Chinese Journal on Internet of Things ›› 2018, Vol. 2 ›› Issue (3): 71-81.doi: 10.11959/j.issn.2096-3750.2018.00066
Special Issue: 区块链
• Theory and Technology • Previous Articles Next Articles
Zonghui WANG1,Shengli ZHANG1,Shi JIN2,Hui WANG1
Revised:
2018-05-25
Online:
2018-09-01
Published:
2018-10-15
Supported by:
CLC Number:
Zonghui WANG,Shengli ZHANG,Shi JIN,Hui WANG. Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018, 2(3): 71-81.
"
方法 | 特点 | 优点 | 缺点 |
Bi-directional Payment | 链下交易通道实现快速交易 | 交易内容仅交易双方可见,减少验证时间 | 公布用户最后的交易状态 |
Lightning Network | 链下交易通道实现快速交易 | 交易内容仅交易双方可见,减少验证时间 | 依靠第三方平台,公布最后交易状态 |
Sprites | 交易处理速度快 | 支持部分提款和存款 | 交易可链接 |
Blot | 对交易内容加密,不可信第三方实现链下通道交易 | 提供更强的用户隐私,交易不可链接 | 第三方可能获取交易内容 |
TumbleBit | 通过RSA和ECDSA密码学实现匿名的链下通道交易技术 | 第三方无法获取具体交易信息,保证用户隐私安全 | 验证时间较长 |
[1] | 袁勇, 王飞跃 . 区块链技术发展现状与展望[J]. 自动化学报, 2016,42(4): 481-494. |
[2] | SWAN M . Blockchain:blueprint for a new economy[M]. “O’Reilly Media,Inc.”, 2015: 212-235. |
[3] | ZHENG Z , XIE S , DAI H N ,et al. Blockchain challenges and opportunities:a survey[J]. International Journal of Web & Grid Services, 2016: 1-19. |
[4] | CROSBY M , PATTANAYAK P , VERMA S ,et al. Blockchain technology:beyond bitcoin[J]. Applied Innovation, 2016,2: 6-10. |
[5] | RON D , SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Interna-tional Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24. |
[6] | BAYARDO R J , AGRAWAL R . Data privacy through optimal k-anonymization[C]// Proceedings.21st International Conference on Data Engineering,2005,ICDE 2005. 2005: 217-228. |
[7] | GENTRY C . A fully homomorphic encryption scheme[M]. Stanford University, 2009: 112-130. |
[8] | NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system[J]. Consulted, 2008 |
[9] | DONET J A D , PéREZ-SOLA C , HERRERA-JOANCOMARTí J , . The bitcoin P2P network[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 87-102. |
[10] | ANTONOPOULOS A M . Mastering bitcoin:unlocking digital crypto-currencies[M]. O'Reilly Media,Inc. 2014: 25-36. |
[11] | JOHNSON D , MENEZES A , VANSTONE S . The elliptic curve digital signature algorithm (ECDSA)[J]. International Journal of Information Security, 2001,1(1): 36-63. |
[12] | COURTOIS N T , GRAJEK M , NAIK R . Optimizing sha256 in bitcoin mining[C]// International Conference on Cryptography and Security Systems. Springer,Berlin,Heidelberg, 2014: 131-144. |
[13] | CASTRO M , LISKOV B . Practical Byzantine fault tolerance and proactive recovery[J]. ACM Transactions on Computer Systems (TOCS), 2002,20(4): 398-461. |
[14] | KING S , NADAL S . Ppcoin:peer-to-peer crypto-currency with proof-of-stake[J]. Self-published Paper, 2012(8):19. |
[15] | ONGARO D , OUSTERHOUT J K . In search of an understandable consensus algorithm[C]// USENIX Annual Technical Conference. 2014: 305-319. |
[16] | REID F , HARRIGAN M . An analysis of anonymity in the bitcoin system[M]. Security and Privacy in Social Networks. Springer,New York,NY, 2013: 197-223. |
[17] | GOLDFEDER S , KALODNER H , REISMAN D ,et al. When the cookie meets the blockchain:privacy risks of Web payments via cryptocurrencies[J]. 2017: 1-23. |
[18] | MEIKLEJOHN S , POMAROLE M , JORDAN G ,et al. A fistful of bitcoins:characterizing pay-ments among men with no names[C]// Proceedings of the 2013 Conference on Internet Measurement Conference. ACM, 2013: 127-140. |
[19] | RON D , SHAMIR A . Quantitative analysis of the full bitcoin transaction graph[C]// Intern-ational Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 6-24. |
