Applied Mathematics in Blockchain and Intelligent Systems

A special issue of Mathematics (ISSN 2227-7390). This special issue belongs to the section "Mathematics and Computer Science".

Deadline for manuscript submissions: 31 July 2024 | Viewed by 708

Special Issue Editors


E-Mail Website
Guest Editor
School of Electronic and Information Engineering, Tongji University, Shanghai 201804, China
Interests: blockchain; smart contact; intelligent systems; distributed decision-making systems

E-Mail Website
Guest Editor
School of Computer and Communication Engineering, University of Science and Technology, Beijing 100871, China
Interests: information security; blockchain and smart contracts; cloud computing; code legalization; algebra and cryptography; secure computing

Special Issue Information

Dear Colleagues,

Blockchain is a shared and immutable ledger. Throughout the process of blockchain, from transaction initiation and confirmation to reaching a consensus across the entire network, mathematical algorithms serve as rules and communication tools, achieving coordinated actions among nodes. It can be said that mathematics has built the cornerstone of trust in blockchain.

At present, blockchain has extended from original cryptocurrencies to various fields such as finance, healthcare, energy management, and supply chain, which facilitate new ways of collaboration and value exchange among multi-entities. Especially with the development of the intelligent systems, the need for data is becoming increasingly urgent. Blockchain’s digital record offers the provenance of the data, which helps allocate appropriate gain to data providers and enhance people's trust in decision making. Moreover, smart contracts have been making advanced progress, supporting several industries, and causing business processes to eliminate friction and improve efficiency. Along with these developments and advantages, the research demands of applied mathematics in blockchain and intelligent systems are evolving in terms of scalability, security, privacy, efficiency, availability and flexibility, which brings a host of challenges and opportunities for research communities.

This Special Issue aims to gather novel, original research articles and reviews that present up-to-date mathematical applications in blockchain and intelligent systems which are able to respond to the challenges of security, privacy and trust, etc.

We are looking forward to receiving your contributions.

Dr. Xiaofeng Ma
Prof. Dr. Yan Zhu
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Mathematics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • theories of blockchain-based intelligent systems
  • distributed consensus mechanisms
  • distributed identities (DID)
  • smart contract
  • smart contract-embedded intelligent systems
  • security and privacy of blockchain systems
  • cross-chain algorithm and technologies
  • scalabilities of blockchain
  • vulnerabilities of blockchain
  • protocols and algorithms based on blockchain
  • simulation methods of blockchain-based intelligent systems
  • blockchain and artificial intelligence (AI)
  • blockchain and internet of things (IoT)
  • blockchain and web3.0 technologies
  • blockchain-based intelligent system innovative applications

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 602 KiB  
Article
Blockchain-Based Unbalanced PSI with Public Verification and Financial Security
by Zhanshan Wang and Xiaofeng Ma
Mathematics 2024, 12(10), 1544; https://doi.org/10.3390/math12101544 - 15 May 2024
Viewed by 356
Abstract
Private set intersection (PSI) enables two parties to determine the intersection of their respective datasets without revealing any information beyond the intersection itself. This paper particularly focuses on the scenario of unbalanced PSI, where the sizes of datasets possessed by the parties can [...] Read more.
Private set intersection (PSI) enables two parties to determine the intersection of their respective datasets without revealing any information beyond the intersection itself. This paper particularly focuses on the scenario of unbalanced PSI, where the sizes of datasets possessed by the parties can significantly differ. Current protocols for unbalanced PSI under the malicious security model exhibit low efficiency, rendering them impractical in real-world applications. By contrast, most efficient unbalanced PSI protocols fail to guarantee the correctness of the intersection against a malicious server and cannot even ensure the client’s privacy. The present study proposes a blockchain-based unbalanced PSI protocol with public verification and financial security that enables the client to detect malicious behavior from the server (if any) and then generate an irrefutable and publicly verifiable proof without compromising its secret. The proof can be verified through smart contracts, and some economic incentive and penalty measures are executed automatically to achieve financial security. Furthermore, we implement the proposed protocol, and experimental results demonstrate that our scheme exhibits low online communication complexity and computational overhead for the client. At the same time, the size of the generated proof and its verification complexity are both O(logn), enabling cost-effective validation on the blockchain. Full article
(This article belongs to the Special Issue Applied Mathematics in Blockchain and Intelligent Systems)
Show Figures

Figure 1

Back to TopTop