首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 62 毫秒
1.
传统的公平合同签署协议通过引入中心化的可信第三方来保证协议的公平性。当第三方不诚实且和签署一方进行合谋,就会对另一方产生不公平。同时,第三方可能会泄露参与方的敏感信息,这将极大地威胁参与方的隐私。故合同签署的公平性和隐私性均依赖于第三方的可靠性。基于区块链的公平合同签署协议可去中心化从而避免依赖第三方来解决公平性,但区块链可被公开访问和验证,这为参与方的隐私问题又带来新的挑战。已有的基于公开区块链的隐私保护公平合同签署协议利用参与方共享的秘密因子对合同信息及公钥进行加密从而隐藏了参与方数字证书中的真实身份信息;但在协议的承诺阶段,由于区块链的假名性,执行两笔保证金交易时可能会泄露正在签署合同的参与方信息。为最大限度保护参与方的身份隐私,本文基于混币技术,通过引入半诚实可信第三方来提供参与者身份的混淆服务,并结合盲的可验证加密签名方案,设计出新的隐私保护公平合同签署协议。该协议可支持多个合同签署人通过区块链完成公平的合同签署,不仅可以保护与合同相关的隐私内容,还可以保护参与方的身份隐私。  相似文献   

2.
区块链在商业交易领域的快速发展及应用,尤其是交易合同的签署对公平的需求,导致传统的单向信任模式的区块链需要更换为双向信任模式。基于已有的多种公平合同签署协议(fair contract signing protocol,FCSP),提出一种面向Fabric区块链的快速公平合同签署协议(TFCSP),与已有FCSP的分步多次区块上传或者简单智能合约的实现不同,TFCSP通过修改Fabric的gossip进程,由交易发起方对交易签名、接收方对块信息验证并签名再进行上传,这种多次异步签名一次上传及二次验证合约内容的方式保证了双向信任,并且大大提升了交易的效率。最后将该协议应用到保险区块链,完成其架构设计,并通过实验验证其有效性,实验结果表明,该协议在保证交易可信的前提下保持了较好的性能。  相似文献   

3.
在基于区块链的供应链管理溯源系统中,由于区块链技术是一种基于分布式的系统,对于区块链中存储的数据所有节点都会进行备份,如果直接把溯源数据存储在链上,这会导致数据占用大量内存,增加溯源系统维护成本和降低系统响应速度的问题。因此提出一种链下扩展存储方案,该方案首先利用SHA-256哈希算法的单向性对明文数据进行哈希运算得到哈希值,然后采用SM2加密算法产生的私钥对哈希值进行签名,保证信息上传者身份的可靠,最后把哈希值和签名值通过智能合约保存在区块链中,明文数据和其哈希值与签名值在区块链上存储的地址则存储在数据库中。通过结合中心化存储和区块链技术各自的优势,既可以保证溯源数据不可被篡改又可以有效减少区块链网络中溯源数据所占内存的大小。最后,在所提方案的基础上,对溯源系统进行详细设计并采用以太坊区块链平台对其进行实现。  相似文献   

4.
提出了称作一次变色龙哈希函数的新密码学原语:同一哈希值的2个原像(一次碰撞)不会暴露任何陷门信息,而同一哈希值的3个原像(二次碰撞)则会暴露部分陷门信息,但足以导致严重的安全危害.基于经典的RSA困难问题构造了简单高效的一次变色龙哈希函数方案,并在随机预言模型下证明了其安全性.应用该一次变色龙哈希函数方案,进一步高效实现了对每个区块仅允许至多一次修正的可修正区块链,而任何区块的二次修改都将导致区块链崩溃的惩罚.对区块链进行有效治理是网络空间安全治理的关键领域,而可修正区块链则构成了区块链监管和治理的最核心技术.所提出的可修正区块链方案具有高效和修正权限契合实际需求的两大特点,有望为区块链监管(尤其是链上有害数据的事后治理)提供有力的技术参考.  相似文献   

5.
伴随着区块链技术的飞速发展,各类区块链项目呈井喷式增长。在区块链项目数量呈现加速上升态势的同时,后续没有相应的配套措施,导致目前大部分的区块链项目无法互联互通。为了解决每个链都是独立的、垂直的封闭体系,让链与链之间的互操作性成为可能,文章基于哈希锁定技术,设计了一种改进的跨链技术,通过将主链资产双向锚定到侧链,利用哈希时间契约锁协议HTDLC,哈希锁防止信息篡改,时间锁限制交易时间,违约锁放置违约强制保障协议,实现资产跨链交易。  相似文献   