[20] | KOSHY P , KOSHY D , MCDANIEL P . An analysis of anonymity in bitcoin using P2P network traffic[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 469-485. |
[21] | ANDROULAKI E , KARAME G O , ROESCHLIN M ,et al. Evaluating user privacy in bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2013: 34-51. |
[22] | OBER M , KATZENBEISSER S , HAMACHER K . Structure and anonymity of the bitcoin transaction graph[J]. Future Internet, 2013,5(2): 237-250. |
[23] | BONNEAU J , NARAYANAN A , MILLER A ,et al. Mixcoin:anonymity for bitcoin with accountable mixes[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2014: 486-504. |
[24] | VALENTA L , ROWAN B . Blindcoin:blinded,accountable mixes for bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2015: 112-126. |
[25] | CHAUM D , . Blind signatures for untraceable payments[C]// Advances in Cryptology. Springer,Boston,MA, 1983: 199-203. |
[26] | DUFFIELD E , DIAZ D . Dash:a privacy centric crypto currency[J]. 2014: 1-22. |
[27] | Maxwell , Gregory . CoinJoin:bitcoin privacy for the real world[J]. 2013: 1-13. |
[28] | RUFFING T , MORENO-SANCHEZ P , KATE A . CoinShuffle:practical decentralized coin mixing for Bitcoin[C]// European Symposium on Research in Computer Security. Springer,Cham, 2014: 345-364. |
[29] | HEILMAN E , ALSHENIBR L , BALDIMTSI F ,et al. TumbleBit:an untrusted bitcoin-compatibl-e anonymous payment hub[C]// Proceedings of NDSS 2017, 2017: 1-15. |
[30] | ZIEGELDORF J H , GROSSMANN F , HENZE M ,et al. CoinParty:secure multi-party mixing of bitcoins[C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. ACM, 2015: 75-86. |
[31] | Van Saberhagen N.Cryptonote v2.0[J]. 2013: 1-13. |
[32] | NOETHER S , MACKENZIE A , TEAM M C . Ring confidential transactions[J]. 2016: 1-12. |
[33] | MILLER A , MOESER M , LEE K ,et al. An empirical analysis of linkability in the monero blockchain[J]. 2017: 1-15. |
[34] | KUMAR A , FISCHER C , TOPLE S ,et al. A traceability analysis of monero’s blockchain[C]// European Symposium on Research in Computer Security. Springer,Cham, 2017: 153-173. |
[35] | MIERS I , GARMAN C , GREEN M ,et al. Zerocoin:anonymous distributed e-cash from bitcoin[C]// 2013 IEEE Symposium on Security and Privacy (SP). 2013: 397-411. |
[36] | RACKOFF C , SIMON D R . Non-interactive zero-knowledge proof of knowledge and chosen ciphertext attack[C]// Annual International Cryptology Conference. Springer,Berlin,Heidelberg, 1991: 433-444. |
[37] | SASSON E B , CHIESA A , GARMAN C ,et al. Zerocash:decentralized anonymous payment-s from bitcoin[C]// 2014 IEEE Symposium on Security and Privacy (SP). 2014: 459-474. |
[38] | MCCORRY P , M?SER M , SHAHANDASTI S F , ,et al. Towards bitcoin payment networks[C]// Australasian Conference on Information Security and Privacy. Springer,Cham, 2016: 57-76. |
[39] | DECKER C , WATTENHOFER R . A fast and scalable payment network with bitcoin duplex micropayment channels[C]// Symposium on Self-Stabilizing Systems. Springer,Cham, 2015: 3-18. |
[40] | POON J , DRYJA T . The bitcoin lightning network:scalable off-chain instant payments[J]. Draft Version 0.5, 2016,9:14. |
[41] | MILLER A , BENTOV I , KUMARESAN R ,et al. Sprites:payment channels that go faster than lightning[J]. 2017: 1-23. |
[42] | GREEN M , MIERS I . Bolt:anonymous payment channels for decentralized currencies[C]// Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. ACM, 2017: 473-489. |
[43] | HEILMAN E , BALDIMTSI F , GOLDBERG S . Blindly signed contracts:anonymous on-blockchain and off-blockchain bitcoin transactions[C]// International Conference on Financial Cryptography and Data Security. Springer,Berlin,Heidelberg, 2016: 43-60. |
