一级黄色片免费播放|中国黄色视频播放片|日本三级a|可以直接考播黄片影视免费一级毛片

高級(jí)搜索

留言板

尊敬的讀者、作者、審稿人, 關(guān)于本刊的投稿、審稿、編輯和出版的任何問(wèn)題, 您可以本頁(yè)添加留言。我們將盡快給您答復(fù)。謝謝您的支持!

姓名
郵箱
手機(jī)號(hào)碼
標(biāo)題
留言內(nèi)容
驗(yàn)證碼

區(qū)塊鏈用戶匿名與可追蹤技術(shù)

李佩麗 徐海霞

李佩麗, 徐海霞. 區(qū)塊鏈用戶匿名與可追蹤技術(shù)[J]. 電子與信息學(xué)報(bào), 2020, 42(5): 1061-1067. doi: 10.11999/JEIT190813
引用本文: 李佩麗, 徐海霞. 區(qū)塊鏈用戶匿名與可追蹤技術(shù)[J]. 電子與信息學(xué)報(bào), 2020, 42(5): 1061-1067. doi: 10.11999/JEIT190813
Peili LI, Haixia XU. Blockchain User Anonymity and Traceability Technology[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1061-1067. doi: 10.11999/JEIT190813
Citation: Peili LI, Haixia XU. Blockchain User Anonymity and Traceability Technology[J]. Journal of Electronics & Information Technology, 2020, 42(5): 1061-1067. doi: 10.11999/JEIT190813

區(qū)塊鏈用戶匿名與可追蹤技術(shù)

doi: 10.11999/JEIT190813 cstr: 32379.14.JEIT190813
基金項(xiàng)目: 國(guó)家重點(diǎn)研發(fā)計(jì)劃(2017YFB0802500),北京市科技計(jì)劃(Z191100007119007),山東省重大科技創(chuàng)新工程(2019JZZY020129)
詳細(xì)信息
    作者簡(jiǎn)介:

    李佩麗:女,1988年生,助理研究員,研究方向?yàn)槊艽a學(xué)、區(qū)塊鏈隱私保護(hù)與監(jiān)管

    徐海霞:女,1973年生,副研究員,研究方向?yàn)榘踩喾接?jì)算、區(qū)塊鏈隱私保護(hù)與監(jiān)管、共識(shí)機(jī)制

    通訊作者:

    徐海霞 xuhaixia@iie.ac.cn

  • 中圖分類號(hào): TP311

Blockchain User Anonymity and Traceability Technology

Funds: The National Key R&D Program of China (2017YFB0802500), Beijing Municipal Science and Technology Project (Z191100007119007), The Major Science and Technology Innovation Project of Shandong Province (2019JZZY020129)
  • 摘要: 區(qū)塊鏈具有透明性、數(shù)據(jù)完整性、防篡改等優(yōu)點(diǎn),在金融、政府、軍事等領(lǐng)域有重要應(yīng)用價(jià)值。目前有越來(lái)越多的工作研究區(qū)塊鏈的隱私保護(hù)問(wèn)題,典型的包括門(mén)羅幣、Zerocash, Mixcoin等等。這些隱私保護(hù)方法可以用于保護(hù)區(qū)塊鏈上用戶的身份和交易的金額。隱私保護(hù)方案是雙刃劍,一方面是對(duì)合法用戶隱私的完善保護(hù),另一方面如果完全脫離監(jiān)管,則是對(duì)洗錢、勒索等違法犯罪行為的姑息和縱容。針對(duì)區(qū)塊鏈上各種層出不窮的隱私保護(hù)方案,監(jiān)管也要與時(shí)俱進(jìn)。該文研究區(qū)塊鏈用戶身份的隱私保護(hù)和監(jiān)管方法,提出了用戶匿名和可追蹤的技術(shù),旨在推動(dòng)區(qū)塊鏈在實(shí)際中的應(yīng)用。
  • 圖  1  比特幣中區(qū)塊鏈的簡(jiǎn)易結(jié)構(gòu)

    圖  2  用戶注冊(cè)

  • NAKAMOTO S. Bitcoin: A peer-to-peer electronic cash system[EB/OL]. https://bitcoin.org/bitcoin.pdf, 2008.
    曹素珍, 王斐, 郎曉麗, 等. 基于無(wú)證書(shū)的多方合同簽署協(xié)議[J]. 電子與信息學(xué)報(bào), 2019, 41(11): 2691–2698. doi: 10.11999/JEIT190166

    CAO Suzhen, WANG Fei, LANG Xiaoli, et al. Multi-party contract signing protocol based on certificateless[J]. Journal of Electronics &Information Technology, 2019, 41(11): 2691–2698. doi: 10.11999/JEIT190166
    NARAYANAN A, BONNEAU J, FELTEN E, et al. Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction[M]. Princeton University Press, 2016.
    牛淑芬, 王金風(fēng), 王伯彬, 等. 區(qū)塊鏈上基于B+樹(shù)索引結(jié)構(gòu)的密文排序搜索方案[J]. 電子與信息學(xué)報(bào), 2019, 41(10): 2409–2415. doi: 10.11999/JEIT190038

    NIU Shufen, WANG Jinfeng, WANG Bobin, et al. Ciphertext sorting search scheme based on b+ tree index structure on blockchain[J]. Journal of Electronics &Information Technology, 2019, 41(10): 2409–2415. doi: 10.11999/JEIT190038
    鄒均, 張海寧, 唐屹, 等. 區(qū)塊鏈技術(shù)指南[M]. 北京: 機(jī)械工業(yè)出版社, 2016: 97–99.

