区块链毕业论文好写吗多少字,区块链的论文好写吗
近几年来,区块链技术受到了越来越多的关注,许多学校也开设了区块链相关的课程,对于毕业生来说,撰写一篇关于区块链的毕业论文是一个不错的选择。那么,区块链的毕业论文好写吗?
从技术角度来看,区块链技术是一个非常复杂的领域,其内容涉及到许多技术,如密码学、网络安全、数据结构、算法等,因此,要撰写一篇关于区块链的毕业论文,需要掌握一定的技术知识,并且要有足够的时间和精力去完成。
从技术外的角度来看,区块链的毕业论文也是一件不容易的事情。由于区块链技术是一个新兴的领域,相关的文献资料也是有限的,因此,在撰写毕业论文时,需要更多的调研和分析,来获取有价值的论文内容。
总的来说,撰写一篇关于区块链的毕业论文并不是一件容易的事情,但是如果有足够的时间和精力,并且能够深入学习区块链技术,结合实际调研和分析,也是可以完成一篇优秀的毕业论文的。
关键词1:区块链技术
区块链技术是一种新型的分布式账本技术,它可以使多个节点之间的数据在不受信任的情况下安全地共享和交换,从而大大提高了数据安全性和可靠性。区块链技术的核心思想是使用分布式账本技术来存储和管理数据,并使用加密算法来确保数据的安全性。在区块链技术中,每个节点都可以获取到完整的数据,并且可以查看每一个节点的数据,从而保证数据的一致性。
区块链技术的应用非常广泛,它可以用于支付、资产管理、供应链管理、智能合约等,在这些领域中,区块链技术可以提供更安全、更可靠的服务。
关键词2:毕业论文
毕业论文是一篇关于毕业生专业知识的研究论文,它是毕业生在毕业前必须完成的一项重要任务。毕业论文是毕业生在毕业前必须完成的一项重要任务,它可以帮助毕业生更好地了解自己的专业知识,并且可以帮助毕业生更好地融入社会。
撰写毕业论文需要毕业生具备一定的知识和技能,首先,毕业生需要具备足够的知识,以便能够更好地理解毕业论文的要求;其次,毕业生需要具备一定的技能,以便能够更好地完成毕业论文。此外,毕业生还需要具备一定的研究能力,以便能够更好地完成论文。
关键词3:调研分析
调研分析是一种综合性的研究方法,它是一种综合性的研究方法,它可以通过对实际情况进行深入的调研和分析,从而获取有价值的信息。调研分析的步骤包括:定义研究目的、确定研究方法、收集数据、分析数据、得出结论。
调研分析在撰写毕业论文时非常重要,它可以帮助毕业生更好地了解毕业论文的要求,并且可以帮助毕业生更好地融入社会。此外,调研分析还可以帮助毕业生更好地理解毕业论文的内容,从而更好地完成毕业论文。
总的来说,撰写一篇关于区块链的毕业论文是一件不容易的事情,但是如果有足够的时间和精力,并且能够深入学习区块链技术,结合实际调研和分析,也是可以完成一篇优秀的毕业论文的。
请查看相关英文文档
① The development status and future development of blockchain government applications in China. Use it for writing papers! What will be the future development?
Development status: It should be blooming everywhere now, from first-tier cities to There are relevant application cases in third- and fourth-tier cities. For example: the tax chain platform in the first-tier city Guangzhou, the SMIC blockchain public service platform in the second-tier city Changsha, and the blockchain electronic deposit certificate platform in the third-tier city Haikou. You can search online for details. The SMIC platform in Changsha is a relatively comprehensive blockchain + government affairs + public service platform.
② Intensive reading of blockchain papers - Pixel: Multi-signatures for Consensus
The paper mainly proposes a multi-signature algorithm Pixel for the consensus mechanism PoS.
All PoS-based blockchains as well as allowed blockchains have a common structure where nodes run a consensus sub-protocol to reach consensus on the next block to be added to the ledger. Such consensus protocols typically require nodes to check blocking proposals and express their agreement by digitally signing acceptable proposals. When a node sees enough signatures from other nodes on a specific block, it appends them to its view of the ledger.
Since consensus protocols typically involve thousands of nodes working together to reach consensus, the efficiency of the signature scheme is crucial. Furthermore, in order for outsiders to effectively verify the validity of the chain, signatures should be compact for transmission and should be verified quickly. Multisigs have been found to be particularly useful for this task because they enable many signers to create compact and efficient verifiable signatures on public messages.
Additional knowledge: Multi-signature
is a digital signature. In digital signature applications, multiple users are sometimes required to sign and certify the same file. For example, if a statement issued by a company involves the finance department, development department, sales department, after-sales service department and other departments, and needs to be signed and approved by these departments, then these departments need to sign the statement document. A digital signature scheme that enables multiple users to sign the same file is called a multi-digital signature scheme.
Multi-signature is an upgrade of digital signatures, which makes it possible to apply blockchain-related technologies to all walks of life. In actual operation, a multi-signature address can be associated with n private keys. When operations such as transfers are required, funds can be transferred as long as m private keys are signed, where m must be less than or equal to n, that is to say m/n is less than 1, it can be 2/3, 3/5, etc., which must be determined when establishing this multi-signature address.
This article proposes the Pixel signature scheme, a pairing-based forward secure multi-signature scheme that can be used in PoS-based blockchains and can significantly save bandwidth and storage requirements. To support a total of T time periods and a committee of size N, multisig onlyContains two group elements, and verification requires only three pairings, one exponentiation and N -1 multiplications. Pixel signatures are almost as effective as BLS multi-signatures and also satisfy forward security. Additionally, just like in BLS multi-signatures, anyone can non-interactively aggregate individual signatures into a multi-signature.
