application of cross-chain technology in energy interconnection. 展开更多
关键词 Energy internet Blockchain cross-chain transaction Distributed generation Consensus algorithm
在线阅读 下载PDF
An Understandable Cross-Chain Authentication Mechanism for JointCloud Computing
7
作者 Feng Jiang Huai-Min Wang +4 位作者 Pei-Chang Shi Xiang Fu Liao-Liao Feng Rui Li Mo-Heng Lin 《Journal of Computer Science & Technology》 2025年第3期621-636,共16页
JointCloud computing is a new computing paradigm that supports cloud services to achieve mutually beneficial outcomes.A key component of this model is the JointCloud computing distributed ledger,which ensures trust am... JointCloud computing is a new computing paradigm that supports cloud services to achieve mutually beneficial outcomes.A key component of this model is the JointCloud computing distributed ledger,which ensures trust among cloud entities with diverse interests by providing digital space evidence.Blockchain forms the foundation of this framework,and its adoption is growing in various fields to optimize workflows.However,challenges related to blockchain interoperability and cross-chain data authentication remain unresolved,hindering the broader establishment of trust among cloud entities.This paper focuses on the specific scenario of cross-chain data authentication and provides a secure and easy-to-deploy solution.Drawing on the concepts of relay chain and notary mechanism in cross-chain methods,our solution leverages smart contracts and on-chain proofs to ensure security,thereby reducing the reliance on relay nodes.In cases of data falsification,our method offers mechanisms for accountability and data revocation,further enhancing security.Additionally,participating blockchains do not need to alter their data structures or network compositions for authentication,which makes the solution easy to deploy.Experimental results demonstrate that our design can be easily deployed on both homogeneous and heterogeneous blockchains.While maintaining performance comparable to existing solutions,it significantly enhances system security.In the event of data falsification,the solution can quickly hold individuals accountable and eliminate the impact of falsified data,reducing the time to mitigate the impact by half compared with other solutions. 展开更多
关键词 blockchain JointCloud computing smart contract cross-chain data authentication ACCOUNTABILITY
原文传递
Anti-quantum cross-chain identity authentication approach using dynamic group signature
8
作者 Huifang YU Mengjie HUANG 《Frontiers of Information Technology & Electronic Engineering》 2025年第5期742-752,共11页
