Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/28365
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Yilei | en_UK |
dc.contributor.author | Bracciali, Andrea | en_UK |
dc.contributor.author | Li, Tao | en_UK |
dc.contributor.author | Li, Fengyin | en_UK |
dc.contributor.author | Cui, Xinchun | en_UK |
dc.contributor.author | Zhao, Minghao | en_UK |
dc.date.accessioned | 2018-12-10T15:34:41Z | - |
dc.date.available | 2018-12-10T15:34:41Z | - |
dc.date.issued | 2019-03-31 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/28365 | - |
dc.description.abstract | A smart contract enforces specific performance on anonymous users without centralization. It facilitates payment equity in commerce by providing irreversible transactions. Smart contracts are also used for illegal activities such as money laundering and ransomware. Such contracts include criminal smart contracts (CSCs), proposed in CCS’16, that can be efficiently implemented in existing scripting languages. This aggravates concerns about the dangers of CSCs. However, PublicLeaks, a CSC for leaking private data, is conditionally implemented as it is influenced by various factors. For example, PublicLeaks does not necessarily reach a desirable terminal state for a criminal leaking private information, and other possible terminal states may invalidate the CSC. In this study, we propose a CSC based on PublicLeaks by formulating random factors such as the donation ratio. Our contract forks into five terminal states, including a unique one in PublicLeaks due to randomness. We simulated the maximal probabilities of these terminal states and found that the desirable terminal state in PublicLeaks is reachable with low probabilities (lower than 25%). The terminal state where the criminal fails to leak private information is attained with relatively high probabilities (over 65%). Therefore, our simulations show that CSCs are not always as powerful as expected, and the risk posed by them can be mitigated. | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | Elsevier BV | en_UK |
dc.relation | Wang Y, Bracciali A, Li T, Li F, Cui X & Zhao M (2019) Randomness invalidates criminal smart contracts. Information Sciences, 477, pp. 291-301. https://doi.org/10.1016/j.ins.2018.10.057 | en_UK |
dc.rights | This item has been embargoed for a period. During the embargo please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study. Accepted refereed manuscript of: Wang Y, Bracciali A, Li T, Li F, Cui X & Zhao M (2019) Randomness invalidates criminal smart contracts. Information Sciences, 477, pp. 291-301. DOI: https://doi.org/10.1016/j.ins.2018.10.057 © 2018, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_UK |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_UK |
dc.subject | Control and Systems Engineering | en_UK |
dc.subject | Theoretical Computer Science | en_UK |
dc.subject | Software | en_UK |
dc.subject | Information Systems and Management | en_UK |
dc.subject | Artificial Intelligence | en_UK |
dc.subject | Computer Science Applications | en_UK |
dc.title | Randomness invalidates criminal smart contracts | en_UK |
dc.type | Journal Article | en_UK |
dc.rights.embargodate | 2019-10-31 | en_UK |
dc.rights.embargoreason | [elsarticle-template.pdf] Publisher requires embargo of 12 months after formal publication. | en_UK |
dc.identifier.doi | 10.1016/j.ins.2018.10.057 | en_UK |
dc.citation.jtitle | Information Sciences | en_UK |
dc.citation.issn | 0020-0255 | en_UK |
dc.citation.volume | 477 | en_UK |
dc.citation.spage | 291 | en_UK |
dc.citation.epage | 301 | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.citation.peerreviewed | Refereed | en_UK |
dc.type.status | AM - Accepted Manuscript | en_UK |
dc.contributor.funder | Natural Science Foundation of Shandong Province | en_UK |
dc.contributor.funder | Natural Science Foundation of Shandong Province | en_UK |
dc.author.email | andrea.bracciali@stir.ac.uk | en_UK |
dc.citation.date | 30/10/2018 | en_UK |
dc.contributor.affiliation | Qufu Normal University | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.contributor.affiliation | Qufu Normal University | en_UK |
dc.contributor.affiliation | Qufu Normal University | en_UK |
dc.contributor.affiliation | Qufu Normal University | en_UK |
dc.contributor.affiliation | Tsinghua University | en_UK |
dc.identifier.wtid | 1070252 | en_UK |
dc.contributor.orcid | 0000-0002-1602-3720 | en_UK |
dc.contributor.orcid | 0000-0003-1451-9260 | en_UK |
dc.date.accepted | 2018-10-28 | en_UK |
dcterms.dateAccepted | 2018-10-28 | en_UK |
dc.date.filedepositdate | 2018-12-07 | en_UK |
rioxxterms.apc | not required | en_UK |
rioxxterms.type | Journal Article/Review | en_UK |
rioxxterms.version | AM | en_UK |
local.rioxx.author | Wang, Yilei|0000-0002-1602-3720 | en_UK |
local.rioxx.author | Bracciali, Andrea|0000-0003-1451-9260 | en_UK |
local.rioxx.author | Li, Tao| | en_UK |
local.rioxx.author | Li, Fengyin| | en_UK |
local.rioxx.author | Cui, Xinchun| | en_UK |
local.rioxx.author | Zhao, Minghao| | en_UK |
local.rioxx.project | ZR2017MF010|Natural Science Foundation of Shandong Province| | en_UK |
local.rioxx.project | ZR2017MF062|Natural Science Foundation of Shandong Province| | en_UK |
local.rioxx.freetoreaddate | 2019-10-31 | en_UK |
local.rioxx.licence | http://www.rioxx.net/licenses/under-embargo-all-rights-reserved||2019-10-30 | en_UK |
local.rioxx.licence | http://creativecommons.org/licenses/by-nc-nd/4.0/|2019-10-31| | en_UK |
local.rioxx.filename | elsarticle-template.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
local.rioxx.source | 0020-0255 | en_UK |
Appears in Collections: | Computing Science and Mathematics Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
elsarticle-template.pdf | Fulltext - Accepted Version | 554.68 kB | Adobe PDF | View/Open |
This item is protected by original copyright |
A file in this item is licensed under a Creative Commons License
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.