Netinfo Security ›› 2017, Vol. 17 ›› Issue (7): 32-39.doi: 10.3969/j.issn.1671-1122.2017.07.005
• Orginal Article • Previous Articles Next Articles
Hao WANG1,2, Xiangfu SONG1, Junming KE1, Qiuliang XU1()
Received:
2017-06-12
Online:
2017-07-20
Published:
2020-05-12
CLC Number:
Hao WANG, Xiangfu SONG, Junming KE, Qiuliang XU. Blockchain and Privacy Preserving Mechanisms in Cryptocurrency[J]. Netinfo Security, 2017, 17(7): 32-39.
Add to citation manager EndNote|Ris|BibTeX
URL: http://netinfo-security.org/EN/10.3969/j.issn.1671-1122.2017.07.005
[1] | NAKAMOTO S. Bitcoin: A Peer-to-Peer Electronic Cash System [EB/OL].https://bitcoin.org/bitcoin.pdf, 2017 -3-15. |
[2] | 谢辉,王健. 区块链技术及其应用研究[J]. 信息网络安全,2016(9):192-195. |
[3] | NARAYANAN A, BONNEAU J, FELTEN E, et al. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction[EB/OL].https://www.zentralblatt-math.org/ioport/en/?q=an%3A06610102 , 2017 -3-15. |
[4] | 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494. |
[5] | 中国区块链技术和产业发展论坛.中国区块链技术和应用发展白皮书(2016) [EB/OL]. . |
[6] | LAMPORT L, SHOSTAK R, PEASE M.The Byzantine Generals Problem[J]. ACM Transactions on Programming Languages and Systems (TOPLAS), 1982, 4(3): 382-401. |
[7] | LYNCH N.A Hundred Impossibility Proofs for Distributed Computing[C]//ACM.Proceedings of the Eighth Annual ACM Symposium on Principles of Distributed Computing, August 14-16, 1989. Edmonton, Alberta, Canada.New York: ACM, 1989: 1-28. |
[8] | TUREK J, SHASHA D.The Many Faces of Consensus in Distributed Systems[J]. Computer, 1992, 25(6): 8-17. |
[9] | CASTRO M, LISKOV B.Practical Byzantine Fault Tolerance[C]//The USENIX Association. OSDI '99 Proceedings of the Third Symposium on Operating Systems Design and Implementation, February 22-25,1999.New Orleans, Louisiana, USA. New York:ACM, 1999:173-186. |
[10] | DAI W. B-Money [EB/OL]. . |
[11] | VISHNUMURTHY V, CHANDRAKUMAR S, SIRER E G. Karma: A Secure Economic Framework for Peer-to-Peer Resource Sharing[EB/OL].https://www.researchgate.net/publication/246599617_KARMA_a_secure_economic_framework_for_P2P_resource_sharing, 2017 -3-20. |
[12] | FINNEY H. RPOW - Reusable Proofs of Work [EB/OL]. . |
[13] | SZABO N. Bit Gold [EB/OL]. . |
[14] | LERNER S D. MAVEPAY: A New Lightweight Payment Scheme for Peer to Peer Currency Networks[EB/OL]. . |
[15] | BONNEAU J.FawkesCoin: A Cryptocurrency Without Public-Key Cryptography (Transcript of Discussion)[A]// Security Protocols XXII[M]. Cham:Springer, Cham, 2014: 359-370. |
[16] | COURTOIS N T. On the Longest Chain Rule and Programmed Self-Destruction of Crypto Currencies[EB/OL]. . |
[17] | KING S, NADAL S. Ppcoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake[EB/OL]. https://www.researchgate.net/publication/265116876_PPCoin_Peer-to-Peer_Crypto-Currency_with_Proof-of-Stake, 2017-3-26. |
[18] | KING S. Peercointalk’s Community Interview With Sunny King #1 [EB/OL]. . |
[19] | LARIMER D. Transactions as Proof-of-Stake[EB/OL]. https://bravenewcoin.com/assets/Uploads/TransactionsAsProofOfStake10.pdf,2017 -3-26. |
[20] | LARIMER D. Delegated Proof-of-Stake (DPOS), Bitshares [EB/OL]. https://bitshares.org/technology/delegated-proofof-stake-consensus/,2017-4-8. |
[21] | REN L. Proof of Stake Velocity: Building the Social Currency of the Digital Age[EB/OL]. . |
[22] | BENTOV I, LEE C, MIZRAHI A, et al. Proof of Activity: Extending Bitcoin's Proof of Work via Proof of Stake[EB/OL]. . |
[23] | COHEN B. Incentives Build Robustness in BitTorrent[EB/OL]. . |
