Blockchain boundary security protection based on trusted computing
Abstract
Blockchain has the characteristics of openness and decentralization and faces many security threats in application scenarios. Apply trusted computing technology to establish trusted blockchain boundaries and build a systematic security protection framework to meet the security requirements in blockchain application scenarios. Therefore, this paper combines trusted computing technology with blockchain security protection requirements, proposes blockchain trusted boundary, focuses on blockchain boundary trusted measurement technology, and ensures the security and credibility of blockchain boundary from systematization.
RAS ID
44313
Document Type
Conference Proceeding
Date of Publication
2021
Funding Information
Beijing Natural Science Foundation Natural Science Foundation of China China Ministry of Education - China Mobile Scientific Research Foundation China Postdoctoral Science Foundation Beijing Municipal Commission of Education Foundation
School
School of Engineering
Copyright
subscription content
Publisher
IEEE
Recommended Citation
Wang, X., Badshah, A., Tu, S., & Waqas, M. (2021). Blockchain boundary security protection based on trusted computing. DOI: https://doi.org/10.1109/ASSP54407.2021.00042
Comments
Wang, X., Badshah, A., Tu, S., Waqas, M. (2021). Blockchain boundary security protection based on trusted computing. In 2021 2nd Asia Symposium on Signal Processing (ASSP) (pp. 227-231). IEEE. https://doi.org/10.1109/ASSP54407.2021.00042