To see the other types of publications on this topic, follow the link: Permissionless Blockchain.

Journal articles on the topic 'Permissionless Blockchain'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Permissionless Blockchain.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Zhang, Xiaohui, Mingying Xue, and Xianghua Miao. "A Consensus Algorithm Based on Risk Assessment Model for Permissioned Blockchain." Wireless Communications and Mobile Computing 2022 (August 26, 2022): 1–21. http://dx.doi.org/10.1155/2022/8698009.

Full text
Abstract:
Blockchain is characterized by privacy, traceability, and security features as a novel framework of distributed ledger technologies. Blockchain technology enables stakeholders to conduct trusted data sharing and exchange without a trusted centralized institution. These features make blockchain applications attractive to enhance trustworthiness in very different contexts. Due to unique design concepts and outstanding performance, blockchain has become a popular research topic in industry and academia in recent years. Every participant is anonymous in a permissionless blockchain represented by c
APA, Harvard, Vancouver, ISO, and other styles
2

Cerezo Sánchez, David. "Pravuil: Global Consensus for a United World." FinTech 1, no. 4 (2022): 325–44. http://dx.doi.org/10.3390/fintech1040025.

Full text
Abstract:
The latest developments in blockchain technology have conceptualised very efficient consensus protocols that have not yet been able to overcome older technologies. This paper presents Pravuil, a robust, secure, and scalable consensus protocol for a permissionless blockchain suitable for deployment in an adversarial environment such as the Internet. Using zero-knowledge authentication techniques, Pravuil circumvents previous shortcomings of other blockchains: Bitcoin’s limited adoption problem (as transaction demand grows, payment confirmation times grow much less than that of other PoW blockch
APA, Harvard, Vancouver, ISO, and other styles
3

Agarwal, Rachit, Tanmay Thapliyal, and Sandeep Shukla. "Analyzing Malicious Activities and Detecting Adversarial Behavior in Cryptocurrency based Permissionless Blockchains: An Ethereum Usecase." Distributed Ledger Technologies: Research and Practice 1, no. 2 (2022): 1–21. http://dx.doi.org/10.1145/3549527.

Full text
Abstract:
Different malicious activities occur in cryptocurrency-based permissionless blockchains such as Ethereum and Bitcoin. Some activities are due to the exploitation of vulnerabilities which are present in the blockchain infrastructure, some activities target its users through social engineering techniques, while some activities use it to facilitate different malicious activities. Since cryptocurrency-based permissionless blockchains provide pseudonymity to its users, bad actors prefer to carry out transactions related to malicious activities on them. Towards this, we aim at automatically flagging
APA, Harvard, Vancouver, ISO, and other styles
4

Helliar, Christine V., Louise Crawford, Laura Rocca, Claudio Teodori, and Monica Veneziani. "Permissionless and permissioned blockchain diffusion." International Journal of Information Management 54 (October 2020): 102136. http://dx.doi.org/10.1016/j.ijinfomgt.2020.102136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Seira, Amber, Jeffrey Allen, Cy Watsky, and Richard Alley. "Governance of Permissionless Blockchain Networks." FEDS Notes, no. 2024-02-09 (February 2024): None. http://dx.doi.org/10.17016/2380-7172.3443.

Full text
Abstract:
A permissionless blockchain network is a system of physically distributed computers running a copy of a shared ledger and using the same software rules that enable all network participants to “read, submit, and validate transactions” (Beck, Müller-Bloch, and King, 2018, p. 1022). A permissionless system’s accessibility stands in contrast to that of permissioned systems, in which a central authority pre-selects validators and potentially restricts viewing and submission rights (Krause, Natarajan, and Gradstein, 2017; Beck, Müller-Bloch, and King, 2018).
APA, Harvard, Vancouver, ISO, and other styles
6

Heo, Hwanjo, and Seungwon Shin. "Understanding Block and Transaction Logs of Permissionless Blockchain Networks." Security and Communication Networks 2021 (August 3, 2021): 1–18. http://dx.doi.org/10.1155/2021/9549602.

Full text
Abstract:
Public blockchain records are widely studied in various aspects such as cryptocurrency abuse, anti-money-laundering, and monetary flow of businesses. However, the final blockchain records, usually available from block explorer services or querying locally stored data of blockchain nodes, do not provide abundant and dynamic event logs that are only visible from a live large-scale measurement. In this paper, we collect the network logs of three popular permissionless blockchains, that is, Bitcoin, Ethereum, and EOS. The discrepancy between observed events and the public block data is studied via
APA, Harvard, Vancouver, ISO, and other styles
7

Bezuidenhout, Riaan, Wynand Nel, and Jacques Maritz. "Defining Decentralisation in Permissionless Blockchain Systems." African Journal of Information and Communication (AJIC), no. 29 (July 3, 2022): 1–24. http://dx.doi.org/10.23962/ajic.i29.14247.

