Chinese Journal on Internet of Things ›› 2018, Vol. 2 ›› Issue (3): 71-81.doi: 10.11959/j.issn.2096-3750.2018.00066
• Theory and Technology • Previous Articles Next Articles
Zonghui WANG1,Shengli ZHANG1,Shi JIN2,Hui WANG1
Revised:
2018-05-25
Online:
2018-09-01
Published:
2018-10-15
Supported by:
CLC Number:
Zonghui WANG,Shengli ZHANG,Shi JIN,Hui WANG. Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81.
"
方法 | 特点 | 优点 | 缺点 |
Bi-directional Payment | 链下交易通道实现快速交易 | 交易内容仅交易双方可见,减少验证时间 | 公布用户最后的交易状态 |
Lightning Network | 链下交易通道实现快速交易 | 交易内容仅交易双方可见,减少验证时间 | 依靠第三方平台,公布最后交易状态 |
Sprites | 交易处理速度快 | 支持部分提款和存款 | 交易可链接 |
Blot | 对交易内容加密,不可信第三方实现链下通道交易 | 提供更强的用户隐私,交易不可链接 | 第三方可能获取交易内容 |
TumbleBit | 通过RSA和ECDSA密码学实现匿名的链下通道交易技术 | 第三方无法获取具体交易信息,保证用户隐私安全 | 验证时间较长 |
[1] | 袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494. |
[2] | SWAN M . Blockchain:blueprint for a new economy[M]. “O’Reilly Media,Inc.”, 2015: 212-235. |
[3] | ZHENG Z , XIE S , DAI H N ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web & Grid Services, 2016: 1-19. |
[4] | CROSBY M , PATTANAYAK P , VERMA S ,et al. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016,2: 6-10. |
[5] | RON D , SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Interna-tional Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24. |
[6] | BAYARDO R J , AGRAWAL R . Data privacy through optimal k-anonymization[C]// Proceedings.21st International Conference on Data Engineering,2005,ICDE 2005. 2005: 217-228. |
[7] | GENTRY C . A fully homomorphic encryption scheme[M]. Stanford University, 2009: 112-130. |
[8] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008 |
[9] | DONET J A D , PéREZ-SOLA C , HERRERA-JOANCOMARTí J , . The bitcoin P2P network[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 87-102. |
[10] | ANTONOPOULOS A M . Mastering bitcoin:unlocking digital crypto-currencies[M]. O'Reilly Media,Inc. 2014: 25-36. |
[11] | JOHNSON D , MENEZES A , VANSTONE S . The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001,1(1): 36-63. |
[12] | COURTOIS N T , GRAJEK M , NAIK R . Optimizing sha256 in bitcoin mining[C]// International Conference on Cryptography and Security Systems. Springer,Berlin,Heidelberg, 2014: 131-144. |
[13] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems (TOCS), 2002,20(4): 398-461. |
[14] | KING S , NADAL S . Ppcoin:peer-to-peer crypto-currency with proof-of-stake[J]. Self-published Paper, 2012(8):19. |
[15] | ONGARO D , OUSTERHOUT J K . In search of an understandable consensus algorithm[C]// USENIX Annual Technical Conference. 2014: 305-319. |
[16] | REID F , HARRIGAN M . An analysis of anonymity in the bitcoin system[M]. Security and Privacy in Social Networks. Springer,New York,NY, 2013: 197-223. |
[17] | GOLDFEDER S , KALODNER H , REISMAN D ,et al. When the cookie meets the blockchain:privacy risks of Web payments via cryptocurrencies[J]. 2017: 1-23. |
[18] | MEIKLEJOHN S , POMAROLE M , JORDAN G ,et al. A fistful of bitcoins:characterizing pay-ments among men with no names[C]// Proceedings of the 2013 Conference on Internet Measurement Conference. ACM, 2013: 127-140. |
[19] | RON D , SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24. |
[20] | KOSHY P , KOSHY D , MCDANIEL P . An analysis of anonymity in bitcoin using P2P network traffic[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 469-485. |
[21] | ANDROULAKI E , KARAME G O , ROESCHLIN M ,et al. Evaluating user privacy in bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 34-51. |
[22] | OBER M , KATZENBEISSER S , HAMACHER K . Structure and anonymity of the bitcoin transaction graph[J]. Future Internet, 2013,5(2): 237-250. |
[23] | BONNEAU J , NARAYANAN A , MILLER A ,et al. Mixcoin:anonymity for bitcoin with accountable mixes[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 486-504. |
[24] | VALENTA L , ROWAN B . Blindcoin:blinded,accountable mixes for bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2015: 112-126. |
[25] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Springer,Boston,MA, 1983: 199-203. |
[26] | DUFFIELD E , DIAZ D . Dash:a privacy centric crypto currency[J]. 2014: 1-22. |
[27] | Maxwell , Gregory . CoinJoin:bitcoin privacy for the real world[J]. 2013: 1-13. |
[28] | RUFFING T , MORENO-SANCHEZ P , KATE A . CoinShuffle:practical decentralized coin mixing for Bitcoin[C]// European Symposium on Research in Computer Security. Springer,Cham, 2014: 345-364. |
[29] | HEILMAN E , ALSHENIBR L , BALDIMTSI F ,et al. TumbleBit:an untrusted bitcoin-compatibl-e anonymous payment hub[C]// Proceedings of NDSS 2017, 2017: 1-15. |
[30] | ZIEGELDORF J H , GROSSMANN F , HENZE M ,et al. CoinParty:secure multi-party mixing of bitcoins[C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, 2015: 75-86. |
[31] | Van Saberhagen N.Cryptonote v2.0[J]. 2013: 1-13. |
[32] | NOETHER S , MACKENZIE A , TEAM M C . Ring confidential transactions[J]. 2016: 1-12. |
