A survey on privacy protection in blockchain system
暂无分享,去创建一个
Sherali Zeadally | Debiao He | Muhammad Khurram Khan | Qi Feng | Neeraj Kumar | Neeraj Kumar | D. He | S. Zeadally | M. Khan | Qi Feng | De-biao He
[1] Muneeb Ali,et al. Blockstack: A Global Naming and Storage System Secured by Blockchains , 2016, USENIX Annual Technical Conference.
[2] Andreas Unterweger,et al. Privacy-preserving blockchain-based electric vehicle charging with dynamic tariff decisions , 2018, Computer Science - Research and Development.
[3] Tomi Dahlberg,et al. Digital Supply Chain Transformation toward Blockchain Integration , 2017, HICSS.
[4] Adam Doupé,et al. Behind closed doors: measurement and analysis of CryptoLocker ransoms in Bitcoin , 2016, 2016 APWG Symposium on Electronic Crime Research (eCrime).
[5] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[6] Paul Schott. Reference Guide to Anti-Money Laundering and Combating the Financing of Terrorism , 2006 .
[7] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[8] D. Engel,et al. Privacy-Preserving Smart Grid Tariff Decisions with Blockchain-Based Smart Contracts , 2018 .
[9] Jeremy Clark,et al. SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies , 2015, 2015 IEEE Symposium on Security and Privacy.
[10] Melanie Swan,et al. Blockchain: Blueprint for a New Economy , 2015 .
[11] Koutarou Suzuki,et al. Traceable Ring Signature , 2007, Public Key Cryptography.
[12] Elaine Shi,et al. Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab , 2016, Financial Cryptography Workshops.
[13] Don Tapscott,et al. Blockchain Revolution: How the Technology Behind Bitcoin Is Changing Money, Business, and the World , 2016 .
[14] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[15] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[16] Martin Gill,et al. Preventing Money Laundering or Obstructing Business?: Financial Companies' Perspectives on 'Know Your Customer' Procedures , 2004 .
[17] Salil S. Kanhere,et al. Blockchain in internet of things: Challenges and Solutions , 2016, ArXiv.
[18] Tsz Hon Yuen,et al. RingCT 2.0: A Compact Accumulator-Based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero , 2017, ESORICS.
[19] Soohyung Kim,et al. Managing IoT devices using blockchain platform , 2017, 2017 19th International Conference on Advanced Communication Technology (ICACT).
[20] Jan Vornberger,et al. Marker addresses: Adding identification information to Bitcoin transactions to leverage existing trust relationships , 2012, GI-Jahrestagung.
[21] Shen Noether,et al. Ring Confidential Transactions , 2016, Ledger.
[22] Nick Szabo,et al. Formalizing and Securing Relationships on Public Networks , 1997, First Monday.
[23] Jiankun Hu,et al. Preserving transaction privacy in bitcoin , 2017, Future Gener. Comput. Syst..
[24] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[25] Manuel Blum,et al. Non-interactive zero-knowledge and its applications , 1988, STOC '88.
[26] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[27] Stefan Savage,et al. A fistful of bitcoins: characterizing payments among men with no names , 2013, Internet Measurement Conference.
[28] Eiichiro Fujisaki. Sub-linear Size Traceable Ring Signatures without Random Oracles , 2011, CT-RSA.
[29] David Vandervort,et al. Challenges and Opportunities Associated with a Bitcoin-Based Transaction Rating System , 2014, Financial Cryptography Workshops.
[30] Ethan Heilman,et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.
[31] Peng Jiang,et al. A Survey on the Security of Blockchain Systems , 2017, Future Gener. Comput. Syst..
[32] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[33] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[34] Bo Qin,et al. Cecoin: A decentralized PKI mitigating MitM attacks , 2017, Future Gener. Comput. Syst..
[35] Henry M. Kim,et al. Towards an Ontology-Driven Blockchain Design for Supply Chain Provenance , 2016, Intell. Syst. Account. Finance Manag..
[36] Luke Valenta,et al. Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.
[37] Klaus Wehrle,et al. CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.
[38] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[39] Sarah Underwood,et al. Blockchain beyond bitcoin , 2016, Commun. ACM.
[40] Sebastian Feld,et al. Analyzing the Deployment of Bitcoin's P2P Network under an AS-level Perspective , 2014, ANT/SEIT.
[41] Ethan Heilman,et al. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.
[42] Brian Neil Levine,et al. Sybil-Resistant Mixing for Bitcoin , 2014, WPES.
[43] R. Monfared,et al. Blockchain ready manufacturing supply chain using distributed ledger , 2016 .
[44] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[45] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[46] Zibin Zheng,et al. Blockchain challenges and opportunities: a survey , 2018, Int. J. Web Grid Serv..
[47] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[48] Daniel Genkin,et al. Privacy in decentralized cryptocurrencies , 2018, Commun. ACM.
[49] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[50] Dragos Velicanu,et al. A Decentralized Public Key Infrastructure with Identity Retention , 2014, IACR Cryptol. ePrint Arch..
[51] Sooyong Park,et al. Where Is Current Research on Blockchain Technology?—A Systematic Review , 2016, PloS one.
[52] Marc Pilkington,et al. Blockchain Technology: Principles and Applications , 2015 .
[53] Arafatur Rahman,et al. Blockchain Security Hole: Issues and Solutions , 2017 .
[54] Alex Biryukov,et al. Bitcoin over Tor isn't a Good Idea , 2014, 2015 IEEE Symposium on Security and Privacy.
[55] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[56] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[57] Juan Carlos De Martin,et al. Blockchain for the Internet of Things: A systematic literature review , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[58] Joseph K. Liu,et al. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract) , 2004, ACISP.
[59] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.