Full text
Abstract:
The term decentralised as a description of the architecture, operation, and governance of permissionless blockchain systems has become ubiquitous. However, in these contexts, the term decentralised has no clear definition. Blockchain ecosystems are complex, and thus it is essential to address confusion among stakeholders about their nature and promote understanding of the intentions and consequences of their implementation. This article offers a theoretical definition of the term decentralised in the context of permissionless blockchain systems. It is proposed that five inextricable and interc
APA, Harvard, Vancouver, ISO, and other styles
8

Grodzicka, Hanna, Michal Kedziora, and Lech Madeyski. "Cloud Solutions for Private Permissionless Blockchain Deployment." Computing and Informatics 40, no. 4 (2021): 880–96. http://dx.doi.org/10.31577/cai_2021_4_880.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Mohammad, Suleiman Jamal. "Blockchain technology and corporate social responsibility reporting: A symbiotic relationship for enhanced transparency, trust, and governance." Journal of Governance and Regulation 14, no. 2, special issue (2025): 333–40. https://doi.org/10.22495/jgrv14i2siart12.

Full text
Abstract:
In a time of increased corporate accountability, the integration of blockchain technology into corporate social responsibility (CSR) reporting presents a revolutionary option. This paper examines the efficacy of blockchain in improving trust, transparency, and accountability in CSR reporting, while addressing the shortcomings of conventional techniques. By employing a structured decision-making framework and analyzing existing literature, we assess the potential of blockchain to revolutionize CSR reporting, focusing on its immutability, transparency, and decentralized nature. The findings indi
APA, Harvard, Vancouver, ISO, and other styles
10

Melo, David, Saúl Eduardo Pomares-Hernández, Lil María Xibai Rodríguez-Henríquez, and Julio César Pérez-Sansalvador. "Unlocking Blockchain UTXO Transactional Patterns and Their Effect on Storage and Throughput Trade-Offs." Computers 13, no. 6 (2024): 146. http://dx.doi.org/10.3390/computers13060146.

Full text
Abstract:
Blockchain technology ensures record-keeping by redundantly storing and verifying transactions on a distributed network of nodes. Permissionless blockchains have pushed the development of decentralized applications (DApps) characterized by distributed business logic, resilience to centralized failures, and data immutability. However, storage scalability without sacrificing throughput is one of the remaining open challenges in permissionless blockchains. Enhancing throughput often compromises storage, as seen in projects such as Elastico, OmniLedger, and RapidChain. On the other hand, solutions
APA, Harvard, Vancouver, ISO, and other styles
11

Rennie, Ellie. "Machine politics: The cultural science of permissionless systems." Cultural Science 14, no. 1 (2022): 56–62. http://dx.doi.org/10.2478/csj-2022-0008.

Full text
Abstract:
Abstract The survival of permissionless blockchains is typically cast as a cryptoeconomic security problem for mechanism designers to resolve. This essay argues that, long-term, these networks may require something that looks more like a UNESCO protection convention for machine culture than an equation. Ethereum’s machine culture is observable through the formation of a “’we’-group” (Hartley & Potts, 2014, p. 76), which is necessary for the establishment of common knowledge. While entry to the group is permissionless, maintaining membership boundaries demands active contributions from vali
APA, Harvard, Vancouver, ISO, and other styles
12

Luo, Bin, and Changlin Yang. "AeRChain: An Anonymous and Efficient Redactable Blockchain Scheme Based on Proof-of-Work." Entropy 25, no. 2 (2023): 270. http://dx.doi.org/10.3390/e25020270.

Full text
Abstract:
Redactable Blockchain aims to ensure the immutability of the data of most applications and provide authorized mutability for some specific applications, such as for removing illegal content from blockchains. However, the existing Redactable Blockchains lack redacting efficiency and protection of the identity information of voters participating in the redacting consensus. To fill this gap, this paper presents an anonymous and efficient redactable blockchain scheme based on Proof-of-Work (PoW) in the permissionless setting, called “AeRChain”. Specifically, the paper first presents an improved Ba
APA, Harvard, Vancouver, ISO, and other styles
13

Castro-Iragorri, Carlos. "Academic Certification using Blockchain: Permissioned versus Permissionless Solutions." Journal of The British Blockchain Association 3, no. 2 (2020): 1–8. http://dx.doi.org/10.31585/jbba-3-2-(7)2020.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Spindler, Gerald. "Datenschutzrechtliche Anforderungen an den Einsatz der Blockchain-Technologie im Aktienrecht." Zeitschrift für Unternehmens- und Gesellschaftsrecht 49, no. 5 (2020): 707–48. http://dx.doi.org/10.1515/zgr-2020-0039.