Benefit:
To validate Pixel's design, the performance of Pixel's Rust implementation was compared with previous tree-based forward security solutions. Shows how to integrate Pixel into any PoS blockchain. Next, Pixel is evaluated on the Algorand blockchain, showing that it yields significant savings in storage, bandwidth, and block verification time. Our experimental results show that Pixel is effective as a stand-alone primitive and used in blockchains. For example, compared to a set of N = 1500 tree-based forward security signatures (for T = 232) with a 128-bit security level, a single Pixel signature that can authenticate the entire set is 2667 times smaller and can be verified 40 times faster . Pixel signing reduces the size of Algorand blocks of 1500 transactions by approximately 35% and reduces block verification time by approximately 38%.
The biggest difference compared to the traditional BLS multi-signature scheme is that BLS does not have forward security.
Compared with the tree-based forward security signature, the tree-based forward security signature can meet the security requirements, but the signature it constructs is too large and the verification speed needs to be improved. The design of this article reduces the signature size and verification time.
Supplementary knowledge: Forward security
is a security property of communication protocols in cryptography, which means that the leakage of a long-term master key will not lead to the leakage of past session keys. Forward security protects past communications from future exposure of passwords or keys. If a system has forward security, historical communications can be kept safe if the master key is compromised, even if the system is under active attack.
Build forward-secure signatures with Hierarchical Identity Based Encryption (HIBE) and add the ability to securely aggregate signatures on the same message and generate public parameters without a trusted set. To achieve:
1. Generate and update keys
2. Security against malicious key attacks
3. Invalid trust settings
For common post-attacks There are two variants:
1. Short-range variant: The adversary attempts to undermine committee members before a consensus agreement is reached. Resolution: Address short-range attacks by assuming the attack latency is longer than the running time of the consensus subprotocol.
2. Remote variant: solved by fork selection rules.
Forward secure signatures provide a clean solution to both attacks without the need for fork-choice rules or concerns about adversaries andOther assumptions made by the client. (Explain the advantages of forward secure signatures).
Permissioned blockchain consensus protocols (such as PBFT) are also at the core of many permissioned chains (such as Hyperledger), where only approved parties can join the network. Our signature scheme can be similarly applied to this setting to achieve forward secrecy, reduce communication bandwidth and generate compact block certificates.
In the traditional Bellare-Miner model, the forward security signature scheme FS of the message space M consists of the following algorithms:
1. Setup
pp ←Setup(T), pp is the parties Common parameters that are agreed upon by all, Setup(T) represents the distribution setting of fixed parameters within the T time period.
2. Key generation
(pk,sk1) ←Kg
The signer runs the key generation algorithm on the input maximum time period T to generate public verification for the first time period Key pk and initial secret signing key sk1.
3. Key update
skt+1←Upd(skt) The signer uses the key update algorithm to update the secret key skt of time period t to skt + 1 of the next period. This scheme can also provide a "fast-forward" update algorithm skt0←$Upd0(skt,t0) for any t0 > t, which is more efficient than repeatedly applying Upd.
4. Signing
σ ←Sign(skt,M), when inputting the current signature key skt message m∈M, the signer uses this algorithm to calculate the signature σ.
5. Verification
b ← Vf(pk,t,M,σ) Anyone can verify the message M within the time period t under the public key pk by running the verification algorithm The signature of signature M. This algorithm returns 1 indicating that the signature is valid, otherwise it returns 0.
1. Relying on asymmetric bilinear groups to improve efficiency, our signature is located in G2×G1 instead of G2^2. This way, it is enough to give public parameters into G1 (which we can then use hash curve instantiation without trust setup) without having to generate "consistent" public parameters (hi, h0 i) = (gxi 1, gxi 2) ∈G1×G2.
2. Key generation algorithm, public key pk is smaller, and parameter settings improve security.
In addition to the algorithm of the forward secure signature scheme in Section 3, the forward secure multi-signature scheme FMS in the key verification model also has a key generation that additionally outputs the public key Proof of π.
Add Key aggregation key aggregation, Signature aggregation signature aggregation, Aggregate verification summary verification. It also proves its correctness and security on the premise of meeting the multi-signature function of forward security.
1. PoS is protected from subsequent damage
Subsequent damage: Post-verified nodes attack and destroy the previous consensus verification state.
In situations where many users propagate many signatures (such as transaction blocks) on the same message, Pixel can be applied to all of these blockchains to protect against follow-on attacks and potentially reduce bandwidth, storage and computation cost.
2. Pixel integration
In order to vote on block B, each member of the sub-protocol signs B using a Pixel with the current block number. Consensus is reached when we see the set of N committee members signing on the same block B, where N is some fixed threshold. Finally, we aggregate these N signatures into a single multi-signature Σ, and the pair (B, Σ) forms a so-called block certificate and append block B to the blockchain.
3. Register a public key
Every user who wants to participate in the consensus needs to register a participating signing key. Users first sample Pixel key pairs and generate corresponding PoPs. The user then issues a special transaction (signed under her consumption key), registering a new participation key. Transactions include PoP. Select the PoS validator that reached agreement in round r to check (a) the validity of the special transaction and (b) the validity of the PoP. If both checks pass, the user's account is updated with the new participation key. From this point, if checked, the user will use the Pixel login block.
That is, constantly changing its own participation key to achieve forward security.
4. Propagation and aggregation of signatures
The signatures of each committee will be propagated through the network until the signatures of N committee members are seen on the same block B. Note that Pixel supports non-interactive and incremental aggregation: the former means that signatures can be aggregated by any party after broadcast without contacting the original signer, while the latter means that we can add new signatures to a multisig to obtain new of multi-signatures. In practice, this means that the propagating node can perform intermediate aggregation on any number of committee signatures and propagate the results until a block certificate is formed. Alternatively, nodes can aggregate all signatures before writing the block to disk. That is, after receiving enough block certification votes, a node can aggregate the signatures of N committee members into a multi-signature and then write the block and certificate to disk.
5. Key update
When using Pixel in the blockchain, time corresponds to the block number or sub-step in the consensus protocol. Relate time to block numberTime synchronization means that all eligible committee members should update their pixel keys every time a new block is formed and the reincarnation number is updated.
