[1] 袁勇,王飞跃.区块链技术发展现状与展望[J].自动化学报,2016,42(4):481-494.YUAN Y,WANG F Y.Blockchain:the state of the art and future trends[J].Acta Automatica Sinica,2016,42(4):481-494.(in Chinese) [2] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2022-07-05].https://bitcoincash.org/bitcoin.pdf. [3] 王继业,高灵超,董爱强,等.基于区块链的数据安全共享网络体系研究[J].计算机研究与发展,2017,54(4):742-749.WANG J Y,GAO L C,DONG A Q,et al.Block chain based data security sharing network architecture research[J].Journal of Computer Research and Development,2017,54(4):742-749.(in Chinese) [4] BURKE B,WALKER M,CEARLEY D.Top 10 strategic technology trends for 2021[EB/OL].[2022-07-05].https://www.gartner.co.uk/en/articles/gartner-top-strategic-technology-trends-for-2021. [5] 祝烈煌,高峰,沈蒙,等.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.ZHU L H,GAO F,SHEN M,et al.Survey on privacy preserving techniques for blockchain technology[J].Journal of Computer Research and Development,2017,54(10):2170-2186.(in Chinese) [6] 姚前,张大伟.区块链系统中身份管理技术研究综述[J].软件学报,2021,32(7):2260-2286.YAO Q,ZHANG D W.Survey on identity management in blockchain[J].Journal of Software,2021,32(7):2260-2286.(in Chinese) [7] FOG B.Accessing Bitcoin Fog[EB/OL].[2022-07-05].http://bitcoinfog.info/. [8] BONNEAU J,NARAYANAN A,MILLER A,et al.Mixcoin:anonymity for bitcoin with accountable mixes[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2014:486-504. [9] VALENTA L,ROWAN B.Blindcoin:blinded,accountable mixes for bitcoin[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2015:112-126. [10] MAXWELL G.CoinJoin:bitcoin privacy for the real world[EB/OL].[2022-07-05].https://bitcointalk.org/index.php?topic=279249.0. [11] RUFFING T,MORENO-SANCHEZ P,KATE A.CoinShuffle:practical decentralized coin mixing for bitcoin[C]//Proceedings of European Symposium on Research in Computer Security.Berlin,Germany:Springer,2014:345-364. [12] VAN SABERHAGEN N.CryptoNode v 2.0,Monero white paper[EB/OL].[2022-07-05].https://static.monerooutreach.org/doc/monero-outreach/cryptonote_whitepaper.pdf. [13] HOPWOOD D,BOWE S,HORNBY T,et al.Zcash protocol specification[EB/OL].[2022-07-05].http://diyhpl.us/~bryan/papers2/bitcoin/zcash-protocol-specification-2016-10-28.pdf. [14] DUTTA A,VIJAYAKUMARAN S.Revelio:a MimbleWimble proof of reserves protocol[C]//Proceedings of Crypto Valley Conference on Blockchain Technology.Washington D.C.,USA:IEEE Press,2019:7-11. [15] LI X,JIANG P,CHEN T,et al.A survey on the security of blockchain systems[J].Future Generation Computer Systems,2020,107:841-853. [16] GARMAN C,GREEN M,MIERS I.Accountable privacy for decentralized anonymous payments[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2017:81-98. [17] NAGANUMA K,YOSHINO M,SATO H,et al.Auditable zerocoin[C]//Proceedings of European Symposium on Security and Privacy Workshops.Berlin,Germany:Springer,2017:59-63. [18] NARULA N,VASQUEZ W,VIRZA M.zkledger:privacy-preserving auditing for distributed ledgers[C]//Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation.San Diego,USA:USENIX Association,2018:65-80. [19] WÜST K,KOSTIAINEN K,ČAPKUN V,et al.PRCash:fast,private and regulated transactions for digital currencies[C]//Proceedings of International Conference on Financial Cryptography and Data Security.Berlin,Germany:Springer,2019:158-178. [20] 李莉,杜慧娜,李涛.基于群签名与属性加密的区块链可监管隐私保护方案[J].计算机工程,2022,48(6):132-138.LI L,DU H N,LI T.Blockchain supervisable privacy protection scheme based on group signature and attribute encryption[J].Computer Engineering,2022,48(6):132-138.(in Chinese) [21] LI Y N,YANG G M,SUSILO W,et al.Traceable Monero:anonymous cryptocurrency with enhanced accountability[J].IEEE Transactions on Dependable and Secure Computing,2021,18(2):679-691. [22] COURTOIS N T,MERCER R.Stealth address and key management techniques in blockchain systems[C]//Proceedings of the 3rd International Conference on Information Systems Security and Privacy.Washington D.C.,USA:IEEE Press,2017:559-566. [23] CHAUM D L.Untraceable electronic mail,return addresses,and digital pseudonyms[J].Communications of the ACM,1981,24(2):84-90. [24] 王群,李馥娟,倪雪莉,等.区块链隐私威胁及保护机制研究[J/OL].计算机工程:1-8[2022-07-05].https://doi.org/10.19678/j.issn.1000-3428.0064343.WANG Q,LI F J,NI X L,et al.Blockchain privacy threat and protection mechanism research[J/OL].Computer Engineering:1-8[2022-07-05].https://doi.org/10.19678/j.issn.1000-3428.0064343.(in Chinese) [25] NOETHER S,MACKENZIE A,RESEARCH LAB T M.Ring confidential transactions[J].Ledger,2016,1:1-18. [26] HUANG H Y,BASHIR M.The onion router:understanding a privacy enhancing technology community[J].Proceedings of the Association for Information Science and Technology,2016,53(1):1-10. [27] 张亮,刘百祥,张如意,等.区块链技术综述[J].计算机工程,2019,45(5):1-12.ZHANG L,LIU B X,ZHANG R Y,et al.Overview of blockchain technology[J].Computer Engineering,2019,45(5):1-12.(in Chinese) |