SCIENTIA SINICA Informationis, Volume 51 , Issue 9 : 1559(2021) https://doi.org/10.1360/SSI-2020-0016

Digital content ecological value chain based on block chain

More info
  • ReceivedJan 19, 2020
  • AcceptedApr 14, 2020
  • PublishedSep 15, 2021


Funded by







[1] Porter M E, Millar V E. How Information Gives You Competitive Advantage. Harvard Business Review, 1985, 63: 149-160. Google Scholar

[2] Gulati R, Singh H. The Architecture of Cooperation: Managing Coordination Costs and Appropriation Concerns in Strategic Alliances. Administrative Sci Q, 1998, 43: 781-814 CrossRef Google Scholar

[3] Lamport L, Shostak R, Pease M. The Byzantine Generals Problem. ACM Trans Program Lang Syst, 1982, 4: 382-401 CrossRef Google Scholar

[4] Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System. 2008. Google Scholar

[5] Sasson E B, Chiesa A, Garman C, et al. Zerocash: decentralized anonymous payments from bitcoin. In: Proceedings of IEEE Symposium on Security and Privacy, San Jose, 2014. 459--474. Google Scholar

[6] Van Saberhagen N. CryptoNote v 2.0, 2013. Google Scholar

[7] Wood G. Ethereum: a secure decentralised generalised transaction ledger. Ethereum project yellow paper, 2014, 151: 1-32. Google Scholar

[8] Shao Q F, Jin C Q, Zhang Z, et al. Blockchain: Architecture and Research Progress. Chinese Journal Of Computers, 2017, 41: 969-988. Google Scholar

[9] Xu K, Yao W B. Cyber Intelligent Economy and Blockchain. Journal of Guangdong University of Technology, 2018, 35: 1-9. Google Scholar

[10] Cui L, Yang S, Chen Z. An Efficient and Compacted DAG-Based Blockchain Protocol for Industrial Internet of Things. IEEE Trans Ind Inf, 2020, 16: 4134-4145 CrossRef Google Scholar

[11] Wang J, Wang H. Monoxide: scale out blockchains with asynchronous consensus zones. In: Proceedings of USENIX Symposium on Networked Systems Design and Implementation (NSDI), Boston, 2019. 95--112. Google Scholar

[12] Gervais A, Karame G O, Wüst K, et al. On the security and performance of proof of work blockchains. In: Proceedings of the ACM Conference on Computer and Communications Security, Vienna, 2016. 3--16. Google Scholar

[13] Apostolaki M, Zohar A, Vanbever L. Hijacking bitcoin: routing attacks on cryptocurrencies. In: Proceedings of IEEE Symposium on Security and Privacy, San Jose, 2017. 375--392. Google Scholar

[14] Kosba A, Miller A, Shi E, et al. Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: Proceedings of IEEE Symposium on Security and Privacy, San Jose, 2016. 839--858. Google Scholar

[15] Cheng R, Zhang F, Kos J, et al. Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contracts. In: Proceedings of IEEE Symposium on Security and Privacy, San Francisco, 2019. 185--200. Google Scholar

[16] Xue T F, Fu Q C, Wang C, et al. A Medical Data Sharing Model via Blockchain. Acta Automatica Sinica, 2017, 43: 1555-1562. Google Scholar

[17] Wu B, Li Q, Xu K, et al. SmartRetro: blockchain-based incentives for distributed IoT retrospective detection. In: Proceedings of IEEE International Conference on Mobile Ad Hoc and Sensor Systems, Chengdu, 2018. 308--316. Google Scholar

[18] Xu K, Xu S S, Li Q. Blockchain-based decentralized trusted Internet infrastructure. Communications of China Computer Federation, 2020, 16: 29--34. Google Scholar

[19] Wu B, Xu K, Li Q. Toward Blockchain-Powered Trusted Collaborative Services for Edge-Centric Networks. IEEE Network, 2020, 34: 30-36 CrossRef Google Scholar

[20] Liu X. Design and implementation of digital copyright management system based on blockchain. Dissertation for Master's Degree. Dalian: Dalian University of Technology, 2019. Google Scholar

[21] Cai W D, Yu L, Wang R, et al. Blockchain application development techniques. Journal of Software, 2017, 28(6): 1474-1487. Google Scholar

[22] Zhang G R. Research on blockchain technology based on digital content protection. Dissertation for Master's Degree. Shenzhen: University of Chinese Academy of Sciences, 2018. Google Scholar


Contact and support