Conduct an experimental evaluation on the Algorand project, and compare it with the Algorand project's own solution to prevent post-corruption attacks, BM-Ed25519, and the BLS multi-signature solution.
Storage space:
Bandwidth saving:
Algorand uses a relay-based propagation model, where the user’s nodes are connected to the relay network (nodes with more resources ). Without aggregation during propagation, the bandwidth pixel savings for relays and regular nodes come from smaller signature sizes. Each relay can serve dozens or hundreds of nodes, depending on the resources it provides.
Save verification time
③ Easy-to-write professional Internet of Things thesis topic writing reference
The Internet of Things is through information sensing equipment, in accordance with the agreed protocol, A network in which any item is connected to the Internet for information exchange and communication to achieve intelligent identification, positioning, tracking, monitoring and management. Below I will bring you some easy-to-write Internet of Things professional paper topics in 2021. I hope it can help you!
Internet of Things paper topics
1 , Research on driverless tractors based on embedded PC and Internet of Things
2. Design of solar agricultural machinery engine monitoring system - information collection based on smart agricultural Internet of Things
3. Based on Internet of Things Design of agricultural production monitoring system
4. Architecture and implementation of smart greenhouse system based on agricultural Internet of Things
5. Design of wireless monitoring system for paddy fields based on Internet of Things
6. Design of plant factory monitoring system based on the Internet of Things
7. Research on corn growth monitoring and analysis system for precision agriculture based on the Internet of Things
8. Vineyard information acquisition and analysis based on the Internet of Things Design of intelligent irrigation system
9. Smart long-distance pipeline based on Internet of Things technology
10. Mining Internet of Things cloud computing and platform technology
11. Based on Internet of Things technology Internet-connected smart wardrobe system
12. Implementation of file transmission method of IoT system based on MQTT
13. Energy Internet data support platform based on IoT technology
14. Analysis of research progress and development trends of agricultural IoT technology
15. Design and implementation of IoT system for smart classrooms in colleges and universities
16. Discussion on implementation of operator narrowband IoT deployment
17. Strategic thoughts on the reconstruction of commercial bank management based on Internet of Things thinking
18. Optical fiber sensors for mine safety Internet of Things
19. Based on things Design and implementation of networked water quality monitoring system
20. Implicit human-computer interaction message dissemination method in industrial Internet of Things environment
21. Design of smart agricultural monitoring system based on Internet of Things technology
22. Application of Internet of Things technology in vaccine cold chain logistics risk management
23. Impact of remote blood pressure monitoring based on Internet of Things combined with APP management on patients with hypertension
< p> 24. Application of public security Internet of Things technology in social security prevention and control25. RFID authentication protocol to enhance security in the Internet of Things
26. Decision-making between supply and demand sides of agricultural Internet of Things technology Behavior analysis - evolutionary game model and its simulation
27. Research on data forwarding model in the Internet of Things environment
28. Research on the construction of cloud computing-based Internet of Things data gateway
29. Research on the discovery of technological opportunities based on Citespace - taking the development of Internet of Things technology as an example
30. Using Internet of Things technology to explore the new future of smart logistics - a visit to the Intelligent Internet Headquarters of Digital China Group Yan Jun, General Manager of the Internet Business Department
31. Construction of the Internet of Things Virtual Simulation Experimental Teaching Center Platform
32. Design of remote video monitoring system for the Internet of Things smart home
33. Keysight won the bid for the Fuzhou IoT Open Laboratory narrowband IoT low-power test system and radio frequency conformance test system
34. Smart home health care system based on the Internet of Things
< p> 35. Analysis of research progress and development trends of agricultural Internet of Things technology36. Cultivation of innovative practical abilities of Internet of Things major students in the context of new engineering disciplines
37. Things in the context of new engineering disciplines Research on the course setting of Internet majors
38. Research on Tower Company’s shared bicycle solution based on LoRa IoT
39. IoT intelligence collection for emergencies oriented to big data
< p> 40. Analysis of the application prospects of blockchain technology to enhance the security of the Internet of Things41. Research on the construction plan of the professional laboratory of Internet of Things engineering
42. In the era of big data, based on the Internet of Things and cloud Research on computational seismic informatization
43. Development trend of mining Internet of Things network technologyand key technologies
44. Optimized design of Wuhan flood monitoring and early warning system based on Internet of Things and GPRS technology
45. Design and implementation of intelligent monitoring system for hospital wards based on Internet of Things< /p>
46. Method to realize off-grid emergency communication based on edge computing of power Internet of Things
47. Analysis of patent protection of Internet of Things business methods
48. Sharing of Internet of Things Or Artificial Intelligence Monopoly: Digital Capitalism from a Marxist Perspective
49. Design of IoT Elevator Monitoring System Based on MQTT Protocol
50. IoT Gateway Security Based on Timed Automata System modeling and verification
Internet of Things graduation thesis topic reference
1. Practice of remote diagnosis service of thermal power units based on Internet of Things
2. Semantic Internet of Things A multi-domain information interoperability method
3. Mine Internet of Things service bearing platform and mine purchase service
4. Manganese ore mining process monitoring software design in the Internet of Things environment
p>5. Implementation of a collection system based on the Internet of Things
6. Research on talent training programs for Internet of Things professionals in local transformation undergraduate universities
7. Smart home environment based on the Internet of Things Design and analysis of monitoring system
8. Analysis of the application of Internet of Things technology in smart buildings
9. Discussion on key technologies and applications of Internet of Things
10 , Bluetooth transmission discovery service helps realize collaborative Internet of Things
11. Application research of wireless sensor networks and Internet of Things
12. Exploration and practice of construction of Internet of Things system integration training room
13. Planning plan for university Internet of Things experimental center
14. Lightweight network construction layer design for heterogeneous Internet of Things
15. Exploring the Internet of Things Changes in corporate organizational structure under the environment
16. Design of campus intelligent security system under the Internet of Things technology
17. Application and prospects of the Internet of Things in agriculture
< p> 18. Research on school-enterprise cooperation model for strategic emerging Internet of Things majors19. Analysis of new library management models in the Internet of Things/Sensor Network era