    ZOU Jun, ZHANG Haining, TANG Yi, et al. Guidelines for Blockchain Technology[M]. Beijing: China Machine Press, 2016: 97–99.
    CHAUM D, FIAT A, and NAOR M. Untraceable Electronic Cash[M]. GOLDWASSER S. Advances in Cryptology — CRYPTO’ 88. New York: Springer, 1990: 319–327. doi: 10.1007/0-387-34799-2_25.
    CHAUM D and VAN HEYST E. Group Signatures[M]. DAVIES D W. Advances in Cryptology — EUROCRYPT ’91. Berlin: Springer, 1991: 257–265. doi: 10.1007/3-540-46416-6_22.
    GROTH J and SAHAI A. Efficient non-interactive proof systems for bilinear groups[C]. The 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, 2008: 415–432. doi: 10.1007/978-3-540-78967-3_24.
    CHAUM D L. Untraceable electronic mail, return addresses, and digital pseudonyms[J]. Communications of the ACM, 1981, 24(2): 84–90. doi: 10.1145/358549.358563
    BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes[M]. CHRISTIN N and SAFAVI-NAINI R. Financial Cryptography and Data Security. Berlin: Springer, 2014: 486–504. doi: 10.1007/978-3-662-45472-5_31.
    VALENTA L and ROWAN B. BLIndcoin: Blinded, accountable mixes for bitcoin[C]. 2015 International Conference on Financial Cryptography and Data Security, San Juan, USA, 2015: 112–126. doi: 10.1007/978-3-662-48051-9_9.
    MAXWELL G. Coinjoin: Bitcoin privacy for the real world[EB/OL]. Post on Bitcoin Forum. https://bitcointalk.org/index.php?topic=279249.0, 2013.
    RUFFING T, MORENO-SANCHEZ P, and KATE A. CoinShuffle: Practical decentralized coin mixing for bitcoin[C]. The 19th European Symposium on Research in Computer Security, Wroclaw, Poland, 2014: 345–364. doi: 10.1007/978-3-319-11212-1_20.
    RUFFING T, MORENO-SANCHEZ P, and KATE A. P2P mixing and unlinkable bitcoin transactions[C]. The 24th Annual Network and Distributed System Security Symposium, San Diego, USA, 2017: 824.
    RUFFING T and MORENO-SANCHEZ P. Valueshuffle: Mixing confidential transactions for comprehensive transaction privacy in bitcoin[C]. 2017 International Conference on Financial Cryptography and Data Security, Sliema, Malta, 2017: 133–154.
    CHANDRAN N, GROTH J, and SAHAI A. Ring signatures of sub-linear size without random oracles[C]. The 34th International Colloquium on Automata, Languages, and Programming, Wroc?aw, Poland, 2007: 423–434.
    BERGAN T, ANDERSON O, DEVIETTI J, et al. CryptoNote v 2.0[J]. https://cryptonote.org/whitepaper.pdf, 2013.
    LIU J K, WEI V K, and WONG D S. Linkable spontaneous anonymous group signature for ad hoc groups[C]. The 9th Australasian Conference on Information Security and Privacy, Sydney, Australia, 2004: 325–335. doi: 10.1007/978-3-540-27800-9_28.
    MIERS I, GARMAN C, GREEN M, et al. Zerocoin: Anonymous distributed e-cash from bitcoin[C]. 2013 IEEE Symposium on Security and Privacy, Berkeley, USA, 2013: 397–411.
    BEN SASSON E, CHIESA A, GARMAN C, et al. Zerocash: Decentralized anonymous payments from bitcoin[C]. 2014 IEEE Symposium on Security and Privacy, San Jose, USA, 2014: 459–474.
    BEN-SASSON E, CHIESA A, TROMER E, et al. Succinct non-interactive zero knowledge for a von Neumann architecture[C]. The 23rd USENIX Conference on Security Symposium, Berkeley, USA, 2014: 781–796.
    PEDERSEN T P. Non-interactive and information-theoretic Secure Verifiable Secret Sharing[M]. FEIGENBAUM J. Annual International Cryptology— CRYPTO ’91. Berlin: Springer, 1991: 129–140. doi: 10.1007/3-540-46766-1_9.
    FUJISAKI E and SUZUKI K. Traceable ring signature[C]. The 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, 2007: 181–200. doi: 10.1007/978-3-540-71677-8_13.
    GROTH J. Fully anonymous group signatures without random oracles[C]. The 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, 2007: 164–180. doi: 10.1007/978-3-540-76900-2_10.
    ZHOU Sujing and LIN Dongdai. Shorter Verifier-local Revocation Group Signatures from Bilinear Maps[M]. POINTCHEVAL D, MU Yi, and CHEN Kefei. Cryptology and Network Security. Berlin: Springer, 2006: 126–143. doi: 10.1007/11935070_8.
    BONEH D and BOYEN X. Short Signatures without Random Oracles[M]. CACHIN C and CAMENISCH J L. Advances in Cryptology - EUROCRYPT 2004. Berlin: Springer, 2004: 56–73. doi: 10.1007/978-3-540-24676-3_4.
  • 加載中
圖(2)
計(jì)量
  • 文章訪問(wèn)數(shù):  4951
  • HTML全文瀏覽量:  2397
  • PDF下載量:  464
  • 被引次數(shù): 0
出版歷程
  • 收稿日期:  2019-10-22
  • 修回日期:  2020-01-20
  • 網(wǎng)絡(luò)出版日期:  2020-02-25
  • 刊出日期:  2020-06-04

目錄

    /

    返回文章
    返回