[33] | MILLER A , MOESER M , LEE K ,et al. An empirical analysis of linkability in the monero blockchain[J]. 2017: 1-15. |
[34] | KUMAR A , FISCHER C , TOPLE S ,et al. A traceability analysis of monero’s blockchain[C]// European Symposium on Research in Computer Security. Springer,Cham, 2017: 153-173. |
[35] | MIERS I , GARMAN C , GREEN M ,et al. Zerocoin:anonymous distributed e-cash from bitcoin[C]// 2013 IEEE Symposium on Security and Privacy (SP). 2013: 397-411. |
[36] | RACKOFF C , SIMON D R . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]// Annual International Cryptology Conference. Springer,Berlin,Heidelberg, 1991: 433-444. |
[37] | SASSON E B , CHIESA A , GARMAN C ,et al. Zerocash:decentralized anonymous payment-s from bitcoin[C]// 2014 IEEE Symposium on Security and Privacy (SP). 2014: 459-474. |
[38] | MCCORRY P , M?SER M , SHAHANDASTI S F , ,et al. Towards bitcoin payment networks[C]// Australasian Conference on Information Security and Privacy. Springer,Cham, 2016: 57-76. |
[39] | DECKER C , WATTENHOFER R . A fast and scalable payment network with bitcoin duplex micropayment channels[C]// Symposium on Self-Stabilizing Systems. Springer,Cham, 2015: 3-18. |
[40] | POON J , DRYJA T . The bitcoin lightning network:scalable off-chain instant payments[J]. Draft Version 0.5, 2016,9:14. |
[41] | MILLER A , BENTOV I , KUMARESAN R ,et al. Sprites:payment channels that go faster than lightning[J]. 2017: 1-23. |
[42] | GREEN M , MIERS I . Bolt:anonymous payment channels for decentralized currencies[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 473-489. |
[43] | HEILMAN E , BALDIMTSI F , GOLDBERG S . Blindly signed contracts:anonymous on-blockchain and off-blockchain bitcoin transactions[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2016: 43-60. |
[44] | ZHANG Y , WEN J . The IoT electric business model:using blockchain technology for the Internet of things[J]. Peer-to-Peer Networking and Applications, 2017,10(4): 983-994. |
[45] | CHAKRAVORTY A , WLODARCZYK T , RONG C . Privacy preserving data analytics for smart homes[C]// Security and Privacy Workshops (SPW),2013 IEEE. IEEE, 2013: 23-27. |
[46] | DORRI A , KANHERE S S , JURDAK R ,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerC-om Workshops). 2017: 618-623. |
[1] | Yu SUN. Discussion on the common sense of the Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(4): 1-8. |
[2] | Junyong LIU,Li PAN,Mai HE. Internet of energy things and its key technologies [J]. Chinese Journal on Internet of Things, 2020, 4(4): 9-16. |
[3] | Haiying SONG,Zhiwen CHEN,Baiping QIU,Fuhua KUANG,Shijun DENG. Building intelligent integrated management system based on Internet of things and edge computing and its application [J]. Chinese Journal on Internet of Things, 2020, 4(4): 98-104. |
[4] | Jiaxing MA,Ke XIONG,Yu ZHANG,Zhangdui ZHONG,Qiang NI. Outage performance analysis of wireless powered railway Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(3): 52-59. |
[5] | Fuyang CHEN,Bin JIANG,Yu SHA. Railway safety monitoring algorithm based on distributed optical fiber vibration sensor [J]. Chinese Journal on Internet of Things, 2020, 4(3): 106-111. |
[6] | Guanjie CHENG,Zhengjie HUANG,Shuiguang DENG. Data management based on blockchain and edge computing for Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(2): 1-9. |
[7] | Zhen GAO,Qimei CUI,Xuefei ZHANG,Xiaofei WANG. Discussions about application of blockchain in IoT systems [J]. Chinese Journal on Internet of Things, 2020, 4(2): 10-17. |
[8] | Sicheng HAN,Xiaorong ZHU,Xiuxian ZHANG. Optimized scalable Byzantine fault tolerance algorithm [J]. Chinese Journal on Internet of Things, 2020, 4(2): 18-25. |
[9] | Wei WANG,Zuguang LI,Qihui WU. Dynamic spectrum sharing access technology based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 26-34. |
[10] | Zhao GUO,Shuaiyin GUO,Shengli ZHANG,Lingyang SONG,Hui WANG. Analysis of cross-chain technology of blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 35-48. |
[11] | Meng LI,Chengxiang SI,Liehuang ZHU. Secure vehicular digital forensics system based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 49-57. |
[12] | Haojie HUANG,Xiaoxiao WU,Gangqiang LI. Anomaly detection and location of malicious node for IoT based on smart contract in blockchain network [J]. Chinese Journal on Internet of Things, 2020, 4(2): 58-69. |
[13] | Chen TAN,Meijuan CHEN,Ebenezer ACKAH Amuah. Research on distributed identity authentication mechanism of IoT device based on blockchain [J]. Chinese Journal on Internet of Things, 2020, 4(2): 70-77. |
[14] | Shipeng CHEN,Bin CHEN,Mingjun DAI,Hui WANG. Blockchain-based IoT architecture [J]. Chinese Journal on Internet of Things, 2020, 4(2): 78-83. |
[15] | Zhaorui WANG,Liang LIU,Hang LI,Shuguang CUI. Intelligent reflecting surface design for 6G-assited Internet of things [J]. Chinese Journal on Internet of Things, 2020, 4(2): 84-95. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|