20. Internet of Things information perception and Interactive technology
21. Discuss the innovative application of agricultural Internet of Things technology
22. Design and implementation of remote intelligent irrigation system based on Internet of Things technology
23 , Discussion on technological innovation and application strategies of agricultural Internet of Things
24. Design and implementation of park parking management system based on Internet of Things
25. "Vegetable" traceability system based on Internet of Things technologyExplore
26. Research on meteorological disaster monitoring and early warning system based on Internet of Things technology
27. Research on Internet of Things access technology and system design
28. Based on Internet of Things technology Research on the overall operation and maintenance solution of data center based on Internet technology
29. Analysis of practical teaching of Internet of Things courses in secondary vocational schools based on work orientation
30. Service-oriented Internet of Things software architecture design and model detection
31. Discussion on wireless sensor networks for the Internet of Things
32. Research on multi-agent decision-making information support technology in the Internet of Things environment
33. Regional food safety cloud service framework for the Internet of Things and integrated environments
34. Thoughts and practice on the teaching of "Introduction to Internet of Things Technology" in higher vocational colleges
35. Design of remote video monitoring system based on the Internet of Things
36. Research on Optimization of IoT Distributed Database System
37. Research on Privacy and Security Protection of IoT
38. Pilot Application of Bishan Environmental Protection Supervision IoT System Research
39. Design of smart home wireless IoT system
40. Research on IoT greenhouse intelligent management platform
Easy to write IoT thesis title
p>1. The structural system and development of the Internet of Things
2. Thoughts on the application and development of the Internet of Things in my country
3. Group proof of UC security in the Internet of Things environment RFID protocol
4. Research on current research and application status and development strategies of agricultural Internet of Things
5. Analysis of smart items in the era of Internet of Things
6. Based on Zigbee /Design and Implementation of GPRS Internet of Things Gateway System
7. Overview of Internet of Things Part 3: Internet of Things, Internet of Things Systems and Internet of Things Events
8. Internet of Things Technology in Food and research progress in applications in agricultural products
9. Internet of Things - a major strategic opportunity for national innovation and development in the post-IP era
10. Research on Internet of Things architecture
11. Constructing an Internet of Things operation platform based on cloud computing
12. Design of coal mine comprehensive automation system based on Internet of Things
13. Analysis of the future development path of my country's Internet of Things industry
14. Intelligent micro-irrigation system in arid areas based on the Internet of Things
15. Major trends in the Internet of Things
16. Internet of Things gateway technology and applications
< p> 17. Internet of Things SMS Alarm System Based on SIM900A18. Overview of Internet of Things Part 1: What is Internet of Things?
19. Analysis of Security Issues of Internet of Things Technology
p>20. Based on RFIDInternet of Things logistics management system for electronic tags
2. Recommended topics for graduation thesis on Internet of Things:
1. Development of aquatic product supply chain traceability platform based on RFID and EPC Internet of Things
p>2. One of the special lectures on the Internet of Things and Sensing Mines - Basic Concepts and Typical Applications of the Internet of Things
3. Analysis of the development status and industrial chain of my country's Internet of Things industry
4. Internet of Things technology and its applications for smart grids
5. From cloud computing to sea computing: On the architecture of the Internet of Things
6. Discussion of the business model of the Internet of Things< /p>
7. Internet of Things: The fourth generation technology affecting libraries
8. Looking at the Internet of Things from the perspective of embedded systems
9. On the Internet of Things and Its scientific development in my country
10. Internet of Things architecture and intelligent information processing theory and key technologies
11. Smart home system based on Internet of Things technology
12. Prospects for the application of the Internet of Things in the power system
13. Jiuzhaigou Smart Scenic Area Management based on the Internet of Things
14. Aquaculture remote monitoring system based on the Internet of Things Android platform
15. Aquaculture remote monitoring system based on IoT Android platform
16. Design and implementation of smart library based on IoT
17. IoT resource addressing Research on key technologies
18. Research on automatic warehousing management system and its application based on the Internet of Things
19. Internet and Internet of Things
20. "Internet of Things" "Promote the development of RFID technology and communication networks
Reference articles for writing professional thesis topics on the Internet of Things:
★ Complete list of excellent thesis topics 2021
★ Electronics major graduation thesis topics and topic selections
★ College student thesis topic reference 2021
★ 2021 Communications major thesis topics and topic selections
★ Communication major graduation thesis topics and topic selections
★ College student thesis topics 2021
★ 2021 e-commerce graduation thesis topics
★ 2021 environment Engineering thesis topics
★ Graduation thesis topics and topics in construction engineering
★ Recommended mba thesis topics and topics in various directions
④ Blockchain Analysis paper on the prospects of blockchain in the financial field
Analysis paper on the prospects of blockchain in the financial field
p>Blockchain technology was born in 2008, and its first application was Bitcoin. Blockchain technology uses a decentralized consensus mechanism to maintain a complete, distributed, and non-tamperable ledger database, allowing participants in the blockchain to implement a unified ledger system without establishing a trust relationship. . In 2015, many mainstream financial institutions in Europe and the United States recognized the application prospects of this technology and explored the application of blockchain technology in the financial field. The International Monetary Fund pointed out in a report that "it has the potential to change finance." Some people believe that blockchain technology will change human society as profoundly as double-entry accounting and shareholding.
Blockchain will make it possible for all individuals to become important nodes in the allocation of financial resources. It will also promote the improvement of the existing financial system and financial rules, and build a shared and win-win situation. type of financial development ecosystem. The emergence of blockchain technology is a revolution in human credit creation. It allows both parties to the transaction to carry out economic activities without the need for third-party credit intermediaries, thereby achieving low-cost value transfer. It can be said that blockchain technology is a more efficient value exchange technology in the Internet era. The Internet has evolved from an information Internet that transmits information to a value Internet that transfers value. This is conducive to traditional financial institutions taking advantage of the opportunity to transform and transform endogenous businesses. Processes and application scenarios are Internetized.
