STEMM Institute Press
Science, Technology, Engineering, Management and Medicine
Analysis and Research on Blockchain Security Technology: A Case Study of the Poly Network Security Incident
DOI: https://doi.org/10.62517/jbdc.202501411
Author(s)
Ruowan Zhang
Affiliation(s)
School of Civil Engineering and Transportation, Northeast Forestry University, Harbin, Heilongjiang, China
Abstract
Blockchain technology has developed rapidly in recent years, with cross-chain technology emerging as a crucial means to achieve interoperability between different blockchains. However, security issues in cross-chain systems have become increasingly prominent. This paper takes the Poly Network security incident in 2021 as a case study to conduct an in-depth analysis and research on blockchain security technology. It first introduces the details of the Poly Network security incident, then analyzes the causes of the security problems, proposes cross-chain transaction risk management strategies, and focuses on the introduction and optimization comparison of ECC-ElGamal technology in smart contracts. Additionally, it delves into the operational depth of elliptic curve technology and designs Python experiments to verify its performance and security. Finally, it summarizes the research content and looks forward to the future development of blockchain security technology.
Keywords
Blockchain Security; Poly Network; Smart Contract; Cross-Chain Technology; ECC-ElGamal; Elliptic Curve Operation; Python Experiment
References
[1] Johnson, D., Menezes, A., & Vanstone, S. (2001). The Elliptic Curve Digital Signature Algorithm (ECDSA). International Journal of Information Security, 1(1), 36-63. [2] Certicom Research. (2000). Standards for Efficient Cryptography Group (SECG): SEC 1: Elliptic Curve Cryptography. [3] Wang, X., & Li, Y. (2020). Research on Blockchain Security Based on Elliptic Curve Cryptography. Journal of Network and Computer Applications, 165, 102765. [4] PyCryptodome Documentation. (2021). https://pycryptodome.readthedocs.io/ [5] Poly Network. (2021). Poly Network Security Incident Report. [6] Zhang, L., & Chen, X. (2022). Formal Verification of Smart Contracts: A Survey of Methods and Tools. IEEE Transactions on Software Engineering, 48(5), 1678-1695. [7] Liu, J., et al. (2023). Cross-Chain Security Mechanisms: Vulnerabilities, Solutions, and Future Directions. ACM Computing Surveys, 56(3), 1-38. [8] Zhao, H., & Wu, Q. (2023). Optimization of ECC-ElGamal Encryption for Blockchain Smart Contracts. Journal of Cryptographic Engineering, 13(2), 145-158. [9] Sun, Y., et al. (2024). Elliptic Curve Operations in Post-Quantum Blockchain: Challenges and Optimizations. Future Generation Computer Systems, 147, 289-302. [10] Miller, S., & Davis, K. (2022). Blockchain Security Incidents Analysis: 2018-2021. Computers & Security, 108, 102489.
Copyright @ 2020-2035 STEMM Institute Press All Rights Reserved