Journal of Xidian University ›› 2020, Vol. 47 ›› Issue (5): 28-39.doi: 10.19665/j.issn1001-2400.2020.05.005
• Speciall Issue: Blockchain Technology and Its Progress • Previous Articles Next Articles
WANG Hui(),WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying
Received:
2020-05-20
Online:
2020-10-20
Published:
2020-11-06
CLC Number:
WANG Hui,WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying. Research on key technology of blockchain privacy protection and scalability[J].Journal of Xidian University, 2020, 47(5): 28-39.
"
区块链系统 | 共识协议 | 扩容方式 | 隐私保护方式 |
---|---|---|---|
比特币 | PoW | 侧链、闪电网络、PeerCensus、Byzcoin、ELASTICO | |
以太坊 | PoW/PoS | Prism、Plasma、TrueBit、zk-Rollup、Piperine、zokrate | zk-SNARKs |
Zerocash | PoW | 侧链、闪电网络 | zk-SNARKs、哈希承诺 |
Bitcoin-NG | PoW | 一次生成多个区块 | |
IOTA | PoW | DAG结构 | IOTA信任模型 |
Algorand | PoS+BFT | 混合共识协议 | |
Omniledger | PoS+PBFT | 分片 | |
Rapidchain | PoS+BFT | 分片 | |
Monoxide | PoW | 分片 | |
Coda | PoS | 零知识证明递归压缩 | zk-SNARKs |
[1] | NAKAMOTO S. Bitcoin: a Peer-to-peer Electronic Cash System[EB/OL]. [2020-04-26]. https://bitcoin.org/bitcoin.pdf. |
[2] | BUTERIN V. A Next-generation Smart Contract and Decentralized Application Platform[EB/OL]. [2020-04-26]. http://www.fintech.academy/wp-content/uploads/2016/06/EthereumWhitePaper.pdf. |
[3] |
GRIGGS K N, OSSIPOVA O, KOHLIOS C P, et al. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring[J]. Journal of Medical Systems, 2018,42(7):130-138.
doi: 10.1007/s10916-018-0982-x pmid: 29876661 |
[4] | Libra. Libra White Paper[EB/OL].[2020-04-26]. https://libra.org/en-US/white-paper/. |
[5] | 蒋照生, 孙宇林, 王瑞娇. 等. 人民币3.0----中国央行数字货币:运行框架与技术解析[EB/OL]. [2020-04-26]. http://www.huanjing100.com/p-10034.html. |
[6] | MEIKLEJOHN S, POMAROLE M, JORDAN G, et al. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names [C]//Proceedings of the 20133 ACM SIGCOMM Internet Measurement Conference. New York: ACM, 2013: 127-139. |
[7] | NOETHER S. Ring ConfidentialTransactions[J/OL]. [2020-04-26].https://eprint.iacr.org/2015/1098.pdf. |
[8] | BEN-SASSON E, CHIESA A, GARMAN C, et al. Zerocash: Decentralized Anonymous Payments from Bitcoin [C]//Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2014: 459-0474. |
[9] | SWAN M. Blockchain: Blueprint for a New Economy[M/OL]. [2020-04-26]. http://donkasprzak.com/blockchain-blueprint/. |
[10] | TULLOH B. Smart Contracts[EB/OL]. [2020-04-26]. http://www.erights.org/smart-contracts/index.html. |
[11] | MILLER M S, STIEGLER M. The Digital Path: Smart Contracts and the Third World[EB/OL]. [2020-04-26]. http://www.erights.org/talks/pisa/paper/. |
[12] | Etherscan. Ethereum Blockchain Explorer[EB/OL].[2020-04-26]. https://cn.etherscan.com/. |
[13] | GRIGG I. EOS-An introduction[EB/OL]. [2020-04-26]. https://iang.org/papers/EOS_An_Introduction.pdf. |
[14] | CASTRO M, LISKOV B. Practical Byzantine Fault Tolerance and Proactive Recovery[J]. ACM Transactions on Computer Systems, 2002,20(4):398-0461. |
[15] | RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret [C]//Lecture Notes in Computer Science: 2248. Heidelberg: Springer Verlag, 2001: 552-565. |
[16] | LIU J K, WEI, V K, WONG D S. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups [C]//Lecture Notes in Computer Science: 3108. Heidelberg: Springer Verlag, 2004: 325-335. |
[17] | BACK A. Ring Signature Efficiency[C/OL]. [2020-04-26].https://bitcointalk.org/index.php. |
[18] | FUJISAKI E, SUZUKI K. Traceable Ring Signature [C]//Lecture Notes in Computer Science: 4450. Heidelberg: Springer Verlag, 2007: 181-200. |
[19] | VAN SABERHAGEN N. Cryptonote V 2.0.[EB/OL]. [2020-04-26]. https://www.mendeley.com/catalogue/7e4cdb00-7955-30e1-9185-32a1801bd94b/. |
[20] | SUN S F, AU M H, LIU J K, et al. Ringct 2.0: a Compact Accumulator-based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero [C]//Lecture Notes in Computer Science: 10493. Heidelberg: Springer Verlag, 2017: 456-474. |
[21] | YUEN T H, SUN S F, LIU J K, et al. Ringct 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security [C]//Lecture Notes in Computer Science: 12059. Heidelberg: Springer, 2020: 464-483. |
[22] |
LI Y, YANG G, SUSILO W, et al. Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability[J]. IEEE Transactions on Dependable and Secure Computing , 2019, DOI: 10.1109/TDSC.2019.2910058.
