Operations Research in the Blockchain Technology

被引:2
作者
Wang, Xu [1 ,2 ,3 ]
Wu, Ling-Yun [1 ,2 ]
机构
[1] Chinese Acad Sci, Acad Math & Syst Sci, IAM, MADIS, Beijing 100190, Peoples R China
[2] Univ Chinese Acad Sci, Sch Math Sci, Beijing 100049, Peoples R China
[3] Tsinghua Univ, Dept Ind Engn, Beijing 100084, Peoples R China
关键词
Blockchain; Operations research; Security; Efficiency; Resource allocation; SELECTION; STRATEGIES; BITCOIN; GAME;
D O I
10.1007/s40305-021-00348-7
中图分类号
C93 [管理学]; O22 [运筹学];
学科分类号
070105 ; 12 ; 1201 ; 1202 ; 120202 ;
摘要
In the past decade, as a decentralized distributed database technology blockchain has developed rapidly at an unprecedented speed and been applied to a wide range of scenarios far beyond cryptocurrencies, for example, insurance, energy, risk management, and Internet of things (IoT). The blockchain technology combines the achievements from cryptography, computer science, economics, and operations research and has increasingly attracted attention from both academia and industry. Though the operations research has been widely adopted in the blockchain technology, there is a lack of comprehensive survey on the operations research in blockchain-related issues. In order to fill the gap, we analyze the blockchain technology through the perspective of operations research and present a comprehensive review of the operations research problems from the aspects of security and stability, efficiency and performance, and resource allocation. This paper aimed to help the relevant readers in the field of operations research find their own points of interest and conduct in-depth research on the blockchain technology, hoping to promote the rapid development and wider application of the blockchain technology in the near future.
引用
收藏
页码:401 / 422
页数:22
相关论文
共 48 条
[1]  
[Anonymous], 2018, ARXIV180711218
[2]   The Blockchain Folk Theorem [J].
Biais, Bruno ;
Bisiere, Christophe ;
Bouvard, Matthieu ;
Casamatta, Catherine .
REVIEW OF FINANCIAL STUDIES, 2019, 32 (05) :1662-1715
[3]  
Cheng YK, 2018, LECT NOTES COMPUT SC, V11059, P226, DOI 10.1007/978-3-319-99660-8_20
[4]   A Survey on Security and Privacy Issues of Bitcoin [J].
Conti, Mauro ;
Kumar, E. Sandeep ;
Lal, Chhagan ;
Ruj, Sushmita .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2018, 20 (04) :3416-3452
[5]  
Crosby M., 2016, APPL INNOV REV, V2, P6
[6]  
Decker C, 2013, IEEE P2P 2013 PROC, P1, DOI DOI 10.1109/P2P.2013.6688704
[7]   The Miner's Dilemma [J].
Eyal, Ittay .
2015 IEEE SYMPOSIUM ON SECURITY AND PRIVACY SP 2015, 2015, :89-103
[8]   Majority Is Not Enough: Bitcoin Mining Is Vulnerable [J].
Eyal, Ittay ;
Sirer, Emin Guen .
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2014, 2014, 8437 :436-454
[9]   The Bitcoin Backbone Protocol: Analysis and Applications [J].
Garay, Juan ;
Kiayias, Aggelos ;
Leonardos, Nikos .
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2015, PT II, 2015, 9057 :281-310
[10]  
Garey M. R., 1979, Computers and intractability. A guide to the theory of NP-completeness