1. Characteristics and shortcomings of blockchain
(1) Main characteristics of blockchain
(1) Decentralization. In the blockchain, there is no centralized hardware or management organization. The distributed structure system and open source protocol allow all participants to participate in the recording and verification of data, which is then sent to various nodes through distributed propagation. Each participant The nodes are all "self-centered", and the rights and obligations are equal. Blockchain is not simply decentralized, but multi-centered or weakly centered. When the Internet of Things makes it possible for all individuals to become central nodes, the central status of traditional financial intermediaries changes, transforming from a monopoly-type, resource-advantaged center and strong intermediary to an open platform, becoming a service-oriented multi-center. Center of differentiation.
(2) To trust. From a trust perspective, blockchain uses a set of open and transparent mathematical algorithms based on consensus specifications and protocols to enable all nodes to automatically and securely exchange data in a trustless environment. Blockchain essentially solves the problem of trust through mathematical methods. All rules are expressed in the form of algorithmic programs. Participants do not need to know the credit level of the counterparty, and do not need transaction endorsement or guarantee verification from a third-party institution. They only need trust. A common algorithm creates credit, generates trust, and reaches consensus for participants through the algorithm.
(3) Timestamp. Blocks are generated by packaging data and code within a period of time. The header of the next block contains the index information of the previous block, and a chain is formed by connecting the end to the end. Blocks that record the complete history and can beThe fully verified chain forms a timestamp that can trace the complete history, can provide retrieval and search functions for each piece of data, and can use the blockchain structure to trace the source and verify each piece of data. Therefore, the blockchain is timestamped when generated, forming a database that cannot be tampered with or forged. Modifications to the database on a single node are invalid unless more than 51% of the nodes in the system can be controlled at the same time, so the data reliability of the blockchain is very high.
(4) Asymmetric encryption. Blockchain uses an asymmetric encryption algorithm, that is, a "key pair" is used in the encryption and decryption process. The two keys in the "key pair" have asymmetric characteristics. In the application scenario of blockchain, on the one hand, the key is the public key visible to all participants. Participants can use the public key to encrypt a piece of authenticity information, and only the owner of the information can use the private key to decrypt it. On the other hand, the private key is used to sign the information, and the signature is verified by the corresponding public key to ensure that the information was sent by the real holder. Asymmetric encryption minimizes friction boundaries in value exchange, enables transparent data anonymity, and protects personal privacy.
(5) Smart contract: Since the blockchain can realize point-to-point value transfer, corresponding programming scripts can be embedded during transfer. This smart contract method is used to handle some unforeseen transaction patterns and ensure Blockchain can continue to be effective. This kind of programmable script is essentially a list of many instructions to achieve pertinence and conditionality in value exchange and to achieve specific uses of value. Therefore, any value exchange activity based on the blockchain can achieve hard control over its use, direction and various restrictions through intelligent programming, eliminating the cost of soft constraints by law or contract.
(2) Main problems of blockchain
(1) High energy consumption problem. There is an impossible triangle in the traditional currency and banking system, that is, it is impossible to achieve decentralization, low energy consumption and high security at the same time. The impossible triangle also exists in the construction of blockchain. For example, in the actual application of Bitcoin, its development has brought about the rapid expansion of computer hardware, and the main costs in the "mining" process have shifted to hardware costs and electricity costs. Therefore, after applying blockchain technology to achieve equity cost benefits, maximizing its technical efficacy has become an urgent problem to be solved.
(2) Storage space problem. Since the blockchain records every transaction information from the initial information in the system, and each node has to download, store and update data blocks in real time, if the data of each node is completely synchronized, the network pressure will be great, and each node will The storage space capacity requirements of each node may become a key issue restricting its development.
(3) The problem of stress resistance. The system built based on the blockchain follows the barrel theory and must take into account the worst processing speed and network environment among all network nodes. Therefore, if the blockchain technology is promoted to a large-scale transaction environment, its overall stress resistance It remains to be verified. If the transaction volume generated per second exceeds the design capacity of the system (the weakest node),The transaction will automatically enter the queue and be queued, resulting in a bad user experience.
2. Application of blockchain in the financial field
(1) Financial infrastructure
Blockchain may be used as the infrastructure of the Internet in many fields. All show broad application prospects. In the financial industry, blockchain technology will first affect financial infrastructure such as payment systems, securities settlement systems, and transaction databases. Later, the technology will also expand to general financial services, such as credit systems, "anti-money laundering," etc. This is because, based on the characteristics of blockchain technology, it will first enter the infrastructure field with high trust requirements and high cost of traditional trust mechanisms. In the past, infrastructure was a public product, but new technologies and new systems of blockchain have made it more It is possible for multiple people to participate in the provision of public goods. The future of Internet finance will use Internet technologies such as blockchain to transform the core production systems of traditional financial institutions and build financial enterprises on the Internet.
The current information Internet can be collectively referred to as the TCP/IP model, and HTTP is the most important application protocol in the application layer. In the Internet of Value, blockchain is a point-to-point transmission protocol in the application layer. Its value is the same as that of the HTTP protocol in the information Internet. The huge potential and prospect of blockchain is that it can reconstruct the infrastructure and core production systems of the traditional financial industry, not just at the application level such as APPs. This is because, at the network level, the blockchain is based on the IP communication protocol and the distributed network; at the data level, the blockchain database system is brand new and is significantly better than the existing one. There is a database of the financial system; at the application level, registration and settlement, clearing systems, smart contracts, and the Internet of Things based on the blockchain can greatly improve efficiency. Financial activities on the blockchain are programmable finance. .
