Journal of Computer Applications ›› 0, Vol. ›› Issue (): 95-100.DOI: 10.11772/j.issn.1001-9081.2023121815
• Cyber security • Previous Articles Next Articles
Received:
2023-12-29
Revised:
2024-01-24
Accepted:
2024-02-23
Online:
2025-01-24
Published:
2024-12-31
Contact:
Fan ZHAO
通讯作者:
赵凡
作者简介:
任虹(2000—),女,河南信阳人,硕士研究生,CCF会员,主要研究方向:区块链基金资助:
CLC Number:
Hong REN, Fan ZHAO. Survey of smart contract security vulnerability detection technology[J]. Journal of Computer Applications, 0, (): 95-100.
任虹, 赵凡. 智能合约安全漏洞检测技术综述[J]. 《计算机应用》唯一官方网站, 0, (): 95-100.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2023121815
网址 | 描述 |
---|---|
https://swcregistry.io/ | 以太坊智能合约常见的37种漏洞 |
https://www.dasp.co/ | 智能合约常见的10种漏洞 |
https://www.cve.org/ | 通用漏洞披露平台,560条智能合约 相关漏洞 |
https://www.cnvd.org.cn/ | 国家信息安全漏洞共享平台, 431条智能合约相关漏洞 |
网址 | 描述 |
---|---|
https://swcregistry.io/ | 以太坊智能合约常见的37种漏洞 |
https://www.dasp.co/ | 智能合约常见的10种漏洞 |
https://www.cve.org/ | 通用漏洞披露平台,560条智能合约 相关漏洞 |
https://www.cnvd.org.cn/ | 国家信息安全漏洞共享平台, 431条智能合约相关漏洞 |
方法 | 工具 | 发布年份 | 开源地址 | 评价指标 | 对比工具 |
---|---|---|---|---|---|
静态分析 | ①MadMax | 2018 | https://github.com/nevillegrech/MadMax | T | — |
②Slither | 2019 | https://github.com/crytic/slither | T | ③④ | |
③Securify | 2018 | https://github.com/eth-sri/securify2 | FP | ⑧⑩ | |
④SmartCheck | 2018 | https://github.com/smartdec/smartcheck | TP、FN | ③⑩ | |
⑤Zeus | 2018 | 未开源 | FP、FN | ⑩ | |
⑥eThor | 2020 | https://secpriv.wien/ethor/ | F | ⑤ | |
⑦VRust | 2022 | 未开源 | FP | — | |
符号执行 | ⑧Mythril | 2017 | https://github.com/ConsenSys/mythril | — | — |
⑨DefectChecker | 2021 | https://github.com/Jiachi-Chen/DefectChecker/ | TP、TN、FP、FN、P、F | ③⑧⑩ | |
⑩Oyente | 2016 | https://github.com/melonproject/oyente | FP | — | |
⑪Park | 2022 | https://github.com/tczpl/park/ | T | ⑧⑩ | |
⑫Solar | 2020 | https://github.com/fredfeng/solar | FP、FN | ⑧⑬⑮ | |
⑬teEther | 2018 | https://github.com/nescio007/teether | T | — | |
⑭Maian | 2018 | https://github.com/MAIAN-tool/MAIAN | TP、FN | — | |
模糊检测 | ⑮ContractFuzzer | 2018 | https://github.com/gongbell/ContractFuzzer | TP、FP、FN | ⑩ |
⑯ReGuard | 2018 | 未开源 | FP、FN | — | |
⑰ILF | 2019 | 未开源 | C | 21 | |
⑱ContraMaster | 2022 | 未开源 | T | — | |
⑲Harvey | 2020 | 未开源 | T、C | — | |
⑳sFuzz | 2020 | https://github.com/duytai/sFuzz | TP | ⑩⑮ | |
21Echidna | 2021 | https://github.com/crytic/echidna | T | — | |
22Smartian | 2021 | https://github.com/SoftSec-KAIST/Smartian | TP、FP、C | ⑧⑰⑳ | |
23IcyChecker | 2023 | https://github.com/MingxiYe/IcyChecker-Artifact | P、FN、FP | 22 | |
24HFContractFuzzer | 2021 | 未开源 | — | — | |
深度学习 | 25DR-GCN | 2020 | https://github.com/Messi-Q/GraphDeeSmartContract | A、P、R、F | ③④⑧⑩ |
26TMP | 2020 | https://github.com/Messi-Q/GGNNSmartVulDetector | A、P、R、F | ③④⑧⑩ | |
27ContractWard | 2021 | 未开源 | F | — | |
28DeeSCVHunter | 2021 | https://github.com/MRdoulestar/DeeSCVHunter | A、P、R、F | — | |
29AME | 2021 | https://github.com/Messi-Q/AMEVulDetector | A、P、R、F | ②③④⑧⑩ | |
30SmartEmbed | 2020 | https://github.com/beyondacm/SmartEmbed | P、R、F、FP、FN | ④ |
方法 | 工具 | 发布年份 | 开源地址 | 评价指标 | 对比工具 |
---|---|---|---|---|---|
静态分析 | ①MadMax | 2018 | https://github.com/nevillegrech/MadMax | T | — |
②Slither | 2019 | https://github.com/crytic/slither | T | ③④ | |
③Securify | 2018 | https://github.com/eth-sri/securify2 | FP | ⑧⑩ | |
④SmartCheck | 2018 | https://github.com/smartdec/smartcheck | TP、FN | ③⑩ | |
⑤Zeus | 2018 | 未开源 | FP、FN | ⑩ | |
⑥eThor | 2020 | https://secpriv.wien/ethor/ | F | ⑤ | |
⑦VRust | 2022 | 未开源 | FP | — | |
