广东工业大学学报 ›› 2021, Vol. 38 ›› Issue (01): 64-68.doi: 10.12052/gdutxb.200041

• 综合研究 • 上一篇    下一篇

一种可自定义金额的数字货币去中心化混淆方案

聂敏航, 欧毓毅   

  1. 广东工业大学 计算机学院,广东 广州 510006
  • 收稿日期:2020-03-11 出版日期:2021-01-25 发布日期:2020-12-01
  • 通信作者: 欧毓毅(1974-),女,副教授,硕士生导师,主要研究方向为计算机网络系统集成,E-mail:ouyuyi@163.com E-mail:ouyuyi@163.com
  • 作者简介:聂敏航(1994-),男,硕士研究生,主要研究方向为区块链技术、信息安全
  • 基金资助:
    国家自然科学基金资助项目(61572144)

A Digital Currency Decentralized Obfuscation Scheme with Customizable Amounts

Nie Min-hang, Ou Yu-yi   

  1. School of Computers, Guangdong University of Technology, Guangzhou 510006, China
  • Received:2020-03-11 Online:2021-01-25 Published:2020-12-01

摘要: 区块链是随比特币等数字货币兴起的一种全新的去中心化架构, 具有去信任化的特点。在区块链中用假名来提供匿名性, 然而研究表明这种匿名并不安全, 通过交易图谱分析可以发现不同假名间的关联性, 找到同一用户的假名, 破坏匿名性。通过地址的混合可以解决这一问题。本文提出了一种去中心化的混币方法, 通过分析证明, 该方法能有效地保障用户的隐私, 还能实现用户不同金额的混合, 增加便捷性。

关键词: 区块链, 数字货币, 隐私保护, 不可链接性, 匿名性

Abstract: Blockchain is a new decentralized architecture with the rise of bitcoin and other digital currencies. In blockchain, pseudonyms are used to provide anonymity. However, studies have shown that such anonymity is not safe. Correlation between different pseudonyms can be found through transaction graph analysis, and the pseudonyms of the same user can be found to destroy anonymity. This problem can be solved by mixing addresses. A decentralized hybrid method is proposed, which is proved by analysis to be able to effectively protect users' privacy and realize the mixing of different amounts of users to increase the convenience.

Key words: block chain, digital currency, privacy protection, unlinkability, anonymity

中图分类号: 

