2010 International Forum on Information Technology and Applications 2010
DOI: 10.1109/ifita.2010.332
|View full text |Cite
|
Sign up to set email alerts
|

An Overview of Incremental Hash Function Based on Pair Block Chaining

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Satoshi Nakamoto published the article Bitcoin, a peer-topeer electronic cash system [7], marking the birth of blockchain technology. Since then, blockchain technology has attracted many scholars to study its sound characteristics, such as decentralization and not being easy to tamper with.…”
Section: Introductionmentioning
confidence: 99%
“…Satoshi Nakamoto published the article Bitcoin, a peer-topeer electronic cash system [7], marking the birth of blockchain technology. Since then, blockchain technology has attracted many scholars to study its sound characteristics, such as decentralization and not being easy to tamper with.…”
Section: Introductionmentioning
confidence: 99%
“…However, some criminals utilize Bitcoin to do several illegal activities bringing in great security threat to the world [4]. Therefore, it is necessary to get knowledge of the current trend of Bitcoin [7] and make effort to de-anonymize in [6]. In this paper, we put forward and realize a system to analyze Bitcoin from two aspects: blockchain data and network traffic data, gap between proposed theoretical-architecture and current practical implementation of bitcoin system [5] in terms of achieving decentralization, anonymity of users, and consensus.…”
Section: Literature Surveymentioning
confidence: 99%
“…The Byzantine fault is the severest fault: a faulty node sends different values to different nodes by some unforeseen timing in a distributed system [13], [14]. A hash chain is used in the block chain mechanism preventing asset data from rewriting dishonestly in a bitcoin system [8]- [12]. It is used in online game protocols to prevent cheating of players [15], [16].…”
Section: Related Workmentioning
confidence: 99%
“…A hash chain [1]- [3] is a cascade function originally proposed by Lamport [1] adapted in systems such as a practical Byzantine fault (PBFT) protocol called Zyzzyva [4]- [7] for reliable distributed database systems. Additionally, a hash chain is used as a block chain in a bitcoin system [8]- [12]. A hash sequence is used between a database server and each client's database in our protocol as a bootlace.…”
Section: Introductionmentioning
confidence: 99%