浏览全部资源
扫码关注微信
1. 深圳大学信息工程学院,广东 深圳 518060
2. 东南大学移动通信国家重点实验室,江苏 南京 210096
[ "王宗慧(1994-),女,深圳大学硕士生,主要研究方向为区块链、区块链数据隐私保护技术等。" ]
[ "张胜利(1978-),男,博士,深圳大学教授、博士生导师、物理层网络编码创始人,主要研究方向为无线网络、区块链关键技术、物理层网络编码等。" ]
[ "金石(1974-),男,博士,东南大学教授、博士生导师、国家杰出青年基金获得者,主要研究方向为 5G/B5G 移动通信理论与关键技术研究、物联网理论与关键技术研究以及机器学习与大数据处理在移动通信中的应用等。" ]
[ "王晖(1969-),男,博士,深圳大学教授、博士生导师,主要研究方向为物联网、无线网络等。" ]
纸质出版日期:2018-09-30,
网络出版日期:2018-09,
移动端阅览
王宗慧, 张胜利, 金石, 等. 区块链数据隐私保护研究[J]. 物联网学报, 2018,2(3):71-81.
ZONGHUI WANG, SHENGLI ZHANG, SHI JIN, et al. Survey on privacy preserving techniques for blockchain. [J]. Chinese journal on internet of things, 2018, 2(3): 71-81.
王宗慧, 张胜利, 金石, 等. 区块链数据隐私保护研究[J]. 物联网学报, 2018,2(3):71-81. DOI: 10.11959/j.issn.2096-3750.2018.00066.
ZONGHUI WANG, SHENGLI ZHANG, SHI JIN, et al. Survey on privacy preserving techniques for blockchain. [J]. Chinese journal on internet of things, 2018, 2(3): 71-81. DOI: 10.11959/j.issn.2096-3750.2018.00066.
区块链是一种具有去中心化、安全可信、防篡改和可编程等特点的分布式账本技术。区块链系统的公开透明特性使用户交易隐私受到严重威胁,针对此问题设计了不同应用场景相应的隐私问题解决方案。首先介绍区块链技术且基本工作原理,并介绍区块链中典型的隐私问题,如交易隐私问题和账户隐私问题;其次,将现有典型的区块链隐私保护方案分为3种,即混币方案、密码学方案和安全通道方案,并对这3种区块链隐私保护技术方案进行综合而全面的介绍;最后,对区块链数据隐私保护技术进行分析并展望其在物联网安全领域的应用与发展。
Blockchain is a kind of distributed ledger technology with the characteristics of decentralization
security reliability
tamper-proof and programmable.The open and transparent feature of the blockchain system has seriously threatened the transaction privacy of users
and the corresponding privacy problem solution is designed for different application scenarios.Firstly
the basic working principle of block chain technology was introduced
and typical privacy issues was introduced in blockchain
such as transaction privacy and account privacy.Secondly
the existing typical blockchain privacy protection schemes were divided into three types:mixed-coin technology
cryptography technology and secure channel technology
and presents a comprehensive and comprehensive introduction to this three privacy protection schemes; Finally
the blockchain data privacy protection technology was analyzed
the application and development on IoT security were prospeted.
比特币区块链隐私保护密码学物联网
bitcoinblockchainprivacy preservingcryptographyInternet of things
袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494.
SWAN M . Blockchain:blueprint for a new economy[M]. “O’Reilly Media,Inc.”, 2015: 212-235.
ZHENG Z, XIE S, DAI H N ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web & Grid Services, 2016: 1-19.
CROSBY M, PATTANAYAK P, VERMA S ,et al. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016,2: 6-10.
RON D, SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Interna-tional Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24.
BAYARDO R J, AGRAWAL R . Data privacy through optimal k-anonymization[C]// Proceedings.21st International Conference on Data Engineering,2005,ICDE 2005. 2005: 217-228.
GENTRY C . A fully homomorphic encryption scheme[M]. Stanford University, 2009: 112-130.
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008
DONET J A D, PÉREZ-SOLA C, HERRERA-JOANCOMARTÍ J, . The bitcoin P2P network[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 87-102.
ANTONOPOULOS A M . Mastering bitcoin:unlocking digital crypto-currencies[M]. O'Reilly Media,Inc. 2014: 25-36.
JOHNSON D, MENEZES A, VANSTONE S . The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001,1(1): 36-63.
COURTOIS N T, GRAJEK M, NAIK R . Optimizing sha256 in bitcoin mining[C]// International Conference on Cryptography and Security Systems. Springer,Berlin,Heidelberg, 2014: 131-144.
CASTRO M, LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems (TOCS), 2002,20(4): 398-461.
KING S, NADAL S . Ppcoin:peer-to-peer crypto-currency with proof-of-stake[J]. Self-published Paper, 2012(8):19.
ONGARO D, OUSTERHOUT J K . In search of an understandable consensus algorithm[C]// USENIX Annual Technical Conference. 2014: 305-319.
