Secure Scheme Against Compromised Hash in Proof-of-Work Blockchain.

Fengjun Chen,Zhiqiang Liu,Yu Long,Zhen Liu,Ning Ding
DOI: https://doi.org/10.1007/978-3-030-02744-5_1
2018-01-01
Abstract:Blockchain is built on the basis of peer-to-peer network, cryptography and consensus mechanism over a distributed environment. The underlying cryptography in blockchain, such as hash algorithm and digital signature scheme, is used to guarantee the security of blockchain. However, past experience showed that cryptographic primitives do not last forever along with increasing computational power and advanced cryptanalysis. Therefore, it is crucial to investigate the issue that the underlying cryptography in blockchain is compromised.
What problem does this paper attempt to address?