doi: 10.1109/TDSC.2012.11 pmid: 24489520 |
[23] | WANG L, SHEN X, LI J, et al. Cryptographic Primitives in Blockchains[J]. Journal of Network and Computer Applications, 2019,127:43-58. |
[24] | TSANG P P, WEI V K. Short Linkable Ring Signatures for E-voting, E-cash and Attestation [C]//Lecture Notes in Computer Science: 3439. Heidelberg: Springer Verlag, 2005: 48-60. |
[25] | AU M H, CHOW S S M, SUSILO W, et al. Short Linkable Ring Signatures Revisited[C]//Lecture Notes in Computer Science: 4043. Heidelberg: Springer Verlag, 2006: 101-115. |
[26] | AU M H, LIU J K, SUSILO W, et al. Secure Id-based Linkable and Revocable-iff-linked Ring Signature with Constant-size Construction[J]. Theoretical Computer Science, 2013,469:1-14. |
[27] | MAXWELL G, POELSTRA A. Borromean Ring Signatures[EB/OL]. [2020-04-26]. http://diyhpl.us/~bryan/papers2/bitcoin/Borromean%20ring%20signatures.pdf. |
[28] | BLUM M, FELDMAN P, MICALI S. Non-Interactive Zero-Knowledge and Its Applications [C]//Proceedings of the 1988 Annual ACM Symposium on Theory of Computing. New York: ACM, 1988: 103-112. |
[29] | BEN-SASSON E, CHIESA A, TROMER E, et al. Succinct Non-interactive Zero Knowledge for a Von Neumann Architecture [C]//Proceedings of the 2014 23rd USENIX Security Symposium. Berkeley: USENIX Association, 2014: 781-796. |
[30] | BEN-SASSON E, CHIESA A, GREEN M, et al. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs [C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 287-304 |
[31] | BEN-SASSON E, BENTOV L, HORESH Y, et al. Scalable Zero Knowledge with No Trusted Setup [C]//Lecture Notes in Computer Science: 11694. Heidelberg: Springer Verlag, 2019: 701-732. |
[32] | Suterusu. Suterusu Yellowpaper (V 0.2)[EB/OL]. [2020-04-26]. https://www.suterusu.io/#pwa__technology. |
[33] | BUNZ B, BOOTLE J, BONEH D, et al. Bulletproofs: Short Proofs for Confidential Transactions and More [C]//Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 315-334 |
[34] | DAMGARD I, NIELSEN J, POLYCHRONIADOU A, et al. On the Communication Required for Unconditionally Secure Multiplication [C]//Lecture Notes in Computer Science: 9815. Heidelberg: Springer Verlag, 2016: 459-488. |
[35] | ZHOU L, WANG L, SUN Y, et al. AntNest: Fully Non-Interactive Secure Multi-Party Computation[J]. IEEE Access, 2018,6:75639-75649. |
[36] | BENHAMOUDA F, HALEVI S, HALEVI T. Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation [C]//Proceedings of the 2018 IEEE International Conference on Cloud Engineering. Piscataway: IEEE, 2018: 357-363. |
[37] | PEDERSEN T P. Non-interactive and Information-theoretic Secure Verifiable Secret Sharing [C]//Lecture Notes in Computer Science: 576. Heidelberg: Springer Verlag, 1992: 129-140. |
[38] | BUNZ B, BOOTLE J, BONEH D, et al. Bulletproofs: Efficient Range Proofs for Confidential Transactions[C/OL]. [2020-04-26].https://eprint.iacr.org/2017/1066.pdf. |
[39] | NARULA N, VASQUEZ W, VIRZA M. Privacy-preserving Auditing for Distributed Ledgers [C]// Proceedings of the 2018 15th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2018: 65-80. |
