信息网络安全 ›› 2017, Vol. 17 ›› Issue (7): 32-39.doi: 10.3969/j.issn.1671-1122.2017.07.005
收稿日期:
2017-06-12
出版日期:
2017-07-20
发布日期:
2020-05-12
作者简介:
作者简介: 王皓(1984—),男,山东,副教授,博士,主要研究方向为属性基密码体制和区块链技术;宋祥福(1992—),男,山东,博士研究生,主要研究方向为云环境下的密码协议和区块链技术;柯俊明(1994—),男,安徽,硕士研究生,主要研究方向为区块链技术和数字货币;徐秋亮(1960—),男,山东,教授,博士,主要研究方向为密码学与信息安全。
基金资助:
Hao WANG1,2, Xiangfu SONG1, Junming KE1, Qiuliang XU1()
Received:
2017-06-12
Online:
2017-07-20
Published:
2020-05-12
摘要:
区块链作为支撑比特币运行的核心技术,是一种利用链式数据结构来验证和存储数据、利用分布式节点共识机制来生成和更新数据的去中心化基础架构。由于其具备去中心化、可验证、防篡改等特性,迅速成为各国政府、国际组织、大型财团、科研机构关注的热点。文章通过对比特币系统进行剖析,探讨了数字货币中区块链的工作原理,介绍了区块链技术所使用的各类主流共识机制,对数字货币中匿名和隐私保护面临的挑战进行了分析,介绍了现存的匿名和隐私保护方案。
中图分类号:
王皓, 宋祥福, 柯俊明, 徐秋亮. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017, 17(7): 32-39.
Hao WANG, Xiangfu SONG, Junming KE, Qiuliang XU. Blockchain and Privacy Preserving Mechanisms in Cryptocurrency[J]. Netinfo Security, 2017, 17(7): 32-39.
[1] | NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System [EB/OL].https://bitcoin.org/bitcoin.pdf, 2017 -3-15. |
[2] | 谢辉,王健. 区块链技术及其应用研究[J]. 信息网络安全,2016(9):192-195. |
[3] | NARAYANAN A, BONNEAU J, FELTEN E, et al. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction[EB/OL].https://www.zentralblatt-math.org/ioport/en/?q=an%3A06610102 , 2017 -3-15. |
[4] | 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494. |
[5] | 中国区块链技术和产业发展论坛.中国区块链技术和应用发展白皮书(2016) [EB/OL]. . |
[6] | LAMPORT L, SHOSTAK R, PEASE M.The Byzantine Generals Problem[J]. ACM Transactions on Programming Languages and Systems (TOPLAS), 1982, 4(3): 382-401. |
[7] | LYNCH N.A Hundred Impossibility Proofs for Distributed Computing[C]//ACM.Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, August 14-16, 1989. Edmonton, Alberta, Canada.New York: ACM, 1989: 1-28. |
[8] | TUREK J, SHASHA D.The Many Faces of Consensus in Distributed Systems[J]. Computer, 1992, 25(6): 8-17. |
[9] | CASTRO M, LISKOV B.Practical Byzantine Fault Tolerance[C]//The USENIX Association. OSDI '99 Proceedings of the Third Symposium on Operating Systems Design and Implementation, February 22-25,1999.New Orleans, Louisiana, USA. New York:ACM, 1999:173-186. |
[10] | DAI W. B-Money [EB/OL]. . |
[11] | VISHNUMURTHY V, CHANDRAKUMAR S, SIRER E G. Karma: A Secure Economic Framework for Peer-to-Peer Resource Sharing[EB/OL].https://www.researchgate.net/publication/246599617_KARMA_a_secure_economic_framework_for_P2P_resource_sharing, 2017 -3-20. |
[12] | FINNEY H. RPOW - Reusable Proofs of Work [EB/OL]. . |
[13] | SZABO N. Bit Gold [EB/OL]. . |
[14] | LERNER S D. MAVEPAY: A New Lightweight Payment Scheme for Peer to Peer Currency Networks[EB/OL]. . |
[15] | BONNEAU J.FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion)[A]// Security Protocols XXII[M]. Cham:Springer, Cham, 2014: 359-370. |
[16] | COURTOIS N T. On the Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies[EB/OL]. . |
[17] | KING S, NADAL S. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake[EB/OL]. https://www.researchgate.net/publication/265116876_PPCoin_Peer-to-Peer_Crypto-Currency_with_Proof-of-Stake, 2017-3-26. |
