Computer Science ›› 2021, Vol. 48 ›› Issue (11): 62-71.doi: 10.11896/jsjkx.210300025
• Blockchain Technology • Previous Articles Next Articles
FU Zhen-hao, LIN Ding-kang, JIANG Hao-chen, YAN Jia-qi
CLC Number:
[1]SASSON E B,CHIESA A,GARMAN C,et al.Zerocash:Decentralized anonymous payments from bitcoin[C]//2014 IEEE Symposium on Security and Privacy.IEEE,2014:459-474. [2]GUO S T,WANG R J,ZHANG F L.Summary of Principle and Application of Blockchain[J].Computer Science,2021,48(2):271-281. [3]YUAN Y,WANG F Y.Current Status and Prospects of Blockchain Technology Development[J].Acta Automatica Sinica,2016,42(4):481-494. [4]NAKAMOTO S.Bitcoin:A peer-to-peer electronic cash system[R].Manubot,2019. [5]LI X D,NIU Y K,WEI L B,et al.Overview on Privacy Protection in Bitcoin[J].Journal of Cryptologic Research,2019,6(2):133-149. [6]ZHU L H,GAO F,FENG M,et al.Survey on Privacy Preserving Techniques for Blockchain Technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186. [7]KOSHY P,KOSHY D,MCDANIEL P.An analysis of anonymity in bitcoin using p2p network traffic[C]//International Conference on Financial Cryptography and Data Security.Springer,2014. [8]BIRYUKOV A,KHOVRATOVICH D,PUSTOGAROV I.Dea-nonymisation of clients in Bitcoin P2P network[C]//Procee-dings of the 2014 ACM SIGSAC Conference on Computer and Communications Security.2014. [9]ANDROULAKI E,KARAME G O,ROESCHLIN M,et al.Evaluating user privacy in bitcoin[C]//International Conference on Financial Cryptography and Data Security.Springer,2013. [10]LIAO K,ZHAO Z,DOUPÉ A,et al.Behind closed doors:mea-surement and analysis of CryptoLocker ransoms in Bitcoin[C]//2016 APWG Symposium on Electronic Crime Research(eCrime).IEEE,2016. [11]RON D,SHAMIR A.Quantitative analysis of the full bitcoin transaction graph[C]//International Conference on Financial Cryptography and Data Security.Springer,2013. [12]MEIKLEJOHN S,POMAROLE M,JORDAN G,et al.A fistful of bitcoins:characterizing payments among men with no names[C]//Proceedings of the 2013 Conference on Internet Measurement Conference.2013. [13]HERRERA-JOANCOMARTÍ J.Research and challenges on bit-coin anonymity[M]//Data Privacy Management,Autonomous Spontaneous Security,and Security Assurance.Springer,2014,3-16. [14]BONNEAU J,NARAYANAN A,MILLER A,et al.Mixcoin:Anonymity for bitcoin with accountable mixes[C]//Internatio-nal Conference on Financial Cryptography and Data Security.Springer,2014. [15]KENDLER E A,ZOHAR A,GOLDBERG S.Eclipse Attacks on Bitcoin's Peer-to-Peer Network[C]//24th USENIX Security Symposium (USENIX Security 15).2015. [16]CONTI M,KUMAR E S,LAL C,et al.A survey on security and privacy issues of bitcoin[J].IEEE Communications Surveys &Tutorials.2018,20(4):3416-3452. [17]SCHRIJVERS O,BONNEAU J,BONEH D,et al.Incentivecompatibility of bitcoin mining pool reward functions[C]//International Conference on Financial Cryptography and Data Security.Springer,2016:477-498. [18]GERVAIS A,KARAME G O,WÜST K,et al.On the security and performance of proof of work blockchains[C]//Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.2016. [19]BIRYUKOV A,TIKHOMIROV S.Security and privacy of mobile wallet users in Bitcoin,Dash,Monero,and Zcash[J].Pervasive and Mobile Computing,2019,59:101030. [20]DELGADO-SEGURA S,PÉREZ-SOLA C,NAVARRO-ARRI-BAS G,et al.Analysis of the bitcoin utxo set[C]//International Conference on Financial Cryptography and Data Security.Springer,2018. [21]DE SANTIS A,MICALI S,PERSIANO G.Non-interactive zero-knowledge proof systems[C]//Conference on the Theory and Application of Cryptographic Techniques.Springer,1987. [22]PILKINGTON M.Blockchain technology:principles and applications[M]//Research Handbook on Digital Transformations.Edward Elgar Publishing,2016. [23]PINTO A M.An Introduction to the Use of zk-SNARKs inBlockchains[M]//Mathematical Research for Blockchain