6.
区块链历经十年发展,成为信息技术领域最被寄予厚望的颠覆性技术之一.区块链上链数据具有不可篡改性,历史区块数据一旦确认就不能变更.这保证了区块链历史数据的完整性和可验证,但另一方面,当区块链中出现数据管理需求,即历史区块中过期或无效交易需要被压缩、违法违规信息需要被管控删除时,这种特性也将阻碍区块链对有问题的数据进行修改.类似数据管理需求在联盟链、私有链中尤其突出.传统区块链利用哈希算法的碰撞困难,实现区块和交易的完整性验证.而变色龙哈希存在一个陷门,掌握陷门可以轻松找到哈希碰撞.基于这个特性,本文将该类哈希算法的陷门交给多方管理,从而在不影响前后区块的完整性验证的情况下,实现多方共识修改交易数据的功能.本文进一步对变色龙哈希进行改进,设计了一种适用于联盟链的多中心化的账本修改方案.考虑到交易修改功能的去中心化,即变色龙哈希的陷门不应生成、存放于单个节点的问题,改进后的算法允许联盟链的所有权限节点协作生成系统的变色龙哈希公私钥.同时,为了权衡时间、空间代价与安全性,设计了多种有关私钥生成与同步的共识机制,并对它们的空间开销、通信时间、安全程度等性能进行了对比.本文考虑了一些特殊情况下区块链系统的可用性和问责性.最后,利用改进后的变色龙哈希算法构建了原型链,实现了历史交易的管控功能,描述了数据管理功能的设计细节.实验表明,本文提出的账本修改方案,其最佳区块压缩率可达30%、算法执行速率整体达到毫秒级,且具有可证明的安全性.  相似文献   

7.
随着互联网技术的日益发展,电子合同也逐渐取代了传统的纸质合同。新兴的电子合同具有高效快捷、成本低、合同管理简单方便等特点,有利于规范电子商务行为,维护市场秩序,促进电子商务领域的持续健康发展.电子合同的合理合法性,需要通过先进的科学技术,对电子合同的签署进行监督,电子合同的储存进行安全评估。本文通过对基于区块链技术的电子合同应用研究,结合了区块链技术的不可篡改性、公开透明性以及去中心化的特性,来实现基于区块链的电子合同。  相似文献   

8.
在区块链数据存储与查询过程中,由于区块链的透明性和公开性,全网所有用户均有可能获取查询者的数据信息,存在泄漏查询者隐私数据的风险。采用区块链链上-链下存储思想,设计区块链数据存储模型,引入代理重加密机制,将存储者加密后的数据分布式存储在链下,将存储者发送的索引信息和Merkle树根哈希值存储在链上,确保了数据的完整性、可靠性和可验证性,并减少了区块链数据对存储资源的占用。利用椭圆曲线加密算法设计区块链数据保密查询的不经意传输协议,使得全网所有用户均无法获取查询者的数据信息,保护了区块链数据传输过程中查询者的隐私。分析结果表明,该协议中查询者完成一次区块链上的不经意传输仅需2n+2k+2次椭圆曲线乘法运算,相比于现有不经意传输协议具有存储空间小、计算复杂度低等优势,并且在相同长度的密钥下具有更高的安全性。  相似文献   

9.
设计并分析了一个全新的基于双哈希链的公平移动支付协议;简要介绍了移动支付的业务流程并分析了该模型存在对用户不公平的不足之处;把用于一次性数字签名的双哈希链方案引入移动支付协议,借鉴分次支付的思想提出了一个新的公平移动支付协议;该协议包括4个部分:注册协议、定单下载协议、支付协议、清算协议;它具有很高的效率和可靠性,最大优点在于能够保证支付过程中对用户的公平,使移动用户在参加移动增值业务过程中不再处于绝对劣势,适于移动网络中的公平支付.  相似文献   

10.
电子合同签署是电子商务中的一个重要领域,公平电子合同签署协议是公平交换协议的一种应用模型,然而已有的公平电子合同签署协议存在各种安全缺陷.设计了一种新的基于离线可信第三方的公平电子合同签署协议,该协议能够解决已有协议的缺陷,并且提高了协议的执行效率.对协议的安全性进行了分析和证明,结果表明,本协议保证了交换活动的公平进行,从而为电子商务提供了完整的安全保障.  相似文献   

11.
Abstract This paper describes an approach to the design of interactive multimedia materials being developed in a European Community project. The developmental process is seen as a dialogue between technologists and teachers. This dialogue is often problematic because of the differences in training, experience and culture between them. Conditions needed for fruitful dialogue are described and the generic model for learning design used in the project is explained.  相似文献   

12.
European Community policy and the market   总被引:1,自引:0,他引:1  
Abstract This paper starts with some reflections on the policy considerations and priorities which are shaping European Commission (EC) research programmes. Then it attempts to position the current projects which seek to capitalise on information and communications technologies for learning in relation to these priorities and the apparent realities of the marketplace. It concludes that while there are grounds to be optimistic about the contribution EC programmes can make to the efficiency and standard of education and training, they are still too technology driven.  相似文献   