[24] | GHOSH M, Richardson M, FORD B, et al, A Torpath to TorCoin: Proof-of-Bandwidth Altcoins for Compensating Relays[EB/OL]. . |
[25] | JANSEN R, MILLER A, SYVERSON P, et al. From Onions to Shallots: Rewarding Tor Relays with Tears[EB/OL]. . |
[26] | BIRYUKOV A, PUSTOGAROV I.Proof-of-Work as Anonymous Micropayment: Rewarding a Tor Relay[A]// Financial Cryptography and Data Security[M]. Heidelberg :Springer, Berlin, Heidelberg,2015:445-455. |
[27] | LAURIE B. An Efficient Distributed Currency[EB/OL]. ,2017-4-15. |
[28] | SCHWARTZ D, YOUNGS N, BRITTO A. The Ripple Protocol Consensus Algorithm[EB/OL]. ,2017-4-15. |
[29] | MICALI S. Algorand: The Efficient and Democratic Ledger[EB/OL]. https://core.ac.uk/display/42746465,2017-4-20. |
[30] | MEIKLEJOHN S, POMAROLE M, JORDAN G, et al.A Fistful of Bitcoins: Characterizing Payments among Men with No Names[C]//ACM. IMC '13 Proceedings of the 2013 Conference on Internet Measurement Conference, October 23 - 25, 2013 . Barcelona, Spain.New York:ACM,2013:127-140. |
[31] | MAXWELL G. Confidential Transactions[EB/OL]. https://people.xiph.org/~greg/confidential_values.txt,2017-4-28. |
[32] | PEDERSEN T P.Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing[A]// Advances in Cryptology- CRYPTO'91[M]. Heidelberg: Springer, Berlin, Heidelberg,1991: 129-140. |
[33] | BONNEAU J, NARAYANAN A, MILLER A, et al.Mixcoin: Anonymity for Bitcoin with Accountable Mixes[A]// Financial Cryptography and Data Security[M]. Heidelberg: Springer, Berlin, Heidelberg ,2014: 486-504. |
[34] | CORRIGAN-GIBBS H, FORD B.Dissent: Accountable Anonymous Group Messaging[C]//ACM. CCS'10 Proceedings of the 17th ACM Conference on Computer and Communications Security, October 4-8, 2010. Chicago, Illinois, USA.New York:ACM.2010:340-350. |
[35] | RUFFING T, MORENO-SANCHEZ P, KATE A.CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin[A]// Computer Security - ESORICS 2014[M]. Cham :Springer, Cham, 2014: 345-364. |
[36] | BACK A, CORALLO M, DASHJR L. Enabling Blockchain Innovations with Pegged Sidechains[EB/OL]. https://www.mendeley.com/research-papers/enabling-blockchain-innovations-pegged-sidechains/,2017-4-28. |
[37] | BERGAN T, ANDERSON O,DEVIETTI J, et al. CryptoNote v 2.0[EB/OL]. https://www.mendeley.com/research-papers/cryptonote-v-20/,2017-4-28. |
[38] | MIERS I, GARMAN C, GREEN M, et al.Zerocoin: Anonymous Distributed E-Cash from Bitcoin[C]//IEEE. SP'13 Proceedings of the 2013 IEEE Symposium on Security and Privacy, May 19 - 22, 2013. Berkeley, CA, USA.NJ: IEEE, 2013: 397-411. |
[39] | SASSON E B, CHIESA A, GARMAN C, et al.Zerocash: Decentralized Anonymous Payments from Bitcoin[C]//IEEE. SP'14 Proceedings of the 2014 IEEE Symposium on Security and Privacy, May 18 - 21, 2014. San Jose, CA, USA.NJ:IEEE , 2014: 459-474. |
[40] | NOETHER S, MACKENZIE A, Monero Core Team. Ring Confidential Transactions[EB/OL]. https://lawnmower.io/reports/monero_0005.pdf,2017 -5-1. |
[41] | MILLER A, MOESER M, LEE K, et al. An Empirical Analysis of Linkability in the Monero Blockchain[EB/OL]. . |
[42] | KUMAR A, FISCHER C, TOPLE S, et al. A Traceability Analysis of Monero's Blockchain[EB/OL]. ,2017-5-1. |
[43] | SASSON B E, CHIESA A, GENKIN D, et al.SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge[A]// Advances in Cryptology-CRYPTO 2013[M]. Heidelberg: Springer, Berlin, Heidelberg, 2013: 90-108. |
[44] | DECKER C, WATTENHOFER R.A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels[A]// Stabilization, Safety, and Security of Distributed Systems[M]. New York :Springer-Verlag New York, 2015: 3-18. |
