Chinese Journal of Network and Information Security ›› 2021, Vol. 7 ›› Issue (1): 84-92.doi: 10.11959/j.issn.2096-109x.2021009
Special Issue: 区块链
• Topic Ⅱ: Blockchain Security • Previous Articles Next Articles
Tao ZHANG, Qianhong WU, Zongxun TANG
Revised:
2020-07-02
Online:
2021-02-15
Published:
2021-02-01
Supported by:
CLC Number:
Tao ZHANG, Qianhong WU, Zongxun TANG. Bitcoin blockchain based information convert transmission[J]. Chinese Journal of Network and Information Security, 2021, 7(1): 84-92.
"
公钥脚本 | 公钥脚本格式 | 签名脚本格式 |
P2PKH | OP_DUP OP_HASH160 <PubKeyHash> OP_EQUALVERIFY OP_CHECKSIG | <sig> <pubkey> |
P2SH | OP_HASH160 <Hash160(redeemScript)> OP_EQUAL | <sig>[sig][sig...]<redeemScript> |
Multisig | <m> <A pubkey>[B pubkey][C pubkey...]<n> OP_CHECKMULTISIG | OP_0 <A sig>[B sig][C sig...] |
Null Data | OP_RETURN <0 to 40 bytes of data> | — |
[1] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[R]. |
[2] | MAXEMCHUK , NICHOLAS F . Electronic document distribution[J]. AT&T Technical Journal, 1994,73(5): 73-80. |
[3] | LOW S H , MAXEMCHUK N F , BRASSIL J T ,et al. Document marking and identification using both line and word shifting[C]// Fourteenth Annual Joint Conference of the IEEE Computer and Communications Societies(INFOCOM '95). 1995. |
[4] | BRASSIL J , LOW S , MAXEMCHUK N ,et al. Electronic marking and identification techniques to discourage document copying[C]// 13th Proceedings IEEE Networking for Global Communications INFOCOM '94. 1994. |
[5] | ALATTAR A M , ALATTAR O M . Watermarking electronic text documents containing justified paragraphs and irregular line spacing[J]. Proceedings of SPIE - The International Society for Optical Engineering, 2004,5306: 685-695. |
[6] | TAKIZAWA O , MATSUMOTO T , NAKAGAWA H ,et al. 3-8 information hiding on digital docu-ments by adjustment of new-line positions[J]. Journal of the National Institute of Information and Communications Technology , 2005,52(1/2). |
[7] | WAYNER P . Mimic functions[J]. Cryptologia, 1992,16(3): 193-214. |
[8] | TOPKARA M , TOPKARA U , ATALLAH M J . Information hiding through errors:a confusing approach[C]// Security,Steganography,and Watermarking of Multimedia Contents IX. International Society for Optics and Photonics, 2007,6505:65050V. |
[9] | MUHAMMAD H Z , RAHMAN S M S A A , SHAKIL A . Synonym based malay linguistic text steganography[C]// 2009 Innovative Technologies in Intelligent Systems and Industrial Applications. 2009: 423-427. |
[10] | BENDER W , GRUHL D , MORIMOTO N ,et al. Techniques for data hiding[J]. IBM Systems Journal, 1996,35(3.4): 313-336. |
[11] | MANSOUR M F , TEWFIK A H . Audio watermarking by time-scale modification[C]// 2001 IEEE International Conference on Acoustics,Speech,and Signal Processing. 2001: 1353-1356. |
[12] | BONEY L , TEWFIK A H , HAMDY K N . Digital watermarks for audio signals[C]// Proceedings of the Third IEEE International Conference on Multimedia Computing and Systems. IEEE, 1996: 473-480. |
[13] | WU C P , SU P C , KUO C C J . Robust and efficient digital audio watermarking using audio content analysis[C]// Security and Watermarking of Multimedia Contents II.International Society for Optics and Photonics. 2000: 382-392. |
[14] | 陆佰林, 朱艳琴 . 基于小波变换的双水印算法[J]. 微电子学与计算机, 2007(8): 37-40. |
LU B L , ZHU Y Q . An Algorithm of dual watermarking based on wavelet transform[J]. Microelectronics & Computer, 2007(8): 37-40. | |
[15] | 刘红翼, 王继军, 韦月琼 ,等. 一种基于LSB的数字图像信息隐藏算法[J]. 计算机科学, 2008,35(1): 100-102. |
LIU H Y , WANG J J , WEI Y Q ,et al. Department of computer science[J]. Computer Science, 2008,35(1): 100-102. | |
[16] | LUO W , HUANG F , HUANG J . Edge adaptive image steganography based on LSB matching revisited[J]. IEEE Transactions on Information Forensics and Security, 2010,5(2): 201-214. |
[17] | THODI D M , RODRíGUEZ J J . Expansion embedding techniques for reversible watermarking[J]. IEEE Transactions on Image Processing, 2007,16(3): 721-730. |
[18] | 钮心忻, 杨义先, 吴志军 . 信息隐藏理论与关键技术研究[J]. 电信科学, 2004,20(12): 28-30. |
NIU X X , YANG Y X , WU Z J . Study on the basic theory and technology of information hiding[J]. Telecommunications Science, 2004,20(12): 28-30. | |
[19] | 花广路, 李芝棠, 冯兵 . 基于H.264/AVC 视频的低频隐写算法[J]. 通信学报, 2013,34(Z2): 47-50. |
HUA G L , LI Z T , FENG B . Low frequency steganography algorithm for H.264/AVC[J]. Journal on Communications, 2013,34(Z2): 47-50. | |
[20] | SIMMONS G J , . The prisones' problem and the subliminal channel[C]// Advances in Cryptology Proc Crypto, 1984. |
[21] | SIMMONS G J , . The subliminal channel and digital signatures[C]// Proc of the EUROCRYPT 84 Workshop on Advances in Cryptology:Theory and Application of Cryptographic Techniques. 2007. |
[22] | SIMMONS G J , . The subliminal channels of the US digital signature algorithm (DSA)[C]// Proceedings of the 3rd Symposium on:State and Progress of Research in Cryptography. 1993: 35-54. |
