Technology and Security Analysis of Cryptocurrency Based on Blockchain

Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technol...

Full description

Saved in:
Bibliographic Details
Main Authors: Chao Yu, Wenke Yang, Feiyu Xie, Jianmin He
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Complexity
Online Access:http://dx.doi.org/10.1155/2022/5835457
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1849695587536994304
author Chao Yu
Wenke Yang
Feiyu Xie
Jianmin He
author_facet Chao Yu
Wenke Yang
Feiyu Xie
Jianmin He
author_sort Chao Yu
collection DOAJ
description Blockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan (2015) and Choi (2019) and find that the top ten platforms play critical roles in security support and have significant advantages in terms of funds, duration, and human resources. Moreover, these platforms provide computational resources and benefits to the consensus algorithm selection for blockchain practitioners. Second, encryption ensures the security of cryptocurrencies. On the one hand, the digital signatures identify the identity of the signatory and the transaction. However, the principle of the hash algorithm (SHA256) confirms ownership. Meanwhile, SHA256 is infeasible to compute in the reverse direction and is difficult to attack. Furthermore, the records in the blockchain can be queried by every participant, making the system information transparent and open reliable. Third, compared to the study of Fu and Fang 2016, we find that the blockchain structure is composed of security components and basic components of six layers that are independent and cannot be extended completely and have a certain coupling among them. Fourth, the underlying ledger structures of Bitcoin and DAG are highly correlated to their security. Specifically, we follow Sompolinsky et al. (2016) and detect that the structure of SPECTRE ensures network security and robustness from its block production, conflict resolution, and generated trusted transaction sets. Meanwhile, the voting algorithm of SPECTRE makes resolving conflicting transactions by calculating votes and ensuring the transaction information that is virtually unable to be tampered with possible. In particular, the security calculation power of SPECTRE can reach 51% and resist “double-spend attacks” and “censorship attacks” effectively. In addition, the RDL framework of SPECTRE achieves security confirmation of transferring funds. Moreover, PHANTOM identifies evil blocks by employing block connectivity analysis and ensures its security. Eventually, we also expand the studies of (Sompolinsky et al., 2016 and Sompolinsky et al., 2017) and compare the basic characteristics of the protocols of Bitcoin, SPECTRE, and PHANTOM and find that protocols play imperative roles throughout the implementation process of cryptocurrency. In addition, the underlying ledger structure and consensus mechanism make up a blockchain while the confirmation time, throughput limit, and ordering are prerequisites for smart contracts.
format Article
id doaj-art-d01980e21e1f4b00b9192df9513ffb8c
institution DOAJ
issn 1099-0526
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Complexity
spelling doaj-art-d01980e21e1f4b00b9192df9513ffb8c2025-08-20T03:19:45ZengWileyComplexity1099-05262022-01-01202210.1155/2022/5835457Technology and Security Analysis of Cryptocurrency Based on BlockchainChao Yu0Wenke Yang1Feiyu Xie2Jianmin He3School of Cyber Science and EngineeringSchool of Economics and ManagementSchool of Cyber Science and EngineeringSchool of Economics and ManagementBlockchain technology applied to cryptocurrencies is the dominant factor in maintaining the security of cryptocurrencies. This article reviews the technological implementation of cryptocurrency and the security and stability of cryptocurrency and analyzes the security support from blockchain technology and its platforms based on empirical case studies. Our results show that the security support from blockchain technology platforms is significantly insufficient and immature. In addition, we further Zyskind and Nathan (2015) and Choi (2019) and find that the top ten platforms play critical roles in security support and have significant advantages in terms of funds, duration, and human resources. Moreover, these platforms provide computational resources and benefits to the consensus algorithm selection for blockchain practitioners. Second, encryption ensures the security of cryptocurrencies. On the one hand, the digital signatures identify the identity of the signatory and the transaction. However, the principle of the hash algorithm (SHA256) confirms ownership. Meanwhile, SHA256 is infeasible to compute in the reverse direction and is difficult to attack. Furthermore, the records in the blockchain can be queried by every participant, making the system information transparent and open reliable. Third, compared to the study of Fu and Fang 2016, we find that the blockchain structure is composed of security components and basic components of six layers that are independent and cannot be extended completely and have a certain coupling among them. Fourth, the underlying ledger structures of Bitcoin and DAG are highly correlated to their security. Specifically, we follow Sompolinsky et al. (2016) and detect that the structure of SPECTRE ensures network security and robustness from its block production, conflict resolution, and generated trusted transaction sets. Meanwhile, the voting algorithm of SPECTRE makes resolving conflicting transactions by calculating votes and ensuring the transaction information that is virtually unable to be tampered with possible. In particular, the security calculation power of SPECTRE can reach 51% and resist “double-spend attacks” and “censorship attacks” effectively. In addition, the RDL framework of SPECTRE achieves security confirmation of transferring funds. Moreover, PHANTOM identifies evil blocks by employing block connectivity analysis and ensures its security. Eventually, we also expand the studies of (Sompolinsky et al., 2016 and Sompolinsky et al., 2017) and compare the basic characteristics of the protocols of Bitcoin, SPECTRE, and PHANTOM and find that protocols play imperative roles throughout the implementation process of cryptocurrency. In addition, the underlying ledger structure and consensus mechanism make up a blockchain while the confirmation time, throughput limit, and ordering are prerequisites for smart contracts.http://dx.doi.org/10.1155/2022/5835457
spellingShingle Chao Yu
Wenke Yang
Feiyu Xie
Jianmin He
Technology and Security Analysis of Cryptocurrency Based on Blockchain
Complexity
title Technology and Security Analysis of Cryptocurrency Based on Blockchain
title_full Technology and Security Analysis of Cryptocurrency Based on Blockchain
title_fullStr Technology and Security Analysis of Cryptocurrency Based on Blockchain
title_full_unstemmed Technology and Security Analysis of Cryptocurrency Based on Blockchain
title_short Technology and Security Analysis of Cryptocurrency Based on Blockchain
title_sort technology and security analysis of cryptocurrency based on blockchain
url http://dx.doi.org/10.1155/2022/5835457
work_keys_str_mv AT chaoyu technologyandsecurityanalysisofcryptocurrencybasedonblockchain
AT wenkeyang technologyandsecurityanalysisofcryptocurrencybasedonblockchain
AT feiyuxie technologyandsecurityanalysisofcryptocurrencybasedonblockchain
AT jianminhe technologyandsecurityanalysisofcryptocurrencybasedonblockchain