符号执行 | ⑧Mythril | 2017 | https://github.com/ConsenSys/mythril | — | — |
⑨DefectChecker | 2021 | https://github.com/Jiachi-Chen/DefectChecker/ | TP、TN、FP、FN、P、F | ③⑧⑩ | |
⑩Oyente | 2016 | https://github.com/melonproject/oyente | FP | — | |
⑪Park | 2022 | https://github.com/tczpl/park/ | T | ⑧⑩ | |
⑫Solar | 2020 | https://github.com/fredfeng/solar | FP、FN | ⑧⑬⑮ | |
⑬teEther | 2018 | https://github.com/nescio007/teether | T | — | |
⑭Maian | 2018 | https://github.com/MAIAN-tool/MAIAN | TP、FN | — | |
模糊检测 | ⑮ContractFuzzer | 2018 | https://github.com/gongbell/ContractFuzzer | TP、FP、FN | ⑩ |
⑯ReGuard | 2018 | 未开源 | FP、FN | — | |
⑰ILF | 2019 | 未开源 | C | 21 | |
⑱ContraMaster | 2022 | 未开源 | T | — | |
⑲Harvey | 2020 | 未开源 | T、C | — | |
⑳sFuzz | 2020 | https://github.com/duytai/sFuzz | TP | ⑩⑮ | |
21Echidna | 2021 | https://github.com/crytic/echidna | T | — | |
22Smartian | 2021 | https://github.com/SoftSec-KAIST/Smartian | TP、FP、C | ⑧⑰⑳ | |
23IcyChecker | 2023 | https://github.com/MingxiYe/IcyChecker-Artifact | P、FN、FP | 22 | |
24HFContractFuzzer | 2021 | 未开源 | — | — | |
深度学习 | 25DR-GCN | 2020 | https://github.com/Messi-Q/GraphDeeSmartContract | A、P、R、F | ③④⑧⑩ |
26TMP | 2020 | https://github.com/Messi-Q/GGNNSmartVulDetector | A、P、R、F | ③④⑧⑩ | |
27ContractWard | 2021 | 未开源 | F | — | |
28DeeSCVHunter | 2021 | https://github.com/MRdoulestar/DeeSCVHunter | A、P、R、F | — | |
29AME | 2021 | https://github.com/Messi-Q/AMEVulDetector | A、P、R、F | ②③④⑧⑩ | |
30SmartEmbed | 2020 | https://github.com/beyondacm/SmartEmbed | P、R、F、FP、FN | ④ |
方法 | 工具 | RE | IO | TOD | TD | ME | FE | GS | SAA | UEC | DoS | DD | BSD |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
静态分析 | MadMax | √ | √ | ||||||||||
Slither | √ | √ | √ | √ | |||||||||
Securify | √ | √ | √ | √ | √ | √ | √ | ||||||
SmartCheck | √ | √ | √ | √ | √ | √ | √ | ||||||
Zeus | √ | √ | √ | √ | |||||||||
eThor | √ | ||||||||||||
VRust | √ | ||||||||||||
符号执行 | DefectChecker | √ | √ | √ | √ | √ | |||||||
Oyente | √ | √ | √ | √ | √ | √ | |||||||
Park | √ | √ | √ | ||||||||||
Mythril | √ | √ | √ | √ | √ | √ | |||||||
Solar | √ | √ | |||||||||||
teEther | √ | √ | √ | ||||||||||
Maian | √ | √ | |||||||||||
模糊检测 | ContractFuzzer | √ | √ | √ | √ | √ | √ | √ | √ | ||||
ReGuard | √ | ||||||||||||
ILF | √ | √ | √ | ||||||||||
Contramaster | √ | ||||||||||||
Harvey | √ | √ | |||||||||||
sFuzz | √ | √ | √ | √ | √ | √ | √ | √ | |||||
Echidna | |||||||||||||
Smartian | √ | √ | √ | √ | √ | ||||||||
IcyChecker | √ | ||||||||||||
HFContractFuzzer | √ | √ | |||||||||||
深度学习 | DR-GCN | √ | √ | ||||||||||
TMP | √ | √ | |||||||||||
ContractWard | √ | √ | √ | √ | |||||||||
DeeSCVHunter | √ | √ | |||||||||||
AME | √ | √ | |||||||||||
SmartEmbed | √ | √ | √ | √ | √ | ||||||||
总计 | 25 | 12 | 6 | 14 | 6 | 11 | 4 | 1 | 6 | 3 | 5 | 8 |
方法 | 工具 | RE | IO | TOD | TD | ME | FE | GS | SAA | UEC | DoS | DD | BSD |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
静态分析 | MadMax | √ | √ | ||||||||||
Slither | √ | √ | √ | √ | |||||||||
Securify | √ | √ | √ | √ | √ | √ | √ | ||||||
SmartCheck | √ | √ | √ | √ | √ | √ | √ | ||||||
Zeus | √ | √ | √ | √ | |||||||||
eThor | √ | ||||||||||||
VRust | √ | ||||||||||||
符号执行 | DefectChecker | √ | √ | √ | √ | √ | |||||||
Oyente | √ | √ | √ | √ | √ | √ | |||||||
Park | √ | √ | √ | ||||||||||
Mythril | √ | √ | √ | √ | √ | √ | |||||||
Solar | √ | √ | |||||||||||
teEther | √ | √ | √ | ||||||||||
Maian | √ | √ | |||||||||||
模糊检测 | ContractFuzzer | √ | √ | √ | √ | √ | √ | √ | √ | ||||
ReGuard | √ | ||||||||||||
ILF | √ | √ | √ | ||||||||||
Contramaster | √ | ||||||||||||
