Journal of Guangdong University of Technology ›› 2021, Vol. 38 ›› Issue (01): 64-68.doi: 10.12052/gdutxb.200041
• Comprehensive Studies • Previous Articles Next Articles
Nie Min-hang, Ou Yu-yi
CLC Number:
[1] 杨承霖.财经观察: “央行数字货币”破茧还有多久[EB/OL]. (2019-12-18) [2020-01-13]. http://www.xinhuanet.com/2019-12/18/c_1125360605.htm. [2] 王皓, 宋祥福, 柯俊明, 等. 数字货币中的区块链及其隐私保护机制[J]. 信息网络安全, 2017(7): 32-39. WANG H, SONG X F, KE J M, et al. Blockchain and privacy preserving mechanisms in cryptocurrency [J]. Netinfo Security, 2017(7): 32-39. [3] 付烁, 徐海霞, 李佩丽, 等. 数字货币的匿名性研究[J]. 计算机学报, 2019, 42(5): 1045-1062. FU S, XU H X, LI P L, et al. A survey on anonymity of digital currency [J]. Chinese Journal of Computers, 2019, 42(5): 1045-1062. [4] 袁勇, 王飞跃. 区块链技术发展现状与展望[J]. 自动化学报, 2016, 42(4): 481-494. YUAN Y, WANG F Y. Blockchain: the state of the art and future trends [J]. Acta Automatica Sinica, 2016, 42(4): 481-494. [5] 王宗慧, 张胜利, 金石, 等. 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2(3): 71-81. WANG Z H, ZHANG S L, JIN S, et al. Survey on privacy preserving techniques for blockchain [J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81. [6] 祝烈煌, 高峰, 沈蒙, 等. 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54(10): 2170-2186. ZHU L H, GAO F, SHEN M, et al. Server on privacy preserving techniques for blockchain technology [J]. Journal of Computer Research and Development, 2017, 54(10): 2170-2186. [7] ZHANG R, XUE R, LIU L. Security and privacy on blockchain [J]. ACM Computing Surveys, 2019, 52(3): 1-34. [8] ANDROULAKI E, KARAME G O, ROESCHLIN M, et al. Evaluating user privacy in bitcoin [C]//Financial Cryptography and Data Security. Berlin: Springer, 2013: 34-51. [9] REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system [C]//Proc of the 3rd IEEE Int Conf on Privacy, Security, Risk and Trust. Piscataway, NJ: IEEE, 2011: 1318-1326. [10] RON D, SHAMIR A. Quantitative analysis of the full bitcoin transaction graph [C]//Financial Cryptography. Berlin: Springer, 2013: 6-24. [11] MELKLEJOHN S, POMAROLE M, JORDAN G, et al. A fistful of bitcoins: Characterizing payments among men with no names [C]//Proc of the 13th ACM Internet Measurement Conf. New York: ACM, 2013: 127-140. [12] KOSHY P, KOSHY D, MCDANIEL P. An analysis of anonymity in bitcoin using P2P network traffic [C]//Financial Cryptography and Data Security. Berlin: Springer. 2014: 469-485. [13] BIRYUKOV A, PUSTOGAROV I. Bitcoin over tor isn’t a good idea [C]//2015 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2015: 122-134. [14] MIERS I, GARMAN C, GREEN M, et al. Zerocoin: Anonymous distributed e-cash from bitcoin [C]//2013 IEEE Symposium on Security and Privacy. Piscataway, NJ: IEEE, 2013: 397-411. [15] FEIGE U, FIAT A, SHAMIR A. Zero-knowledge proofs of identity [J]. Journal of Cryptology, 1988, 1(2): 77-94. [16] BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 486-504. [17] VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin.[C]//Financial Cryptography and Data Security. Berlin: Springer, 2015: 112-126. [18] GREGORY M. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22) [2020-01-13]. http://bitcointalk.org/index.php?topic=279249.0. [19] TIM R, PEDRO M S, ANIKET K. CoinShuffle: practical decentralized coin mixing for bitcoin [C]//European Symposium on Research in Computer Security (ESORICS). Berlin: Springer, 2014: 345-364. [20] WANG Q, LI X X, YU Y. Anonymity for bitcoin from secure escrow address [J]. IEEE Access, 2018, 6: 12336-12341. [21] ZIEGELDORF J H, MATZUTT R, HENZE M, et al. Secure and anonymous decentralized Bitcoin mixing [J]. Future Generation Computer Systems, 2018, 80: 448-466. [22] GENNARO R, JARECKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystems [J]. Journal of Cryptology, 2007, 20(1): 51-83. [23] SPAGNUOLO M, MAGGI F, ZANERO S. BitIodine: extracting intelligence from the bitcoin network [C]//Financial Cryptography and Data Security. Berlin: Springer, 2014: 457-468. |
[1] | Dong Zhen-ning, Wang Jun-jie, Luo Ke-wen, Chen Lang-cheng. An Evolutionary Game Analysis of Online Car-hailing Passengers' Privacy Protection [J]. Journal of Guangdong University of Technology, 2023, 40(01): 19-28. |
[2] | ZHAO Guang-Qiang, LING Jie. Anonymous Authentication Protocol Based on Bilinear Pairing and Nonce in Cloud Computing [J]. Journal of Guangdong University of Technology, 2014, 31(3): 67-71. |
|