Eco-nomy.Springer,2020:233-249. [24]WAHBY R S,TZIALLA I,SHELAT A,et al.Doubly-efficient zkSNARKs without trusted setup[C]//2018 IEEE Symposium on Security and Privacy (SP).IEEE,2018. [25]BUTERIN V.Quadratic arithmetic programs:from zero to hero[OL].https://medium.com/@VitalikButerin/quadratic …,2016. [26]BEN-SASSON E,CHIESA A,GENKIN D,et al.SNARKs for C:Verifying program executions succinctly and in zero know-ledge[C]//Annual Cryptology Conference.Springer,2013. [27]BANERJEE A,CLEAR M,TEWARI H.Demystifying the Role of zk-SNARKs in Zcash[C]//2020 IEEE Conference on Application,Information and Network Security (AINS).IEEE,2020. [28]BEN-SASSON E,CHIESA A,RIABZEV M,et al.Aurora:Transparent succinct arguments for R1CS[C]//Annual International Conference on the Theory and Applications of Cryptographic Techniques.Springer,2019. [29]BOWE S,GABIZON A,GREEN M D.A multi-party protocolfor constructing the public parameters of the Pinocchio zk-SNARK[C]//International Conference on Financial Cryptography and Data Security.Springer,2018. [30]PETKUS M.Why and how zk-snark works[J].arXiv:1906.07221.2019. [31]MAYER H.zk-SNARK explained:Basic Principles[OL].https://blog.coinfabrik.com/wp-content/uploads/2017/03/zkSNARK-explained_basic_principles.pdf.2016. [32]ZHOU X,TANG X.Research and implementation of RSA algorithm for encryption and decryption[C]//Proceedings of 2011 6th International Forum on Strategic Technology.IEEE,2011. [33]SMART N P.The exact security of ECIES in the generic group model[C]//IMA International Conference on Cryptography and Coding.Springer,2001:73-84. [34]QUESNELLE J.On the linkability of Zcash transactions[J].arXiv:1712.01210,2017. [35]BIRYUKOV A,FEHER D.Privacy and linkability of mining in zcash[C]//2019 IEEE Conference on Communications and Network Security (CNS).IEEE,2019. [36]BIRYUKOV A,FEHER D.Deanonymization of hidden transactions in zcash[OL].https://cryptolux.org/images/d/d9/Zcash.pdf?via=indexdotco. [37]BIRYUKOV A,FEHER D,VITTO G.Privacy aspects and subliminal channels in Zcash[C]//Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security.2019. [38]BRADBURY D.The problem with Bitcoin[J].Computer Fraud &Security,2013,2013(11):5-8. [39] CHAUM D L.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-90. [40]DE BALTHASAR T,HERNANDEZ-CASTRO J.An analysis of bitcoin laundry services[C]//Nordic Conference on Secure IT Systems.Springer,2017. [41]STANDAERT F.Introduction to side-channel attacks[M]//Secure Integrated Circuits and Systems.Springer,2010:27-42. [42]KOCHER P,JAFFE J,JUN B.Differential power analysis[C]//Annual International Cryptology Conference.Springer,1999. [43]TRAMÈR F,BONEH D,PATERSON K.Remote side-channel attacks on anonymous transactions[C]//29th {USENIX} Security Symposium ({USENIX} Security 20).2020. [44]TRAMER F,BONEH D,PATERSON K G.PING and RE-JECT:The Impact of Side-Channels on Zcash Privacy[OL].https://crypto.stanford.edu/timings/. [45]BRUMLEY D,BONEH D.Remote timing attacks are practical[J].Computer Networks,2005,48(5):701-716. [46]BRUMLEY B B,TUVERI N.Remote timing attacks are stillpractical[C]//European Symposium on Research in Computer Security.Springer,2011. [47]KAPPOS G,YOUSAF H,MALLER M,et al.An empiricalanalysis of anonymity in zcash[C]//27th {USENIX} Security Symposium ({USENIX} Security 18).2018. [48]SIMMONS G J.The prisoners' problem and the subliminalchannel[C]//Advances in Cryptology.Springer,1984. [49]SIMMONS G J.The subliminal channel and digital signatures[C]//Workshop on the Theory and Application of of Cryptographic Techniques.Springer,1984. [50]ZHANG T,WU Q H,TANG Z X.Bitcoin blockchain based information convert transmission[J].Chinese Journal of Network and Information Security,2021,7(1):84-92. [51]LI T R,CHAMRAJNAGAR A S,FONG X R,et al.Sentiment-based prediction of alternative cryptocurrency price fluctuations using gradient