下面的文獻整理大多數與區塊連接的匿名性有關,有小部分關於以太坊的文獻ios
1.引用:Androulaki, E., Karame, G., Roeschlin, M., Scherer, T. and Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of FC 2013, 34–51.
被引量:154
摘要:Bitcoin is quickly emerging as a popular digital payment system. However, in spite of its reliance on pseudonyms, Bitcoin raises a number of privacy concerns due to the fact that all of the transactions that take place are publicly announced in the system.In this paper, we investigate the privacy provisions in Bitcoin when it is used as a primary currency to support the daily transactions of individuals in a university setting. More specifically, we evaluate the privacy that is provided by Bitcoin (i) by analyzing the genuine Bitcoin system and (ii) through a simulator that faithfully mimics the use of Bitcoin within a university. In this setting, our results show that the profiles of almost 40% of the users can be, to a large extent, recovered even when users adopt privacy measures recommended by Bitcoin. To the best of our knowledge, this is the first work that comprehensively analyzes, and evaluates the privacy implications of Bitcoin.
比特幣正在迅速成爲一種流行的數字支付系統。 然而,儘管比特幣依賴於假名,但因爲全部發生的交易都是在系統中公開宣佈的,所以比特幣提出了許多隱私問題。在本文中,咱們調查了比特幣的隱私條款。 用做支持大學環境中我的平常交易的主要貨幣。 更具體地說,咱們經過分析真正的比特幣系統和(ii)經過模擬器來評估比特幣(i)提供的隱私,該模擬器忠實地模仿大學內比特幣的使用。 在此設置中,咱們的結果顯示,即便用戶採用比特幣推薦的隱私措施,近40%的用戶的配置文件在很大程度上也能夠恢復。 據咱們所知,這是第一部全面分析和評估比特幣隱私含義的工做。git
2.引用:Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of IMC, 2013, 127–140.
被引量:223
摘要:Bitcoin is a decentralized virtual currency whose usage has skyrocketed since its introduction in January 2009. Like cash, the ownership of bitcoins is anonymous, as participants transact bitcoins using pseudonyms rather than persistent real-world identities. In this article, we examine the limitations of Bitcoin anonymity and discover that the ability to cluster pseudonyms according to heuristics about shared ownership allows us to identify (i.e., associate with a real-world entity or user) a significant and active slice of the Bitcoin economy. Along the way, we explain a lot about how Bitcoin works.
比特幣是一種分散的虛擬貨幣,自2009年1月推出以來,其使用率一路飆升。與現金同樣,比特幣的全部權是匿名的,由於參與者使用假名而不是持久的真實身份來交易比特幣。在本文中,咱們研究了比特幣匿名的侷限性,並發現根據關於共享全部權的啓發式方法對假名進行聚類的能力使咱們可以識別(即,與真實世界的實體或用戶相關聯)比特幣的重要且活躍的切片。經濟。在此過程當中,咱們解釋了不少關於比特幣的工做原理。程序員
3.引用:Reid, F. and Harrigan, M. An analysis of anonymity in the Bitcoin system. In Proceedings of IEEE PASSAT and SocialCom, 2011, 1318–1326.
被引量:297
摘要:Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.
比特幣(一種點對點電子貨幣系統)的匿名性是一個複雜的問題。在系統內,用戶僅由公鑰標識。但願對其用戶進行去匿名化的攻擊者將嘗試構建用戶和公鑰之間的一對多映射,並將系統外部的信息與用戶相關聯。比特幣經過將用戶的映射僅存儲在該用戶節點上的公鑰上並容許每一個用戶根據須要生成儘量多的公鑰來比特這種攻擊。在本文中,咱們考慮從比特幣的公共交易歷史中得出的兩個網絡的拓撲結構。咱們證實這兩個網絡具備非平凡的拓撲結構,提供比特幣系統的互補視圖,並對匿名性有影響。咱們將這些結構與外部信息和技術(例如上下文發現和流量分析)相結合,以調查據稱盜竊比特幣的行爲,在盜竊時,比特幣的市場價值約爲50萬美圓。shell
4.引用:Ron, D. and Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. In Proceedings of FC 2013, 6–24.