[23] | YOUNG A , YUNG M . Kleptography:using cryptography against cryptography[C]// International Conference on the Theory and Applications of Cryptographic Techniques. 1997: 62-74. |
[24] | YOUNG A , YUNG M . The prevalence of kleptographic attacks on discrete-log based cryptosystems[C]// Annual International Cryptology Conference. 1997: 264-276. |
[25] | BELLARE M , PATERSON K G , ROGAWAY P . Security of symmetric encryption against mass surveillance[C]// Annual Cryptology Conference. 2014: 1-19. |
[26] | 项世军, 罗欣荣 . 同态公钥加密系统的图像可逆信息隐藏算法[J]. 软件学报, 2016,27(6): 1592-1601. |
XIANG S J , LUO X R . Reversible data hiding in encrypted image based on homomorphic public key cryptosystem[J]. Journal of Software, 2016,27(6): 1592-1601. | |
[27] | 李佩丽, 徐海霞, 马添军 ,等. 可更改区块链技术研究[J]. 密码学报, 2018,5(5): 501-509. |
LI P L , XU H X , MA T J ,et al. Research on fault-correcting blockchain technology[J]. Journal of Cryptologic Research, 2018,5(5): 501-509. | |
[28] | 秦波, 陈李昌豪, 伍前红 ,等. 比特币与法定数字货币[J]. 密码学报, 2017,4(2): 176-186. |
QIN B , CHEN L C H , WU Q H ,et al. Bitcoin and digital fiat currency[J]. Journal of Cryptologic Research, 2017,4(2): 176-186. | |
[29] | YAGA D , MELL P , ROBY N ,et al. Blockchain technology overview[J]. arXiv preprint arXiv:1906.11078, 2019. |
[30] | PARTALA J . Provably secure covert communication on blockchain[J]. Cryptography, 2018,2(3): 18. |
[31] | 宋上 . 基于区块链的隐蔽通信系统BLOCCE改进研究[D]. 兰州:兰州大学, 2019. |
SONG S . Research on the improvement of block chain based covert communication system BLOCCE[D]. Lanzhou:Lanzhou University, 2019. | |
[32] | 李彦峰, 丁丽萍, 吴敬征 ,等. 区块链环境下的新型网络隐蔽信道模型研究[J]. 通信学报, 2019,40(5): 67-78. |
LI Y F , DING L P , WU J Z ,et al. Research on a new network covert channel model in blockchain environment[J]. Journal on Communications, 2019,40(5): 67-78. | |
[33] | Bitcoin (BTC) price stats and information[EB]. |
[34] | Bitcoin developer guide[EB]. |
[35] | RIJMEN V , DAEMEN J . Advanced encryption standard[C]// Proceedings of Federal Information Processing Standards Publications,National Institute of Standards and Technology. 2001: 19-22. |
[1] | Zhao CAI, Tao JING, Shuang REN. Survey on Ethereum phishing detection technology [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 21-32. |
[2] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[3] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[4] | Fei TANG, Ning GAN, Xianggui YANG, Jinyang WANG. Anti malicious KGC certificateless signature scheme based on blockchain and domestic cryptographic SM9 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 9-19. |
[5] | Dan LIN, Kaixin LIN, Jiajing WU, Zibin ZHENG. Bytecode-based approach for Ethereum smart contract classification [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 111-120. |
[6] | Liquan CHEN, Xiao LI, Zheyi YANG, Sijie QIAN. Blockchain-based high transparent PKI authentication protocol [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 1-11. |
[7] | Wenbo ZHANG, Simin CHEN, Lifei WEI, Wei SONG, Dongmei HUANG. State-of-the-art survey of smart contract verification based on formal methods [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 12-28. |
[8] | Feng LIU, Jie YANG, Jiayin QI. Survey on blockchain privacy protection techniques in cryptography [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 29-44. |
[9] | Xiaoling SONG, Yong LIU, Jingnan DONG, Yongfei HUANG. Application and prospect of blockchain in Metaverse [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 45-65. |
[10] | Lin JIN, Youliang TIAN. Multi-authority attribute hidden for electronic medical record sharing scheme based on blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 66-76. |
[11] | Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG. Blockchain covert communication scheme based on the cover of normal transactions [J]. Chinese Journal of Network and Information Security, 2022, 8(4): 77-86. |
[12] | Jianlin NIU, Zhiyu REN, Xuehui DU. Cross-domain authentication scheme based on consortium blockchain [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 123-133. |
[13] | Baoqin ZHAI, Jian WANG, Lei HAN, Jiqiang LIU, Jiahao HE, Tianhao LIU. Hierarchical proxy consensus optimization for IoV based on blockchain and trust value [J]. Chinese Journal of Network and Information Security, 2022, 8(3): 142-153. |
[14] | Jiaren YU, Youliang TIAN, Hui LIN. Design of miner type identification mechanism based on reputation management model [J]. Chinese Journal of Network and Information Security, 2022, 8(1): 128-138. |
[15] | Yaofei WANG, Weiming ZHANG, Kejiang CHEN, Wenbo ZHOU, Nenghai YU. Survey on image non-additive steganography [J]. Chinese Journal of Network and Information Security, 2021, 7(6): 1-10. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|