Full text
Abstract:
Blockchain-Technologien gelten als eine der größten Chancen der Digitalisierung, erlauben sie doch fälschungssichere Transaktionen ohne Intermediäre. Dementsprechend sieht auch die Digitalisierungsstrategie der Bundesregierung vor, die Möglichkeiten des Einsatzes der Blockchain-Technologie im Gesellschaftsrecht auszuloten. Hierzu gehören aber datenschutzrechtliche Anforderungen, die zum Teil mit der Blockchain-Technologie im Konflikt stehen. Der Beitrag untersucht die datenschutzrechtlichen Herausforderungen und plädiert für den Einsatz einer privaten zulassungsbedingten Blockchain anstelle de
APA, Harvard, Vancouver, ISO, and other styles
15

MATTILA, VILMA, PRATEEK DWIVEDI, PRATIK GAURI, and MD AHBAB. "HOMOMORPHIC ENCRYPTION IN 5IRE BLOCKCHAIN." International Journal of Social Sciences and Management Review 05, no. 02 (2022): 264–76. http://dx.doi.org/10.37602/ijssmr.2022.5219.

Full text
Abstract:
With the advent of blockchain technology, decentralized system is gaining huge popularity as it provides a new solution for data storage and sharing as well as keeping privacy in place. Blockchains are of two categories; public and private. Public blockchains are permissionless, mostly used for exchanging and mining cryptocurrency, where anyone can join and thus exposed to the risk of a privacy breach. If the content is the transaction information, one might opt for not sharing these data in the public domain. One solution could be to encrypt the information, but that comes at the cost of losi
APA, Harvard, Vancouver, ISO, and other styles
16

Monrat, Ahmed Afif, Olov Schelén, and Karl Andersson. "A Taxonomy Guideline for Blockchain Platforms." Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications 15, no. 2 (2024): 286–308. http://dx.doi.org/10.58346/jowua.2024.i2.019.

Full text
Abstract:
Traditional methods of reaching consensus in monetary systems depend on centralized authorities that are considered trustworthy. Blockchain challenges the traditional model by establishing consensus through a decentralized network of peers, which is responsible for validating transactions and preserving a chronologically ordered ledger of transactions. Utilizing blockchain technology has extended beyond cryptocurrencies to encompass various industrial systems. Nevertheless, much ambiguity surrounds the benefits of employing blockchain technology compared to competing technological solutions. T
APA, Harvard, Vancouver, ISO, and other styles
17

Liu, Manlu, Kean Wu, and Jennifer Jie Xu. "How Will Blockchain Technology Impact Auditing and Accounting: Permissionless versus Permissioned Blockchain." Current Issues in Auditing 13, no. 2 (2019): A19—A29. http://dx.doi.org/10.2308/ciia-52540.

Full text
Abstract:
SUMMARY Blockchain offers a drastically new way to record, process, and store financial transactions and information, and has the potential to fundamentally change the landscape of the accounting profession and reshape the business ecosystem. In this article, we introduce two types (i.e., permissionless and permissioned) of blockchain and lay out their technological features. We further discuss implications of blockchain to auditing and elaborate on opportunities and challenges of the two types of blockchain to auditors. We conclude by making specific recommendations for auditors to adapt, adj
APA, Harvard, Vancouver, ISO, and other styles
18

Minaei, Mohsen, Pedro Moreno-Sanchez, and Aniket Kate. "MoneyMorph: Censorship Resistant Rendezvous using Permissionless Cryptocurrencies." Proceedings on Privacy Enhancing Technologies 2020, no. 3 (2020): 404–24. http://dx.doi.org/10.2478/popets-2020-0058.

Full text
Abstract:
AbstractCryptocurrencies play a major role in the global financial ecosystem. Their presence across different geopolitical corridors, including in repressive regimes, has been one of their striking features. In this work, we leverage this feature for bootstrapping Censorship Resistant communication. We conceptualize the notion of stego-bootstrapping scheme and its security in terms of rareness and security against chosencovertext attacks. We present MoneyMorph, a provably secure stego-bootstrapping scheme using cryptocurrencies. MoneyMorph allows a censored user to interact with a decoder enti
APA, Harvard, Vancouver, ISO, and other styles
19

Mishra, Aditya, Ankit Sharma, Devesh Anand Shrivastava, Deepa Jha, Prachi Goel, and Apurva Jain. "Blockchain and the Law – Legality & Legal Applications." International Journal for Research in Applied Science and Engineering Technology 11, no. 12 (2023): 2040–43. http://dx.doi.org/10.22214/ijraset.2023.57761.

Full text
Abstract:
Abstract: In our thorough exploration of the intricate relationship between blockchain technology and the legal landscape, we uncover three key intersections: legality, law-like characteristics, and legal applications. Delving into the realm of legality, we analyze the profound impact of jurisdiction-specific regulations governing cryptocurrencies, intellectual property, and taxation. This includes considerations such as identity verification, exchange regulation, securities laws, bankruptcy regulations, and anti-money laundering enforcement, shaping the multifaceted legal terrain. Shifting fo
APA, Harvard, Vancouver, ISO, and other styles
20

Ling, Xintong, Zheng Gao, Yuwei Le, et al. "Satellite-Aided Consensus Protocol for Scalable Blockchains." Sensors 20, no. 19 (2020): 5616. http://dx.doi.org/10.3390/s20195616.

