區塊鏈文獻整理
目錄
- 1/5的引用次數比較多的文獻
- 3/5新發表的文獻(2017.2018年)
下面的文獻整理大多數與區塊連結的匿名性有關,有小部分關於以太坊的文獻
1/5的引用次數比較多的文獻
1.引用:Androulaki, E., Karame, G., Roeschlin, M., Scherer, T. and Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of FC 2013, 34–51.
被引量:154
摘要:Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system.In this paper, we investigate the privacy provisions in Bitcoin when it is used as a primary currency to support the daily transactions of individuals in a university setting. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the use of Bitcoin within a university. In this setting, our results show that the profiles of almost 40% of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin.
比特幣正在迅速成為一種流行的數字支付系統。 然而,儘管比特幣依賴於假名,但由於所有發生的交易都是在系統中公開宣佈的,因此比特幣提出了許多隱私問題。在本文中,我們調查了比特幣的隱私條款。 用作支援大學環境中個人日常交易的主要貨幣。 更具體地說,我們通過分析真正的比特幣系統和(ii)通過模擬器來評估比特幣(i)提供的隱私,該模擬器忠實地模仿大學內比特幣的使用。 在此設定中,我們的結果顯示,即使使用者採用比特幣推薦的隱私措施,近40%的使用者的配置檔案在很大程度上也可以恢復。 據我們所知,這是第一部全面分析和評估比特幣隱私含義的工作。
2.引用:Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of IMC, 2013, 127–140.
被引量:223
摘要:Bitcoin is a decentralized virtual currency whose usage has skyrocketed since its introduction in January 2009. Like cash, the ownership of bitcoins is anonymous, as participants transact bitcoins using pseudonyms rather than persistent real-world identities. In this article, we examine the limitations of Bitcoin anonymity and discover that the ability to cluster pseudonyms according to heuristics about shared ownership allows us to identify (i.e., associate with a real-world entity or user) a significant and active slice of the Bitcoin economy. Along the way, we explain a lot about how Bitcoin works.
比特幣是一種分散的虛擬貨幣,自2009年1月推出以來,其使用率一路飆升。與現金一樣,比特幣的所有權是匿名的,因為參與者使用假名而不是持久的真實身份來交易比特幣。在本文中,我們研究了比特幣匿名的侷限性,並發現根據關於共享所有權的啟發式方法對假名進行聚類的能力使我們能夠識別(即,與真實世界的實體或使用者相關聯)比特幣的重要且活躍的切片。經濟。在此過程中,我們解釋了很多關於比特幣的工作原理。
3.引用:Reid, F. and Harrigan, M. An analysis of anonymity in the Bitcoin system. In Proceedings of IEEE PASSAT and SocialCom, 2011, 1318–1326.
被引量:297
摘要:Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.
比特幣(一種點對點電子貨幣系統)的匿名性是一個複雜的問題。在系統內,使用者僅由公鑰標識。希望對其使用者進行去匿名化的攻擊者將嘗試構建使用者和公鑰之間的一對多對映,並將系統外部的資訊與使用者相關聯。比特幣通過將使用者的對映僅儲存在該使用者節點上的公鑰上並允許每個使用者根據需要生成儘可能多的公鑰來位元這種攻擊。在本文中,我們考慮從比特幣的公共交易歷史中得出的兩個網路的拓撲結構。我們證明這兩個網路具有非平凡的拓撲結構,提供比特幣系統的互補檢視,並對匿名性有影響。我們將這些結構與外部資訊和技術(例如上下文發現和流量分析)相結合,以調查據稱盜竊比特幣的行為,在盜竊時,比特幣的市場價值約為50萬美元。
4.引用:Ron, D. and Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. In Proceedings of FC 2013, 6–24.
被引量:281
摘要:The Bitcoin scheme is a rare example of a large scale global payment system in which all the transactions are publicly accessible (but in an anonymous way). We downloaded the full history of this scheme, and analyzed many statistical properties of its associated transaction graph. In this paper we answer for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, and how they move bitcoins between their various accounts in order to better protect their privacy. In addition, we isolated all the large transactions in the system, and discovered that almost all of them are closely related to a single large transaction that took place in November 2010, even though the associated users apparently tried to hide this fact with many strange looking long chains and fork-merge structures in the transaction graph.