(2) Digital Currency
From the perspectives of security and cost, it is a general trend that banknotes will be replaced by new technologies and new products. The establishment of digital currency issuance and circulation systems is very necessary for financial infrastructure construction and economic development. Following the integration of traditional currency and digital currency, the issuance, circulation and trading of digital currency should be led by the central bank, reflecting convenience and security, and achieving a balance between protecting privacy, maintaining social order, and combating illegal and criminal activities. It is conducive to the effective operation and transmission of monetary policy. It is necessary to retain the control of monetary sovereignty. Digital currency is freely convertible and controllable.
The success of blockchain technology on Bitcoin proves the feasibility of programmable digital currency. Research from the Bank of England suggests that central banks could consider issuing blockchain-based digital currencies, which could increase financial stability. The technical routes of digital currency can be divided into two types: account-based and non-account-based. They can also be used in layers to try to coexist. The characteristic of blockchain technology is distributed bookkeeping, which is not account-based and cannot be tampered with. If the digital currency focuses on protecting personal privacy, this technology can be used.technique. However, the current blockchain occupies too many computing resources and storage resources and cannot cope with the current scale of transactions. This problem needs to be solved before it can be promoted and applied.
(3) Self-finance
From the perspective of services and non-monetary creation, modern finance is realized through intermediaries. In the Internet era, it is possible to achieve direct finance in the true sense of disintermediation. However, this possibility is not complete. The main reason is that the current Internet finance is based on the original finance and cannot be jumped out. Blockchain technology provides a possibility. Blockchain can be divided into public blockchain and private blockchain. Public blockchains are like Bitcoin. Once the protocol is approved, it becomes an integral part of the blockchain. Private blockchains still need to be permissioned, and blockchain technology in banking systems requires auditing of each participant. Private blockchain is very similar to a form of self-finance, and public blockchain is more similar to the support and guarantee for the bottom layer of private blockchain. When blockchain technology is widely used and third-party financial management technology is generally available, self-financing based on blockchain technology will become completely possible.
3. Blockchain Application and Financial Supervision
Blockchain technology is currently the only tool that can be used to record and prove transaction consistency and company financial accuracy without the need for a third party. Therefore, it can meet the requirements of potential regulators and the public for audit effectiveness, accuracy and timeliness, and has broad application prospects in the financial field. However, its development is still restricted by the current system. On the one hand, blockchain has had an impact on the current system because its decentralized and autonomous characteristics dilute concepts such as the state and supervision. For example, digital currencies represented by Bitcoin challenge the country's right to issue currency and regulate monetary policy, causing monetary authorities to take a conservative attitude towards the development of digital currencies. On the other hand, regulatory authorities also lack full understanding and expectations of this new technology, and the establishment of laws and systems will be seriously delayed, resulting in the lack of necessary institutional norms and legal protection for blockchain applications, increasing the risks for market entities.
Once blockchain financial technology is widely deployed in the financial industry, the de-financial nature of supervision will occur, and supervisory functions, supervisory methods and supervisory means will be redefined. For example, if securities lending, repurchases, and margin trading can be traded through the blockchain, regulatory authorities can consider using the information from this public ledger to monitor systemic risks in the market, which is not only efficient but also reliable. From a macro-financial perspective, after the emergence of the financial era, the currency creation and transmission mechanism and the credit creation pattern will change. From a micro-finance perspective, with the further development of blockchain technology, finance and business have become difficult to distinguish, and will transcend the meaning of separate and mixed industry supervision. The reform of the financial supervision system needs to be discussed from this perspective.
The "decentralization" brought about by blockchain technology still requires centralized departments to provide regulatory and guarantee support. Regulators can proactively embrace new technologies in Internet finance, U.S. Securities and Exchange CommissionCommittee member Kara Stein believes that regulators need to be in a leading position to leverage the advantages of blockchain technology and respond quickly to its potential weaknesses. For example, blockchain technology hopes to break privileges and human manipulation and allow computer algorithms to achieve "free credit notarization." But in practice, due to the lack of supervision, digital currency transactions such as Bitcoin face high risks of speculation and money laundering. Therefore, the application of blockchain technology requires regulatory authorities to formulate relevant standards and specifications to ensure that financial innovative products are used appropriately. At the same time, it is necessary to improve the protection of consumer rights and interests, strengthen education on the protection of financial consumer rights and interests, and improve consumers' awareness of risk prevention.
;⑤ I want to do research in the direction of blockchain. Are there any recommended papers?
You can find sample papers in this area by searching for "blockchain" on CNKI.
⑥ Blockchain Graduation Project Proposal
Background of the project research:
With the development of modern technology and information industry, at this stage, the fourth The second industrial revolution is beginning to take shape, and the world is about to enter a technological era centered on new technologies such as the Internet and artificial intelligence. At the same time, blockchain technology has emerged as the times require and has become a hot topic of concern to many international governments and industries. Blockchain technology has been regarded as the core technology with the greatest potential to trigger the fifth round of disruptive revolution after steam engines, electricity, information and Internet technology. In the past 10 years, with the strong support of the government and policies, the development situation of my country's philanthropy has been relatively optimistic. However, as the scale of charity continues to develop and expand, my country's public welfare undertakings have gradually revealed some shortcomings. The biggest problems existing in traditional public welfare undertakings are insufficient credibility, imperfect internal management of charitable organizations, and high costs. However, many Internet public welfare service companies are currently actively using the new technology of blockchain to solve this problem. Blockchain technology has the characteristics of decentralization, information traceability and non-tampering, openness and transparency, and smart contracts. It can make up for the shortcomings of traditional public welfare undertakings such as opaque information and low management efficiency. Blockchain technology will enter public welfare undertakings and will Bring new development opportunities to the charity industry.
The main content of the research: This topic mainly includes the following three aspects:
[if !supportLists] 1. [endif] Combination of blockchain technology and public welfare Problems that arise and solved.