被引量:281
摘要:The Bitcoin scheme is a rare example of a large scale global payment system in which all the transactions are publicly accessible (but in an anonymous way). We downloaded the full history of this scheme, and analyzed many statistical properties of its associated transaction graph. In this paper we answer for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, and how they move bitcoins between their various accounts in order to better protect their privacy. In addition, we isolated all the large transactions in the system, and discovered that almost all of them are closely related to a single large transaction that took place in November 2010, even though the associated users apparently tried to hide this fact with many strange looking long chains and fork-merge structures in the transaction graph.
比特幣計劃是大規模全球支付系統的一個罕見例子,其中全部交易都是公開可訪問的(但以匿名方式)。 咱們下載了該方案的完整歷史,並分析了其相關事務圖的許多統計屬性。 在本文中,咱們首次回答了關於用戶的典型行爲,他們如何得到以及他們如何使用比特幣,他們在帳戶中保留比特幣的餘額以及他們如何在各類帳戶之間移動比特幣的各類有趣問題。 爲了更好地保護本身的隱私。 此外,咱們隔離了系統中的全部大型事務,並發現幾乎全部事務都與2010年11月發生的單個大型事務密切相關,即便關聯用戶顯然試圖隱藏這個事實而且看起來很奇怪 事務圖中的長鏈和fork-merge結構。api
5.引用:Koshy P, Koshy D, Mcdaniel P. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic[C]// International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014:469-485.
被引量:60
摘要:Over the last 4 years, Bitcoin, a decentralized P2P cryptocurrency, has gained widespread attention. The ability to create pseudoanonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of anonymity Bitcoin offers using clustering and flow analysis, none have demonstrated the ability to map Bitcoin addresses directly to IP data. We propose a novel approach to creating and evaluating such mappings solely using real-time transaction traffic collected over 5 months. We developed heuristics for identifying ownership relationships between Bitcoin addresses and IP addresses. We discuss the circumstances under which these relationships become apparent and demonstrate how nearly 1,000 Bitcoin addresses can be mapped to their likely owner IPs by leveraging anomalous relaying behavior
在過去的4年中,比特幣是一種分散的P2P加密貨幣,受到普遍關注。 建立僞匿名的能力使用比特幣的金融交易已成爲貨幣對重視隱私的用戶有吸引力。 雖然之前的工做有
分析了比特幣提供的匿名程度使用聚類和流量分析,沒有人證實可以映射比特幣地址直接到IP數據。 咱們提出了一種創造和創造的新方法僅使用收集的實時交易流量評估此類映射超過5個月。 咱們開發了啓發式方法來識別全部權比特幣地址和IP地址之間的關係。 咱們討論這些關係變得明顯的環境演示如何將近1,000個比特幣地址映射到他們的地址可能經過利用異常中繼行爲來擁有IPpromise
6.引用:Herrera-Joancomartí J. Research and Challenges on Bitcoin Anonymity[M]// Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Springer International Publishing, 2015:3-16.
被引量:15
摘要:Bitcoin has emerged as the most successful crypto currency since its appearance back in 2009. Besides its security robustness, two main properties have probably been its key to success: anonymity and decentralization. In this paper, we provide a comprehensive description on the details that make such cryptocurrency an interesting research topic in the privacy community. We perform an exhaustive review of the bitcoin anonymity research papers that have been published so far and we outline some research challenges on that topic.
自2009年出現以來,比特幣已成爲最成功的加密貨幣。除了安全穩健性以外,兩個主要屬性多是其成功的關鍵:匿名和分散。 在本文中,咱們提供了有關細節的全面描述,使這種加密貨幣成爲隱私社區中一個有趣的研究課題。 咱們對目前已發佈的比特幣匿名研究論文進行了詳盡的審查,並概述了該主題的一些研究挑戰。安全
7.引用:Feld S, Schönfeld M, Werner M. Traversing Bitcoin’s P2P network: Insights into the structure of a decentralized currency[J]. 2016.
被引量:59
摘要:Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network. Our attacks require only a few machines and have been experimentally verified. The estimated success rate is between 11% and 60% depending on how stealthy an attacker wants to be. We propose several countermeasures to mitigate these new attacks.