To solve the privacy leakage and identity island problems in cross-chain interaction,we propose an anti-quantum cross-chain identity authentication approach based on dynamic group signature(DGS-AQCCIDAA)for smart educ... To solve the privacy leakage and identity island problems in cross-chain interaction,we propose an anti-quantum cross-chain identity authentication approach based on dynamic group signature(DGS-AQCCIDAA)for smart education.The relay-based cross-chain model promotes interconnection in heterogeneous consortium blockchains.DGS is used as the endorsement strategy for cross-chain identity authentication.Our approach can ensure quantum security under the learning with error(LWE)and inhomogeneous small integer solution(ISIS)assumptions,and it uses non-interactive zero-knowledge proof(NIZKP)to protect user identity privacy.Our scheme has low calculation overhead and provides anonymous cross-chain identity authentication in the smart education system. 展开更多
关键词 cross-chain Identity authentication Dynamic group signature(DGS) Anti-quantum security Zero-knowledge proof
原文传递
基于BERT模型的跨链异常交易检测
9
作者 申振龙 童燕翔 +2 位作者 王萧 王奔 张鹏程 《计算机工程》 北大核心 2026年第1期254-265,共12页
跨链是一种打破区块链网络“信息孤岛”,实现不同区块链网络之间互操作的重要技术。作为跨链实现的产物,跨链桥已成为异构区块链之间实现资产转移和信息传递的重要解决方案。近几年,针对跨链桥漏洞的攻击频繁发生,攻击导致的跨链交易异... 跨链是一种打破区块链网络“信息孤岛”,实现不同区块链网络之间互操作的重要技术。作为跨链实现的产物,跨链桥已成为异构区块链之间实现资产转移和信息传递的重要解决方案。近几年,针对跨链桥漏洞的攻击频繁发生,攻击导致的跨链交易异常已造成高达数十亿的经济损失。然而,目前对跨链桥的异常交易问题研究较少,且仅有的一些检测工作高度依赖于人工总结的交易序列异常模式。针对这一问题,提出一种基于BERT(Bidirectional Encoder Representations from Transformers)模型的跨链异常交易检测方法,通过提供基于特征提取的2种检测模式,克服现有检测方法对人工经验依赖的局限性。第1种模式旨在更精准地提取特征,先根据交易状态从跨链原生交易数据中自动抽取具有关键特征的跨链交易序列,再通过跨链交易序列文本数据微调BERT-Base-Uncased预训练模型适应异常交易检测任务;第2种模式旨在弥补仅考虑关键跨链交易序列可能带来的特征不足,直接通过具有全面特征的原始交易文本数据微调BERT-Base-Uncased预训练模型进而解决异常交易检测任务。实验使用现有工作的真实跨链数据评估所提检测方法,结果表明,2种检测模式均能有效检测出异常的跨链交易,精确率、召回率及F1值均达到了100%。 展开更多
关键词 区块链 跨链桥 跨链交易 漏洞 交易序列
在线阅读 下载PDF
基于区块链的数据安全共享研究
10
作者 郭毅 李旭青 +3 位作者 张子蛟 张宏涛 张连成 张香丽 《信息网络安全》 北大核心 2026年第1期1-23,共23页
数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共... 数据作为数字化时代的“新石油”,要挖掘其蕴含的重要价值,必须保障数据共享的绝对安全。传统数据安全共享模式存在集权化和信任缺失的问题,易引发“单点故障”。区块链技术具备去中心化、透明可追溯和不可篡改的特性,将其应用于数据共享领域,能够显著提升共享过程的安全性与可信性。文章对基于区块链的数据安全共享相关研究工作进行综述。首先,构建了基于区块链的数据安全共享模型,并阐释了数据存储、访问控制、数据传输及隐私保护这3种关键技术的概念与定义;然后,针对数据存储、访问控制、数据传输及隐私保护、跨链技术的相关研究,从基本思想、优缺点及适用场景3个维度展开详细分析与对比;最后,探讨了当前基于区块链的数据安全共享面临的权限动态调整困难、数据隐私与透明性冲突等核心问题,并提出了若干可行的解决思路,同时对未来研究方向进行了展望。 展开更多
关键词 区块链 数据存储 访问控制 数据传输及隐私保护 跨链
在线阅读 下载PDF
大规模任务场景下多无人机协同任务分配方法
11
作者 王俊杰 闫东宇 +1 位作者 郝永平 徐九龙 《兵工学报》 北大核心 2026年第1期244-260,共17页
目前,多无人机(Unmanned Aerial Vehicle,UAV)在大规模任务场景下的任务分配问题仍是一个挑战性问题。传统启发式算法可在较低计算复杂度下得到满意的解,但收敛速度慢且难以收敛到全局最优解。为此提出一种基于UAV链、任务链和双阶段修... 目前,多无人机(Unmanned Aerial Vehicle,UAV)在大规模任务场景下的任务分配问题仍是一个挑战性问题。传统启发式算法可在较低计算复杂度下得到满意的解,但收敛速度慢且难以收敛到全局最优解。为此提出一种基于UAV链、任务链和双阶段修复策略的遗传算法(Genetic Algorithm Based on UAV-chain,Task-chain,and Two-Stage Repair strategy,UTTSRGA)。在编码结构中设计UAV链和任务链来量化任务执行代价,增强了编码中的信息承载能力并显著提升搜索效率。针对交叉操作后出现任务缺失与任务重复问题,设计双阶段修复策略。第一阶段设计随机填充机制,增强对解空间的全局搜索能力;第二阶段设计邻接映射表修复机制,根据任务间的邻接关系提供进化方向,有效引导种群向当前最优解快速收敛。提出动态复合变异策略,融合自适应变异率与基于任务链值的变异点选择,并设计4种功能互补的变异算子,多维度协同优化解的质量。针对大规模场景下的路径交叉问题,引入路径优化策略,从实践角度进一步优化任务分配方案。实验结果表明,UTTSRGA在不同任务规模下,尤其是大规模复杂任务场景中,在解的质量、收敛速度和鲁棒性3个方面均表现出显著优势。 展开更多
关键词 多无人机协同 无人机链 任务链 双阶段修复机制 路径交叉
在线阅读 下载PDF
Research on cross-chain and interoperability for blockchain system 被引量:1
12
