区块链原理、方法与应用

本课程为北京大学数学科学学院研究生课程(研本合上)。

时间:周二5-6节(单),周四3-4节。

地点:三教508。

答疑:双周二14:00-15:00,智华楼353。

课程内容:本课程主要讲授区块链的密码学原理和共识机制等基础理论,比特币、以太坊等典型区块链技术以及区块链安全、监管、验证等方法和区块链技术的一些应用,并对区块链领域当前存在的问题及未来可能的发展进行讨论。

参考书目:

[1] 聂长海,陆超逸,高维忠,郑志强,区块链技术基础教程:原理、方法及实践,机械工业出版社,2023.

[2] 魏翼飞,区块链原理、架构与应用(第二版),清华大学出版社,2022.

[3] 潘恒,斯雪明,区块链原理与实践,电子工业出版社,2021.

[4] 陈钟,单志广,区块链导论,机械工业出版社,2021.

[5] 杨保华,陈昌,区块链原理、设计与应用(第二版),机械工业出版社,2021.

成绩判定:

参加课程学习的每位同学需从下方所给列表中任选一篇论文做一次报告,并选择一个课程项目进行研究,完成一篇项目论文(课题4中文,课题1-3中英文均可),中文正文(不含参考文献)不少于软件学报格式10页,英文正文(不含参考文献)不少于LNCS格式16页或IEEE格式8页,论文可从建议课题中选择其一,也可根据自己的研究方向自选课题(推荐自选,课题需符合本课程宗旨并经与任课教师讨论取得同意,如自选课题,请写一个简短的研究建议,说明所选课题的重要性及与本课程的相关性,通过邮件发送给我,合理的题目都可通过确认)。

本课程期末成绩将基于平时考勤及作业(10%)、前沿论文报告(40%)和课程项目论文(50%)综合评定。

重要日期(deadline):

    平时作业提交(教学网):见课程日程安排。

    确定报告题目及课程论文所选课题(给我发email):3月27日。

    项目报告提交(教学网):6月12日。

可选报告论文列表:

1. 密码协议及应用:

[1] Mathias Hall-Andersen, Mark Simkin, Benedikt Wagner: FRIDA: Data Availability Sampling from FRI. CRYPTO (6) 2024: 289-324.

[2] Pratyush Ranjan Tiwari, Matthew Green: Subverting Cryptographic Hardware Used in Blockchain Consensus. FC (1) 2024: 384-424

[3] Pei Zhang, Qingfeng Cheng, Mingliang Zhang, Xiangyang Luo: A Blockchain-Based Secure Covert Communication Method via Shamir Threshold and STC Mapping. IEEE Trans. Dependable Secur. Comput. 21(5): 4469-4480 (2024)

[4] Sijiang Xie, Rui Shi, Yang Yang, Huiqin Xie, Yingjiu Li, Robert H. Deng: AccCred: Improved Accountable Anonymous Credentials With Dynamic Triple-Hiding Committees. IEEE Trans. Dependable Secur. Comput. 22(3): 1961-1975 (2025)

[5] Pengfei Duan, Zhaofeng Ma, Hongmin Gao, Tian Tian, Yuqing Zhang: Multi-Authority Attribute-Based Encryption Scheme With Access Delegation for Cross Blockchain Data Sharing. IEEE Trans. Inf. Forensics Secur. 20: 323-337 (2025)

[6] Joon Sik Kim, Kwangsu Lee, Jong Hwan Park, Hyoseung Kim: Dynamic Threshold Key Encapsulation With Transparent Setup. IEEE Trans. Inf. Forensics Secur. 20: 8433-8448 (2025)

2. 智能合约安全分析与漏洞识别:

[1] Jie Cai, Jiachi Chen, Tao Zhang, Xiapu Luo, Xiaobing Sun, Bin Li: Detecting Reentrancy Vulnerabilities for Solidity Smart Contracts With Contract Standards-Based Rules. IEEE Trans. Inf. Forensics Secur. 20: 3662-3676 (2025)

[2] Fei Tong, Zihao Li, Guang Cheng, Yujian Zhang, Heng Li: sBugChecker: A Systematic Framework for Detecting Solidity Compiler-Introduced Bugs. IEEE Trans. Inf. Forensics Secur. 20: 9760-9775 (2025)

[3] Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Ziming Zhao, Yang Liu: Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. IEEE Trans. Inf. Forensics Secur. 20: 2157-2170 (2025)

[4] Gulshan Kumar, Rahul Saha, Mauro Conti, William J. Buchanan: LEAGAN: A Decentralized Version-Control Framework for Upgradeable Smart Contracts. IEEE Trans. Serv. Comput. 18(3): 1529-1542 (2025)

[5] Isra Mohamed Ali, Mohamed M. Abdallah: On Off-Chaining Smart Contract Runtime Protection: A Queuing Model Approach. IEEE Trans. Parallel Distributed Syst. 35(8): 1345-1359 (2024)