[44] | ZHANG Y , WEN J . The IoT electric business model:using blockchain technology for the Internet of things[J]. Peer-to-Peer Networking and Applications, 2017,10(4): 983-994. |
[45] | CHAKRAVORTY A , WLODARCZYK T , RONG C . Privacy preserving data analytics for smart homes[C]// Security and Privacy Workshops (SPW),2013 IEEE. IEEE, 2013: 23-27. |
[46] | DORRI A , KANHERE S S , JURDAK R ,et al. Blockchain for IoT security and privacy:the case study of a smart home[C]// 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerC-om Workshops). 2017: 618-623. |
[1] | Jing WU, Sheng LI, Jing ZHANG, Ming XIN, Ruowen TAO, Zhou ZHOU, Lijia PAN, Yi SHI. New flexible sensor for the internet of things [J]. Chinese Journal on Internet of Things, 2023, 7(2): 1-14. |
[2] | Guanglei GENG, Bo GAO, Ke XIONG, Pingyi FAN, Yang LU, Yuwei WANG. A survey of federated learning for 6G networks [J]. Chinese Journal on Internet of Things, 2023, 7(2): 50-66. |
[3] | Bin SHEN, Yinbo LI, Xiaowei LIANG. Spectrum access control for cognitive internet of things users based on enhanced weighted centroid localization [J]. Chinese Journal on Internet of Things, 2023, 7(1): 93-108. |
[4] | Weijin JIANG, Tiantian LUO, Ying YANG, En LI, Wenying ZHOU. Private data access control model based on block chain technology in the internet of things environment [J]. Chinese Journal on Internet of Things, 2022, 6(4): 169-182. |
[5] | Chuannian SHEN. Review on cross-chain technology research of blockchains [J]. Chinese Journal on Internet of Things, 2022, 6(4): 183-196. |
[6] | Zaichen ZHANG, Xiaohu YOU, Jian DANG, Liang WU, Bingcheng ZHU, Ji CHEN, Lei WANG. Optical wireless communication and internet of things [J]. Chinese Journal on Internet of Things, 2022, 6(3): 1-13. |
[7] | Nuo HUANG, Weijie LIU, Chen GONG. Industrial IoT oriented petahertz communication [J]. Chinese Journal on Internet of Things, 2022, 6(3): 37-46. |
[8] | Jun SUN, Shangweikang ZHAO. Energy-saving computation offloading scheme based on Sarsa algorithm in industrial internet of things [J]. Chinese Journal on Internet of Things, 2022, 6(3): 82-90. |
[9] | Yangqun LI, Dengyin ZHANG. Research and application of Web of things resource management framework [J]. Chinese Journal on Internet of Things, 2022, 6(2): 50-64. |
[10] | Wei WANG, Renqian GU, Li3 PENG, Jijun ZHAO, Zhongcheng WEI, Cunxi CHANG. Robust optimization of air based relay for internet of things based on UAV [J]. Chinese Journal on Internet of Things, 2022, 6(1): 101-112. |
[11] | Mingjuan WU, Shuyi CHEN, Haitao LIU. Study of international standard ISO/IEC 30144: 2020 applied in intelligent substation auxiliary monitoring [J]. Chinese Journal on Internet of Things, 2022, 6(1): 123-132. |
[12] | Hao JIANG, Hongming CHEN, Yilong CAO, Haoyang CUI. Comparison of MIMO based on high capacity LPWAN technology TurMassTM and LoRa [J]. Chinese Journal on Internet of Things, 2021, 5(4): 54-61. |
[13] | Zhongcheng WEI, Xinqiu ZHANG, Bin LIAN, Wei WANG, Jijun ZHAO. A survey on Wi-Fi signal based identification technology [J]. Chinese Journal on Internet of Things, 2021, 5(4): 107-119. |
[14] | Yinghai XIE, Yu ZHANG. Electricity meter area identification technology based on channel coding theory [J]. Chinese Journal on Internet of Things, 2021, 5(4): 137-144. |
[15] | Yiyang HU, Lina QI. Channel estimation method of massive MIMO-OFDM system based on adaptive compressed sensing [J]. Chinese Journal on Internet of Things, 2021, 5(3): 78-85. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|