作者 Li Ming Qiu Honglin +2 位作者 Xu Quanqing Song Wenpeng Liu Baixiang 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2021年第5期1-17,26,共18页
At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘va... At present, there is an urgent need for blockchain interoperability technology to realize interconnection between various blockchains, data communication and value transfer between blockchains, so as to break the ‘value silo’ phenomenon of each blockchain. Firstly, it lists what people understand about the concept of interoperability. Secondly, it gives the key technical issues of cross-chain, including cross-chain mechanism, interoperability, eventual consistency, and universality. Then, the implementation of each cross-chain key technology is analyzed, including Hash-locking, two-way peg, notary schemes, relay chain scheme, cross-chain protocol, and global identity system. Immediately after that, five typical cross-chain systems are introduced and comparative analysis is made. In addition, two examples of cross-chain programmability and their analysis are given. Finally, the current state of cross-chain technology is summarized from two aspects: key technology implementation and cross-chain application enforcement. The cross-chain technology as a whole has formed a centralized fixed mechanism, as well as a trend of modular design, and some of the solutions to mature applications were established in the relevant standards organizations, and the cross-chain technology architecture tends to be unified, which is expected to accelerate the evolution of the open cross-chain network that supports the real needs of the interconnection of all chains. 展开更多
关键词 blockchain distributed ledger technology cross-chain INTEROPERABILITY Hash-locking NOTARY RELAY multi-chain
原文传递
A verifiable and efficient cross-chain calculation model for charging pile reputation 被引量:1
13
作者 Cui Zhang Yunhua He +3 位作者 Bin Wu Hui Yang Ke Xiao Hong Li 《High-Confidence Computing》 EI 2024年第2期105-115,共11页
To solve the current situation of low vehicle-to-pile ratio,charging pile(CP)operators incorporate private CPs into the shared charging system.However,the introduction of private CP has brought about the problem of po... To solve the current situation of low vehicle-to-pile ratio,charging pile(CP)operators incorporate private CPs into the shared charging system.However,the introduction of private CP has brought about the problem of poor service quality.Reputation is a common service evaluation scheme,in which the third-party reputation scheme has the issue of single point of failure;although the blockchain-based reputation scheme solves the single point of failure issue,it also brings the challenges of storage and query efficiency.It is a feasible solution to classify and store information on multiple chains,and at this time,reputation needs to be calculated in a cross-chain mode.Crosschain reputation calculation faces the problems of correctness verification,integrity verification