Harvey | √ | √ | |||||||||||
sFuzz | √ | √ | √ | √ | √ | √ | √ | √ | |||||
Echidna | |||||||||||||
Smartian | √ | √ | √ | √ | √ | ||||||||
IcyChecker | √ | ||||||||||||
HFContractFuzzer | √ | √ | |||||||||||
深度学习 | DR-GCN | √ | √ | ||||||||||
TMP | √ | √ | |||||||||||
ContractWard | √ | √ | √ | √ | |||||||||
DeeSCVHunter | √ | √ | |||||||||||
AME | √ | √ | |||||||||||
SmartEmbed | √ | √ | √ | √ | √ | ||||||||
总计 | 25 | 12 | 6 | 14 | 6 | 11 | 4 | 1 | 6 | 3 | 5 | 8 |
1 | NOFER M, GOMBER P, HINZ O, et al. Blockchain[J]. Business and Information Systems Engineering, 2017, 59(3): 183-187. |
2 | AVERINA A, AVERINA O. Review of blockchain frameworks and platforms[C]// Proceedings of the 2020 International Multi-Conference on Industrial Engineering and Modern Technologies. Piscataway: IEEE, 2020: 1-6. |
3 | AZARIA A, EKBLAW A, VIEIRA T, et al. MedRec: using blockchain for medical data access and permission management [C]// Proceedings of the 2nd International Conference on Open and Big Data. Piscataway: IEEE, 2016: 25-30. |
4 | DUBOVITSKAYA A, XU Z, RYU S, et al. Secure and trustable electronic medical records sharing using blockchain [J]. AMIA Annual Symposium Proceedings Archive. 2017, 2017: 650-659. |
5 | FAN K, WANG S, REN Y, et al. MedBlock: efficient and secure medical data sharing via blockchain[J]. Journal of Medical Systems, 2018, 42: No.136. |
6 | REYNA A, MARTÍN C, CHEN J, et al. On blockchain and its integration with IoT. Challenges and opportunities[J]. Future Generation Computer Systems, 2018, 88: 173-190. |
7 | HUH S, CHO S, KIM S. Managing IoT devices using blockchain platform[C]// Proceedings of the 19th International Conference on Advanced Communication Technology. Piscataway: IEEE, 2017: 464-467. |
8 | NOVO O. Blockchain meets IoT: an architecture for scalable access management in IoT [J]. IEEE Internet of Things Journal, 2018, 5(2): 1184-1195. |
9 | CAGIGAS D, CLIFTON J, DIAZ-FUENTES D, et al. Blockchain for public services: a systematic literature review [J]. IEEE Access, 2021, 9: 13904-13921. |
10 | SHAHAAB A, MAUDE R, HEWAGE C, et al. Blockchain: a panacea for trust challenges in public services? A socio-technical perspective[J]. The Journal of the British Blockchain Association, 2020, 3(2): 53-60. |
11 | ØLNES S, JANSEN A. Blockchain technology as infrastructure in public sector: an analytical framework[C]// Proceedings of the 19th Annual International Conference on Digital Government Research: Governance in the Data Age. New York: ACM, 2018: No.77. |
12 | SAVELYEV A. Copyright in the blockchain era: promises and challenges[J]. Computer Law and Security Review, 2018, 34(3): 550-561. |
13 | JING N, LIU Q, SUGUMARAN V. A blockchain-based code copyright management system[J]. Information Processing and Management, 2021, 58(3): No.102518. |
14 | MENG Z, MORIZUMI T, MIYATA S, et al. Design scheme of copyright management system based on digital watermarking and blockchain[C]// Proceedings of the IEEE 42nd Annual Computer Software and Applications Conference. Piscataway: IEEE, 2018: 359-364. |
15 | HOLLAND M, NIGISCHER C, STJEPANDIĆ J. Copyright protection in additive manufacturing with blockchain approach[M]// Advances in Trnsdisciplinary Engineering. Volume 5: Transdisciplinary Engineering: A Paradigm Shift. Amsterdam: IOS Press, 2017: 914-921. |
16 | 倪远东,张超,殷婷婷. 智能合约安全漏洞研究综述[J]. 信息安全学报, 2020, 5(3):78-99. |
17 | TIKHOMIROV S, VOSKRESENSKAYA E, IVANITSKIY I, et al. SmartCheck: static analysis of Ethereum smart contracts[C]// Proceedings of the ACM/IEEE 1st International Workshop on Emerging Trends in Software Engineering for Blockchain. New York: ACM, 2018: 9-16. |
