Grade management is of great significance for university management. It helps schools to better organize, count, and analyze students' learning. Therefore, the authenticity and security of information in the management system is particularly important. Most of the current score management systems use centralized management methods, relying on administrators to manage data through centralized databases such as SQL Server, Oracle, which have the risk about information leakage and tampering. With the rise of blockchain technology, the decentralized and distrusted features have attracted much attention. By using decentralized blockchain technology to proposes a secure and tamper-proof management system for score management. We use P2P network and blockchain to provide a safe and stable operating environment for the system, The students' grades are hashed, and the results of the hash are embedded in a blockchain using the timestamp service OriginStamp's API. The data in the blockchain is managed and monitored by the entire network to prevent illegal tampering and destruction. We provide interactive interfaces for users and the underlying data to complete the uploading, modifying and query functions. The proposed system can effectively provide the authenticity and validity of data in the score management system, and has a significant impact on the management of student information in schools and the formulation of teaching tasks.
孙韵秋, 王启春. 基于区块链技术的高校成绩管理系统[J]. 密码学报, 2018, 5(5): 568-578.
SUN Y Q, WANG Q C. University Score Management System Based on Blockchain Technology. Journal of Cryptologic Research, 2018, 5(5): 568-578.
\bibitem{1}LUU L, NARAYANAN V, ZHENG C, et al. A secure sharding protocol for open blockchains[C]. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 17–30. [DOI: 10.1145/2976749.2978389]
\bibitem{2}KARAME G. On the security and scalability of Bitcoin's blockchain[C]. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security. ACM, 2016: 1861–1862. [DOI: 10.1145/2976749.2976756]
\bibitem{3}TSAI W D, YU L, WANG R, et al. Blockchain application development techniques[J]. Journal of Software, 2017, 28(6): 1474–1487. [DOI:10.13328/j.cnki.jos.005232]\\
蔡维德,郁莲,王荣, 等. 基于区块链的应用系统开发方法研究[J]. 软件学报, 2017, 28(6): 1474–1487. [DOI:10.13328/j. cnki.jos.005232]
\bibitem{4}NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. https://bitcoin.org/bitcoin.pdf. 2008.
\bibitem{5}B{\"O}HME R, CHRISTIN N, EDELMAN B, et al. Bitcoin: Economics, technology, and governance[J]. Journal of Economic Perspectives, 2015, 29(2): 213–238. [DOI: 10.1257/jep.29.2.213]
\bibitem{6}PUTHAL D, MALIK N, MOHANTY S P, et al. The blockchain as a decentralized security framework [Future Directions][J]. IEEE Consumer Electronics Magazine, 2018, 7(2): 18–21. [DOI: 10.1109/MCE.2017.2776459]
\bibitem{7}KRAFT D. Difficulty control for blockchain-based consensus systems[J]. Peer-to-Peer Networking and Applications, 2016, 9(2): 397–413. [DOI: 10.1007/s12083-015-0347-x]
\bibitem{8}TSCHORSCH F, SCHEUERMANN B. Bitcoin and beyond: A technical survey on decentralized digital currencies[J]. IEEE Communications Surveys \& Tutorials, 2016, 18(3): 2084–2123. [DOI: 10.1109/COMST.2016. 2535718]
\bibitem{9}YUAN Y, WANG F Y. Blockchain: The state of the art and future trends[J]. Acta Automatica Sinica, 2016, 42(4): 481−494. [DOI: 10.16383/j.aas.2016.c160158]\\
袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481−494. [DOI: 10.16383/j.aas.2016.c160158]
\bibitem{10}KOSBA A, MILLER A, SHI E, et al. HAWK: The blockchain model of cryptography and privacy-preserving smart contracts[C]. In: Proceedings of 2016 IEEE Symposium on Security and Privacy (SP). IEEE, 2016: 839–858. [DOI: 10.1109/SP.2016.55]
\bibitem{11}CHRISTIDIS K, DEVETSIKIOTIS M. Blockchains and smart contracts for the Internet of Things[J]. IEEE Access, 2016, 4: 2292–2303. [DOI: 10.1109/ACCESS.2016.2566339]
\bibitem{12}FELD S, SCH{\"O}NFELD M, WERNER M. Analyzing the deployment of Bitcoin's P2P network under an AS-level perspective[J]. Procedia Computer Science, 2014, 32: 1121–1126. [DOI: 10.1016/j.procs.2014.05.542]