13.
融合集成方法已经广泛应用在模式识别领域,然而一些基分类器实时性能稳定性较差,导致多分类器融合性能差,针对上述问题本文提出了一种新的基于多分类器的子融合集成分类器系统。该方法考虑在度量层融合层次之上通过对各类基多分类器进行动态选择,票数最多的类别作为融合系统中对特征向量识别的类别,构成一种新的自适应子融合集成分类器方法。实验表明,该方法比传统的分类器以及分类融合方法识别准确率明显更高,具有更好的鲁棒性。  相似文献   

14.
Development of software intensive systems (systems) in practice involves a series of self-contained phases for the lifecycle of a system. Semantic and temporal gaps, which occur among phases and among developer disciplines within and across phases, hinder the ongoing development of a system because of the interdependencies among phases and among disciplines. Such gaps are magnified among systems that are developed at different times by different development teams, which may limit reuse of artifacts of systems development and interoperability among the systems. This article discusses such gaps and a systems development process for avoiding them.  相似文献   

15.
This paper presents control charts models and the necessary simulation software for the location of economic values of the control parameters. The simulation program is written in FORTRAN, requires only 10K of main storage, and can run on most mini and micro computers. Two models are presented - one describes the process when it is operating at full capacity and the other when the process is operating under capacity. The models allow the product quality to deteriorate to a further level before an existing out-of-control state is detected, and they can also be used in situations where no prior knowledge exists of the out-of-control causes and the resulting proportion defectives.  相似文献   

16.
Going through a few examples of robot artists who are recognized worldwide, we try to analyze the deepest meaning of what is called “robot art” and the related art field definition. We also try to highlight its well-marked borders, such as kinetic sculptures, kinetic art, cyber art, and cyberpunk. A brief excursion into the importance of the context, the message, and its semiotics is also provided, case by case, together with a few hints on the history of this discipline in the light of an artistic perspective. Therefore, the aim of this article is to try to summarize the main characteristics that might classify robot art as a unique and innovative discipline, and to track down some of the principles by which a robotic artifact can or cannot be considered an art piece in terms of social, cultural, and strictly artistic interest. This work was presented in part at the 13th International Symposium on Artificial Life and Robotics, Oita, Japan, January 31–February 2, 2008  相似文献   

17.
《计算机科学》2007,34(4):148-148
Recent years have seen rapid advances in various grid-related technologies, middleware, and applications. The GCC conference has become one of the largest scientific events worldwide in grid and cooperative computing. The 6th international conference on grid and cooperative computing (GCC2007) Sponsored by China Computer Federation (CCF),Institute of Computing Technology, Chinese Academy of Sciences (ICT) and Xinjiang University ,and in Cooperation with IEEE Computer Soceity ,is to be held from August 16 to 18, 2007 in Urumchi, Xinjiang, China.  相似文献   

18.
为了设计一种具有低成本、低功耗、易操作、功能强且可靠性高的煤矿井下安全分站,针对煤矿安全生产实际,文章提出了采用MCS-51系列单片机为核心、具有CAN总线通信接口的煤矿井下安全监控分站的设计方案;首先给出煤矿井下安全监控分站的整体构架设计,然后着重阐述模拟量输入信号处理系统的设计过程,最后说明单片机最小系统及其键盘、显示、报警、通信等各个组成部分的设计;为验证设计方案的可行性与有效性,使用Proteus软件对设计内容进行仿真验证,设计的煤矿井下安全监控分站具有瓦斯、温度等模拟量参数超标报警功能和电机开停、风门开闭等开关量指示功能;仿真结果表明:设计的煤矿井下安全监控分站具有一定的实际应用价值.  相似文献   

19.
Although there are many arguments that logic is an appropriate tool for artificial intelligence, there has been a perceived problem with the monotonicity of classical logic. This paper elaborates on the idea that reasoning should be viewed as theory formation where logic tells us the consequences of our assumptions. The two activities of predicting what is expected to be true and explaining observations are considered in a simple theory formation framework. Properties of each activity are discussed, along with a number of proposals as to what should be predicted or accepted as reasonable explanations. An architecture is proposed to combine explanation and prediction into one coherent framework. Algorithms used to implement the system as well as examples from a running implementation are given.  相似文献   

20.
This paper provides the author's personal views and perspectives on software process improvement. Starting with his first work on technology assessment in IBM over 20 years ago, Watts Humphrey describes the process improvement work he has been directly involved in. This includes the development of the early process assessment methods, the original design of the CMM, and the introduction of the Personal Software Process (PSP)SM and Team Software Process (TSP){SM}. In addition to describing the original motivation for this work, the author also reviews many of the problems he and his associates encountered and why they solved them the way they did. He also comments on the outstanding issues and likely directions for future work. Finally, this work has built on the experiences and contributions of many people. Mr. Humphrey only describes work that he was personally involved in and he names many of the key contributors. However, so many people have been involved in this work that a full list of the important participants would be impractical.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号