比特幣是一種數字貨幣,它依賴於一組分散的礦工來鑄造硬幣,並依靠點對點網絡來廣播交易。比特幣用戶的身份隱藏在假名(公鑰)背後,建議常常更改,以增長交易不可連接性。咱們提出了一種對比特幣用戶進行去匿名化的有效方法,它容許將用戶假名連接到生成事務的IP地址。當用戶位於其ISP的NAT或防火牆後面時,咱們的技術適用於最多見和最具挑戰性的場景。它們容許連接NAT後面的用戶的事務,並區分同一NAT後面的不一樣用戶的鏈接和事務。咱們還代表,經過濫用比特幣網絡的反DoS對策,能夠切斷使用Tor或其餘匿名服務的天然對策。咱們的攻擊只須要幾臺機器,而且已經過實驗驗證。估計成功率在11%到60%之間,具體取決於攻擊者想要的隱祕程度。咱們提出了幾種緩解這些新攻擊的對策。網絡
8.引用:Saxena A, Misra J, Dhar A. Increasing Anonymity in Bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2014:122-139.
被引量:9
摘要:Bitcoin prevents double-spending using the blockchain, a public ledger kept with every client. Every single transaction till date is present in this ledger. Due to this, true anonymity is not present in bit-coin. We present a method to enhance anonymity in bitcoin-type cryp-tocurrencies. In the blockchain, each block holds a list of transactions linking the sending and receiving addresses. In our modified protocol the transactions (and blocks) do not contain any such links. Using this, we obtain a far higher degree of anonymity. Our method uses a new primitive known as composite signatures. Our security is based on the hardness of the Computation Diffie-Hellman assumption in bilinear maps.
比特幣使用區塊鏈防止雙重支出,每一個客戶都保留着分類帳。 到目前爲止,每筆交易都是出如今這個分類賬中。 所以,在比特中不存在真正的匿名性硬幣。 咱們提出了一種加強比特幣類型密碼的匿名性的方法tocurrencies。 在區塊鏈中,每一個區塊都包含一個事務列表連接發送和接收地址。 在咱們修改的協議中事務(和塊)不包含任何此類連接。 使用這個,咱們得到更高程度的匿名性。 咱們的方法使用了一個新的原始被稱爲複合簽名。 咱們的安全性基於硬度雙線性映射中的計算Diffie-Hellman假設。併發
9.引用:Conti M, Sandeep K E, Lal C, et al. A Survey on Security and Privacy Issues of Bitcoin[J]. IEEE Communications Surveys & Tutorials, 2017, PP(99):1-1.
被引量:12
摘要:Bitcoin is a popular cryptocurrency that records all transactions in a distributed append-only public ledger called blockchain. The security of Bitcoin heavily relies on the incentive-compatible proof-of-work (PoW) based distributed consensus protocol, which is run by the network nodes called miners. In exchange for the incentive, the miners are expected to maintain the blockchain honestly. Since its launch in 2009, Bitcoin economy has grown at an enormous rate, and it is now worth about 150 billions of dollars. This exponential growth in the market value of bitcoins motivate adversaries to exploit weaknesses for profit, and researchers to discover new vulnerabilities in the system, propose countermeasures, and predict upcoming trends. In this paper, we present a systematic survey that covers the security and privacy aspects of Bitcoin. We start by giving an overview of the Bitcoin system and its major components along with their functionality and interactions within the system. We review the existing vulnerabilities in Bitcoin and its major underlying technologies such as blockchain and PoW-based consensus protocol. These vulnerabilities lead to the execution of various security threats to the standard functionality of Bitcoin. We then investigate the feasibility and robustness of the state-of-the-art security solutions. Additionally, we discuss the current anonymity considerations in Bitcoin and the privacy-related threats to Bitcoin users along with the analysis of the existing privacy-preserving solutions. Finally, we summarize the critical open challenges, and we suggest directions for future research towards provisioning stringent security and privacy solutions for Bitcoin.