比特幣計劃是大規模全球支付系統的一個罕見例子,其中所有交易都是公開可訪問的(但以匿名方式)。 我們下載了該方案的完整歷史,並分析了其相關事務圖的許多統計屬性。 在本文中,我們首次回答了關於使用者的典型行為,他們如何獲得以及他們如何使用比特幣,他們在賬戶中保留比特幣的餘額以及他們如何在各種賬戶之間移動比特幣的各種有趣問題。 為了更好地保護自己的隱私。 此外,我們隔離了系統中的所有大型事務,並發現幾乎所有事務都與2010年11月發生的單個大型事務密切相關,即使關聯使用者顯然試圖隱藏這個事實並且看起來很奇怪 事務圖中的長鏈和fork-merge結構。
1/5的早期文獻
5.引用:Koshy P, Koshy D, Mcdaniel P. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic[C]// International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014:469-485.
被引量:60
摘要:Over the last 4 years, Bitcoin, a decentralized P2P cryptocurrency, has gained widespread attention. The ability to create pseudoanonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of anonymity Bitcoin offers using clustering and flow analysis, none have demonstrated the ability to map Bitcoin addresses directly to IP data. We propose a novel approach to creating and evaluating such mappings solely using real-time transaction traffic collected over 5 months. We developed heuristics for identifying ownership relationships between Bitcoin addresses and IP addresses. We discuss the circumstances under which these relationships become apparent and demonstrate how nearly 1,000 Bitcoin addresses can be mapped to their likely owner IPs by leveraging anomalous relaying behavior
在過去的4年中,比特幣是一種分散的P2P加密貨幣,受到廣泛關注。 建立偽匿名的能力使用比特幣的金融交易已成為貨幣對重視隱私的使用者有吸引力。 雖然以前的工作有
分析了比特幣提供的匿名程度使用聚類和流量分析,沒有人證明能夠對映比特幣地址直接到IP資料。 我們提出了一種創造和創造的新方法僅使用收集的實時交易流量評估此類對映超過5個月。 我們開發了啟發式方法來識別所有權比特幣地址和IP地址之間的關係。 我們討論這些關係變得明顯的環境演示如何將近1,000個比特幣地址對映到他們的地址可能通過利用異常中繼行為來擁有IP
6.引用:Herrera-Joancomartí J. Research and Challenges on Bitcoin Anonymity[M]// Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Springer International Publishing, 2015:3-16.
被引量:15
摘要:Bitcoin has emerged as the most successful crypto currency since its appearance back in 2009. Besides its security robustness, two main properties have probably been its key to success: anonymity and decentralization. In this paper, we provide a comprehensive description on the details that make such cryptocurrency an interesting research topic in the privacy community. We perform an exhaustive review of the bitcoin anonymity research papers that have been published so far and we outline some research challenges on that topic.
自2009年出現以來,比特幣已成為最成功的加密貨幣。除了安全穩健性之外,兩個主要屬性可能是其成功的關鍵:匿名和分散。 在本文中,我們提供了有關細節的全面描述,使這種加密貨幣成為隱私社群中一個有趣的研究課題。 我們對目前已釋出的比特幣匿名研究論文進行了詳盡的審查,並概述了該主題的一些研究挑戰。
7.引用:Feld S, Schönfeld M, Werner M. Traversing Bitcoin’s P2P network: Insights into the structure of a decentralized currency[J]. 2016.
被引量:59
摘要:Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network. Our attacks require only a few machines and have been experimentally verified. The estimated success rate is between 11% and 60% depending on how stealthy an attacker wants to be. We propose several countermeasures to mitigate these new attacks.
