[1] |
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008,1(2012): 28.
|
[2] |
GERVAIS A , CAPKUN S , KARAME G O ,et al. On the privacy provisions of Bloom filters in lightweight bitcoin clients[C]// Computer Security Applications Conference. 2014: 326-335.
|
[3] |
BONNEAU J , MILLER A , CLARK J ,et al. SoK:research perspectives and challenges for bitcoin and cryptocurrencies[C]// 2015 IEEE Symposiumon Security and Privacy. 2015: 104-121.
|
[4] |
NARAYANAN A , BONNEAU J , FELTEN E ,et al. Bitcoin and cryptocurrency technologies[M]. America: Princeton University Press, 2016.
|
[5] |
KARAME G O , ANDROULAKI E , CAPKUN S . Double-spending fast payments in bitcoin[C]// ACM Conference on Computer and Communications Security. 2012: 906-917.
|
[6] |
EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable[M]// Financial Cryptography and Data Security. Springer Berlin Heidelberg, 2014.
|
[7] |
KOSHY P , KOSHY P , MCDANIEL P . An analysis of anonymity in bitcoin using P2P network traffic[C]// Finanical Cryptography and Data Security. 2014: 469-485.
|
[8] |
MEIKLEJOHN S , POMAROLE M , JORDAN G ,et al. A fistful of bitcoins:charaterizing payments among men with no names[C]// The 2013 Conference on Internet Measurement Conference. 2013: 127-140.
|
[9] |
REID F , HARRIGAN M . An analysis of anonymity in the bitcoin system[C]// In Security and Privacy in Social Networks. 2012: 197-223.
|
[10] |
张方国, 王常杰, 王育民 . 基于椭圆曲线的数字签名与盲签名[J]. 通信学报, 2001,22(8): 22-28.
|
|
ZHANG F G , WANG C J , WANG Y M . Digital signature and blind signature based on elliptic curve[J]. Journal on Communications, 2001,22(8): 22-28.
|
[11] |
JOHNSON D , MENEZES A , VANSTONE S . The elliptic digital signature algorithm(ECDSA)[J]. International Journal of Information Security, 2010,1(1): 36-63.
|
[12] |
ANDREAS M A . Mastering bitcoin[M]. O'Reilly Media, 2014.
|
[13] |
ABE M , FUJISAKI E . How to date blind signatures[M]. Berlin: Springer, 1996: 244-251.
|
[14] |
MIERS I , GAMAN C , GREEN M ,et al. Zerocoin:anonymous distributed e-cash from bitcoin[C]// 2013 IEEE Symposium on Security and Privacy, 2013: 97-411.
|
[15] |
BENSASSON E , CHIESA A , GAMAN C ,et al. Zerocash:decentralized anonymous payments from bitcoin[C]// 2014 IEEE Symposium on Security and Privacy (SP). 2014: 459-474.
|
[16] |
RUFFING T , MORENO P , KATE A . Coin shuffle:practical decentralized coin mixing for bitcoin[M]// Computer Security-ESORICS: Springer, 2014: 345-364.
|
[17] |
BONNEAU J , NARAYANAN , MILLER A ,et al. Mixcoin:anonymity for bitcoin with accountable mixes[C]// Financial Cryptography and Data Security. 2014: 486-504.
|
[18] |
VLENTA L , ROWAN B . Blindcoin:blinded,accountable mixes for bitcoin[C]// Financial Cryptography and Data Security. 2015: 112-126.
|
[19] |
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router[J]. Journal of the Franklin Institute, 2004,239(2): 135-139.
|
[20] |
DOUCEUR J R , . The sybil attack[C]// First International Workshop on Peer-to-Peer Systems. 2002: 251-260.
|