比特幣是一種流行的加密貨幣,它記錄了一個名爲區塊鏈的分佈式附加公共分類帳中的全部交易。比特幣的安全性很大程度上依賴於激勵兼容的基於工做量證實(PoW)的分佈式共識協議,該協議由稱爲礦工的網絡節點運行。做爲獎勵的交換,礦工們應該誠實地維護區塊鏈。自2009年推出以來,比特幣經濟以驚人的速度增加,如今價值約150億美圓。比特幣市場價值的這種指數增加促使對手利用漏洞獲取利潤,研究人員發現系統中的新漏洞,提出對策並預測即將到來的趨勢。在本文中,咱們提供了一個涵蓋比特幣安全和隱私方面的系統調查。咱們首先概述比特幣系統及其主要組件及其在系統中的功能和交互。咱們回顧了比特幣及其主要基礎技術(如區塊鏈和基於PoW的共識協議)中的現有漏洞。這些漏洞致使對比特幣標準功能的各類安全威脅的執行。而後,咱們研究了最早進的安全解決方案的可行性和穩健性。此外,咱們還討論了比特幣當前的匿名性考慮以及與比特幣用戶相關的隱私威脅以及對現有隱私保護解決方案的分析。最後,咱們總結了關鍵的開放性挑戰,併爲將來的研究提供了方向,爲比特幣提供嚴格的安全和隱私解決方案。
10.引用:Fanti G, Viswanath P. Anonymity Properties of the Bitcoin P2P Network[J]. 2017.
被引量:3
摘要:Bitcoin is a popular alternative to fiat money, widely used for its perceived anonymity properties. However, recent attacks on Bitcoin’s peer-to-peer (P2P) network demonstrated that its gossip-based flooding protocols, which are used to ensure global network consistency, may enable user deanonymization the linkage of a user’s IP address with her pseudonym in the Bitcoin network. In 2015, the Bitcoin community responded to these attacks by changing the network’s flooding mechanism to a different protocol, known as diffusion.However, no systematic justification was provided for the change, and it is unclear if diffusion actually improves the system’s anonymity. In this paper, we model the Bitcoin networking stack and analyze its anonymity properties, both pre- and post-2015. In doing so, we consider new adversarial
models and spreading mechanisms that have not been previously studied in the source-finding literature. We theoretically prove that Bitcoin’s networking protocols (both pre- and post-2015) offer poor anonymity properties on networkswith a regular-tree topology. We validate this claimin simulation on a 2015 snapshot of the real Bitcoin P2P network topology.
比特幣是法訂貨幣的流行替代品,普遍用於其感知的匿名屬性。可是,最近的攻擊在比特幣的點對點(P2P)網絡上證實了這一點它基於八卦的泛洪協議,用於確保
全球網絡一致性,可使用戶去匿名化 - 用戶的IP地址與她的假名的連接比特幣網絡。 2015年,比特幣社區作出了迴應經過改變網絡洪水來應對這些攻擊機制到不一樣的協議,稱爲擴散。可是,沒有提供系統的理由變化,目前還不清楚擴散是否真的改善了系統的匿名性。在本文中,咱們對比特幣進行建模網絡堆棧和分析其匿名屬性,二者2015年以前和以後。在這樣作時,咱們考慮新的對抗性沒有的模型和傳播機制之前在源頭髮現文獻中研究過。咱們理論上證實比特幣的網絡協議(二者都有2015年以前和以後)在網絡上提供差的匿名屬性使用常規樹拓撲。咱們驗證了此聲明模擬真實比特幣P2P的2015年快照網絡拓撲結構。
11.引用:Neudecker T, Hartenstein H. Could Network Information Facilitate Address Clustering in Bitcoin?[C]// International Conference on Financial Cryptography and Data Security. Springer, Cham, 2017:155-169.
被引用量:3
摘要:Address clustering tries to break the privacy of bitcoin users by linking all addresses created by an individual user, based on information available from the blockchain. As an alternative information source, observations of the underlying peer-to-peer network have also been used to attack the privacy of users. In this paper, we assess whether combining blockchain and network information may facilitate the clustering process. For this purpose, we apply all applicable clustering heuristics that are known to us to current blockchain information and associate the resulting clusters with IP address information extracted from observing the message flooding process of the bitcoin network. The results indicate that only a small share of clusters (less than 8%) were conspicuously associated with a single IP address. Also, only a small number of IP addresses showed a conspicuous association with a single cluster.