Full text
Abstract:
In this work, we propose a satellite-aided permissionless consensus protocol for scalable space–terrestrial blockchains. We design its working principle and workflow by taking full advantage of satellites for extensive coverage and ubiquitous connectivity. Based on the proposed protocol, we demonstrate how such a space–terrestrial blockchain grows and evolves through several typical cases in the presence of adversarial nodes, user misbehavior, and transmission outage. Taking proof of work (PoW) as a benchmark, we assess the system security by considering both adversarial miners and possible co
APA, Harvard, Vancouver, ISO, and other styles
21

Anthony, Njoku ThankGod, Mahmoud Shafik, and Hany F. Atlam. "An effective MLP model for detecting malicious nodes in PoS permissionless blockchains." MATEC Web of Conferences 401 (2024): 10003. http://dx.doi.org/10.1051/matecconf/202440110003.

Full text
Abstract:
With the proliferation of blockchain technology, ensuring the security and integrity of permissionless Proof-of-Stake (PoS) blockchain networks has become imperative. This paper addresses the persistent need for an effective system to detect and mitigate malicious nodes in such environments. Leveraging Deep Learning (DL) techniques, specifically Multi-Layer Perceptron (MLP), a novel model is proposed for real-time identification and detection of malicious nodes in PoS blockchain networks. The model integrates components for data collection, feature extraction, and model training using MLP. The
APA, Harvard, Vancouver, ISO, and other styles
22

Chaitali Deshmukh. "Enhanced Malicious Activity Detection In Permissionless-Blockchain Systems: A Comprehensive Review." Advances in Nonlinear Variational Inequalities 28, no. 6s (2025): 179–206. https://doi.org/10.52783/anvi.v28.4143.

Full text
Abstract:
Blockchain technology has impacted areas of financial services, health sector, and supply chain industries by providing efficient, secure and reliable solutions to data management. Due to wide application, blockchain usage is increasingly popular, which has raised security issues, including attacks by malicious accounts and fraud. This paper aims to provide an overview of the current methods applied to malicious account detection in blockchain networks with focus on the unsupervised and supervised learning techniques. Unsupervised models are able to generalize unseen data, cross-network and sc
APA, Harvard, Vancouver, ISO, and other styles
23

Franke, Laura, Marco Schletz, and Søren Salomo. "Designing a Blockchain Model for the Paris Agreement’s Carbon Market Mechanism." Sustainability 12, no. 3 (2020): 1068. http://dx.doi.org/10.3390/su12031068.

Full text
Abstract:
This paper examines the benefits and constraints of applying blockchain technology for the Paris Agreement carbon market mechanism and develops a list of technical requirements and soft factors as selection criteria to test the feasibility of two different blockchain platforms. The carbon market mechanism, as outlined in Article 6.2 of the Paris Agreement, can accelerate climate action by enabling cooperation between national Parties. However, in the past, carbon markets were limited by several constraints. Our research investigates these constraints and translates them into selection criteria
APA, Harvard, Vancouver, ISO, and other styles
24

Tang, Weizhao, Lucianna Kiffer, Giulia Fanti, and Ari Juels. "Strategic Latency Reduction in Blockchain Peer-to-Peer Networks." ACM SIGMETRICS Performance Evaluation Review 51, no. 1 (2023): 93–94. http://dx.doi.org/10.1145/3606376.3593572.

Full text
Abstract:
Most permissionless blockchain networks run on peer-to-peer (P2P) networks, which offer flexibility and decentralization at the expense of performance (e.g., network latency). Historically, this tradeoff has not been a bottleneck for most blockchains. However, an emerging host of blockchain-based applications (e.g., decentralized finance) are increasingly sensitive to latency; users who can reduce their network latency relative to other users can accrue (sometimes significant) financial gains. In this work, we initiate the study of strategic latency reduction in blockchain P2P networks. We fir
APA, Harvard, Vancouver, ISO, and other styles
25

Tang, Weizhao, Lucianna Kiffer, Giulia Fanti, and Ari Juels. "Strategic Latency Reduction in Blockchain Peer-to-Peer Networks." Proceedings of the ACM on Measurement and Analysis of Computing Systems 7, no. 2 (2023): 1–33. http://dx.doi.org/10.1145/3589976.