18 | FEIST J, GRIECO G, GROCE A. Slither: a static analysis framework for smart contracts[C]// Proceedings of the IEEE/ACM 2nd International Workshop on Emerging Trends in Software Engineering for Blockchain. Piscataway: IEEE, 2019: 8-15. |
19 | KALRA S, GOEL S, DHAWAN M, et al. Zeus: analyzing safety of smart contracts [C]// Proceedings of the 2018 Network and Distributed System Security Symposium. Reston, VA: Internet Society: 2018: 1-15. |
20 | GRECH N, KONG M, JURISEVIC A, et al. MadMax: surviving out-of-gas conditions in ethereum smart contracts [J]. Proceedings of the ACM on Programming Languages, 2018, 2(OOPSLA): No.116. |
21 | TSANKOV P, DAN A, DRACHSLER-COHEN D, et al. Securify: practical security analysis of smart contracts [C]// Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2018: 67-82. |
22 | SCHNEIDEWIND C, GRISHCHENKO I, SCHERER M, et al. eThor: practical and provably sound static analysis of Ethereum smart contracts [C]// Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2020: 621-640. |
23 | CUI S, ZHAO G, GAO Y, et al. VRust: automated vulnerability detection for Solana smart contracts [C]// Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2022: 639-652. |
24 | LUU L, CHU D H, OLICKEL H, et al. Making smart contracts smarter[C]// Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2016: 254-269. |
25 | CHEN J, XIA X, LO D, et al. DefectChecker: automated smart contract defect detection by analyzing EVM bytecode[J]. IEEE Transactions on Software Engineering, 2022, 48(7): 2189-2207. |
26 | ZHENG P, ZHENG Z, LUO X. Park: accelerating smart contract vulnerability detection via parallel-fork symbolic execution[C]// Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis. New York: ACM, 2022: 740-751. |
27 | FENG Y, TORLAK E, BODIK R. Summary-based symbolic evaluation for smart contracts [C]// Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering. New York: ACM, 2020: 1141-1152. |
28 | KRUPP J, ROSSOW C. teEther: gnawing at Ethereum to automatically exploit smart contracts[C]// Proceedings of the 27th USENIX Security Symposium. Berkeley: USENIX Association, 2018: 1317-1333. |
29 | NIKOLIĆ I, KOLLURI A, SERGEY I, et al. Finding the greedy, prodigal, and suicidal contracts at scale [C]// Proceedings of the 34th Annual Computer Security Applications Conference. New York: ACM, 2018: 653-663. |
30 | JIANG B, LIU Y, CHAN W K. ContractFuzzer: fuzzing smart contracts for vulnerability detection [C]// Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering. New York: ACM, 2018: 259-269. |
31 | LIU C, LIU H, CAO Z, et al. ReGuard: finding reentrancy bugs in smart contracts [C]// Proceedings of the ACM/IEEE 40th International Conference on Software Engineering: Companion Proceedings. New York: ACM, 2018: 65-68. |
32 | NGUYEN T D, PHAM L H, SUN J, et al. sFuzz: an efficient adaptive fuzzer for solidity smart contracts [C]// Proceedings of the ACM/IEEE 42nd International Conference on Software Engineering. New York: ACM, 2020: 778-788. |
33 | HE J, BALUNOVIĆ M, AMBROLADZE N, et al. Learning to fuzz from symbolic execution with application to smart contracts[C]// Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. New York: ACM, 2019: 531-548. |
34 | CHOI J, KIM D, KIM S, et al. Smartian: enhancing smart contract fuzzing with static and dynamic data-flow analyses [C]// Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering. Piscataway: IEEE, 2021: 227-239. |