and efficiency.Therefore,this paper proposes a verifiable and efficient cross-chain calculation model for CP reputation.Specially,in this model,we propose a verifiable cross-chain contract calculation scheme that adopts polynomial commitment to solve the problems of polynomial damage and tampering that may be encountered in the crosschain process of outsourced polynomials,so as to ensure the integrity and correctness of polynomial calculations.In addition,the miner selection and incentive mechanism algorithm in this scheme ensures the correctness of extracted information when the outsourced polynomial is calculated on the blockchain.The security analysis and experimental results demonstrate that this scheme is feasible in practice. 展开更多
关键词 Blockchain Shared charging REPUTATION cross-chain Verifiable
在线阅读 下载PDF
农产品跨境电商与冷链物流协同发展问题与对策
14
作者 隋青 张晓华 +2 位作者 张长峰 郭风军 陈满江 《保鲜与加工》 北大核心 2026年第1期129-135,共7页
农产品跨境电商与冷链物流的协同发展是顺应全球化贸易趋势的必然选择,也是提高农产品附加值、降低损耗和促进农民增收的重要途径;二者相辅相成、相互促进,成为农产品国际贸易的重要支撑。总结了我国农产品跨境电商的发展现状,剖析了影... 农产品跨境电商与冷链物流的协同发展是顺应全球化贸易趋势的必然选择,也是提高农产品附加值、降低损耗和促进农民增收的重要途径;二者相辅相成、相互促进,成为农产品国际贸易的重要支撑。总结了我国农产品跨境电商的发展现状,剖析了影响其发展的关键因素,指出了跨境电商冷链物流产业现存的问题。在此基础上,提出了针对性的解决对策,主要包括通过优化跨境电商物流系统,构建高效温控供应链,实现农产品全过程的监测与质量追溯和构建完善的法律规范体系,从而为农产品跨境电商的健康发展提供坚实保障。 展开更多
关键词 农产品 跨境电商 冷链物流 协同发展
在线阅读 下载PDF
协同理论视角下基础-临床研究交叉融合的影响路径及策略探析
15
作者 刘诗晴 胡友坤 +3 位作者 刘亚伟 张新禄 黄媛 赵镇 《科技管理研究》 2026年第2期234-247,共14页
推动基础研究与临床研究有组织的结合是激发医学创新活力的核心,而明晰基础-临床研究交叉融合的影响路径是促进二者深度融合的关键。从协同理论视角,构建“政府-社会-单位-个人”的多元主体协同模型框架,基于实证研究调查数据,运用链式... 推动基础研究与临床研究有组织的结合是激发医学创新活力的核心,而明晰基础-临床研究交叉融合的影响路径是促进二者深度融合的关键。从协同理论视角,构建“政府-社会-单位-个人”的多元主体协同模型框架,基于实证研究调查数据,运用链式中介效应模型揭示影响路径,为推动基础-临床研究交叉融合提出政策建议。研究结果显示:我国基础研究与临床研究交叉融合已从自发探索进入系统推进阶段,跨领域参与度显著提升,需求导向协同创新研究模式初见成效,但仍面临着政策协同不足、资源配置分散、管理制度不完善等问题;构建的中介效应模型揭示了4条核心影响路径,明确了政府引导驱动对促进基础-临床研究交叉融合有直接显著正向影响;而社会组织支持、单位管理效能在促进交叉科研行为中均发挥中介作用,且单位的中介效应强于社会组织。基于此,通过政策牵引、资源整合、机制创新、个体激活的四维驱动,形成“政府搭台、社会织网、组织赋能、人才唱戏”的创新格局,以期为加速推动基础研究与临床研究的深度融合提供新对策。 展开更多
关键词 基础研究 临床研究 跨领域研究 交叉融合 协同理论 链式中介
在线阅读 下载PDF
基于属性加密技术的去中心化跨链车联网数据共享方案
16
作者 俞惠芳 周雯泽 《小型微型计算机系统》 北大核心 2026年第3期709-714,共6页
针对车联网中隐私泄露、数据易被非授权访问及篡改、云存储系统单点故障等问题,提出一种基于属性加密技术的跨链数据交互方法.传统单区块链模式存在数据共享壁垒,难以实现不同品牌车辆链间的数据互通,存储模式单一且无法规避数据孤岛问... 针对车联网中隐私泄露、数据易被非授权访问及篡改、云存储系统单点故障等问题,提出一种基于属性加密技术的跨链数据交互方法.传统单区块链模式存在数据共享壁垒,难以实现不同品牌车辆链间的数据互通,存储模式单一且无法规避数据孤岛问题.所提方案通过中继链、云存储系统和可扩展的拜占庭容错共识机制的融合,解决了传统单区块链模式的可扩展性限制和海量数据的存储问题,设置访问树结构和文件访问有效期进行细粒度访问控制.分散的路侧单元采集车辆实时信息上传至区块链,协助用户完成数据上链;利用可信中继链实现同一城区内不同品牌车辆之间的数据交换.所提方案安全性高且适于复杂庞大的数据环境.相比而言,总计算效率相比同类算法提升约14.28%,通信总开销降低34.4%,极大地提升了跨链数据交换效率. 展开更多
关键词 车联网 跨链协议 数据共享 中继链 密文策略
在线阅读 下载PDF
供应链协同下的异地投资与企业资源配置效率
17
作者 刘宇桦 倪一宁 马野青 《山西财经大学学报》 北大核心 2026年第1期101-113,共13页
依托供应链区位布局异地投资是全国统一大市场建设的重要路径。基于2002—2023年中国上市企业数据,考察供应链协同下异地投资对企业资源配置效率的影响。研究发现,供应链协同下异地投资能够显著提升企业的资源配置效率,作用路径为增强... 依托供应链区位布局异地投资是全国统一大市场建设的重要路径。基于2002—2023年中国上市企业数据,考察供应链协同下异地投资对企业资源配置效率的影响。研究发现,供应链协同下异地投资能够显著提升企业的资源配置效率,作用路径为增强供应链风险感知能力、提升供需匹配度和减少关系专用性资产投资。异质性分析显示,该效应在低营运效率、高信息披露质量、高供应商和客户集中度以及生产与销售效率更高的企业更为显著。进一步研究发现,企业采用投资设立子公司与跨行业投资模式才能实现资源配置优势。 展开更多
