广东工业大学学报 ›› 2021, Vol. 38 ›› Issue (01): 64-68.doi: 10.12052/gdutxb.200041
聂敏航, 欧毓毅
Nie Min-hang, Ou Yu-yi
摘要: 区块链是随比特币等数字货币兴起的一种全新的去中心化架构, 具有去信任化的特点。在区块链中用假名来提供匿名性, 然而研究表明这种匿名并不安全, 通过交易图谱分析可以发现不同假名间的关联性, 找到同一用户的假名, 破坏匿名性。通过地址的混合可以解决这一问题。本文提出了一种去中心化的混币方法, 通过分析证明, 该方法能有效地保障用户的隐私, 还能实现用户不同金额的混合, 增加便捷性。
中图分类号:
[1] 杨承霖.财经观察: “央行数字货币”破茧还有多久[EB/OL]. (2019-12-18) [2020-01-13]. http://www.xinhuanet.com/2019-12/18/c_1125360605.htm. [2] 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39. WANG H, SONG X F, KE J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency [J]. Netinfo Security, 2017(7): 32-39. [3] 付烁, 徐海霞, 李佩丽, 等. 数字货币的匿名性研究[J]. 计算机学报, 2019, 42(5): 1045-1062. FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency [J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062. [4] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494. YUAN Y, WANG F Y. Blockchain: the state of the art and future trends [J]. Acta Automatica Sinica, 2016, 42(4): 481-494. [5] 王宗慧, 张胜利, 金石, 等. 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2(3): 71-81. WANG Z H, ZHANG S L, JIN S, et al. Survey on privacy preserving techniques for blockchain [J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81. [6] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186. ZHU L H, GAO F, SHEN M, et al. Server on privacy preserving techniques for blockchain technology [J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. [7] ZHANG R, XUE R, LIU L. Security and privacy on blockchain [J]. ACM Computing Surveys, 2019, 52(3): 1-34. [8] ANDROULAKI E, KARAME G O, ROESCHLIN M, et al. Evaluating user privacy in bitcoin [C]//Financial Cryptography and Data Security. Berlin: Springer, 2013: 34-51. [9] REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system [C]//Proc of the 3rd IEEE Int Conf on Privacy, Security, Risk and Trust. Piscataway, NJ: IEEE, 2011: 1318-1326. [10] RON D, SHAMIR A. Quantitative analysis of the full bitcoin transaction graph [C]//Financial Cryptography. Berlin: Springer, 2013: 6-24. [11] MELKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of bitcoins: Characterizing payments among men with no names [C]//Proc of the 13th ACM Internet Measurement Conf. New York: ACM, 2013: 127-140. [12] KOSHY P, KOSHY D, MCDANIEL P. An analysis of anonymity in bitcoin using P2P network traffic [C]//Financial Cryptography and Data Security. Berlin: Springer. 2014: 469-485. [13] BIRYUKOV A, PUSTOGAROV I. Bitcoin over tor isn’t a good idea [C]//2015 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2015: 122-134. [14] MIERS I, GARMAN C, GREEN M, et al. Zerocoin: Anonymous distributed e-cash from bitcoin [C]//2013 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2013: 397-411. [15] FEIGE U, FIAT A, SHAMIR A. Zero-knowledge proofs of identity [J]. Journal of Cryptology, 1988, 1(2): 77-94. [16] BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 486-504. [17] VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin.[C]//Financial Cryptography and Data Security. Berlin: Springer, 2015: 112-126. [18] GREGORY M. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22) [2020-01-13]. http://bitcointalk.org/index.php?topic=279249.0. [19] TIM R, PEDRO M S, ANIKET K. CoinShuffle: practical decentralized coin mixing for bitcoin [C]//European Symposium on Research in Computer Security (ESORICS). Berlin: Springer, 2014: 345-364. [20] WANG Q, LI X X, YU Y. Anonymity for bitcoin from secure escrow address [J]. IEEE Access, 2018, 6: 12336-12341. [21] ZIEGELDORF J H, MATZUTT R, HENZE M, et al. Secure and anonymous decentralized Bitcoin mixing [J]. Future Generation Computer Systems, 2018, 80: 448-466. [22] GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems [J]. Journal of Cryptology, 2007, 20(1): 51-83. [23] SPAGNUOLO M, MAGGI F, ZANERO S. BitIodine: extracting intelligence from the bitcoin network [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 457-468. |
[1] | 董振宁, 王俊杰, 罗克文, 陈浪城. 网约车乘客隐私保护的演化博弈研究[J]. 广东工业大学学报, 2023, 40(01): 19-28. |
[2] | 蒋丽, 谢胜利, 张彦. 面向6G网络的联邦学习资源协作激励机制设计[J]. 广东工业大学学报, 2021, 38(06): 47-52,83. |
[3] | 李光程, 赵庆林, 谢侃. 去中心化的数据处理方案设计[J]. 广东工业大学学报, 2021, 38(06): 77-83. |
[4] | 陈冰儿, 王帮海, 劳南新. 基于DPoS扩展的量子加密区块链[J]. 广东工业大学学报, 2021, 38(02): 34-38. |
[5] | 魏生, 戴科冕. 区块链金融场景应用分析及企业级架构探讨[J]. 广东工业大学学报, 2020, 37(02): 1-10. |
[6] | 魏生, 戴科冕. 基于区块链技术的私募股权众筹平台变革及展望[J]. 广东工业大学学报, 2019, 36(02): 37-46. |
[7] | 徐恪, 姚文兵. 赛博智能经济与区块链[J]. 广东工业大学学报, 2018, 35(03): 1-9. |
[8] | 冷杰武, 江平宇, 刘加军, 陈庆新, 刘强. 区块链技术驱动的产消者自组织产品制造社群构建[J]. 广东工业大学学报, 2017, 34(05): 1-9. |
[9] | 许青林, 覃国民, 姜文超, 谢燕丽. 敏感数据自主可控的云存储平台元数据管理[J]. 广东工业大学学报, 2014, 31(4): 46-53. |
[10] | 刘洪伟, 刘智慧, 朱慧, 陆涛. 大数据环境下跨组织间协同优化决策的隐私保护算法[J]. 广东工业大学学报, 2014, 31(3): 21-26. |
[11] | 赵广强, 凌捷. 基于双线性对和随机数的云计算环境匿名认证协议[J]. 广东工业大学学报, 2014, 31(3): 67-71. |
[12] | 刘洪伟,石雅强,梁周扬,肖岳. 面向聚类挖掘的局部旋转扰动隐私保护算法[J]. 广东工业大学学报, 2012, 29(3): 28-34. |
|