研究生: |
李仲嘉 Lee, Chung-Chia |
---|---|
論文名稱: |
基於公有區塊鏈之自動懸賞系統 Automatic Reward System Based on Public Blockchain |
指導教授: |
黃冠寰
Hwang, Gwan-Hwan |
學位類別: |
碩士 Master |
系所名稱: |
資訊工程學系 Department of Computer Science and Information Engineering |
論文出版年: | 2020 |
畢業學年度: | 108 |
語文別: | 中文 |
論文頁數: | 41 |
中文關鍵詞: | 自動懸賞 、不可否認性 、即時稽核 、證明違約 、智能合約 、區塊鏈 |
DOI URL: | http://doi.org/10.6345/NTNU202000934 |
論文種類: | 學術論文 |
相關次數: | 點閱:136 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
近年來隨著網路科技的發達與專業分工的趨勢,懸賞方為了在時間或是空間的壓力下追求最大利益,會與承包方簽訂合約且提供一筆懸賞金,合約內容會明訂只要承包方確實完成任務,即可獲得懸賞金。
但是我們可以將懸賞方視為一個中心化的資料庫,假設今天懸賞方今天訂出合約內容為完成點擊懸賞方的影片十次,承包方確實完成了,但是懸賞方卻惡意的將點擊次數更改並宣稱承包方未完成任務,拒絕給付款項給承包方。而承包方只能依照當初簽訂的合約走法律途徑,而法律途徑往往曠日廢時。
本篇論文使用了公有區塊鏈以太坊的智能合約進行設計,因為公有區塊鏈上的紀錄是不可竄改且智能合約的程式碼也都是公開透明的,任何人都可以檢查是否有錯,只要承包方完成任務拿到正確的密碼學證據,上傳到智能合約中,智能合約將會自動判斷是否達到可領取懸賞金的條件,如果懸賞方出錯了,我們也可以透過智能合約進行申訴,不需要公正第三方的裁決。
而本篇論文會以路跑攝影當作例子,賽事主辦方為懸賞方,承包商為攝影師,攝影師獲得的懸賞金取決於自己的照片被參賽跑者下載次數,而我們會以上述解決方法實現一個公開透明且可稽核的懸賞系統。
[1]“南迴公路路跑逾7千人 創台東史上最多” https://udn.com/news/story/7879/4161042
[2] “All sport” https://allsports.tw/
[3] “運動筆記” https://running.biji.co/
[4] Hasan, H. R., & Salah, K. (2018a). Blockchain-Based Proof of Delivery of Physical Assets With Single and Multiple Transporters. IEEE Access, 6, 46781-46793. doi:10.1109/access.2018.2866512
[5] Hasan, H. R., & Salah, K. (2018b). Proof of Delivery of Digital Assets Using Blockchain and Smart Contracts. IEEE Access, 6, 65439-65448. doi:10.1109/access.2018.2876971
[6] Leiba, O., Yitzchak, Y., Bitton, R., Nadler, A., & Shabtai, A. (2018). Incentivized Delivery Network of IoT Software Updates Based on Trustless Proof-of-Distribution. Paper presented at the 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[7] "IPFS" Available from https://ipfs.io/
[8] Bitcoin. Available from: https://www.bitcoin.com/.
[9] Ethereum. Available from: https://etherscan.io/.
[10] ”加密貓”Available from https://www.cryptokitties.co/
[11] ”FOMO 3D” Available from https://exitscam.me/play
[12] “weifund 眾籌” http://weifund.io/
[13] Hwang, G.-H., Chen, H.-F.: Efficient real-time auditing and proof of violation for cloud storage systems. In: The 9th IEEE International Conference on Cloud Computing (IEEE Cloud 2016), 27 June–2 July 2016, San Francisco, USA (2016)
[14] Gwan-Hwan Hwang and Shih-Kai Fu, “Proof of Violation for Trust and Accountability of Cloud Database Systems,” 2016 16th IEEE/ACM International Symposium on Cluster, Cloud, and Grid Computing
[15] Gwan-Hwan Hwang, Pei-Chun Tien, and Yi-Hsiang Tang,”Blockchain-based Automatic Indemnification Mechanism Based on Proof of Violation for Cloud Storage Services”, 2020 The 2nd International Conference on Blockchain Technology
[16] E. Ben-Sasson, A. Chiesa, E. Tromer, and M. Virza, “Succinct non-interactive zero knowledge for a von neumann architecture.” In USENIX Security Symposium, 2014, pp. 781–796.
[17] N. Bitansky, A. Chiesa, Y. Ishai, O. Paneth, and R. Ostrovsky, “Succinct non -interactive arguments via linear interactive proofs,” in Theory of Cryptography. Springer, 2013, pp. 315–333.