2018 27th International Conference on Computer Communication and Networks (ICCCN) 2018
DOI: 10.1109/icccn.2018.8487348
|View full text |Cite
|
Sign up to set email alerts
|

A Survey of Blockchain: Techniques, Applications, and Challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
94
0
5

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 153 publications
(99 citation statements)
references
References 55 publications
0
94
0
5
Order By: Relevance
“…Secondly, as the number of miners (i.e., block) increases, the size of the BCT also increases continuously [19,42]. This increases the cost of storage and reduces the speed of distribution over the whole network, leading to a rise in the number of issues like the scalability and availability of BCT [55]. For instance, when the number of blocks is increased dramatically the scalability of the BCT becomes an issue and can lead to an increase in the latency of the entire network.…”
Section: Open Issues and Future Research Directionsmentioning
confidence: 99%
“…Secondly, as the number of miners (i.e., block) increases, the size of the BCT also increases continuously [19,42]. This increases the cost of storage and reduces the speed of distribution over the whole network, leading to a rise in the number of issues like the scalability and availability of BCT [55]. For instance, when the number of blocks is increased dramatically the scalability of the BCT becomes an issue and can lead to an increase in the latency of the entire network.…”
Section: Open Issues and Future Research Directionsmentioning
confidence: 99%
“…The structure of append-only logs is similar to that of blockchains for crypto-currencies [15]: they both consist of a sequence of immutable events that can only be extended by adding new events, and in which the integrity of earlier events is guaranteed by the chain of hashes from later events. However, for the gossip algorithms presented in this paper, each participant has their own log and the system is not trying to reach consensus on a single global state.…”
Section: Related Workmentioning
confidence: 99%
“…Both projects pioneered the use of replicated authenticated single-writer append-only logs: chains of ordered immutable events, similar to blockchains [15] but specific to each participant and without the need for global consensus. In particular, SSB efficiently replicates logs using the Scuttlebutt gossip protocol [39], by only transmitting the latest missing events between pairs of replicas.…”
Section: Introductionmentioning
confidence: 99%
“…Because of these features, hash functions can be applied to verify the integrity of the original message, or as hash pointers, in which the pointer contains the hash of the message that it points to. In the blockchain, each data block contains the hash value of the previous block so that the integrity of all previous data can be verified, as well as to keep the transaction records from being altered [23]. Blockchain technology has over the past few years evolved from the earlier Bitcoin foundation to other generation platforms.…”
Section: Hashingmentioning
confidence: 99%