[40] | CATALANO D, FIORE D. Vector Commitments and Their Applications [C]//Lecture Notes in Computer Science: 7778. Heidelberg: Springer Verlag, 2013: 55-72. |
[41] | LAI R W F, MALAVOLTA G. Subvector Commitments with Application to Succinct Arguments [C]//Lecture Notes in Computer Science: 11692. Heidelberg: Springer Verlag, 2019: 530-560. |
[42] | EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: a Scalable Blockchain Protocol [C]//Proceedings of the 2016 13th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2016: 45-59. |
[43] | GILAD Y, HEMO R, MICALI S, et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies [C]//Proceedings of the 2017 26th Symposium on Operating Systems Principles. New York: ACM, 2017: 51-68. |
[44] | DECKER C, SEIDEL J, WATTENHOFER R. Bitcoin Meets Strong Consistency [C]//Proceedings of the 2016 17th International Conference on Distributed Computing and Networking. New York: ACM, 2016: a13. |
[45] | ABRAHAM I, MALKHI D, NAYAK K, et al. Solida: a Blockchain Protocol Based on Reconfigurable Byzantine Consensus[CP/OL]. [2020-04-26].https://arxiv.org/pdf/1612.02916.pdf. |
[46] | KOKORIS-KOGIAS E, JOVANOVIC P, GAILLY N, et al. Enhancing Bitcoin Security and Performance with Strong Consistency Via Collective Signing [C]//Proceedings of the 2016 25th USENIX Security Symposium. Berkeley: USENIX Association, 2016: 279-296. |
[47] | LUU L, NARAYANAN V, ZHENG C, et al. A Secure Sharding Protocol for Open Blockchains [C]// Proceedings of the 2016 ACM Conference on Computer and Communications Security. New York: ACM, 2016: 17-30. |
[48] | KOKORIS-KOGIAS E, JOVANOVIC P, GASSER L, et al. OmniLedger: a Secure, Scale-out, Decentralized Ledger via Sharding [C]//Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 583-598. |
[49] | ZAMANI M, MOVAHEDI M, RAYKOVA M. RapidChain: Scaling Blockchain Via Full Sharding [C]//Proceedings of the 2018 ACM Conference on Computer and Communications Security. New York: ACM, 2018: 931-948. |
[50] | WANG J, WANG H. Monoxide: Scale out Blockchains with Asynchronous Consensus Zones [C]// Proceedings of the 2019 16th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2019: 95-112. |
[51] | MCELHANEY J W. The Tangle[J]. Aba Journal, 2004,90(5):26-27. |
[52] | YANG L, BAGARIA V, WANG G, et al. Prism: Scaling Bitcoin by 10,000x[J/OL]. [2020-04-23].https://arxiv.org/pdf/1909.11261.pdf. |
[53] | POON J, BUTERIN V. Plasma: Scalable Autonomous Smart Contracts[J/OL]. [2020-04-23].https://plasma.io/plasma.pdf. |
[54] | JASON T, CHRISTIAN R. A Scalable Verification Solution for Blockchains[J/OL]. [2020-04-23]. https: //arxiv.org/pdf/1908.04756.pdf. |
[55] | WHITEHAT B, GLUCHOWSKI A, HARRY R, et al. Roll_up / roll_back snark side chain ~17000tps. [EB/OL].[2020-04-23].https://ethresear.ch/t/roll-up-roll-backsnark-side-chain-17000-tps/3675. |
[56] | BONNEAU J, MECKLER I, RAO V, et al. Coda: Decentralized Cryptocurrency at Scale[J/OL]. [2020-04-29]. https://eprint.iacr.org/2020/352.pdf. |
[57] | LEE J, NIKITIN K, SETTY S. Replicated State Machines without Replicated Execution[C/OL]. [2020-04-29].https://nikirill.com/files/piperine.pdf. |
