检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:林定康 颜嘉麒 巴·楠登 符朕皓 姜皓晨 LIN Dingkang;YAN Jiaqi;BA Nandeng;FU Zhenhao;JIANG Haochen(School of Information Management,Nanjing University,Nanjing Jiangsu 210023,China)
出 处:《计算机应用》2022年第1期148-156,共9页journal of Computer Applications
基 金:江苏“333高层次人才培养工程”科研项目(BRA2020276);南京大学2021年双创大数据与理论研究双创项目。
摘 要:虚拟数字货币为恐怖分子融资、洗钱、毒品交易等犯罪活动提供了温床,而门罗币作为新兴数字货币的代表,具有公认的高匿名性。针对利用门罗币匿名性犯罪的问题,从技术角度探索门罗币匿名技术及其追踪技术,综述近年来的研究进展,从而为有效应对基于区块链技术的犯罪提供技术支持。具体来说,总结了门罗币匿名技术的演进,并梳理了学术界关于门罗币匿名技术的追溯对策。首先,在匿名技术中,介绍了环签名、保证不可链接性(一次性公钥)、保证不可追溯性、提高匿名性的重要版本升级等。然后,在追踪技术中,介绍了0-mixin攻击、输出合并攻击、最新猜测攻击、封闭集攻击、泛洪攻击、恶意远程节点攻击、钱包环攻击等攻击方法。最后,基于对匿名技术和追溯对策的分析,得出了四点结论:门罗币的匿名技术和追踪技术的发展相互促进;RingCT的应用是一把双刃剑,既使得从币值出发的被动攻击方法失效,也使得主动攻击方法更加容易奏效;输出合并攻击和0-mixin攻击具有互补作用;门罗币的系统安全链条仍待理顺。Virtual digital currency provides a breeding ground for terrorist financing,money laundering,drug trafficking and other criminal activities.As a representative emerging digital currency,Monero has a universally acknowledged high anonymity.Aiming at the problem of using Monroe anonymity to commit crimes,Monero anonymity technology and tracking technology were explored as well as the research progresses were reviewed in recent years,so as to provide technical supports for effectively tackling the crimes based on blockchain technology.In specific,the evolution of Monero anonymity technology was summarized,and the tracking strategies of Monero anonymity technology in academic circles were sorted out.Firstly,in the anonymity technologies,ring signature,guaranteed unlinkability(one-off public key),guaranteed untraceability,and the important version upgrading for improving anonymity were introduced.Then,in tracking technologies,the attacks such as zero mixin attack,output merging attack,guess-newest attack,closed set attack,transaction flooding attack,tracing attacks from remote nodes and Monero ring attack were introduced.Finally,based on the analysis of anonymity technologies and tracking strategies,four conclusions were obtained:the development of anonymity technology and the development of tracking technology of Monero promote each other;the application of Ring Confidential Transactions(RingCT)is a two-edged sword,which makes the passive attack methods based on currency value ineffective,and also makes the active attack methods easier to succeed;output merging attack and zero mixin attack complement each other;Monero’s system security chain still needs to be sorted out.
关 键 词:区块链 门罗币 数字货币 追踪技术 匿名技术 文献综述 环签名
分 类 号:TP311.13[自动化与计算机技术—计算机软件与理论] TP309[自动化与计算机技术—计算机科学与技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.216.45.133