地址羣集試圖經過連接由單個用戶建立的全部地址(基於區塊鏈中可用的信息)來破壞比特幣用戶的隱私。 做爲替代信息源,對底層對等網絡的觀察也被用於攻擊用戶的隱私。 在本文中,咱們評估組合區塊鏈和網絡信息是否能夠促進聚類過程。 爲此,咱們將咱們已知的全部適用的聚類啓發法應用於當前的區塊鏈信息,並將獲得的聚類與從觀察比特幣網絡的消息洪泛過程當中提取的IP地址信息相關聯。 結果代表,只有一小部分集羣(小於8%)明顯與單個IP地址相關聯。 此外,只有少數IP地址與單個羣集顯示出明顯的關聯。
12.引用:@incollection{NIPS2017_6735,title = {Deanonymization in the Bitcoin P2P Network},author = {Fanti, Giulia and Viswanath, Pramod},booktitle = {Advances in Neural Information Processing Systems 30},editor = {I. Guyon and U. V. Luxburg and S. Bengio and H. Wallach and R. Fergus and S. Vishwanathan and R. Garnett},
pages = {1364--1373},year = {2017},publisher = {Curran Associates, Inc.},url = {http://papers.nips.cc/paper/6735-deanonymization-in-the-bitcoin-p2p-network.pdf}}
url:http://papers.nips.cc/paper/6735-deanonymization-in-the-bitcoin-p2p-network
被引量:2
摘要:Recent attacks on Bitcoin's peer-to-peer (P2P) network demonstrated that its transaction-flooding protocols, which are used to ensure network consistency, may enable user deanonymization---the linkage of a user's IP address with her pseudonym in the Bitcoin network. In 2015, the Bitcoin community responded to these attacks by changing the network's flooding mechanism to a different protocol, known as diffusion. However, it is unclear if diffusion actually improves the system's anonymity. In this paper, we model the Bitcoin networking stack and analyze its anonymity properties, both pre- and post-2015. The core problem is one of epidemic source inference over graphs, where the observational model and spreading mechanisms are informed by Bitcoin's implementation; notably, these models have not been studied in the epidemic source detection literature before. We identify and analyze near-optimal source estimators. This analysis suggests that Bitcoin's networking protocols (both pre- and post-2015) offer poor anonymity properties on networks with a regular-tree topology. We confirm this claim in simulation on a 2015 snapshot of the real Bitcoin P2P network topology.
最近對比特幣的點對點(P2P)網絡的攻擊代表,其用於確保網絡一致性的事務氾濫協議能夠實現用戶的匿名化 - 用戶的IP地址與比特幣網絡中的假名的連接。 2015年,比特幣社區經過將網絡洪泛機制更改成不一樣的協議(稱爲擴散)來應對這些攻擊。然而,目前尚不清楚擴散是否真正改善了系統的匿名性。在本文中,咱們對比特幣網絡堆棧進行建模,並在2015年以前和以後分析其匿名屬性。核心問題是關於圖的流行病源推斷之一,其中觀察模型和傳播機制由比特幣的實施提供信息;值得注意的是,這些模型以前還沒有在流行病學檢測文獻中進行過研究。咱們識別並分析近乎最優的源估計器。該分析代表,比特幣的網絡協議(2015年以前和以後)在具備常規樹拓撲的網絡上提供了較差的匿名性。咱們在2015年真實比特幣P2P網絡拓撲快照的模擬中證明了這一主張。
13.引用:Author:Jad Wahab,Wednesday 18th April, 2018. Privacy in Blockchain Systems, url:https://arxiv.org/pdf/1809.10642.pdf.
被引量:0
摘要:In this literature review, we first briefly provide an introduction on the privacy aspect of blockchain systems and why it is a difficult quality to achieve, especially using traditional methods. Next, we go over a wide range of different strategies and techniques, along with theirrespective empirical implementations. Starting with approaches that attempted to provide privacy on Bitcoin/existing blockchain systems, then going into more advanced techniques, such as secure multi-party computations, ring signatures, and zero knowledge proofs, that construct a more advanced blockchain system from scratch with the objective of preserving privacy. Finally, we conclude that the current state of privacy on blockchains still needs work for it to be reliable. Nevertheless, the field of privacy in this domain is developing and advancing at a rapid rate.