Full text
Abstract:
Most permissionless blockchain networks run on peer-to-peer (P2P) networks, which offer flexibility and decentralization at the expense of performance (e.g., network latency). Historically, this tradeoff has not been a bottleneck for most blockchains. However, an emerging host of blockchain-based applications (e.g., decentralized finance) are increasingly sensitive to latency; users who can reduce their network latency relative to other users can accrue (sometimes significant) financial gains. In this work, we initiate the study of strategic latency reduction in blockchain P2P networks. We fir
APA, Harvard, Vancouver, ISO, and other styles
26

Partida, Alberto, Saki Gerassis, Regino Criado, Miguel Romance, Eduardo Giráldez, and Javier Taboada. "Modeling Bitcoin plus Ethereum as an Open System of Systems of Public Blockchains to Improve Their Resilience against Intentional Risk." Electronics 11, no. 2 (2022): 241. http://dx.doi.org/10.3390/electronics11020241.

Full text
Abstract:
In this article, we model the two most market-capitalised public, open and permissionless blockchain implementations, Bitcoin (BTC) and Ethereum (ETH), as a System of Systems (SoS) of public blockchains. We study the concepts of blockchain, BTC, ETH, complex networks, SoS Engineering and intentional risk. We analyse BTC and ETH from an open SoS perspective through the main properties that seminal System of Systems Engineering (SoSE) references propose. This article demonstrates that these public blockchain implementations create networks that grow in complexity and connect with each other. We
APA, Harvard, Vancouver, ISO, and other styles
27

Caldarola, Fabio, Gianfranco d’Atri, and Enrico Zanardo. "Neural Fairness Blockchain Protocol Using an Elliptic Curves Lottery." Mathematics 10, no. 17 (2022): 3040. http://dx.doi.org/10.3390/math10173040.

Full text
Abstract:
To protect participants’ confidentiality, blockchains can be outfitted with anonymization methods. Observations of the underlying network traffic can identify the author of a transaction request, although these mechanisms often only consider the abstraction layer of blockchains. Previous systems either give topological confidentiality that may be compromised by an attacker in control of a large number of nodes, or provide strong cryptographic confidentiality but are so inefficient as to be practically unusable. In addition, there is no flexible mechanism to swap confidentiality for efficiency
APA, Harvard, Vancouver, ISO, and other styles
28

Sun, Meng, Yuteng Lu, Yichun Feng, Qi Zhang, and Shaoying Liu. "Modeling and Verifying the CKB Blockchain Consensus Protocol." Mathematics 9, no. 22 (2021): 2954. http://dx.doi.org/10.3390/math9222954.

Full text
Abstract:
The Nervos CKB (Common Knowledge Base) is a public permissionless blockchain designed for the Nervos ecosystem. The CKB consensus protocol is the key protocol of the Nervos CKB, which improves the limit of the consensus’s performance for Bitcoin. In this paper, we developed the formal model of the CKB consensus protocol using timed automata. Based on the model, we formally verified various important properties of the Nervos CKB to provide a sufficient trustworthiness assurance. Especially, the security of the Nervos CKB against the selfish mining attacks to the protocol was investigated.
APA, Harvard, Vancouver, ISO, and other styles
29

Denis González, Camilo, Daniel Frias Mena, Alexi Massó Muñoz, Omar Rojas, and Guillermo Sosa-Gómez. "Electronic Voting System Using an Enterprise Blockchain." Applied Sciences 12, no. 2 (2022): 531. http://dx.doi.org/10.3390/app12020531.

Full text
Abstract:
Conventional electronic voting systems use a centralized scheme. A central administration of these systems manages the entire voting process and has partial or total control over the database and the system itself. This creates some problems, accidental or intentional, such as possible manipulation of the database and double voting. Many of these problems have been solved thanks to permissionless blockchain technologies in new voting systems; however, the classic consensus method of such blockchains requires specific computing power during each voting operation. This has a significant impact o
APA, Harvard, Vancouver, ISO, and other styles
30

de Caria, Riccardo. "Blockchain-Based Money as the Ultimate Challenge to Sovereignty." European Journal of Comparative Law and Governance 6, no. 2 (2019): 131–45. http://dx.doi.org/10.1163/22134514-00602004.

Full text
Abstract:
The article considers the radical challenge that blockchain, and in particular the blockchain-based cryptocurrency Bitcoin, poses to state sovereignty. If blockchain ever succeeds to be adopted on a large scale, Bitcoin, or any other permissionless blockchain-based cryptocurrency for that matter, is a direct threat to one of the key tenets of sovereignty: the monopoly over money. Without this traditional monopoly, states will not be able to exist as they have so far. Building on this premise, the article argues that blockchain-based money is currently posing a serious challenge to state sovere
APA, Harvard, Vancouver, ISO, and other styles
31

Mik, Eliza. "Electronic Platforms: Openness, Transparency & Privacy Issues." European Review of Private Law 26, Issue 6 (2018): 853–70. http://dx.doi.org/10.54648/erpl2018058.