比特幣是一種數字貨幣,它依賴於一組分散的礦工來鑄造硬幣,並依靠點對點網路來廣播交易。比特幣使用者的身份隱藏在假名(公鑰)背後,建議經常更改,以增加交易不可連結性。我們提出了一種對比特幣使用者進行去匿名化的有效方法,它允許將使用者假名連結到生成事務的IP地址。當用戶位於其ISP的NAT或防火牆後面時,我們的技術適用於最常見和最具挑戰性的場景。它們允許連結NAT後面的使用者的事務,並區分同一NAT後面的不同使用者的連線和事務。我們還表明,通過濫用比特幣網路的反DoS對策,可以切斷使用Tor或其他匿名服務的自然對策。我們的攻擊只需要幾臺機器,並且已通過實驗驗證。估計成功率在11%到60%之間,具體取決於攻擊者想要的隱祕程度。我們提出了幾種緩解這些新攻擊的對策。
8.引用:Saxena A, Misra J, Dhar A. Increasing Anonymity in Bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014:122-139.
被引量:9
摘要:Bitcoin prevents double-spending using the blockchain, a public ledger kept with every client. Every single transaction till date is present in this ledger. Due to this, true anonymity is not present in bit-coin. We present a method to enhance anonymity in bitcoin-type cryp-tocurrencies. In the blockchain, each block holds a list of transactions linking the sending and receiving addresses. In our modified protocol the transactions (and blocks) do not contain any such links. Using this, we obtain a far higher degree of anonymity. Our method uses a new primitive known as composite signatures. Our security is based on the hardness of the Computation Diffie-Hellman assumption in bilinear maps.
比特幣使用區塊鏈防止雙重支出,每個客戶都保留著分類賬。 到目前為止,每筆交易都是出現在這個分類帳中。 因此,在位元中不存在真正的匿名性硬幣。 我們提出了一種增強比特幣型別密碼的匿名性的方法tocurrencies。 在區塊鏈中,每個區塊都包含一個事務列表連結傳送和接收地址。 在我們修改的協議中事務(和塊)不包含任何此類連結。 使用這個,我們獲得更高程度的匿名性。 我們的方法使用了一個新的原始被稱為複合簽名。 我們的安全性基於硬度雙線性對映中的計算Diffie-Hellman假設。
3/5新發表的文獻(2017.2018年)
9.引用:Conti M, Sandeep K E, Lal C, et al. A Survey on Security and Privacy Issues of Bitcoin[J]. IEEE Communications Surveys & Tutorials, 2017, PP(99):1-1.
被引量:12
摘要:Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only public ledger called blockchain. The security of Bitcoin heavily relies on the incentive-compatible proof-of-work (PoW) based distributed consensus protocol, which is run by the network nodes called miners. In exchange for the incentive, the miners are expected to maintain the blockchain honestly. Since its launch in 2009, Bitcoin economy has grown at an enormous rate, and it is now worth about 150 billions of dollars. This exponential growth in the market value of bitcoins motivate adversaries to exploit weaknesses for profit, and researchers to discover new vulnerabilities in the system, propose countermeasures, and predict upcoming trends. In this paper, we present a systematic survey that covers the security and privacy aspects of Bitcoin. We start by giving an overview of the Bitcoin system and its major components along with their functionality and interactions within the system. We review the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol. These vulnerabilities lead to the execution of various security threats to the standard functionality of Bitcoin. We then investigate the feasibility and robustness of the state-of-the-art security solutions. Additionally, we discuss the current anonymity considerations in Bitcoin and the privacy-related threats to Bitcoin users along with the analysis of the existing privacy-preserving solutions. Finally, we summarize the critical open challenges, and we suggest directions for future research towards provisioning stringent security and privacy solutions for Bitcoin.
