Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    REVIEW

    A Systematic Literature Review on Blockchain Consensus Mechanisms’ Security: Applications and Open Challenges

    Muhammad Muntasir Yakubu1,2,*, Mohd Fadzil B Hassan1,3, Kamaluddeen Usman Danyaro1, Aisha Zahid Junejo4, Muhammed Siraj5, Saidu Yahaya1, Shamsuddeen Adamu1, Kamal Abdulsalam6

    Computer Systems Science and Engineering, Vol.48, No.6, pp. 1437-1481, 2024, DOI:10.32604/csse.2024.054556 - 22 November 2024

    Abstract This study conducts a systematic literature review (SLR) of blockchain consensus mechanisms, an essential protocols that maintain the integrity, reliability, and decentralization of distributed ledger networks. The aim is to comprehensively investigate prominent mechanisms’ security features and vulnerabilities, emphasizing their security considerations, applications, challenges, and future directions. The existing literature offers valuable insights into various consensus mechanisms’ strengths, limitations, and security vulnerabilities and their real-world applications. However, there remains a gap in synthesizing and analyzing this knowledge systematically. Addressing this gap would facilitate a structured approach to understanding consensus mechanisms’ security and vulnerabilities comprehensively. The… More >

  • Open Access

    A Novel PoW Scheme Implemented by Probabilistic Signature for Blockchain

    Bo Mi1, Yuan Weng1, Darong Huang1,*, Yang Liu1, Yuqing Gan2

    Computer Systems Science and Engineering, Vol.39, No.2, pp. 265-274, 2021, DOI:10.32604/csse.2021.017507 - 20 July 2021

    Abstract PoW (Proof of Work) plays a significant role in most blockchain systems to grant an accounting right over decentralized participants and ensure tamper resistance. Though hash functions are generally exploited for PoW due to their merits on summering, anti-collision, and irreversibility, they cannot certify that the bookkeeper is exactly the worker. Thereafter, such insistence may lead to abuse or even embezzlement of computing power for the benefit of malicious miners. To preserve the functionality of PoW but also bind the miners’ signing keys with their works, we build a post-quantum PoW scheme by changing the More >

Displaying 1-10 on page 1 of 2. Per Page