检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:沈蒙[1] 车征 祝烈煌[1] 徐恪[3,4] 高峰 余聪聪[2] 吴言 SHEN Meng;CHE Zheng;ZHU Lie-Huang;XU Ke;GAO Feng;YU Cong-Cong;WU Yan(School of Cyberspace Science and Technology,Beijing Institute of Technology,Beijing 100081;School of Computer Science and Technology,Beijing Institute of Technology,Beijing 100081;Department of Computer Science and Technology,Tsinghua University,Beijing 100084;Beijing National Research Center for Information Science and Technology,Beijing 100084)
机构地区:[1]北京理工大学网络空间安全学院,北京100081 [2]北京理工大学计算机学院,北京100081 [3]清华大学计算机科学与技术系,北京100084 [4]北京信息科学与技术国家研究中心,北京100084
出 处:《计算机学报》2023年第1期125-146,共22页Chinese Journal of Computers
基 金:国家重点研发计划(2020YFB1006101);北京市科技新星计划(Z201100006820006);国家自然科学基金(61825204,61932016,61972039,62132011,62222201);北京高校卓越青年科学家计划项目(BJJWZYJH01201910003011);北京市自然科学基金(4192050)资助.
摘 要:近年来,以区块链技术为基础的加密数字货币持续涌现,受到各方的广泛关注.与传统的支付方式相比,区块链数字货币具有去中心化特性,支持交易匿名性.然而,匿名性也为不法行为提供了隐匿的便利条件,使得区块链数字货币日益成为洗钱、勒索等违法犯罪活动的支付媒介.因此,区块链数字货币匿名性保护和对抗技术是当前研究的热点问题.本文首先对交易匿名性的内涵进行了深入剖析,将其归纳为不可标识性、不可链接性和不可追踪性三个方面.以此为指导,对区块链数字货币的匿名性保护技术和匿名性对抗技术进行了介绍,并开展了对比分析.最后,本文总结了区块链数字货币匿名性研究所面临的挑战和未来的发展趋势.In recent years,cryptocurrencies based on blockchain technology have emerged and attracted widespread attention from various parties.Compared with traditional payment methods,cryptocurrency has the characteristics of decentralization and supports transaction anonymity.However,anonymity also provides hidden conveniences for illegal activities,making cryptocurrency increasingly a payment medium for money laundering,extortion,and other illicit activities.Therefore,cryptocurrency anonymity protection and countermeasures technology are a hot issue for current research.The research on the anonymity of cryptocurrency transactions mainly focuses on protecting transaction anonymity and the confrontation of anonymity.In terms of transaction anonymity protection,researchers mostly use zero-knowledge proof,Tor network,and other anonymity technologies to ensure the anonymity of users in the entire transaction process from different perspectives.Regarding the confrontation of anonymity,the researchers mainly combined the transaction information disclosed in the blockchain ledger and the dissemination data in the network layer to analyze the transaction traces left by users in the transaction process from different perspectives.In this paper,we first give an in-depth analysis of transaction anonymity's connotation and summarize it into three aspects:(1)Unidentifiability.For a given transaction,the observer cannot identify the true identity of the transaction participants in the physical world.(2)Unlinkability.For a given two transactions(at most,one of which is sent by the observer),the observer cannot determine whether they are paid to the same user.Also,the observer cannot determine whether the same user-initiated them.(3)Untraceability.For a given transaction,the observer cannot trace the flow of funds between the address to which the transaction was sent and the address to which the transaction was received.Then,we group the existing anonymity protection schemes into three categories according to the different focuses:(1)Un
分 类 号:TP391[自动化与计算机技术—计算机应用技术]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:18.117.92.75