比特幣是一種流行的加密貨幣,它記錄了一個名為區塊鏈的分散式附加公共分類賬中的所有交易。比特幣的安全性很大程度上依賴於激勵相容的基於工作量證明(PoW)的分散式共識協議,該協議由稱為礦工的網路節點執行。作為獎勵的交換,礦工們應該誠實地維護區塊鏈。自2009年推出以來,比特幣經濟以驚人的速度增長,現在價值約150億美元。比特幣市場價值的這種指數增長促使對手利用漏洞獲取利潤,研究人員發現系統中的新漏洞,提出對策並預測即將到來的趨勢。在本文中,我們提供了一個涵蓋比特幣安全和隱私方面的系統調查。我們首先概述比特幣系統及其主要元件及其在系統中的功能和互動。我們回顧了比特幣及其主要基礎技術(如區塊鏈和基於PoW的共識協議)中的現有漏洞。這些漏洞導致對比特幣標準功能的各種安全威脅的執行。然後,我們研究了最先進的安全解決方案的可行性和穩健性。此外,我們還討論了比特幣當前的匿名性考慮以及與比特幣使用者相關的隱私威脅以及對現有隱私保護解決方案的分析。最後,我們總結了關鍵的開放性挑戰,併為未來的研究提供了方向,為比特幣提供嚴格的安全和隱私解決方案。
10.引用:Fanti G, Viswanath P. Anonymity Properties of the Bitcoin P2P Network[J]. 2017.
被引量:3
摘要:Bitcoin is a popular alternative to fiat money, widely used for its perceived anonymity properties. However, recent attacks on Bitcoin’s peer-to-peer (P2P) network demonstrated that its gossip-based flooding protocols, which are used to ensure global network consistency, may enable user deanonymization the linkage of a user’s IP address with her pseudonym in the Bitcoin network. In 2015, the Bitcoin community responded to these attacks by changing the network’s flooding mechanism to a different protocol, known as diffusion.However, no systematic justification was provided for the change, and it is unclear if diffusion actually improves the system’s anonymity. In this paper, we model the Bitcoin networking stack and analyze its anonymity properties, both pre- and post-2015. In doing so, we consider new adversarial
models and spreading mechanisms that have not been previously studied in the source-finding literature. We theoretically prove that Bitcoin’s networking protocols (both pre- and post-2015) offer poor anonymity properties on networkswith a regular-tree topology. We validate this claimin simulation on a 2015 snapshot of the real Bitcoin P2P network topology.
比特幣是法定貨幣的流行替代品,廣泛用於其感知的匿名屬性。但是,最近的攻擊在比特幣的點對點(P2P)網路上證明了這一點它基於八卦的泛洪協議,用於確保
全球網路一致性,可以使使用者去匿名化 - 使用者的IP地址與她的假名的連結比特幣網路。 2015年,比特幣社群做出了迴應通過改變網路洪水來應對這些攻擊機制到不同的協議,稱為擴散。但是,沒有提供系統的理由變化,目前還不清楚擴散是否真的改善了系統的匿名性。在本文中,我們對比特幣進行建模網路堆疊和分析其匿名屬性,兩者2015年之前和之後。在這樣做時,我們考慮新的對抗性沒有的模型和傳播機制以前在源頭髮現文獻中研究過。我們理論上證明比特幣的網路協議(兩者都有2015年之前和之後)在網路上提供差的匿名屬性使用常規樹拓撲。我們驗證了此宣告模擬真實比特幣P2P的2015年快照網路拓撲結構。
11.引用:Neudecker T, Hartenstein H. Could Network Information Facilitate Address Clustering in Bitcoin?[C]// International Conference on Financial Cryptography and Data Security. Springer, Cham, 2017:155-169.
被引用量:3
摘要:Address clustering tries to break the privacy of bitcoin users by linking all addresses created by an individual user, based on information available from the blockchain. As an alternative information source, observations of the underlying peer-to-peer network have also been used to attack the privacy of users. In this paper, we assess whether combining blockchain and network information may facilitate the clustering process. For this purpose, we apply all applicable clustering heuristics that are known to us to current blockchain information and associate the resulting clusters with IP address information extracted from observing the message flooding process of the bitcoin network. The results indicate that only a small share of clusters (less than 8%) were conspicuously associated with a single IP address. Also, only a small number of IP addresses showed a conspicuous association with a single cluster.