Full text
Abstract:
Abstract: Any discussion of the legal issues surrounding blockchain technologies seems doomed from the outset. The sheer amount and complexity of technical terms, which are often used inconsistently, precludes an exhaustive and disciplined analysis of the potential legal problems that could arise from the widespread, commercial use of blockchains. Consequently, the evaluation of the popular claims hailing blockchains as enablers of commerce is extremely challenging. Additional complications arise from the fact that blockchain technologies are accompanied by multiple ideological concepts that,
APA, Harvard, Vancouver, ISO, and other styles
32

Rubel, Dejah. "No Need to Ask." Information Technology and Libraries 38, no. 2 (2019): 11–17. http://dx.doi.org/10.6017/ital.v38i2.10822.

Full text
Abstract:
This article will describe how permissionless metadata blockchains could be created to overcome two significant limitations in current cataloging practices: centralization and a lack of traceability. The process would start by creating public and private keys, which could be managed using digital wallet software. After creating a genesis block, nodes would submit either a new record or modifications to a single record for validation. Validation would rely on a Federated Byzantine Agreement consensus algorithm because it offers the most flexibility for institutions to select authoritative peers
APA, Harvard, Vancouver, ISO, and other styles
33

Liu, Wenxuan, Donghong Zhang, Chunxiao Mu, Xiangfu Zhao, and Jindong Zhao. "Ring-Overlap: A Storage Scaling Mechanism for Hyperledger Fabric." Applied Sciences 12, no. 19 (2022): 9568. http://dx.doi.org/10.3390/app12199568.

Full text
Abstract:
Currently, blockchain is facing a serious storage explosion problem. While most storage scaling schemes are focused on permissionless blockchain, we propose the ring-overlap mechanism for consortium blockchain and use it to scale Hyperledger Fabric. In our scheme, all accounting nodes are divided into clusters, and each cluster contains several nodes; then, a portion of the entire block data is stored in a cluster. Block data is stored overlappingly on some cluster nodes, and each block is guaranteed to have some copies in a cluster. Theoretical analysis and simulation show that the storage oc
APA, Harvard, Vancouver, ISO, and other styles
34

Karaduman, Özgür, and Gülsena Gülhas. "Blockchain-Enabled Supply Chain Management: A Review of Security, Traceability, and Data Integrity Amid the Evolving Systemic Demand." Applied Sciences 15, no. 9 (2025): 5168. https://doi.org/10.3390/app15095168.

Full text
Abstract:
As supply chains become increasingly digitized and decentralized, ensuring security, traceability, and data integrity has emerged as a critical concern. Blockchain technology has shown significant potential to address these challenges by providing immutable records, transparent data flows, and tamper-resistant transaction logs. However, the effective application of blockchain in real-world supply chains requires the careful evaluation of both architectural design and technical limitations, including scalability, interoperability, and privacy. This review systematically examines existing blockc
APA, Harvard, Vancouver, ISO, and other styles
35

Bezuidenhout, Riaan, Wynand Nel, and Jacques M. Maritz. "Permissionless Blockchain Systems as Pseudo-Random Number Generators for Decentralized Consensus." IEEE Access 11 (2023): 14587–611. http://dx.doi.org/10.1109/access.2023.3244403.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

KR, Dr Vineetha, and Mano K. "The Emergence of Decentralized Business Models: Blockchain Interruption and Decentralized Finance." International Journal for Research in Applied Science and Engineering Technology 10, no. 6 (2022): 2165–71. http://dx.doi.org/10.22214/ijraset.2022.44168.

Full text
Abstract:
Abstract: Blockchain technology has the ability to lower transaction costs, build distributed trust, and empower decentralised platforms, providing a foundation for new decentralised business models. Blockchain technology enables the growth of decentralised financial services in the financial industry, which are more decentralised, inventive, compatible, borderless, and transparent. Decentralized financial services, driven by blockchain technology, have the potential to expand financial inclusion, allow open access, stimulate permissionless innovation, and open new doors for entrepreneurs and
APA, Harvard, Vancouver, ISO, and other styles
37

Geng, Tieming, Laurent Njilla, and Chin-Tser Huang. "Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment." Network 2, no. 1 (2022): 66–80. http://dx.doi.org/10.3390/network2010005.

Full text
Abstract:
With the rapid advancement and wide application of blockchain technology, blockchain consensus protocols, which are the core part of blockchain systems, along with the privacy issues, have drawn much attention from researchers. A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain. Meanwhile, some blockchain applications, such as cryptocurrencies, are based on low-efficiency and high-cost consensus protocols, which may not be practical and feasible for other blockchain applications. In this paper, we propose an efficient and privacy
APA, Harvard, Vancouver, ISO, and other styles
38

Seol, Youhwan, Jaehong Ahn, Sehyun Park, et al. "DDNB—Doubly Decentralized Network Blockchain Architecture for Application Services." Applied Sciences 10, no. 15 (2020): 5212. http://dx.doi.org/10.3390/app10155212.