[6] Jie Chen, Liangmin Wang, Huijuan Zhu: SmartGuard: Making Prediction Verifiable Through Transaction Sequences for Smart Contract Vulnerability Detection. IEEE Trans. Inf. Forensics Secur. 20: 6117-6132 (2025)

3. 共识协议:

[1] Mohammad M. Jalalzai, Jianyu Niu, Chen Feng, Fangyu Gai: Fast-HotStuff: A Fast and Robust BFT Protocol for Blockchains. IEEE Trans. Dependable Secur. Comput. 21(4): 2478-2493 (2024)

[2] Nicolas Alhaddad, Sisi Duan, Mayank Varia, Haochen Wang, Haibin Zhang: Efficient Byzantine Broadcast From Succinct Erasure Coding Proof System. IEEE Trans. Inf. Forensics Secur. 20: 8583-8596 (2025)

[3] Haeung Choi, Seungmin Kim, Heung-No Lee: Error Correction Code Verifiable Computation Consensus. IEEE Trans. Inf. Forensics Secur. 20: 6678-6692 (2025)

[4] Yue Huang, Huizhong Li, Yi Sun, Sisi Duan: Byzantine Fault Tolerance With Non-Determinism, Revisited. IEEE Trans. Inf. Forensics Secur. 20: 309-322 (2025)

[5] Hao Yang, Jing Chen, Kewen Pan, Kun He, Meng Jia, Ruiying Du: Volia: An Efficient and Light Asynchronous BFT Protocol. IEEE Trans. Inf. Forensics Secur. 20: 6706-6718 (2025)

[6] Yingzi Gao, Yuan Lu, Zhenliang Lu, Qiang Tang, Yuyi Wang, Jing Xu: Turritopsis: Practical Dynamic Asynchronous BFT. IEEE Trans. Inf. Forensics Secur. 20: 5588-5603 (2025)

4. 区块链攻防:

[1] Junjie Hu, Huan Yan, Na Ruan, Zhen Xiao, Jianhua Li: The Halt Game: Sometimes Rewards Cannot Cover Expenses in the PoW-Based Blockchain. IEEE Trans. Inf. Forensics Secur. 20: 8906-8921 (2025)

[2] Ruonan Chen, Dawei Li, Yang Zhang, Yizhong Liu, Jianwei Liu, Zhenyu Guan, Min Xie, Qianhong Wu, Jianying Zhou, Willy Susilo: Dissecting Blockchain Network Partitioning Attacks and Novel Defense for Bitcoin and Ethereum. IEEE Trans. Inf. Forensics Secur. 20: 8613-8627 (2025)

[3] Roozbeh Sarenche, Ren Zhang, Svetla Nikova, Bart Preneel: Selfish Mining Time-Averaged Analysis in Bitcoin: Is Orphan Reporting an Effective Countermeasure? IEEE Trans. Inf. Forensics Secur. 20: 449-464 (2025)

[4] Anlin Chen, Shengling Wang, Hongwei Shi, Yu Guo, Xiuzhen Cheng: Reconnaissance-Strike Complex: A Network-Layer Solution to the Natural Forking in Blockchain. IEEE Trans. Inf. Forensics Secur. 20: 2022-2034 (2025)

[5] Ming Zhang, Wenhai Sun, Hui Li, Xiaofeng Wang, Zihao Yang, Chao Qu, Xiaoguang Li: Manipulated Transaction Collision Attack on Execute-Order-Validate Blockchain. IEEE Trans. Dependable Secur. Comput. 22(2): 1132-1149 (2025)

[6] Yunlong Mao, Ziqin Dang, Heng Wang, Yuan Zhang, Sheng Zhong: Solution Probing Attack Against Coin Mixing Based Privacy-Preserving Crowdsourcing Platforms. IEEE Trans. Dependable Secur. Comput. 21(5): 4684-4698 (2024)

5. 区块链联邦学习:

[1] Jialiang Han, Yudong Han, Xiang Jing, Gang Huang, Yun Ma: DegaFL: Decentralized Gradient Aggregation for Cross-Silo Federated Learning. IEEE Trans. Parallel Distributed Syst. 36(2): 212-225 (2025)

[2] Hao Wang, Yichen Cai, Yu Tao, Luyao Wang, Yanbin Li, Lu Zhou: B2DFL: Bringing butterfly to decentralized federated learning assisted with blockchain. J. Parallel Distributed Comput. 195: 104978 (2025)

[3] Chenhao Xu, Jiaqi Ge, Yao Deng, Longxiang Gao, Mengshi Zhang, Yong Li, Wanlei Zhou, Xi Zheng: BASS: A Blockchain-Based Asynchronous SignSGD Architecture for Efficient and Secure Federated Learning. IEEE Trans. Dependable Secur. Comput. 21(6): 5388-5402 (2024)

[4] Leon Witt, Usama Zafar, KuoYeh Shen, Felix Sattler, Dan Li, Songtao Wang, Wojciech Samek: Decentralized and Incentivized Federated Learning: A Blockchain-Enabled Framework Utilising Compressed Soft-Labels and Peer Consistency. IEEE Trans. Serv. Comput. 17(4): 1449-1464 (2024)