地址群集試圖通過連結由單個使用者建立的所有地址(基於區塊鏈中可用的資訊)來破壞比特幣使用者的隱私。 作為替代資訊源,對底層對等網路的觀察也被用於攻擊使用者的隱私。 在本文中,我們評估組合區塊鏈和網路資訊是否可以促進聚類過程。 為此,我們將我們已知的所有適用的聚類啟發法應用於當前的區塊鏈資訊,並將得到的聚類與從觀察比特幣網路的訊息洪泛過程中提取的IP地址資訊相關聯。 結果表明,只有一小部分叢集(小於8%)明顯與單個IP地址相關聯。 此外,只有少數IP地址與單個群集顯示出明顯的關聯。
12.引用:@incollection{NIPS2017_6735,title = {Deanonymization in the Bitcoin P2P Network},author = {Fanti, Giulia and Viswanath, Pramod},booktitle = {Advances in Neural Information Processing Systems 30},editor = {I. Guyon and U. V. Luxburg and S. Bengio and H. Wallach and R. Fergus and S. Vishwanathan and R. Garnett},
pages = {1364--1373},year = {2017},publisher = {Curran Associates, Inc.},url = {http://papers.nips.cc/paper/6735-deanonymization-in-the-bitcoin-p2p-network.pdf}}
被引量:2
摘要:Recent attacks on Bitcoin's peer-to-peer (P2P) network demonstrated that its transaction-flooding protocols, which are used to ensure network consistency, may enable user deanonymization---the linkage of a user's IP address with her pseudonym in the Bitcoin network. In 2015, the Bitcoin community responded to these attacks by changing the network's flooding mechanism to a different protocol, known as diffusion. However, it is unclear if diffusion actually improves the system's anonymity. In this paper, we model the Bitcoin networking stack and analyze its anonymity properties, both pre- and post-2015. The core problem is one of epidemic source inference over graphs, where the observational model and spreading mechanisms are informed by Bitcoin's implementation; notably, these models have not been studied in the epidemic source detection literature before. We identify and analyze near-optimal source estimators. This analysis suggests that Bitcoin's networking protocols (both pre- and post-2015) offer poor anonymity properties on networks with a regular-tree topology. We confirm this claim in simulation on a 2015 snapshot of the real Bitcoin P2P network topology.
最近對比特幣的點對點(P2P)網路的攻擊表明,其用於確保網路一致性的事務氾濫協議可以實現使用者的匿名化 - 使用者的IP地址與比特幣網路中的假名的連結。 2015年,比特幣社群通過將網路洪泛機制更改為不同的協議(稱為擴散)來應對這些攻擊。然而,目前尚不清楚擴散是否真正改善了系統的匿名性。在本文中,我們對比特幣網路堆疊進行建模,並在2015年之前和之後分析其匿名屬性。核心問題是關於圖的流行病源推斷之一,其中觀察模型和傳播機制由比特幣的實施提供資訊;值得注意的是,這些模型之前尚未在流行病學檢測文獻中進行過研究。我們識別並分析近乎最優的源估計器。該分析表明,比特幣的網路協議(2015年之前和之後)在具有常規樹拓撲的網路上提供了較差的匿名性。我們在2015年真實比特幣P2P網路拓撲快照的模擬中證實了這一主張。
13.引用:Jad Wahab, Privacy in Blockchain Systems, https://arxiv.org/pdf/1809.10642.pdf.
被引量:0
摘要:In this literature review, we first briefly provide an introduction on the privacy aspect of blockchain systems and why it is a difficult quality to achieve, especially using traditional methods. Next, we go over a wide range of different strategies and techniques, along with theirrespective empirical implementations. Starting with approaches that attempted to provide privacy on Bitcoin/existing blockchain systems, then going into more advanced techniques, such as secure multi-party computations, ring signatures, and zero knowledge proofs, that construct a more advanced blockchain system from scratch with the objective of preserving privacy. Finally, we conclude that the current state of privacy on blockchains still needs work for it to be reliable. Nevertheless, the field of privacy in this domain is developing and advancing at a rapid rate.