Full text
Abstract:
Decentralization and immutability characteristics of blockchain technology has attracted numerous blockchain-based systems and applications to be proposed. However, technical shortcomings such as low transaction speed, complexity, scalability, and vulnerability to certain attacks have been identified, making it challenging to use the technology on general consumer applications and services. To address the problem, we propose a new application service platform architecture called DDNB (Doubly Decentralized Network Blockchain). DDNB divides the system into multiple layers in order to take advant
APA, Harvard, Vancouver, ISO, and other styles
39

Bhattacharjya, Aniruddha, Remigiusz Wisniewski, and Venkatram Nidumolu. "Holistic Research on Blockchain’s Consensus Protocol Mechanisms with Security and Concurrency Analysis Aspects of CPS." Electronics 11, no. 17 (2022): 2760. http://dx.doi.org/10.3390/electronics11172760.

Full text
Abstract:
In the present era, the consensus for blockchain is of three types: consortium/permissioned, decentralized/permissionless, and somewhat decentralized. Presently, security and privacy of blockchain scenarios are in four directions: auditability and transparency, accountability and nonrepudiation, contract privacy, and transactional privacies. Blockchain works on multilayered architectures with its consensus mechanisms. In this paper, important mechanisms of various consensus protocols for application specific usage are analyzed. In general, these consensus mechanisms have four groups of propert
APA, Harvard, Vancouver, ISO, and other styles
40

Partida, Alberto, Regino Criado, and Miguel Romance. "Identity and Access Management Resilience against Intentional Risk for Blockchain-Based IOT Platforms." Electronics 10, no. 4 (2021): 378. http://dx.doi.org/10.3390/electronics10040378.

Full text
Abstract:
Some Internet of Things (IoT) platforms use blockchain to transport data. The value proposition of IoT is the connection to the Internet of a myriad of devices that provide and exchange data to improve people’s lives and add value to industries. The blockchain technology transfers data and value in an immutable and decentralised fashion. Security, composed of both non-intentional and intentional risk management, is a fundamental design requirement for both IoT and blockchain. We study how blockchain answers some of the IoT security requirements with a focus on intentional risk. The review of a
APA, Harvard, Vancouver, ISO, and other styles
41

Rizaldi, Dimas Yoan, and Ibnu Febry Kurniawan. "Implementasi Multichain sebagai Alternatif Solusi Keamanan dan Privasi Data pada Komunikasi Perangkat Pintar Rumah." Journal of Informatics and Computer Science (JINACS) 1, no. 02 (2020): 115–21. http://dx.doi.org/10.26740/jinacs.v1n02.p115-121.

Full text
Abstract:
Abstrak— IoT berkembang dengan cepat dan diperkirakan akan tumbuh hingga 26 miliar perangkat di tahun 2020. Keamanan dan privasi dianggap sebagai hambatan utama agar paradigma IoT dapat diterima secara penuh. Keterbatasan pada perangkat IoT dan jaringan juga mengakibatkan sulitnya menerapkan solusi keamanan yang ada secara langsung, khususnya protokol keamanan tradisional dan kriptografi primitif yang membutuhkan banyak memori dan sumber daya komputer. Pada penelitian ini menerapkan teknologi yang menopang sistem cryptocurrency bitcoin yaitu blockchain, untuk memberikan keamanan dan privasi da
APA, Harvard, Vancouver, ISO, and other styles
42

Bezuidenhout, Riaan, Wynand Nel, and Jacques M. Maritz. "Embedding Tamper-Resistant, Publicly Verifiable Random Number Seeds in Permissionless Blockchain Systems." IEEE Access 10 (2022): 39912–25. http://dx.doi.org/10.1109/access.2022.3165616.

Full text
APA, Harvard, Vancouver, ISO, and other styles
43

Sarker, Arijet, Simeon Wuthier, Jinoh Kim, Jonghyun Kim, and Sang-Yoon Chang. "Blockchain Handshaking with Software Assurance: Version++ Protocol for Bitcoin Cryptocurrency." Electronics 13, no. 19 (2024): 3857. http://dx.doi.org/10.3390/electronics13193857.

Full text
Abstract:
Cryptocurrency software implements cryptocurrency operations (including the distributed consensus protocol and peer-to-peer networking) and often involves the open-source community. We design a software assurance scheme for cryptocurrency and advance the cryptocurrency handshaking protocol by providing the verification capability of the Bitcoin software by peers and preventing any potential peer from establishing a connection with modified Bitcoin software. Since we focus on Bitcoin (the most popular cryptocurrency) for implementation and integration, we call our scheme Version++, built on and
APA, Harvard, Vancouver, ISO, and other styles
44

Spychiger, Florian, Claudio J. Tessone, Liudmila Zavolokina, and Gerhard Schwabe. "Incentivizing Data Quality in Blockchain-Based Systems—The Case of the Digital Cardossier." Distributed Ledger Technologies: Research and Practice 1, no. 1 (2022): 1–27. http://dx.doi.org/10.1145/3538228.