[58] | EBERHARDT J, TAI S. ZoKrates - Scalable Privacy-Preserving Off-Chain Computations[C/OL]. [2020-04-29].https://ieeexplore.ieee.org/document/8726497. |
[59] | DRYJA T. Utreexo: A Dynamic Hash-based Accumulator Optimized for the Bitcoin UTXO Set[J/OL]. [2020-04-29]. https://eprint.iacr.org/2019/611.pdf. |
[1] | ZHAI Sheping, CAO Yongqiang, YANG Rui, ZHANG Ruiting. Algorithm for byzantine fault-tolerant consensus to support dynamic feedback decision-making [J]. Journal of Xidian University, 2024, 51(6): 132-148. |
[2] | LI Xiaohan, YANG Yanbo, ZHANG Jiawei, LI Baoshan, MA Jianfeng. Graph neural network vulnerability detection for ethernet smart contracts [J]. Journal of Xidian University, 2024, 51(4): 139-150. |
[3] | ZHAI Sheping, ZHANG Ruiting, YANG Rui, CAO Yongqiang. Blockchain searchable encryption scheme for multi-user environment [J]. Journal of Xidian University, 2024, 51(4): 151-169. |
[4] | PENG Yongxiang, MA Yong, LIU Zhiquan, WANG Libo, WU Yongdong, CHEN Ning, TANG Yong. Efficient smart contract testing scheme supporting transactions filtering [J]. Journal of Xidian University, 2024, 51(3): 194-202. |
[5] | ZHAI Sheping, LU Xianjing, HUO Yuanyuan, YANG Rui. Improved data sharing scheme based on conditional broadcast proxy re-encryptionn [J]. Journal of Xidian University, 2024, 51(2): 224-238. |
[6] | GUO Qing, TIAN Youliang. Medicaldata privacy protection scheme supporting controlled sharing [J]. Journal of Xidian University, 2024, 51(1): 165-176. |
[7] | PENG Yongxiang, LIU Zhiquan, WANG Libo, WU Yongdong, MA Jianfeng, CHEN Ning. Contract vulnerability repair scheme supporting inline data processing [J]. Journal of Xidian University, 2024, 51(1): 178-186. |
[8] | ZHOU Hao,MA Jianfeng,LIU Zhiquan,WANG Libo,WU Yongdong,FAN Wenjie. Blockchain-assisted solution for emergency message trust evaluation in the VANET [J]. Journal of Xidian University, 2023, 50(4): 148-156. |
[9] | LIU Yuanzhen, YANG Yanbo, ZHANG Jiawei, LI Baoshan, MA Jianfeng. Blockchain scheme for anti malicious nodes in distributed machine learning [J]. Journal of Xidian University, 2023, 50(2): 178-187. |
[10] | LI Wenhua,DONG Lihua,ZENG Yong. Analysis and improvement of the security of the key-nets homomorphic encryption scheme [J]. Journal of Xidian University, 2023, 50(1): 192-202. |
[11] | REN Yanli,ZHAI Mengjuan,HU Mingqi. Fair redactable blockchain supporting malicious punishment [J]. Journal of Xidian University, 2023, 50(1): 203-212. |
[12] | ZHANG Haibo,BIAN Xia,XU Yongjun,XIANG Shengting,HE Xiaofan. Blockchain-assisted vehicle reputation management method for VANET [J]. Journal of Xidian University, 2022, 49(4): 49-59. |
[13] | ZENG Huixiang,XI Ning,XIE Qingqing,LV Jing,CUI Zhihao,MA Jianfeng. Decentralized ciphertext sharing based on blockchain [J]. Journal of Xidian University, 2022, 49(2): 135-145. |
[14] | PAN Senshan,XU Lamei. DorChain:Utilization of dormant coins to improve the transaction verification efficiency [J]. Journal of Xidian University, 2022, 49(2): 182-189. |
[15] | SUN Rong,ZHENG Huihui,LIU Jingwei. Design of an online caching scheme in fog networks [J]. Journal of Xidian University, 2022, 49(2): 36-41. |
|