在這篇文獻綜述中,我們首先簡要介紹一下區塊鏈系統的隱私方面以及為什麼它質量很差實現,特別是使用傳統方法。 接下來,我們過去各種不同的策略和技巧,以及他們的各自的經驗實施。 從那些方法開始試圖在比特幣/現有區塊鏈系統上提供隱私,然後進入更高階的技術,例如安全的多方構造的計算,環簽名和零知識證明一個更先進的區塊鏈系統從頭開始與目標保護隱私。 最後,我們得出結論,目前的狀態區塊鏈上的隱私仍然需要工作才能保證可靠性。儘管如此,這個領域的隱私領域正在發展和進步
快速的。
14.引用:Henry R, Herzberg A, Kate A. Blockchain Access Privacy: Challenges and Directions[J]. IEEE Security & Privacy, 2018, 16(4):38-45.
被引量:0
摘要:Privacy, facilitated by a confluence of cryptography and decentralization, is one of the primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy promise has proven illusory, and despite growing interest in privacy-centric blockchains, most blockchain users remain susceptible to privacy attacks that exploit network-layer information and access patterns that leak as users interact with blockchains. Understanding if and how blockchain-based applications can provide strong privacy guarantees is a matter of increasing urgency. Many researchers advocate using anonymous communications networks, such as Tor, to ensure access privacy. We challenge this approach, showing the need for mechanisms through which non-anonymous users can (i) publish transactions that cannot be linked to their network addresses or to their other transactions, and (ii) fetch details of specific transactions without revealing which transactions they seek. We hope this article inspires blockchain researchers to think beyond Tor and tackle these important access privacy problems head-on.
隱私,由密碼學和權力下放的融合促成,是採用像比特幣這樣的加密貨幣的主要動機之一。唉,比特幣隱私承諾已被證明是虛幻的,儘管對以隱私為中心的區塊鏈越來越感興趣,但大多數區塊鏈使用者仍然容易受到利用網路層資訊和訪問模式的隱私攻擊,這些模式會隨著使用者與區塊鏈互動而洩露。瞭解基於區塊鏈的應用程式是否以及如何提供強大的隱私保障是一個日益緊迫的問題。許多研究人員主張使用Tor等匿名通訊網路來確保訪問隱私。我們對此方法提出質疑,表明需要非匿名使用者可以(i)釋出無法連結到其網路地址或其他交易的交易的機制,以及(ii)獲取特定交易的詳細資訊,而不會洩露他們的交易尋求。我們希望本文能激發區塊鏈研究人員超越Tor的思考,並正面解決這些重要的訪問隱私問題。
15.引用:Ouaddah A, Elkalam A A, Ouahman A A. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT[J]. 2017.
被引量:9
摘要:Access control face big challenges in IoT. Unfortunately, it is hard to implement current access control standards on smart object due to its constrained nature while the introduction of powerful and trusted third party to handle access control logic could harm user privacy. In this work we show how blockchain, the promising technology behind Bitcoin, can be very attractive to face those arising challenges. We therefore propose FairAccess as a new decentralized pseudonymous and privacy preserving authorization management framework that leverages the consistency of blockchain technology to manage access control on behalf of constrained devices.
訪問控制面臨著物聯網的巨大挑戰。 遺憾的是,由於其受約束的性質,很難在智慧物件上實現當前的訪問控制標準,而引入強大且可信的第三方來處理訪問控制邏輯可能會損害使用者隱私。 在這項工作中,我們展示了區塊鏈(比特幣背後的有前途的技術)如何能夠面對這些挑戰而非常具有吸引力。 因此,我們建議將FairAccess作為一種新的分散式假名和隱私保護授權管理框架,該框架利用區塊鏈技術的一致性來代表受約束裝置管理訪問控制。
16.引用:Fan K, Ren Y, Wang Y, et al. Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G[J]. Iet Communications, 2018, 12(5):527-532.
被引量:0
摘要:Now, the authors life is full of vast amount of information, the era of information has arrived. So the content-centric networks face severe challenges in dealing with a huge range of content requests, bringing protection and sharing concerns of the content. How to protect information in the network efficiently and securely for the upcoming 5G era has become a problem. The authors propose a scheme based on a blockchain to solve the privacy issues in content-centric mobile networks for 5G. The authors implement the mutual trust between content providers and users. Besides, the openness and tamper-resistant of the blockchain ledger ensure the access control and privacy of the provider. With the help of a miner, selected from users, the authors can maintain the public ledger expediently. Also, in return, the authors share the interesting data with low overhead, network delay and congestion, and then achieve green communication.