[18] | KING S. Peercointalk’s Community Interview With Sunny King #1 [EB/OL]. . |
[19] | LARIMER D. Transactions as Proof-of-Stake[EB/OL]. https://bravenewcoin.com/assets/Uploads/TransactionsAsProofOfStake10.pdf,2017 -3-26. |
[20] | LARIMER D. Delegated Proof-of-Stake (DPOS), Bitshares [EB/OL]. https://bitshares.org/technology/delegated-proofof-stake-consensus/,2017-4-8. |
[21] | REN L. Proof of Stake Velocity: Building the Social Currency of the Digital Age[EB/OL]. . |
[22] | BENTOV I, LEE C, MIZRAHI A, et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake[EB/OL]. . |
[23] | COHEN B. Incentives Build Robustness in BitTorrent[EB/OL]. . |
[24] | GHOSH M, Richardson M, FORD B, et al, A Torpath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays[EB/OL]. . |
[25] | JANSEN R, MILLER A, SYVERSON P, et al. From Onions to Shallots: Rewarding Tor Relays with Tears[EB/OL]. . |
[26] | BIRYUKOV A, PUSTOGAROV I.Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay[A]// Financial Cryptography and Data Security[M]. Heidelberg :Springer, Berlin, Heidelberg,2015:445-455. |
[27] | LAURIE B. An Efficient Distributed Currency[EB/OL]. ,2017-4-15. |
[28] | SCHWARTZ D, YOUNGS N, BRITTO A. The Ripple Protocol Consensus Algorithm[EB/OL]. ,2017-4-15. |
[29] | MICALI S. Algorand: The Efficient and Democratic Ledger[EB/OL]. https://core.ac.uk/display/42746465,2017-4-20. |
[30] | MEIKLEJOHN S, POMAROLE M, JORDAN G, et al.A Fistful of Bitcoins: Characterizing Payments among Men with No Names[C]//ACM. IMC '13 Proceedings of the 2013 Conference on Internet Measurement Conference, October 23 - 25, 2013 . Barcelona, Spain.New York:ACM,2013:127-140. |
[31] | MAXWELL G. Confidential Transactions[EB/OL]. https://people.xiph.org/~greg/confidential_values.txt,2017-4-28. |
[32] | PEDERSEN T P.Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing[A]// Advances in Cryptology- CRYPTO'91[M]. Heidelberg: Springer, Berlin, Heidelberg,1991: 129-140. |
[33] | BONNEAU J, NARAYANAN A, MILLER A, et al.Mixcoin: Anonymity for Bitcoin with Accountable Mixes[A]// Financial Cryptography and Data Security[M]. Heidelberg: Springer, Berlin, Heidelberg ,2014: 486-504. |
[34] | CORRIGAN-GIBBS H, FORD B.Dissent: Accountable Anonymous Group Messaging[C]//ACM. CCS'10 Proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010. Chicago, Illinois, USA.New York:ACM.2010:340-350. |
[35] | RUFFING T, MORENO-SANCHEZ P, KATE A.CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin[A]// Computer Security - ESORICS 2014[M]. Cham :Springer, Cham, 2014: 345-364. |
[36] | BACK A, CORALLO M, DASHJR L. Enabling Blockchain Innovations with Pegged Sidechains[EB/OL]. https://www.mendeley.com/research-papers/enabling-blockchain-innovations-pegged-sidechains/,2017-4-28. |
[37] | BERGAN T, ANDERSON O,DEVIETTI J, et al. CryptoNote v 2.0[EB/OL]. https://www.mendeley.com/research-papers/cryptonote-v-20/,2017-4-28. |
[38] | MIERS I, GARMAN C, GREEN M, et al.Zerocoin: Anonymous Distributed E-Cash from Bitcoin[C]//IEEE. SP'13 Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 19 - 22, 2013. Berkeley, CA, USA.NJ: IEEE, 2013: 397-411. |