boosting tree model[J].Frontiers in Physics,2019,7:98. [52]AVERIN A,SAMARTSEV A,SACHENKO N.Review ofMethods for Ensuring Anonymity and De-Anonymization in Blockchain[C]//2020 International Conference Quality Ma-nagement,Transport and Information Security,Information Technologies (IT&QM&IS).IEEE,2020. [53]EYAL I,SIRER E G.Majority is not enough:Bitcoin mining is vulnerable[C]//International conference on financial cryptography and data security.Springer,2014. [54]PHILLIP A,CHAN J S,PEIRIS S.A new look at cryptocurrencies[J].Economics Letters,2018,163:6-9. [55]BEN-SASSON E,CHIESA A,TROMER E,et al.Succinct non-interactive zero knowledge for a von Neumann architecture[C]//23rd {USENIX} Secu-rity Symposium ({USENIX} Security 14).2014. [56]LV L T,CUI D W,HEI X H,et al.Three Mechanisms of Key Encryption Algorithm in Network System[J].Computer Engineering,2003(14):114-116. [57]HAN X,YUAN Y,WANG F Y.Security Problems on Block-chain:The State of the Art and Future Trends[J].Acta Automatica Sinica.2019,45(1):206-225. [58]WANG H,SONG X F,KE J M,et al.Blockchain and Privacy Preserving Mechanisms in Cryptocurrency[J].Netinfo Security,2017(7):32-39. |
[1] | WANG Zi-kai, ZHU Jian, ZHANG Bo-jun, HU Kai. Research and Implementation of Parallel Method in Blockchain and Smart Contract [J]. Computer Science, 2022, 49(9): 312-317. |
[2] | ZHOU Hang, JIANG He, ZHAO Yan, XIE Xiang-peng. Study on Optimal Scheduling of Power Blockchain System for Consensus Transaction ofEach Unit [J]. Computer Science, 2022, 49(6A): 771-776. |
[3] | FU Li-yu, LU Ge-hao, WU Yi-ming, LUO Ya-ling. Overview of Research and Development of Blockchain Technology [J]. Computer Science, 2022, 49(6A): 447-461. |
[4] | GAO Jian-bo, ZHANG Jia-shuo, LI Qing-shan, CHEN Zhong. RegLang:A Smart Contract Programming Language for Regulation [J]. Computer Science, 2022, 49(6A): 462-468. |
[5] | MAO Dian-hui, HUANG Hui-yu, ZHAO Shuang. Study on Automatic Synthetic News Detection Method Complying with Regulatory Compliance [J]. Computer Science, 2022, 49(6A): 523-530. |
[6] | LI Bo, XIANG Hai-yun, ZHANG Yu-xiang, LIAO Hao-de. Application Research of PBFT Optimization Algorithm for Food Traceability Scenarios [J]. Computer Science, 2022, 49(6A): 723-728. |
[7] | WANG Si-ming, TAN Bei-hai, YU Rong. Blockchain Sharding and Incentive Mechanism for 6G Dependable Intelligence [J]. Computer Science, 2022, 49(6): 32-38. |
[8] | SUN Hao, MAO Han-yu, ZHANG Yan-feng, YU Ge, XU Shi-cheng, HE Guang-yu. Development and Application of Blockchain Cross-chain Technology [J]. Computer Science, 2022, 49(5): 287-295. |
[9] | YANG Zhen, HUANG Song, ZHENG Chang-you. Study on Crowdsourced Testing Intellectual Property Protection Technology Based on Blockchain and Improved CP-ABE [J]. Computer Science, 2022, 49(5): 325-332. |
[10] | REN Chang, ZHAO Hong, JIANG Hua. Quantum Secured-Byzantine Fault Tolerance Blockchain Consensus Mechanism [J]. Computer Science, 2022, 49(5): 333-340. |
[11] | FENG Liao-liao, DING Yan, LIU Kun-lin, MA Ke-lin, CHANG Jun-sheng. Research Advance on BFT Consensus Algorithms [J]. Computer Science, 2022, 49(4): 329-339. |
[12] | WANG Xin, ZHOU Ze-bao, YU Yun, CHEN Yu-xu, REN Hao-wen, JIANG Yi-bo, SUN Ling-yun. Reliable Incentive Mechanism for Federated Learning of Electric Metering Data [J]. Computer Science, 2022, 49(3): 31-38. |
[13] | ZHANG Ying-li, MA Jia-li, LIU Zi-ang, LIU Xin, ZHOU Rui. Overview of Vulnerability Detection Methods for Ethereum Solidity Smart Contracts [J]. Computer Science, 2022, 49(3): 52-61. |
[14] | YANG Xin-yu, PENG Chang-gen, YANG Hui, DING Hong-fa. Rational PBFT Consensus Algorithm with Evolutionary Game [J]. Computer Science, 2022, 49(3): 360-370. |
[15] | FAN Jia-xing, WANG Zhi-wei. Hierarchical Anonymous Voting Scheme Based on Threshold Ring Signature [J]. Computer Science, 2022, 49(1): 321-327. |
|