Full text
Abstract:
Inspired by an industry initiative to address the celebrated market for lemons (poor-quality used cars), we investigate how incentives for a permissioned blockchain-based system in the automobile ecosystem can be designed to ensure high-quality data storage and use by different stakeholders. The peer-to-peer distributed ledger platform connects organizations and car owners with disparate interests and hidden intentions. While previous literature has chiefly examined incentives for permissionless platforms, we leverage studies about crowdsensing applications to stimulate research on incentives
APA, Harvard, Vancouver, ISO, and other styles
45

Wang, Yumei, Yongdong Wu, and Junzuo Lai. "Contract-Based Incentive Mechanism for Redactable Proof-of-Stake Blockchains." Security and Communication Networks 2023 (May 17, 2023): 1–10. http://dx.doi.org/10.1155/2023/6403686.

Full text
Abstract:
Blockchain has received a lot of attention due to its immutability. However, the immutability characteristic prohibits editing the blocks which need to be modified. Although the existing redactable blockchain enables to manipulate blocks in a controlled way, it may suffer from the security threats if the number of honest committee members (CMs) is insufficient. Thus, to attract honest CMs for validating and voting the editing blocks in permissionless blockchain, this paper presents a contract-based incentive mechanism between contract issuer and every CM. Firstly, it models the interaction bet
APA, Harvard, Vancouver, ISO, and other styles
46

MATTILA, VILMA, PRATEEK DWIVEDI, PRATIK GAURI, and DHANRAJ DADHICH. "ZERO KNOWLEDGE PROOF FOR HOMOMORPHICALLY ENCRYPTED TRANSACTIONS IN 5IRE BLOCKCHAIN." International Journal of Social Sciences and Management Review 05, no. 03 (2022): 259–67. http://dx.doi.org/10.37602/ijssmr.2022.5320.

Full text
Abstract:
Since public blockchains are permissionless, it is subject to passive adversarial attack. In 5irechain we have addressed the security problem related to this passive adversarial activity by applying 5ireHE, a homomorphic encryption technique that encrypts the transactional details using the receiver’s public key. Since the transaction is encrypted by the receiver’s public key, it is harder for other validators to validate the transaction in 5ire. In this paper, we introduce ZKP for validating the transaction in a sense that validator can check if the sender’s previous balance and the remaining
APA, Harvard, Vancouver, ISO, and other styles
47

Platt, Moritz, and Peter McBurney. "Sybil in the Haystack: A Comprehensive Review of Blockchain Consensus Mechanisms in Search of Strong Sybil Attack Resistance." Algorithms 16, no. 1 (2023): 34. http://dx.doi.org/10.3390/a16010034.

Full text
Abstract:
Consensus algorithms are applied in the context of distributed computer systems to improve their fault tolerance. The explosive development of distributed ledger technology following the proposal of “Bitcoin” led to a sharp increase in research activity in this area. Specifically, public and permissionless networks require robust leader selection strategies resistant to Sybil attacks in which malicious attackers present bogus identities to induce byzantine faults. Our goal is to analyse the entire breadth of works in this area systematically, thereby uncovering trends and research directions r
APA, Harvard, Vancouver, ISO, and other styles
48

Bahadure, Mr Rugved, Ms Riya Khasare, Ms Sakshi Mahure, Mr Lakhan Rathod, Mr Satweek Junghare, and Prof N. G. Rathi. "Thr3ebay: E-commerce Dapp using Blockchain." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 1435–38. http://dx.doi.org/10.22214/ijraset.2023.51813.

Full text
Abstract:
Abstract: Blockchain has the potential to shake the foundation of e-commerce by enabling exchange relations that are trustless and operate without dedicated intermediaries or even central authorities in the case of permissionless blockchains. Furthermore, the exchange of information and value between companies and consumers might change considerably by enabling unified access to immutable data along the entire supply chain. In this paper, we build a Dapp called Thr3ebay which offers buyers and sellers a secure and transparent platform where transactions are conducted directly between participa
APA, Harvard, Vancouver, ISO, and other styles
49

Halgamuge, Malka N., and Dilmi Guruge. "Fair rewarding mechanism in music industry using smart contracts on public-permissionless blockchain." Multimedia Tools and Applications 81, no. 2 (2021): 1523–44. http://dx.doi.org/10.1007/s11042-021-11078-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Halgamuge, Malka N., and Dilmi Guruge. "Fair rewarding mechanism in music industry using smart contracts on public-permissionless blockchain." Multimedia Tools and Applications 81, no. 2 (2021): 1523–44. http://dx.doi.org/10.1007/s11042-021-11078-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!