在這篇文獻綜述中,咱們首先簡要介紹一下區塊鏈系統的隱私方面以及爲何它質量不好實現,特別是使用傳統方法。 接下來,咱們過去各類不一樣的策略和技巧,以及他們的各自的經驗實施。 從那些方法開始試圖在比特幣/現有區塊鏈系統上提供隱私,而後進入更高級的技術,例如安全的多方構造的計算,環簽名和零知識證實一個更先進的區塊鏈系統從頭開始與目標保護隱私。 最後,咱們得出結論,目前的狀態區塊鏈上的隱私仍然須要工做才能保證可靠性。儘管如此,這個領域的隱私領域正在發展和進步
快速的。
14.引用:Henry R, Herzberg A, Kate A. Blockchain Access Privacy: Challenges and Directions[J]. IEEE Security & Privacy, 2018, 16(4):38-45.
被引量:0
摘要:Privacy, facilitated by a confluence of cryptography and decentralization, is one of the primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy promise has proven illusory, and despite growing interest in privacy-centric blockchains, most blockchain users remain susceptible to privacy attacks that exploit network-layer information and access patterns that leak as users interact with blockchains. Understanding if and how blockchain-based applications can provide strong privacy guarantees is a matter of increasing urgency. Many researchers advocate using anonymous communications networks, such as Tor, to ensure access privacy. We challenge this approach, showing the need for mechanisms through which non-anonymous users can (i) publish transactions that cannot be linked to their network addresses or to their other transactions, and (ii) fetch details of specific transactions without revealing which transactions they seek. We hope this article inspires blockchain researchers to think beyond Tor and tackle these important access privacy problems head-on.
隱私,由密碼學和權力下放的融合促成,是採用像比特幣這樣的加密貨幣的主要動機之一。比特幣隱私承諾已被證實是虛幻的,儘管對以隱私爲中心的區塊鏈愈來愈感興趣,但大多數區塊鏈用戶仍然容易受到利用網絡層信息和訪問模式的隱私攻擊,這些模式會隨着用戶與區塊鏈交互而泄露。瞭解基於區塊鏈的應用程序是否以及如何提供強大的隱私保障是一個日益緊迫的問題。許多研究人員主張使用Tor等匿名通訊網絡來確保訪問隱私。咱們對此方法提出質疑,代表須要非匿名用戶能夠(i)發佈沒法連接到其網絡地址或其餘交易的交易的機制,以及(ii)獲取特定交易的詳細信息,而不會泄露他們的交易尋求。咱們但願本文能激發區塊鏈研究人員超越Tor的思考,並正面解決這些重要的訪問隱私問題。
15.引用:Ouaddah A, Elkalam A A, Ouahman A A. Towards a Novel Privacy-Preserving Access Control Model Based on Blockchain Technology in IoT[J]. 2017.
被引量:9
摘要:Access control face big challenges in IoT. Unfortunately, it is hard to implement current access control standards on smart object due to its constrained nature while the introduction of powerful and trusted third party to handle access control logic could harm user privacy. In this work we show how blockchain, the promising technology behind Bitcoin, can be very attractive to face those arising challenges. We therefore propose FairAccess as a new decentralized pseudonymous and privacy preserving authorization management framework that leverages the consistency of blockchain technology to manage access control on behalf of constrained devices.
訪問控制面臨着物聯網的巨大挑戰。 遺憾的是,因爲其受約束的性質,很難在智能對象上實現當前的訪問控制標準,而引入強大且可信的第三方來處理訪問控制邏輯可能會損害用戶隱私。 在這項工做中,咱們展現了區塊鏈(比特幣背後的有前途的技術)如何可以面對這些挑戰而很是具備吸引力。 所以,咱們建議將FairAccess做爲一種新的分散式假名和隱私保護受權管理框架,該框架利用區塊鏈技術的一致性來表明受約束設備管理訪問控制。
16.引用:Fan K, Ren Y, Wang Y, et al. Blockchain-based efficient privacy preserving and data sharing scheme of content-centric network in 5G[J]. Iet Communications, 2018, 12(5):527-532.
被引量:0
摘要:Now, the authors life is full of vast amount of information, the era of information has arrived. So the content-centric networks face severe challenges in dealing with a huge range of content requests, bringing protection and sharing concerns of the content. How to protect information in the network efficiently and securely for the upcoming 5G era has become a problem. The authors propose a scheme based on a blockchain to solve the privacy issues in content-centric mobile networks for 5G. The authors implement the mutual trust between content providers and users. Besides, the openness and tamper-resistant of the blockchain ledger ensure the access control and privacy of the provider. With the help of a miner, selected from users, the authors can maintain the public ledger expediently. Also, in return, the authors share the interesting data with low overhead, network delay and congestion, and then achieve green communication.
