作者: Maoning Wang , Meijiao Duan , Jianming Zhu
关键词:
摘要: The blockchain is an emerging technology. Because of its efficiency and functionality, it widely considered to have revolutionary application prospects. As a supporting part the data structure, hash function important for ensuring availability security blockchain. To evaluate technology analyze several criteria functions used in This paper focuses on two criteria-hiding puzzle-friendliness-that should satisfy proposed by Narayanan et al. (Narayanan A, Bonneau J, Felten E, Bitcoin Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press, 2016). Under framework Rogaway?Shrimpton's theory, their definitions are mathematically described relation proved. Also, comparisons between traditional ones made. conclusions this point out that functions, harder break hiding puzzle-friendliness than preimage resistance, which shows proven be preimage-resistant or tested cryptanalysis like SHA256 tend enough corresponding parts design. At same time, from attackers' view can provide theoretical basis studying potential attacks defects may exist structure applied