A Survey on Privacy Protection of Blockchain: The Technology and Application
暂无分享,去创建一个
[1] Daniel Joseph,et al. SHARVOT: Secret SHARe-Based VOTing on the Blockchain , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).
[2] Benjamin Aziz,et al. Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - , 2017, IoTBDS.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Yingshu Li,et al. Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.
[5] Bing Pan,et al. A Survey of Privacy-Preserving Techniques for Blockchain , 2019, ICAIS.
[6] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[7] Zhang Fengwei,et al. A Study of Using TEE on Edge Computing , 2019 .
[8] Mohamed Baza,et al. Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval , 2019, 2019 International Conference on Smart Applications, Communications and Networking (SmartNets).
[9] Bharat K. Bhargava,et al. A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing , 2019, IEEE Transactions on Industrial Informatics.
[10] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[11] Brian Neil Levine,et al. Sybil-Resistant Mixing for Bitcoin , 2014, WPES.
[12] Jeremy Clark,et al. Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.
[13] Markku-Juhani O. Saarinen. Arithmetic coding and blinding countermeasures for lattice signatures , 2018, Journal of Cryptographic Engineering.
[14] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[15] Huanguo Zhang. Research and Development of Trusted Computing in China , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.
[16] Michael S. Kester,et al. Bitcoin Transaction Graph Analysis , 2015, ArXiv.
[17] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[18] Yang Gao,et al. An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.
[19] Matthew Green,et al. Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.
[20] Adam Mackenzie,et al. MRL-0004 Improving Obfuscation in the CryptoNote Protocol , 2015 .
[21] Gang Qu,et al. BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[22] Heekuck Oh,et al. A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin , 2014, WISA.
[23] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[24] Jianping Yu,et al. A Blind-Mixing Scheme for Bitcoin based on an Elliptic Curve Cryptography Blind Digital Signature Algorithm , 2015, ArXiv.
[25] Shen Noether,et al. Ring Confidential Transactions , 2016, Ledger.
[26] Ivan Damgård,et al. Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..
[27] Prateek Saxena,et al. A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.
[28] Klaus Wehrle,et al. CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.
[29] Khaled Salah,et al. Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.
[30] Sherali Zeadally,et al. A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..
[31] Iddo Bentov,et al. Sprites and State Channels: Payment Networks that Go Faster Than Lightning , 2017, Financial Cryptography.
[32] Ethan Heilman,et al. Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.
[33] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[34] Fabio Antonelli,et al. IoT data privacy via blockchains and IPFS , 2017, IOT.
[35] Mihir Bellare,et al. The Security of Cipher Block Chaining , 1994, CRYPTO.
[36] Gao Feng,et al. Survey on Privacy Preserving Techniques for Blockchain Technology , 2017 .
[37] Cong Wang,et al. Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.
[38] George Danezis,et al. Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.
[39] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[40] Raylin Tso,et al. Distributed E-Voting and E-Bidding Systems Based on Smart Contract , 2019, Electronics.
[41] Baocheng Wang,et al. Large-scale Election Based On Blockchain , 2017, IIKI.
[42] C Karthik,et al. An Overview of Blockchain Technology , 2018, International Research Journal of Electronics and Computer Engineering.
[43] Zhipeng Cai,et al. A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.
[44] Guishan Dong,et al. 区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application) , 2019, 计算机科学.
[45] Alex Pentland,et al. Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.
[46] Kevin Lee,et al. An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.
[47] Elaine Shi,et al. Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).
[48] Yael Tauman Kalai,et al. How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.
[49] Yang Gao,et al. Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems , 2018, Comput. Networks.
[50] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[51] Christian Decker,et al. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.
[52] Feng Hao,et al. Towards Bitcoin Payment Networks , 2016, ACISP.
[53] Pedro Moreno-Sanchez,et al. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.
[54] Nicolas Courtois,et al. Stealth Address and Key Management Techniques in Blockchain Systems , 2017, ICISSP.
[55] Luke Valenta,et al. Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.
[56] Yu Hui,et al. Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction , 2018 .
[57] Matthew Green,et al. Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.
[58] David Chaum,et al. Group Signatures , 1991, EUROCRYPT.
[59] Nazim Faour. Transparent Voting Platform Based on Permissioned Blockchain , 2018, ArXiv.
[60] Ethan Heilman,et al. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.
[61] Pedro Moreno-Sanchez,et al. ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin , 2017, Financial Cryptography Workshops.