REID F, HARRIGAN M . An analysis of anonymity in the bitcoin system[M]. Security and Privacy in Social Networks. Springer,New York,NY, 2013: 197-223.
GOLDFEDER S, KALODNER H, REISMAN D ,et al. When the cookie meets the blockchain:privacy risks of Web payments via cryptocurrencies[J]. 2017: 1-23.
MEIKLEJOHN S, POMAROLE M, JORDAN G ,et al. A fistful of bitcoins:characterizing pay-ments among men with no names[C]// Proceedings of the 2013 Conference on Internet Measurement Conference. ACM, 2013: 127-140.
RON D, SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24.
KOSHY P, KOSHY D, MCDANIEL P . An analysis of anonymity in bitcoin using P2P network traffic[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 469-485.
ANDROULAKI E, KARAME G O, ROESCHLIN M ,et al. Evaluating user privacy in bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 34-51.
OBER M, KATZENBEISSER S, HAMACHER K . Structure and anonymity of the bitcoin transaction graph[J]. Future Internet, 2013,5(2): 237-250.
BONNEAU J, NARAYANAN A, MILLER A ,et al. Mixcoin:anonymity for bitcoin with accountable mixes[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 486-504.
VALENTA L, ROWAN B . Blindcoin:blinded,accountable mixes for bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2015: 112-126.
CHAUM D, . Blind signatures for untraceable payments[C]// Advances in Cryptology. Springer,Boston,MA, 1983: 199-203.
DUFFIELD E, DIAZ D . Dash:a privacy centric crypto currency[J]. 2014: 1-22.
Maxwell , Gregory . CoinJoin:bitcoin privacy for the real world[J]. 2013: 1-13.
RUFFING T, MORENO-SANCHEZ P, KATE A . CoinShuffle:practical decentralized coin mixing for Bitcoin[C]// European Symposium on Research in Computer Security. Springer,Cham, 2014: 345-364.
HEILMAN E, ALSHENIBR L, BALDIMTSI F ,et al. TumbleBit:an untrusted bitcoin-compatibl-e anonymous payment hub[C]// Proceedings of NDSS 2017, 2017: 1-15.
ZIEGELDORF J H, GROSSMANN F, HENZE M ,et al. CoinParty:secure multi-party mixing of bitcoins[C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, 2015: 75-86.
Van Saberhagen N.Cryptonote v2.0[J]. 2013: 1-13.
NOETHER S, MACKENZIE A, TEAM M C . Ring confidential transactions[J]. 2016: 1-12.
MILLER A, MOESER M, LEE K ,et al. An empirical analysis of linkability in the monero blockchain[J]. 2017: 1-15.
KUMAR A, FISCHER C, TOPLE S ,et al. A traceability analysis of monero’s blockchain[C]// European Symposium on Research in Computer Security. Springer,Cham, 2017: 153-173.
MIERS I, GARMAN C, GREEN M ,et al. Zerocoin:anonymous distributed e-cash from bitcoin[C]// 2013 IEEE Symposium on Security and Privacy (SP). 2013: 397-411.
RACKOFF C, SIMON D R . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]// Annual International Cryptology Conference. Springer,Berlin,Heidelberg, 1991: 433-444.
SASSON E B, CHIESA A, GARMAN C ,et al. Zerocash:decentralized anonymous payment-s from bitcoin[C]// 2014 IEEE Symposium on Security and Privacy (SP). 2014: 459-474.
MCCORRY P, MÖSER M, SHAHANDASTI S F, ,et al. Towards bitcoin payment networks[C]// Australasian Conference on Information Security and Privacy. Springer,Cham, 2016: 57-76.
DECKER C, WATTENHOFER R . A fast and scalable payment network with bitcoin duplex micropayment channels[C]// Symposium on Self-Stabilizing Systems. Springer,Cham, 2015: 3-18.
POON J, DRYJA T . The bitcoin lightning network:scalable off-chain instant payments[J]. Draft Version 0.5, 2016,9:14.
MILLER A, BENTOV I, KUMARESAN R ,et al. Sprites:payment channels that go faster than lightning[J]. 2017: 1-23.
GREEN M, MIERS I . Bolt:anonymous payment channels for decentralized currencies[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 473-489.
HEILMAN E, BALDIMTSI F, GOLDBERG S . Blindly signed contracts:anonymous on-blockchain and off-blockchain bitcoin transactions[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2016: 43-60.
ZHANG Y, WEN J . The IoT electric business model:using blockchain technology for the Internet of things[J]. Peer-to-Peer Networking and Applications, 2017,10(4): 983-994.
CHAKRAVORTY A, WLODARCZYK T, RONG C . Privacy preserving data analytics for smart homes[C]// Security and Privacy Workshops (SPW),2013 IEEE. IEEE, 2013: 23-27.
DORRI A, KANHERE S S, JURDAK R ,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerC-om Workshops). 2017: 618-623.
0
浏览量
2404
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构