現在,作者的生活充滿了大量的資訊,資訊的時代已經到來。 因此,以內容為中心的網路在處理大量內容請求時面臨嚴峻挑戰,帶來內容的保護和共享問題。 如何在即將到來的5G時代有效且安全地保護網路中的資訊已經成為一個問題。 作者提出了一種基於區塊鏈的方案,以解決5G內容中心行動網路中的隱私問題。 作者實現了內容提供者和使用者之間的相互信任。 此外,區塊鏈分類帳的開放性和防篡改性確保了提供商的訪問控制和隱私。 在從使用者中選擇的礦工的幫助下,作者可以方便地維護公共分類賬。 而且,作為回報,作者以低開銷,網路延遲和擁塞共享有趣的資料,然後實現綠色通訊。
17.引用:Ranshous S, Joslyn C A, Kreyling S, et al. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph[C]// International Conference on Financial Cryptography and Data Security. Springer, Cham, 2017:248-263.
被引用量:0
摘要:Bitcoin exchanges operate between digital and fiat currency networks, thus providing an opportunity to connect real-world identities to pseudonymous addresses, an important task for anti-money laundering efforts. We seek to characterize, understand, and identify patterns centered around exchanges in the context of a directed hypergraph model for Bitcoin transactions. We introduce the idea of motifs in directed hypergraphs, considering a particular 2-motif as a potential laundering pattern. We identify distinct statistical properties of exchange addresses related to the acquisition and spending of bitcoin. We then leverage this to build classification models to learn a set of discriminating features, and are able to predict if an address is owned by an exchange with >80% accuracy using purely structural features of the graph. Applying this classifier to the 2-motif patterns reveals a preponderance of inter-exchange activity, while not necessarily significant laundering patterns.
比特幣交易在數字和法定貨幣網路之間運作,從而提供了將現實身份與假名地址聯絡起來的機會,這是反洗錢工作的一項重要任務。 我們尋求在比特幣交易的有向超圖模型的背景下,以交換為中心來描述,理解和識別模式。 我們在有向超圖中引入了圖案的概念,將特定的2圖案視為潛在的洗錢模式。 我們識別與比特幣的購置和支出相關的交換地址的不同統計特性。 然後,我們利用它來構建分類模型以學習一組區分特徵,並且能夠使用圖的純結構特徵來預測地址是否由具有> 80 %準確度的交換所擁有。 將該分類器應用於2-基序模式揭示了交換活動的優勢,而不一定是重要的洗錢模式。
18.引用:Daniel Genkin, Dimitrios Papadopoulos, Charalampos Papamanthou Communications of the ACM, June 2018, Vol. 61 No. 6, Pages 78-88 doi:10.1145/3132696
被引量:0
摘要:While blockchain-based cryptocurrencies like Bitcoin do not directly reveal users' identities, they are often prone to deanonymization attacks. By observing the flow of transactions stored in the public blockchain, third parties can make accurate guesses about the identities of involved individuals.Existing privacy-enhancing techniques
for cryptocurrencies mostly come in two flavors: Mixing overlay protocols that can be executed on top of an existing cryptocurrency to hide the flow of funds among a set of participants, and alternative privacy-preserving cryptocurrencies that use advanced cryptographic techniques to achieve strong user privacy by design. We review and compare solutions from both techniques.
而基於區塊鏈的加密貨幣像比特幣不直接透露使用者'身份,他們往往傾向於去匿名化攻擊。 通過觀察儲存在中的事務流公共區塊鏈,第三方可以做關於身份的準確猜測涉及的個人。現有的隱私增強技術加密貨幣主要是進來的兩種口味:混合覆蓋協議可以在一個上面執行現有的加密貨幣來隱藏流量一組參與者中的資金,和替代隱私保護使用高階的加密貨幣加密技術實現強大的使用者隱私設計。我們審查並比較來自的解決方案兩種技術。
下面是關於[以太坊隱私]的文獻.