35 | WANG H, LIU Y, LI Y, et al. Oracle-supported dynamic exploit generation for smart contracts [J]. IEEE Transactions on Dependable and Secure Computing, 2022, 19(3): 1795-1809. |
36 | GRIECO G, SONG W, CYGAN A, et al. Echidna: effective, usable, and fast fuzzing for smart contracts [C]// Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis. New York: ACM, 2020: 557-560. |
37 | WÜSTHOLZ V, CHRISTAKIS M. Harvey: a greybox fuzzer for smart contracts [C]// Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. New York: ACM, 2020: 1398-1409. |
38 | DING M, LI P, LI S, et al. HFContractFuzzer: fuzzing hyperledger fabric smart contracts for vulnerability detection [C]// Proceedings of the 25th International Conference on Evaluation and Assessment in Software Engineering. New York: ACM, 2021:321-328. |
39 | YE M, NAN Y, ZHENG Z, et al. Detecting state inconsistency bugs in DApps via on-chain transaction replay and fuzzing [C]// Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis. New York: ACM, 2023: 298-309. |
40 | ZHUANG Y, LIU Z, QIAN P, et al. Smart contract vulnerability detection using graph neural networks [C]// Proceedings of the 29th International Conference on Artificial Intelligence. California: IJCAI.org, 2021: 3283-3290. |
41 | WANG W, SONG J, XU G, et al. ContractWard: automated vulnerability detection models for Ethereum smart contracts [J]. IEEE Transactions on Network Science and Engineering, 2021, 8(2): 1133-1144. |
42 | GAO Z. When deep learning meets smart contracts [C]// Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering. New York: ACM, 2020: 1400-1402. |
43 | GAO Z, JIANG L, XIA X, et al. Checking smart contracts with structural code embedding[J]. IEEE Transactions on Software Engineering, 2020, 47(12): 2874-2891. |
44 | YU X, ZHAO H, HOU B, et al. DeeSCVHunter: a deep learning-based framework for smart contract vulnerability detection[C]// Proceedings of the 2021 International Joint Conference on Neural Networks. Piscataway: IEEE, 2021: 1-8. |
45 | LIU Z, QIAN P, WANG X, et al. Smart contract vulnerability detection: from pure neural network to interpretable graph feature and expert pattern fusion [C]// Proceedings of the 30th International Joint Conference on Artificial Intelligence. California: IJCAI.org, 2021: 2751-2759. |
[1] | Chunxia LIU, Hanying XU, Gaimei GAO, Weichao DANG, Zilu LI. Smart contract vulnerability detection method based on echo state network [J]. Journal of Computer Applications, 2025, 45(1): 153-161. |
[2] | Min SUN, Shihang JIAO, Chenyan WANG. Credit based committee consensus mechanism [J]. Journal of Computer Applications, 2025, 45(1): 170-177. |
[3] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[4] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[5] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[6] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[7] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[8] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[9] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[10] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[11] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[12] | Yifan WANG, Shaofu LIN, Yunjiang LI. Highway free-flow tolling method based on blockchain and zero-knowledge proof [J]. Journal of Computer Applications, 2024, 44(12): 3741-3750. |
[13] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[14] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
[15] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||