[5] Vidushi Agarwal, Shruti Mishra, Sujata Pal: Towards a Sustainable Blockchain: A Peer-to-Peer Federated Learning based Approach. ACM Trans. Internet Techn. 24(4): 1-26 (2024)

[6] Md. Mamunur Rashid, Yong Xiang, Md Palash Uddin, Jine Tang, Keshav Sood, Longxiang Gao: Trustworthy and Fair Federated Learning via Reputation-Based Consensus and Adaptive Incentives. IEEE Trans. Inf. Forensics Secur. 20: 2868-2882 (2025)

课程项目可选课题:

    1. 智能合约的并行问题(现有的智能合约编程语言如Solidity、Move、Cadence、Liquid等均无法较好地支持并行编程模型,可能原因是什么?会导致什么问题?有什么可能的解决方法提升智能合约的并行能力?)(独立完成,论文成绩*0.8)

    2. 智能合约编程语言的内生安全性:设计和问题(研究智能合约编程语言的内生安全性机制,语言允许合约做哪些事情?有什么合约需要的特征但由于安全问题语言中未能提供?语言中可能会有哪些类型的安全漏洞?有什么好的解决方案?)(独立完成,论文成绩*0.8)

    3. 密码/共识协议形式化建模与验证(从可选报告论文列表密码或共识协议部分任选一种,并自选一种形式化验证工具如Tamarin、ProVerif、PRISM、UPPAAL、Coq、Isabelle/HOL等,对所选共识协议进行形式化建模和验证,对协议的安全性、活性、对恶意节点的防御能力等性质进行分析。)(可独立或合作完成,合作者不超过2人)

    4. 随着信息化技术的普及,越来越多的纸质合同被电子合同替代,这些电子合同在操作和使用过程中容易遭到篡改或者删除,极大影响了电子合同的真实性和可信性。此外,电子合同还存在诸多风险,如电子合同签订成本高、合同纠纷处理效率低、举证困难、中心化存储数据易被篡改、电子合同文件易丢失等。采用区块链系统实现电子合同上链,可以有效解决这些问题。开发一个基于区块链的电子合同存证系统,实现合同签署方(普通用户)和法院用户角色,普通用户可在线下沟通、签署完成电子合同,通过存证平台将电子合同的哈希值保存在区块链上,合同各签署方均有权随时查看链上存储的合同详情。当合同出现争议等纠纷时,普通用户可向法院提出申诉请求,法院受理后,可以调阅区块链存证平台上保存的电子合同证据,并进行核验,还可对链上存储的合同信息进行溯源。(本课题仅限本科生选做,独立完成)

课程日程安排(随课程进度更新):

序号 课程内容 作业 辅助阅读材料
1

绪论

(Lecture 1-2) 

1. 区块链关键技术及存在问题研究综述,刘双印等,计算机工程与应用,58(3): 66-82, 2022。

2. 区块链关键技术及其应用研究进展,朱建明等,太原理工大学学报,51(3): 321-330, 2020。

3. 区块链关键技术的研究进展,李燕等,计算机工程与应用,55(20): 13-23, 2019.

2

区块链网络

(Lecture 3) 

1. P2P技术揭秘——P2P网络技术原理与典型系统开发,管磊,清华大学出版社,2011。

2. Daniel Cason, Nenad Milosevic, Zarko Milosevic, Fernando Pedone: Gossip consensus. Middleware 2021, pages 198-209, ACM, 2021.

3. Hao Zhang, Yonggang Wen, Haiyong Xie, Nenghai Yu: Distributed Hash Table: Theory, Platforms and Applications, Springer, 2013.

4. 区块链网络综述,司冰茹, 肖江, 刘存扬, 戴小海, 金海,软件学报,35(2): 773-799, 2024.

3

密码学原理

(Lecture 4-5)

1. 密码学原理与实践(第三版),Douglas R. Stinson著,冯登国等译,电子工业出版社,2016。

2. 应用密码学:协议、算法与C源程序,Bruce Schneier著,吴世忠等译,机械工业出版社,2021。

4

区块链共识机制

(Lecture 5-8)

 

1. 区块链共识机制研究综述,刘懿中等,密码学报,6(4):395-432,2019。

2. 区块链共识协议综述,夏清等,软件学报,32(2):277-299,2021。

5

比特币

(Lecture 8-9) 

6

以太坊

(Lecture 9-10)

 

7

超级账本

(Lecture 11) 

8
公有链、区块链安全与监管(Lecture 12) 

9

区块链安全技术

(Lecture 13-15)

10 

区块链应用

(Lecture 16) 

论文报告:

时间 报告人 报告题目
5.12

张知辛

卢天泽

5.14

吴秉阳

邬程灿

5.21

邱文晰

童雪飞

5.26

郭尧昱

岳关璋

5.28

6.4

雷斐然

6.9

王迩东

6.11

魏泽明