[45] | MILLER A, BENTOV I, KUMARESAN R, et al. Sprites: Payment Channels that Go Faster than Lightning[EB/OL]. https://arxiv.org/abs/1702.05812,2017-5-2. |
[46] | HEILMAN E, ALSHENIBR L, BALDIMTSI F, et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub[EB/OL]. . |
[47] | GREEN M, MIERS I. Bolt: Anonymous Payment Channels for Decentralized Currencies[EB/OL]. , 2017-5-2. |
[48] | GARMAN C, GREEN M, MIERS I. Decentralized Anonymous Credentials[EB/OL]. https://mirror.robert-marquardt.com/anonbib/cache/garmandecentralized.pdf,2017-5-2. |
[49] | CORRIGAN-GIBBS H, BONEH D, Mazières D.Riposte: An Anonymous Messaging System Handling Millions of Users[C]//IEEE.Security and Privacy (SP), 2015 IEEE Symposium on,May 17-21, 2015. San Jose, CA, USA.NJ: IEEE, 2015: 321-338. |
[1] | Lingyu BIAN, Linlin ZHANG, Kai ZHAO, Fei SHI. Ethereum Malicious Account Detection Method Based on LightGBM [J]. Netinfo Security, 2020, 20(4): 73-80. |
[2] | Zhilai MAO, Yanan LIU, Huiping SUN, Zhong CHEN. Research on Blockchain Performance Scalability and Security [J]. Netinfo Security, 2020, 20(3): 56-64. |
[3] | Weimin LANG, Han ZHANG, Yifeng ZHAO, Jinfang YAO. A Blockchain-based Behavior Regulation and Activities Management Scheme for Internet of Things [J]. Netinfo Security, 2020, 20(2): 22-29. |
[4] | Yihua ZHOU, Zhuqing LV, Yuguang YANG, Weimin SHI. Data Deposit Management System Based on Blockchain Technology [J]. Netinfo Security, 2019, 19(8): 8-14. |
[5] | Aitong LU, Kuo ZHAO, Jingying YANG, Feng WANG. Research on Cross-chain Technology of Blockchain [J]. Netinfo Security, 2019, 19(8): 83-90. |
[6] | Min ZHENG, Hong WANG, Hong LIU, Chong TAN. Survey on Consensus Algorithms of Blockchain [J]. Netinfo Security, 2019, 19(7): 8-24. |
[7] | Yuanjian ZHOU, Dongmei QING, Yining LIU, Songzhan LV. Design of Electronic Warehouse Receipts System Based on Blockchain [J]. Netinfo Security, 2019, 19(6): 84-90. |
[8] | Wenming WANG, Chongyang SHI, Yinghao WANG, Dejian WEI. Research on Transaction and Security Based on Blockchain Technology [J]. Netinfo Security, 2019, 19(5): 1-9. |
[9] | Yiming HEI, Jianwei LIU, Zongyang ZHANG, Hui YU. Blockchain-based Distributed Cloud Storage System with Public Verification [J]. Netinfo Security, 2019, 19(3): 52-60. |
[10] | Guofeng ZHAO, Mingcong ZHANG, Jihua ZHOU, Tao ZHAO. Research and Application of Block File Storage Model Based on Blockchain System of Erasure Code [J]. Netinfo Security, 2019, 19(2): 28-35. |
[11] | Peili LI, Haixia XU, Tianjun MA, Yongheng MU. The Application of Blockchain Technology in Network Mutual Aid and User Privacy Protection [J]. Netinfo Security, 2018, 18(9): 60-65. |
[12] | Qiongqiong DUAN, Dinghua XIANG, Hongzhou SHI. Design on the Blockchain-based Authentication for Smart Objects [J]. Netinfo Security, 2018, 18(9): 95-101. |
[13] | Jinghao LIU, Jianchuan PING, Xiaomei FU. Research on A Distributed Public Key System Based on Blockchain [J]. Netinfo Security, 2018, 18(8): 25-33. |
[14] | Wei HU, Qiuhan WU, Shengli LIU, Wei FU. Design of Secure eID and Identity Authentication Agreement in Mobile Terminal Based on Guomi Algorithm and Blockchain [J]. Netinfo Security, 2018, 18(7): 7-9. |
[15] | Xing WANG, Jian WENG, Yue ZHANG, Ming LI. Blockchain System for Creating Digital Assets Based on Reputation Value [J]. Netinfo Security, 2018, 18(5): 59-65. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||