[if !supportLists] 2. [endif] Make a public welfare query webpage based on blockchain technology
[if !supportLists] 3. [endif] The query system Application issues and explanation
Purpose of the research:
As the scale of my country’s public welfare continues to develop and expand, our shortcomings have also been exposed. Insufficient credibility, charitable organizations lackLack of management, and the use of blockchain technology can solve this problem. This technology will track and store data and behaviors throughout the donation process, realize the complete disclosure of the public welfare chain, enable donors to effectively supervise, avoid shortcomings such as low efficiency and clear fund flows, and control risks for public welfare projects, improving Credibility and transparency of public welfare projects promote the development and progress of public welfare projects and enhance trust between people. According to the attributes and characteristics of the blockchain system, public welfare enterprises can implement full-cycle tracking, evidence storage and auditing of data and behaviors in the public welfare process, so that all parties involved in public welfare projects can conduct full-process tracking and effective supervision of the project, avoiding Due to the shortcomings of artificially reducing efficiency in public welfare, it provides a rational method for public welfare projects to control risks and judge effects, improve the transparency of public welfare undertakings, and promote the development of public welfare.
Significance of the project research: This project intends to develop an open and transparent system for tracking public welfare donations based on blockchain technology and combined with the actual development of public welfare undertakings in my country. Through in-depth analysis of blockchain technology and charity business, we found that blockchain technology has natural advantages in solving the problem of public welfare transparency. Blockchain technology can be understood as a distributed accounting method that can record all transaction information and ensure that it cannot be tampered with. This determines that wherever justice, fairness, and integrity are required, blockchain has great technology. Room to play. At the same time, the addition of smart contracts directly solves the business problem of earmarked funds.
Eventually, trust between citizens will be enhanced, donation channels will be accelerated, and the development of social donations will be promoted
2. Literature review (current status and development of relevant research at home and abroad Trend)
[if !supportLists] (1) [endif] Current status of foreign blockchain-related industries
China and Europe are gradually occupying the world in blockchain industry policies, and the EU is The European Blockchain Observation Forum has been established in February 2018. Its main responsibilities include: policy determination, industry-university-research linkage, cross-border BaaS
(Blockchain as a Service) service construction, standard open source formulation, etc. Investing 5 million euros in Horizon2020 as a blockchain research and development fund (before December 19, 2018), it is expected that investment in blockchain will reach 340 million euros within three years (2018-2020). In the United States, due to different policies among states, although blockchain is still a craze among American start-ups, the promotion of industrial policy has been slow. The Middle East, led by Di Pai, is leading the trend of blockchain. The government is taking the lead and enterprises are cooperating to explore new technology applications of blockchain. Japan and South Korea are also relatively active in the Asia-Pacific region. Japan is dominated by NTT.With the government providing support, South Korea uses finance as an entry point to explore blockchain applications. Isism is also a constant threat to all areas of Chinese society. A comprehensive review of the development status of new media culture in major foreign developed countries, summarizing experiences, and drawing lessons have certain implications for the development of new media culture in China.
[if !supportLists] (2) [endif] Current status of domestic new media research
The State Council of China issued the "Thirteenth Five-Year Plan for National Informatization", Blockchain New technologies such as big data, artificial intelligence, and machine deep learning have become the focus of the country’s layout. The People's Bank of China issued the "Thirteenth Five-Year Plan for the Development of Information Technology in China's Financial Industry", which clearly proposed to actively promote research on the application of new technologies such as blockchain and artificial intelligence, and organize pilot projects for national digital currencies. In October 2017, the Ministry of Industry and Information Technology released the "White Paper on China's Blockchain Technology and Application Development", which is the first official guidance document for blockchain.
Governments across the country, especially in coastal areas, have established blockchain experimental sites and research institutes. At present, the governments of Shenzhen, Hangzhou, Guangzhou, Guiyang and other places are actively establishing blockchain development zones and providing special support policies. China Guangzhou officially released 10 Guangzhou blockchain strategies in December 2017 to create a blockchain enterprise technology innovation zone in Huangpu District and Development Zone. In March 2018, the Shenzhen Municipal Economic, Trade and Information Commission issued the "Notice of the Municipal Economic, Trade and Information Commission on Organizing and Implementing the Second Batch of Support Plan for the New Generation Information Technology and Information Security Transformation of Shenzhen's Strategic Emerging Industries in 2018". The district Blockchain is on the list of support directions. This is the fifth local government in China to introduce support policies for blockchain after Guangzhou, Guiyang, and Gehangzhou.
(3) Current status of blockchain in the open source field
Hyperledger (Hyperledger)
Hyperledger (Hyperledger) is developed by the Linux Foundation The open source project to promote blockchain digital technology and transaction verification, launched in 2015, has attracted the participation of many companies including IBM, Intel, Fujitsu, UPS, Cisco, Huawei, Redhat, Oracle, Samsung, Tencent Cloud, Internet Finance, etc. Currently, There are already more than 200 member units, and Bran Behlendorf, founder of the Aache Foundation, serves as the executive director of the ledger project.
The goal of the Hyperledger project is to allow members to work together to build an open platform to meet user cases from many different industries and simplify business processes. Process Ledger has multiple blockchain platform projects, including Fabri contributed by BIMc project, the Sawtooth project contributed by Intel, and Iroha, Burrow, Indy, etc.
The development status of blockchain in the field of standards
ITU-T
ITU-T (International Telecommunication Union Standardization Organization) from 2016 to 2017 At the beginning of the year, SG16 (Study Group), SG17 and SG20 respectively launched research on the overall needs and security of distributed ledgers to attract applications in the Internet of Things. Established three focus groups (Focus Group on Distributed Ledger (FG DLT), Focus Group on Data Processing and Management (FG DPM), and Focus Group on Fiat Digital Currency (FG DFC)), focusing on blockchain and distributed ledger respectively. Technology application and service research, establishing a trustworthy Internet of Things and smart city data management framework based on blockchain, and carrying out standardization work on blockchain applications based on digital currency. Huawei serves as the chairman of the Architecture Group of the Focus Group on Distributed Ledger (FG DLT) and the Blockchain Group of the Focus Group on Data Processing and Management (FGDPM).