关键词 供应链协同 异地投资 资源配置效率 供应链风险 风险感知 供需匹配度 专用资产投资 跨行业投资
原文传递
以“链”促投:产业链链长制与企业异地投资决策
18
作者 梁小甜 洪金明 《山西财经大学学报》 北大核心 2026年第1期64-76,共13页
明确产业链链长制对企业异地投资决策的作用机制,能够为优化链长制政策设计与增强产业链韧性提供重要的经验依据。以2010—2023年A股上市公司为研究样本,实证检验产业链链长制对企业异地投资决策的影响。研究发现,产业链链长制促进了企... 明确产业链链长制对企业异地投资决策的作用机制,能够为优化链长制政策设计与增强产业链韧性提供重要的经验依据。以2010—2023年A股上市公司为研究样本,实证检验产业链链长制对企业异地投资决策的影响。研究发现,产业链链长制促进了企业跨市投资,但对跨省投资没有显著影响。机制检验表明,产业链链长制通过降低企业交易成本、减弱政策不确定性感知、提升供应链网络位置促进企业跨市投资。异质性分析显示,当地区数字产业基础好、行业竞争度高及企业金融资源多时,政策效应更显著。拓展性分析表明,由省级领导担任链长更能促进企业跨市投资,且该政策有助于增强产业链韧性与产业集聚。 展开更多
关键词 产业链链长制 企业异地投资 产业链韧性 企业交易成本 政策不确定性 供应链网络 产业集聚 行业竞争
原文传递
区块链技术在ESG会计报告中的应用
19
作者 徐嘉骏 《商业观察》 2026年第6期101-104,共4页
在全球ESG投资快速发展的背景下,企业ESG报告面临数据可信度不足与审计效率低下的双重挑战。传统ESG会计流程因人工填报的主观性、部门数据壁垒及验证成本高昂等问题,易引发信息不对称与数据失真风险。研究聚焦区块链技术对ESG治理体系... 在全球ESG投资快速发展的背景下,企业ESG报告面临数据可信度不足与审计效率低下的双重挑战。传统ESG会计流程因人工填报的主观性、部门数据壁垒及验证成本高昂等问题,易引发信息不对称与数据失真风险。研究聚焦区块链技术对ESG治理体系的重构逻辑,通过文献分析与技术框架设计,系统探讨其在数据真实性保障、审计流程优化及标准化建设中的作用路径。研究发现,区块链技术通过分布式账本、智能合约与加密算法形成三重治理机制:其一,构建数据全流程上链存证体系,实现环境、社会等核心指标的不可篡改追溯,从源头遏制数据造假;其二,利用智能合约自动执行数据校验规则,打通跨部门信息孤岛,显著降低人工核验成本;其三,基于隐私计算技术实现敏感数据的可信验证,平衡信息披露与商业机密保护需求。技术应用推动ESG数据格式标准化与审计流程智能化,为碳配额核算、环境权益交易等场景提供可信基础设施。 展开更多
关键词 区块链技术 数据可信度 ESG会计 跨链互操作性
在线阅读 下载PDF
Reaching consensus for membership dynamic in secret sharing and its application to cross-chain
20
作者 Yan Zhu Bingyu Li +3 位作者 Zhenyang Ding Yang Yang Qianhong Wu Haibin Zheng 《High-Confidence Computing》 2023年第3期50-60,共11页
The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership... The communication efficiency optimization,censorship resilience,and generation of shared randomness are inseparable from the threshold cryptography in the existing Byzantine Fault Tolerant(BFT)consensus.The membership in consensus in a blockchain scenario supports dynamic changes,which effectively prevents the corruption of consensus participants.Especially in cross-chain protocols,the dynamic access to different blockchains will inevitably bring about the demand for member dynamic.Most existing threshold cryptography schemes rely on redefined key shares,leading to a static set of secret sharing participants.In this paper,we propose a general approach to coupling blockchain consensus and dynamic secret sharing.The committee performs consensus confirmation of both dynamic secret sharing and transaction proposals.Our scheme facilitates threshold cryptography membership dynamic,thus underlying support for membership dynamic of threshold cryptographybased BFT consensus schemes.We instantiate a dynamic HotStuff consensus to demonstrate the effectiveness of the scheme.After the correctness and security proof,our scheme achieves the secrecy and integrity of the threshold key shares while ensuring consensus liveness and safety.Experimental results prove that our scheme obtains dynamic membership with negligible overhead. 展开更多
关键词 Threshold cryptography Byzantine fault tolerant cross-chain CONSENSUS Dynamic secret sharing
在线阅读 下载PDF
上一页 1 2 50 下一页 到第
使用帮助 返回顶部