Computer Science ›› 2025, Vol. 52 ›› Issue (8): 385-392.doi: 10.11896/jsjkx.240600079
• Information Security • Previous Articles Next Articles
FENG Yimeng1, FENG Yan1,2, XIE Sijiang1,2, ZHANG Qing1
CLC Number:
[1]NAKAMOTO S.Bitcoin:A Peer-to-Peer Electronic Cash System [EB/OL].(2008-11-01) [2024-05-29].http://bitcoin.org/bitcoin.pdf. [2]LI X D,NIU Y K,WEI L B,et al.A Survey of Bitcoin Privacy Protection[J].Journal of Cryptologic Research,2019,6(2):133-149. [3]BONNEAU J,NARAYANAN A,MILLER A,et al.Mixcoin:Anonymity for Bitcoin with Accountable Mixes [C]//Proceedings of the 18th International Conference on Financial Cryptography and Data Security.Berlin:Springer,2014:486-504. [4]VALENTA L,ROWAN B.Blindcoin:Blinded,Accountable Mixes for Bitcoin [C]//Proceedings of the International Conference on Financial Cryptography and Data Security.Berlin:Springer,2015:112-126. [5]HEILMAN E,ALSHENIBR L,BALDIMTSI F,et al.Tumble-Bit:An Untrusted Bitcoin-Compatible Anonymous Payment Hub [C]//Proceedings of the 24th Annual Network and Distributed System Security Symposium.2017:158-176. [6]MAXWELL G.CoinSwap:Transaction Graph Disjoint Trustless Trading [EB/OL].(2013-10-30) [2024-05-29].https://bitcointalk.org/index.php?topic=321228.0. [7]MAXWELL G.CoinJoin:Bitcoin Privacy for the Real World[EB/OL].(2013-08-22) [2024-05-29].https://bitcointalk.org/index.php?topic=279249.0. [8]RUFFING T,MORENO P S,KATE A.CoinShuffle:Practical Decentralized Coin Mixing for Bitcoin [C]//Proceedings of the European Symposium on Research in Computer Security.Berlin:Springer,2014:345-364. [9]ZIEGELDORF J H,GROSSMANN F,HENZE M,et al.CoinParty:Secure Multi-Party Mixing of Bitcoins [C]//Proceedings of the 5th ACM Conference on Data and Application Security and Privacy.New York:ACM,2015:75-86. [10]HUANG Y Y,PU J.Learning Blockchain from Zero[M].Beijing:Tsinghua University Press,2020:122-128. [11]NIEM H,OU Y Y.A Decentralized Obfuscation Scheme forDigital Currency with Customizable Amounts[J].Journal of Guangdong University of Technology,2021,38(1):64-68. [12]CHENG Q L,JIN Y.TTShuffle:privacy protection mechanism based on two-tier shuffling in blockchain [J].Application Research of Computers,2021,38(2):363-366,371. [13]SONG J H,LI Z K,ZHANG B C.Coin mixing mechanism inblockchain based on intermediator [J].Application Research of Computers,2022,39(3):868-873. |
[1] | DAI Xiangguang, HE Chenglong, GUAN Mingyu, ZHANG Wei, ZHOU Yang, LIU Jianfeng, LYU Qingguo. State-decomposition Distributed Dual Averaging Algorithm for Privacy Online ConstrainedOptimization over Directed Networks [J]. Computer Science, 2025, 52(8): 411-420. |
[2] | WANG Chundong, ZHANG Qinghua, FU Haoran. Federated Learning Privacy Protection Method Combining Dataset Distillation [J]. Computer Science, 2025, 52(6A): 240500132-7. |
[3] | ZHAO Chanchan, WEI Xiaomin, SHI Bao, LYU Fei, LIU Libin, ZHANG Ziyang. Edge Computing Based Approach for Node Trust Evaluation in Blockchain Networks [J]. Computer Science, 2025, 52(6A): 240600153-8. |
[4] | LIU Runjun, XIAO Fengjun, HU Weitong, WANG Xu. Reversible Data Hiding in Fully Encrypted Images Based on Pixel Interval Partitioning andPrediction Recovery [J]. Computer Science, 2025, 52(6A): 240900030-8. |
[5] | YUAN Lin, HUANG Ling, HAO Kaile, ZHANG Jiawei, ZHU Mingrui, WANG Nannan, GAO Xinbo. Adversarial Face Privacy Protection Based on Makeup Style Patch Activation [J]. Computer Science, 2025, 52(6): 405-413. |
[6] | CAO Tengfei, YIN Runtian, ZHU Liang, XU Changqiao. Survey of Personalized Location Privacy Protection Technologies [J]. Computer Science, 2025, 52(5): 307-321. |
[7] | WANG Qiuli, REN Zhiyu, WU Xiangyu, GUAN Qiuguo, WANG Haichao. Blockchain-based Internet of Things Traceable and Anonymous Cross-domain AuthenticationScheme [J]. Computer Science, 2025, 52(5): 337-344. |
[8] | TAN Shiyi, WANG Huaqun. Remote Dynamic Data Integrity Checking Scheme for Multi-cloud and Multi-replica [J]. Computer Science, 2025, 52(5): 345-356. |
[9] | WANG Pu, GAO Zhanyun, WANG Zhenfei, SONG Zheli. BDBFT:A Consensus Protocol Based on Reputation Prediction Model for IoT Scenario [J]. Computer Science, 2025, 52(5): 366-374. |
[10] | ZHENG Xu, HUANG Xiangjie, YANG Yang. Reversible Facial Privacy Protection Method Based on “Invisible Masks” [J]. Computer Science, 2025, 52(5): 384-391. |
[11] | YANG Fan, SUN Yi, LIN Wei, GAO Qi. Blockchain-based Highly Trusted Query Verification Scheme for Streaming Data [J]. Computer Science, 2025, 52(4): 352-361. |
[12] | JIAO Jian, CHEN Ruixiang, HE Qiang, QU Kaiyang, ZHANG Ziyi. Study on Smart Contract Vulnerability Repair Based on T5 Model [J]. Computer Science, 2025, 52(4): 362-368. |
[13] | DU Likuan, LIU Chen, WANG Junlu, SONG Baoyan. Self-learning Star Chain Space Adaptive Allocation Method [J]. Computer Science, 2025, 52(3): 359-365. |
[14] | LIU Yuming, DAI Yu, CHEN Gongping. Review of Federated Learning in Medical Image Processing [J]. Computer Science, 2025, 52(1): 183-193. |
[15] | LI Yongjun, ZHU Yuefei, BAI Lifang. Enhanced Location K-anonymity Privacy Protection Scheme Based on Geohash [J]. Computer Science, 2024, 51(9): 393-400. |
|