如今,做者的生活充滿了大量的信息,信息的時代已經到來。 所以,之內容爲中心的網絡在處理大量內容請求時面臨嚴峻挑戰,帶來內容的保護和共享問題。 如何在即將到來的5G時代有效且安全地保護網絡中的信息已經成爲一個問題。 做者提出了一種基於區塊鏈的方案,以解決5G內容中心移動網絡中的隱私問題。 做者實現了內容提供者和用戶之間的相互信任。 此外,區塊鏈分類賬的開放性和防篡改性確保了提供商的訪問控制和隱私。 在從用戶中選擇的礦工的幫助下,做者能夠方便地維護公共分類帳。 並且,做爲回報,做者以低開銷,網絡延遲和擁塞共享有趣的數據,而後實現綠色通訊。
17.引用:Ranshous S, Joslyn C A, Kreyling S, et al. Exchange Pattern Mining in the Bitcoin Transaction Directed Hypergraph[C]// International Conference on Financial Cryptography and Data Security. Springer, Cham, 2017:248-263.
被引用量:0
摘要:Bitcoin exchanges operate between digital and fiat currency networks, thus providing an opportunity to connect real-world identities to pseudonymous addresses, an important task for anti-money laundering efforts. We seek to characterize, understand, and identify patterns centered around exchanges in the context of a directed hypergraph model for Bitcoin transactions. We introduce the idea of motifs in directed hypergraphs, considering a particular 2-motif as a potential laundering pattern. We identify distinct statistical properties of exchange addresses related to the acquisition and spending of bitcoin. We then leverage this to build classification models to learn a set of discriminating features, and are able to predict if an address is owned by an exchange with >80% accuracy using purely structural features of the graph. Applying this classifier to the 2-motif patterns reveals a preponderance of inter-exchange activity, while not necessarily significant laundering patterns.
比特幣交易在數字和法訂貨幣網絡之間運做,從而提供了將現實身份與假名地址聯繫起來的機會,這是反洗錢工做的一項重要任務。 咱們尋求在比特幣交易的有向超圖模型的背景下,以交換爲中心來描述,理解和識別模式。 咱們在有向超圖中引入了圖案的概念,將特定的2圖案視爲潛在的洗錢模式。 咱們識別與比特幣的購置和支出相關的交換地址的不一樣統計特性。 而後,咱們利用它來構建分類模型以學習一組區分特徵,而且可以使用圖的純結構特徵來預測地址是否由具備> 80 %準確度的交換所擁有。 將該分類器應用於2-基序模式揭示了交換活動的優點,而不必定是重要的洗錢模式。
18.引用:Daniel Genkin, Dimitrios Papadopoulos, Charalampos Papamanthou Communications of the ACM, June 2018, Vol. 61 No. 6, Pages 78-88 doi:10.1145/3132696
被引量:0
摘要:While blockchain-based cryptocurrencies like Bitcoin do not directly reveal users' identities, they are often prone to deanonymization attacks. By observing the flow of transactions stored in the public blockchain, third parties can make accurate guesses about the identities of involved individuals.Existing privacy-enhancing techniques
for cryptocurrencies mostly come in two flavors: Mixing overlay protocols that can be executed on top of an existing cryptocurrency to hide the flow of funds among a set of participants, and alternative privacy-preserving cryptocurrencies that use advanced cryptographic techniques to achieve strong user privacy by design. We review and compare solutions from both techniques.
而基於區塊鏈的加密貨幣像比特幣不直接透露用戶'身份,他們每每傾向於去匿名化攻擊。 經過觀察存儲在中的事務流公共區塊鏈,第三方能夠作關於身份的準確猜想涉及的我的。現有的隱私加強技術加密貨幣主要是進來的兩種口味:混合覆蓋協議能夠在一個上面執行現有的加密貨幣來隱藏流量一組參與者中的資金,和替代隱私保護使用高級的加密貨幣加密技術實現強大的用戶隱私設計。咱們審查並比較來自的解決方案兩種技術。
下面是關於[以太坊隱私]的文獻.