Two committees of CCSA (China Communications Standards Association) have established subgroups and projects respectively:
CCSA TC10 (Internet of Things Technical Working Committee) Established in October 2017, the Internet of Things Blockchain Subgroup: Responsible for the application research and standardization of blockchain technology in the Internet of Things and its covered areas such as smart cities, Internet of Vehicles, edge computing, Internet of Things big data, Internet of Things industry applications, logistics and intelligent manufacturing, and is led by China China Unicom technical experts serve as team leaders, and Huawei technical experts serve as deputy team leaders.
The Blockchain and Big Data Working Group under CCSA TC1 (Internet and Application Technology Working Committee) completed two blockchain industry standards: "Blockchain: Part 1 Overall Technical Requirements for Blockchain ” and “Blockchain: Part 2 Evaluation Indicators and Evaluation Methods”, in which Huawei actively participated.
JPEG
During the 78th JPEG Conference in February 2018, the JPEG Committee organized a special session on blockchain and distributed ledger technology and their impact on the JPEG standard. Meeting. Taking into account the potential impact of technologies such as blockchain and distributed ledgers on future multimedia, the committee decided to establish an ad hoc group to explore use cases and standardization needs related to blockchain technology in a multimedia environment, with a focus on imaging and multimedia applications. standardization work.
IETF
"Decentralized Internet Infrastructure" was established at the ETF99 meeting in June 2017ProposedRG
(Research Group), plans to study the blockchain architecture and corresponding standards. In 2018, IETF will likely pay more attention to the implementation of blockchain interconnection standards on the blockchain. develop.
3. The proposed research methods (plans, technical routes, etc.) and feasibility demonstration
This topic mainly studies blockchain technology Research methods used in combination with charitable donations:
1. Collect relevant theories using literature methods, collect literature materials and related theories using information retrieval, screening and other methods, and come to the blockchain The current state of technology and mastering blockchain decentralization technology.
2. Combine the technology with public welfare by combining theory and practice. Complete improvements to the system.
3. Use the method of comparative analysis to discuss the current development status of new media operations from both domestic and foreign aspects, as well as existing problems in the development of my country's new media operation models, and look forward to the development prospects of this technology field.
Feasibility demonstration:
1. Technical feasibility. The research goals involved in this topic already have considerable theoretical foundations at home and abroad. Through literature survey, we can learn about actual, reliable and useful information data, and the actual requirements are not difficult.
2. Economic feasibility. The research on this topic can be done by accessing literature and materials through the Internet and libraries. It is convenient and feasible and does not require a lot of economic consumption. Therefore, from an economic point of view, it is completely feasible.
3. Operational feasibility. This topic requires the combination of blockchain technology and public welfare, especially the tracing of these applications. A comprehensive analysis of the graduation project system on this topic can be achieved through the analysis of both Study the literature and study the existing information documents, use the data you collected to organize and analyze, apply what you have learned, and complete this project completely. From an operability point of view, it is completely feasible.
4. Expected results (or expected results)
1. Through research on the data, clarify the relevant concepts of blockchain technology, skillfully use dapp, and create a web page.
2. Through distributed applications, creating a system that allows the public to quickly browse and understand the public welfare process will increase convenience for the further development of my country's public welfare undertakings.
3. I hope that I can continue to learn and make progress from the process of writing this paper. Being able to master the relevant knowledge of blockchain will be helpful to your future career.
⑦ Can blockchain be included in a paper on data structure
p>If you pass the exam, can you write it in a paper on data structure? Blockchain can be written in a paper on data structure.
⑧ What are the prospects of blockchain?
The application of blockchain has extended to many fields such as medical health, education, charity, social management, and finance. The biggest advantage of blockchain is that it truly completes the construction of credit in an anonymous society, bringing new opportunities to many fields, thus making various innovative applications possible. . The current blockchain is equivalent to the Internet 20 years ago. It is in its preliminary stage. In the future, it will definitely become a major part of the social economy and be used to benefit the people and society. Please wait and see!
Blockchain is an intelligent peer-to-peer network that uses distributed databases to identify, disseminate and record information, also known as the Internet of Value. The concept of blockchain was first proposed by Satoshi Nakamoto in his paper "Bitcoin: A Peer-to-Peer Electronic Cash System" published on the Bitcoin Forum in late 2008.
It is a chain data structure that combines data blocks in a sequential manner in chronological order, and is cryptographically guaranteed to be an untamperable and unforgeable distributed ledger.
Broadly speaking, blockchain technology uses block chain data structures to verify and store data, uses distributed node consensus algorithms to generate and update data, and uses cryptography to ensure the security of data transmission and access. A new distributed infrastructure and computing method that uses smart contracts composed of automated script codes to program and manipulate data.
Blockchain Investment
Blockchain investment is indeed one of the hottest investment methods in today’s society. Although blockchain seems to have just started, as such a novel existence, it It is indeed very unique. Many people don’t know what blockchain is. They only know that blockchain mining can make money, so they follow it in a fog. But to make a truly safe investment, I suggest that everyone still Understand it first, prepare well before taking action, and don’t fight an unprepared battle.
Blockchain technology does have huge room for growth in the future. Many people believe that it will be able to subvert many existing industries in the future. This is very important. This is the source of all your confidence. If you If you don’t recognize the value of blockchain from the bottom of your heart, then you are likely to be affected by some negative remarks and even doubt the entire industry, which will affect your entire decision-making and judgment.
If you just want to play casually or test the water, the chance of success is very small.
Once you are determined, be prepared and spend all your precious energy on research. When investing, you must do your homework! Never invest money without knowing what the project is about.
Finally, blockchain is a new industry after all. It is currently in a mixed situation. Of course, scammers are indispensable. Therefore, when we invest,You must be careful, don’t take whatever others say, and keep your eyes open.
In addition, I still have to say that investment is risky, so you must be cautious!
- 上一篇: 凸显出区块链的题目
- 下一篇: 区块链产品运营是做什么的,区块链产品运营方案