19.引用:Kosba A, Miller A, Shi E, et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts[C]// Security and Privacy. IEEE, 2016:839-858.
被引量:127
摘要:Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, the decentralized blockchain ensures that honest parties obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount transacted, are exposed on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view. A Hawk programmer can write a private smart contract in an intuitive manner without having to implement cryptography, and our compiler automatically generates an efficient cryptographic protocol where contractual parties interact with the blockchain, using cryptographic primitives such as zero-knowledge proofs. To formally define and reason about the security of our protocols, we are the first to formalize the blockchain model of cryptography. The formal modeling is of independent interest. We advocate the community to adopt such a formal model when designing applications atop decentralized blockchains.
新興的智慧合約系統優於分散的加密貨幣,允許相互不信任的各方在沒有可信第三方的情況下安全地進行交易。在合同違約或中止的情況下,分散的區塊鏈可確保誠實的當事人獲得相應的賠償。然而,現有系統缺乏交易隱私。所有交易,包括假名和交易金額之間的資金流動,均在區塊鏈中公開。我們介紹Hawk,這是一種分散的智慧合約系統,不會在區塊鏈中明確儲存金融交易,從而保留了公眾視角下的交易隱私。 Hawk程式設計師可以直觀地編寫私有智慧合約,而無需實施加密,我們的編譯器會自動生成一種有效的加密協議,其中合同方與區塊鏈互動,使用加密原語,如零知識證明。為了正式定義和推理我們的協議的安全性,我們是第一個正式化密碼學的區塊鏈模型。正式建模具有獨立的意義。我們主張社群在分散區塊鏈上設計應用程式時採用這種正式模型。
20.引用:Galal H S. Verifiable Sealed-Bid Auction on the Ethereum Blockchain[C]// Finanacial Cryptography. 2018.
被引量:0
摘要:The success of the Ethereum blockchain as a decentralized application platform with a distributed consensus protocol has made many organizations start to invest into running their business on top of it. Technically, the most impressive feature behind Ethereum’s success is its support for a Turing complete language. On the other hand, the inherent transparency and, consequently, the lack of privacy poses a great challenge for many financial applications. In this paper, we tackle this challenge and present a smart contract for a verifiable sealed-bid auction on the Ethereum blockchain. In a nutshell, initially, the bidders submit homomorphic commitments to their sealed-bids on the contract. Subsequently, they reveal their commitments secretly to the auctioneer via a public key encryption scheme. Then, according to the auction rules, the auctioneer determines and claims the winner of the auction. Finally, we utilize interactive zero-knowledge proof protocols between the smart contract and the auctioneer to verify the correctness of such a claim. The underlying protocol of the proposed smart contract is partially privacy-preserving. To be precise, no information about the losing bids is leaked to the bidders. We provide an analysis of the proposed protocol and the smart contract design, in addition to the estimated gas costs associated with the different transactions
以太坊區塊鏈作為具有分散式共識協議的分散式應用平臺的成功使得許多組織開始投資於在其上執行業務。從技術上講,以太坊成功背後最令人印象深刻的功能是它支援圖靈完整語言。另一方面,固有的透明度以及因此缺乏隱私對許多金融應用構成了巨大的挑戰。在本文中,我們解決了這一挑戰,併為以太坊區塊鏈的可驗證密封競標拍賣提供了明智的合約。簡而言之,最初,投標人向合同的密封投標提交同形承諾。隨後,他們通過公鑰加密方案祕密向買方揭露其承諾。然後,根據拍賣規則,拍賣師確定並要求拍賣的獲勝者。最後,我們利用智慧合約和拍賣師之間的互動式零知識證明協議來驗證此類索賠的正確性。擬議的智慧合約的基本協議部分隱私保護。確切地說,沒有關於失敗投標的資訊洩露給投標人。除了與不同交易相關的估計天然氣成本之外,我們還提供了對擬議協議和智慧合約設計的分析