19.引用:Kosba A, Miller A, Shi E, et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts[C]// Security and Privacy. IEEE, 2016:839-858.
被引量:127
摘要:Emerging smart contract systems over decentralized cryptocurrencies allow mutually distrustful parties to transact safely without trusted third parties. In the event of contractual breaches or aborts, the decentralized blockchain ensures that honest parties obtain commensurate compensation. Existing systems, however, lack transactional privacy. All transactions, including flow of money between pseudonyms and amount transacted, are exposed on the blockchain. We present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view. A Hawk programmer can write a private smart contract in an intuitive manner without having to implement cryptography, and our compiler automatically generates an efficient cryptographic protocol where contractual parties interact with the blockchain, using cryptographic primitives such as zero-knowledge proofs. To formally define and reason about the security of our protocols, we are the first to formalize the blockchain model of cryptography. The formal modeling is of independent interest. We advocate the community to adopt such a formal model when designing applications atop decentralized blockchains.
新興的智能合約系統優於分散的加密貨幣,容許相互不信任的各方在沒有可信第三方的狀況下安全地進行交易。在合同違約或停止的狀況下,分散的區塊鏈可確保誠實的當事人得到相應的賠償。然而,現有系統缺少交易隱私。全部交易,包括假名和交易金額之間的資金流動,均在區塊鏈中公開。咱們介紹Hawk,這是一種分散的智能合約系統,不會在區塊鏈中明確存儲金融交易,從而保留了公衆視角下的交易隱私。 Hawk程序員能夠直觀地編寫私有智能合約,而無需實施加密,咱們的編譯器會自動生成一種有效的加密協議,其中合同方與區塊鏈交互,使用加密原語,如零知識證實。爲了正式定義和推理咱們的協議的安全性,咱們是第一個正式化密碼學的區塊鏈模型。正式建模具備獨立的意義。咱們主張社區在分散區塊鏈上設計應用程序時採用這種正式模型。
20.引用:Galal H S. Verifiable Sealed-Bid Auction on the Ethereum Blockchain[C]// Finanacial Cryptography. 2018. 被引量:0 摘要:The success of the Ethereum blockchain as a decentralized application platform with a distributed consensus protocol has made many organizations start to invest into running their business on top of it. Technically, the most impressive feature behind Ethereum’s success is its support for a Turing complete language. On the other hand, the inherent transparency and, consequently, the lack of privacy poses a great challenge for many financial applications. In this paper, we tackle this challenge and present a smart contract for a verifiable sealed-bid auction on the Ethereum blockchain. In a nutshell, initially, the bidders submit homomorphic commitments to their sealed-bids on the contract. Subsequently, they reveal their commitments secretly to the auctioneer via a public key encryption scheme. Then, according to the auction rules, the auctioneer determines and claims the winner of the auction. Finally, we utilize interactive zero-knowledge proof protocols between the smart contract and the auctioneer to verify the correctness of such a claim. The underlying protocol of the proposed smart contract is partially privacy-preserving. To be precise, no information about the losing bids is leaked to the bidders. We provide an analysis of the proposed protocol and the smart contract design, in addition to the estimated gas costs associated with the different transactions 以太坊區塊鏈做爲具備分佈式共識協議的分散式應用平臺的成功使得許多組織開始投資於在其上運行業務。從技術上講,以太坊成功背後最使人印象深入的功能是它支持圖靈完整語言。另外一方面,固有的透明度以及所以缺少隱私對許多金融應用構成了巨大的挑戰。在本文中,咱們解決了這一挑戰,併爲以太坊區塊鏈的可驗證密封競標拍賣提供了明智的合約。簡而言之,最初,投標人向合同的密封投標提交同形承諾。隨後,他們經過公鑰加密方案祕密向買方揭露其承諾。而後,根據拍賣規則,拍賣師肯定並要求拍賣的獲勝者。最後,咱們利用智能合約和拍賣師之間的交互式零知識證實協議來驗證此類索賠的正確性。擬議的智能合約的基本協議部分隱私保護。確切地說,沒有關於失敗投標的信息泄露給投標人。除了與不一樣交易相關的估計自然氣成本以外,咱們還提供了對擬議協議和智能合約設計的分析