[39] | SASSON E B, CHIESA A, GARMAN C, et al.Zerocash: Decentralized Anonymous Payments from Bitcoin[C]//IEEE. SP'14 Proceedings of the 2014 IEEE Symposium on Security and Privacy, May 18 - 21, 2014. San Jose, CA, USA.NJ:IEEE , 2014: 459-474. |
[40] | NOETHER S, MACKENZIE A, Monero Core Team. Ring Confidential Transactions[EB/OL]. https://lawnmower.io/reports/monero_0005.pdf,2017 -5-1. |
[41] | MILLER A, MOESER M, LEE K, et al. An Empirical Analysis of Linkability in the Monero Blockchain[EB/OL]. . |
[42] | KUMAR A, FISCHER C, TOPLE S, et al. A Traceability Analysis of Monero's Blockchain[EB/OL]. ,2017-5-1. |
[43] | SASSON B E, CHIESA A, GENKIN D, et al.SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge[A]// Advances in Cryptology-CRYPTO 2013[M]. Heidelberg: Springer, Berlin, Heidelberg, 2013: 90-108. |
[44] | DECKER C, WATTENHOFER R.A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels[A]// Stabilization, Safety, and Security of Distributed Systems[M]. New York :Springer-Verlag New York, 2015: 3-18. |
[45] | MILLER A, BENTOV I, KUMARESAN R, et al. Sprites: Payment Channels that Go Faster than Lightning[EB/OL]. https://arxiv.org/abs/1702.05812,2017-5-2. |
[46] | HEILMAN E, ALSHENIBR L, BALDIMTSI F, et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub[EB/OL]. . |
[47] | GREEN M, MIERS I. Bolt: Anonymous Payment Channels for Decentralized Currencies[EB/OL]. , 2017-5-2. |
[48] | GARMAN C, GREEN M, MIERS I. Decentralized Anonymous Credentials[EB/OL]. https://mirror.robert-marquardt.com/anonbib/cache/garmandecentralized.pdf,2017-5-2. |
[49] | CORRIGAN-GIBBS H, BONEH D, Mazières D.Riposte: An Anonymous Messaging System Handling Millions of Users[C]//IEEE.Security and Privacy (SP), 2015 IEEE Symposium on,May 17-21, 2015. San Jose, CA, USA.NJ: IEEE, 2015: 321-338. |
[1] | 边玲玉, 张琳琳, 赵楷, 石飞. 基于LightGBM的以太坊恶意账户检测方法[J]. 信息网络安全, 2020, 20(4): 73-80. |
[2] | 毛志来, 刘亚楠, 孙惠平, 陈钟. 区块链性能扩展与安全研究[J]. 信息网络安全, 2020, 20(3): 56-64. |
[3] | 郎为民, 张汉, 赵毅丰, 姚晋芳. 一种基于区块链的物联网行为监控和活动管理方案[J]. 信息网络安全, 2020, 20(2): 22-29. |
[4] | 姚萌萌, 唐黎, 凌永兴, 肖卫东. 基于串空间的安全协议形式化分析研究[J]. 信息网络安全, 2020, 20(2): 30-36. |
[5] | 周艺华, 吕竹青, 杨宇光, 侍伟敏. 基于区块链技术的数据存证管理系统[J]. 信息网络安全, 2019, 19(8): 8-14. |
[6] | 路爱同, 赵阔, 杨晶莹, 王峰. 区块链跨链技术研究[J]. 信息网络安全, 2019, 19(8): 83-90. |
[7] | 郑敏, 王虹, 刘洪, 谭冲. 区块链共识算法研究综述[J]. 信息网络安全, 2019, 19(7): 8-24. |
[8] | 周元健, 秦冬梅, 刘忆宁, 吕松展. 基于区块链的可信仓单系统设计[J]. 信息网络安全, 2019, 19(6): 84-90. |
[9] | 王文明, 施重阳, 王英豪, 危德健. 基于区块链技术的交易及其安全性研究[J]. 信息网络安全, 2019, 19(5): 1-9. |
[10] | 黑一鸣, 刘建伟, 张宗洋, 喻辉. 基于区块链的可公开验证分布式云存储系统[J]. 信息网络安全, 2019, 19(3): 52-60. |
[11] | 赵国锋, 张明聪, 周继华, 赵涛. 基于纠删码的区块链系统区块文件存储模型的研究与应用[J]. 信息网络安全, 2019, 19(2): 28-35. |
[12] | 王文明, 王全玉, 王英豪, 任好盼. 面向敏感区域的智能监控与预警数据库研究与设计[J]. 信息网络安全, 2019, 19(12): 1-9. |
[13] | 田秀霞, 陈希, 田福粮. 基于区块链的社区分布式电能安全交易平台方案[J]. 信息网络安全, 2019, 19(1): 51-58. |
[14] | 李佩丽, 徐海霞, 马添军, 穆永恒. 区块链技术在网络互助中的应用及用户隐私保护[J]. 信息网络安全, 2018, 18(9): 60-65. |
[15] | 段琼琼, 项定华, 史红周. 基于区块链的智能物件认证技术方案设计[J]. 信息网络安全, 2018, 18(9): 95-101. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||