  • TN918.4
[1] 杨承霖.财经观察: “央行数字货币”破茧还有多久[EB/OL]. (2019-12-18) [2020-01-13]. http://www.xinhuanet.com/2019-12/18/c_1125360605.htm.
[2] 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39.
WANG H, SONG X F, KE J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency [J]. Netinfo Security, 2017(7): 32-39.
[3] 付烁, 徐海霞, 李佩丽, 等. 数字货币的匿名性研究[J]. 计算机学报, 2019, 42(5): 1045-1062.
FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency [J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062.
[4] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494.
YUAN Y, WANG F Y. Blockchain: the state of the art and future trends [J]. Acta Automatica Sinica, 2016, 42(4): 481-494.
[5] 王宗慧, 张胜利, 金石, 等. 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2(3): 71-81.
WANG Z H, ZHANG S L, JIN S, et al. Survey on privacy preserving techniques for blockchain [J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81.
[6] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186.
ZHU L H, GAO F, SHEN M, et al. Server on privacy preserving techniques for blockchain technology [J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186.
[7] ZHANG R, XUE R, LIU L. Security and privacy on blockchain [J]. ACM Computing Surveys, 2019, 52(3): 1-34.
[8] ANDROULAKI E, KARAME G O, ROESCHLIN M, et al. Evaluating user privacy in bitcoin [C]//Financial Cryptography and Data Security. Berlin: Springer, 2013: 34-51.
[9] REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system [C]//Proc of the 3rd IEEE Int Conf on Privacy, Security, Risk and Trust. Piscataway, NJ: IEEE, 2011: 1318-1326.
[10] RON D, SHAMIR A. Quantitative analysis of the full bitcoin transaction graph [C]//Financial Cryptography. Berlin: Springer, 2013: 6-24.
[11] MELKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of bitcoins: Characterizing payments among men with no names [C]//Proc of the 13th ACM Internet Measurement Conf. New York: ACM, 2013: 127-140.
[12] KOSHY P, KOSHY D, MCDANIEL P. An analysis of anonymity in bitcoin using P2P network traffic [C]//Financial Cryptography and Data Security. Berlin: Springer. 2014: 469-485.
[13] BIRYUKOV A, PUSTOGAROV I. Bitcoin over tor isn’t a good idea [C]//2015 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2015: 122-134.
[14] MIERS I, GARMAN C, GREEN M, et al. Zerocoin: Anonymous distributed e-cash from bitcoin [C]//2013 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2013: 397-411.
[15] FEIGE U, FIAT A, SHAMIR A. Zero-knowledge proofs of identity [J]. Journal of Cryptology, 1988, 1(2): 77-94.
[16] BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 486-504.
[17] VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin.[C]//Financial Cryptography and Data Security. Berlin: Springer, 2015: 112-126.
[18] GREGORY M. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22) [2020-01-13]. http://bitcointalk.org/index.php?topic=279249.0.
[19] TIM R, PEDRO M S, ANIKET K. CoinShuffle: practical decentralized coin mixing for bitcoin [C]//European Symposium on Research in Computer Security (ESORICS). Berlin: Springer, 2014: 345-364.
[20] WANG Q, LI X X, YU Y. Anonymity for bitcoin from secure escrow address [J]. IEEE Access, 2018, 6: 12336-12341.
[21] ZIEGELDORF J H, MATZUTT R, HENZE M, et al. Secure and anonymous decentralized Bitcoin mixing [J]. Future Generation Computer Systems, 2018, 80: 448-466.
[22] GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems [J]. Journal of Cryptology, 2007, 20(1): 51-83.
[23] SPAGNUOLO M, MAGGI F, ZANERO S. BitIodine: extracting intelligence from the bitcoin network [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 457-468.
[1] 董振宁, 王俊杰, 罗克文, 陈浪城. 网约车乘客隐私保护的演化博弈研究[J]. 广东工业大学学报, 2023, 40(01): 19-28.
[2] 蒋丽, 谢胜利, 张彦. 面向6G网络的联邦学习资源协作激励机制设计[J]. 广东工业大学学报, 2021, 38(06): 47-52,83.
[3] 李光程, 赵庆林, 谢侃. 去中心化的数据处理方案设计[J]. 广东工业大学学报, 2021, 38(06): 77-83.
[4] 陈冰儿, 王帮海, 劳南新. 基于DPoS扩展的量子加密区块链[J]. 广东工业大学学报, 2021, 38(02): 34-38.
[5] 魏生, 戴科冕. 区块链金融场景应用分析及企业级架构探讨[J]. 广东工业大学学报, 2020, 37(02): 1-10.
[6] 魏生, 戴科冕. 基于区块链技术的私募股权众筹平台变革及展望[J]. 广东工业大学学报, 2019, 36(02): 37-46.
[7] 徐恪, 姚文兵. 赛博智能经济与区块链[J]. 广东工业大学学报, 2018, 35(03): 1-9.
[8] 冷杰武, 江平宇, 刘加军, 陈庆新, 刘强. 区块链技术驱动的产消者自组织产品制造社群构建[J]. 广东工业大学学报, 2017, 34(05): 1-9.
[9] 许青林, 覃国民, 姜文超, 谢燕丽. 敏感数据自主可控的云存储平台元数据管理[J]. 广东工业大学学报, 2014, 31(4): 46-53.
[10] 刘洪伟, 刘智慧, 朱慧, 陆涛. 大数据环境下跨组织间协同优化决策的隐私保护算法[J]. 广东工业大学学报, 2014, 31(3): 21-26.
[11] 赵广强, 凌捷. 基于双线性对和随机数的云计算环境匿名认证协议[J]. 广东工业大学学报, 2014, 31(3): 67-71.
[12] 刘洪伟,石雅强,梁周扬,肖岳. 面向聚类挖掘的局部旋转扰动隐私保护算法[J]. 广东工业大学学报, 2012, 29(3): 28-34.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!