Journal of Xidian University ›› 2020, Vol. 47 ›› Issue (5): 28-39.doi: 10.19665/j.issn1001-2400.2020.05.005
• Speciall Issue: Blockchain Technology and Its Progress • Previous Articles Next Articles
WANG Hui(),WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying
Received:
2020-05-20
Online:
2020-10-20
Published:
2020-11-06
CLC Number:
WANG Hui,WANG Licheng,BAI Xue,LIU Qinghua,SHEN Xiaoying. Research on key technology of blockchain privacy protection and scalability[J].Journal of Xidian University, 2020, 47(5): 28-39.
"
区块链系统 | 共识协议 | 扩容方式 | 隐私保护方式 |
---|---|---|---|
比特币 | PoW | 侧链、闪电网络、PeerCensus、Byzcoin、ELASTICO | |
以太坊 | PoW/PoS | Prism、Plasma、TrueBit、zk-Rollup、Piperine、zokrate | zk-SNARKs |
Zerocash | PoW | 侧链、闪电网络 | zk-SNARKs、哈希承诺 |
Bitcoin-NG | PoW | 一次生成多个区块 | |
IOTA | PoW | DAG结构 | IOTA信任模型 |
Algorand | PoS+BFT | 混合共识协议 | |
Omniledger | PoS+PBFT | 分片 | |
Rapidchain | PoS+BFT | 分片 | |
Monoxide | PoW | 分片 | |
Coda | PoS | 零知识证明递归压缩 | zk-SNARKs |
[1] | NAKAMOTO S. Bitcoin: a Peer-to-peer Electronic Cash System[EB/OL]. [2020-04-26]. https://bitcoin.org/bitcoin.pdf. |
[2] | BUTERIN V. A Next-generation Smart Contract and Decentralized Application Platform[EB/OL]. [2020-04-26]. http://www.fintech.academy/wp-content/uploads/2016/06/EthereumWhitePaper.pdf. |
[3] |
GRIGGS K N, OSSIPOVA O, KOHLIOS C P, et al. Healthcare Blockchain System Using Smart Contracts for Secure Automated Remote Patient Monitoring[J]. Journal of Medical Systems, 2018,42(7):130-138.
doi: 10.1007/s10916-018-0982-x pmid: 29876661 |
[4] | Libra. Libra White Paper[EB/OL].[2020-04-26]. https://libra.org/en-US/white-paper/. |
[5] | 蒋照生, 孙宇林, 王瑞娇. 等. 人民币3.0----中国央行数字货币:运行框架与技术解析[EB/OL]. [2020-04-26]. http://www.huanjing100.com/p-10034.html. |
[6] | MEIKLEJOHN S, POMAROLE M, JORDAN G, et al. A Fistful of Bitcoins: Characterizing Payments Among Men with No Names [C]//Proceedings of the 20133 ACM SIGCOMM Internet Measurement Conference. New York: ACM, 2013: 127-139. |
[7] | NOETHER S. Ring ConfidentialTransactions[J/OL]. [2020-04-26].https://eprint.iacr.org/2015/1098.pdf. |
[8] | BEN-SASSON E, CHIESA A, GARMAN C, et al. Zerocash: Decentralized Anonymous Payments from Bitcoin [C]//Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2014: 459-0474. |
[9] | SWAN M. Blockchain: Blueprint for a New Economy[M/OL]. [2020-04-26]. http://donkasprzak.com/blockchain-blueprint/. |
[10] | TULLOH B. Smart Contracts[EB/OL]. [2020-04-26]. http://www.erights.org/smart-contracts/index.html. |
[11] | MILLER M S, STIEGLER M. The Digital Path: Smart Contracts and the Third World[EB/OL]. [2020-04-26]. http://www.erights.org/talks/pisa/paper/. |
[12] | Etherscan. Ethereum Blockchain Explorer[EB/OL].[2020-04-26]. https://cn.etherscan.com/. |
[13] | GRIGG I. EOS-An introduction[EB/OL]. [2020-04-26]. https://iang.org/papers/EOS_An_Introduction.pdf. |
[14] | CASTRO M, LISKOV B. Practical Byzantine Fault Tolerance and Proactive Recovery[J]. ACM Transactions on Computer Systems, 2002,20(4):398-0461. |
[15] | RIVEST R L, SHAMIR A, TAUMAN Y. How to Leak a Secret [C]//Lecture Notes in Computer Science: 2248. Heidelberg: Springer Verlag, 2001: 552-565. |
[16] | LIU J K, WEI, V K, WONG D S. Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups [C]//Lecture Notes in Computer Science: 3108. Heidelberg: Springer Verlag, 2004: 325-335. |
[17] | BACK A. Ring Signature Efficiency[C/OL]. [2020-04-26].https://bitcointalk.org/index.php. |
[18] | FUJISAKI E, SUZUKI K. Traceable Ring Signature [C]//Lecture Notes in Computer Science: 4450. Heidelberg: Springer Verlag, 2007: 181-200. |
[19] | VAN SABERHAGEN N. Cryptonote V 2.0.[EB/OL]. [2020-04-26]. https://www.mendeley.com/catalogue/7e4cdb00-7955-30e1-9185-32a1801bd94b/. |
[20] | SUN S F, AU M H, LIU J K, et al. Ringct 2.0: a Compact Accumulator-based (Linkable Ring Signature) Protocol for Blockchain Cryptocurrency Monero [C]//Lecture Notes in Computer Science: 10493. Heidelberg: Springer Verlag, 2017: 456-474. |
[21] | YUEN T H, SUN S F, LIU J K, et al. Ringct 3.0 for Blockchain Confidential Transaction: Shorter Size and Stronger Security [C]//Lecture Notes in Computer Science: 12059. Heidelberg: Springer, 2020: 464-483. |
[22] |
LI Y, YANG G, SUSILO W, et al. Traceable Monero: Anonymous Cryptocurrency with Enhanced Accountability[J]. IEEE Transactions on Dependable and Secure Computing , 2019, DOI: 10.1109/TDSC.2019.2910058.
doi: 10.1109/TDSC.2012.11 pmid: 24489520 |
[23] | WANG L, SHEN X, LI J, et al. Cryptographic Primitives in Blockchains[J]. Journal of Network and Computer Applications, 2019,127:43-58. |
[24] | TSANG P P, WEI V K. Short Linkable Ring Signatures for E-voting, E-cash and Attestation [C]//Lecture Notes in Computer Science: 3439. Heidelberg: Springer Verlag, 2005: 48-60. |
[25] | AU M H, CHOW S S M, SUSILO W, et al. Short Linkable Ring Signatures Revisited[C]//Lecture Notes in Computer Science: 4043. Heidelberg: Springer Verlag, 2006: 101-115. |
[26] | AU M H, LIU J K, SUSILO W, et al. Secure Id-based Linkable and Revocable-iff-linked Ring Signature with Constant-size Construction[J]. Theoretical Computer Science, 2013,469:1-14. |
[27] | MAXWELL G, POELSTRA A. Borromean Ring Signatures[EB/OL]. [2020-04-26]. http://diyhpl.us/~bryan/papers2/bitcoin/Borromean%20ring%20signatures.pdf. |
[28] | BLUM M, FELDMAN P, MICALI S. Non-Interactive Zero-Knowledge and Its Applications [C]//Proceedings of the 1988 Annual ACM Symposium on Theory of Computing. New York: ACM, 1988: 103-112. |
[29] | BEN-SASSON E, CHIESA A, TROMER E, et al. Succinct Non-interactive Zero Knowledge for a Von Neumann Architecture [C]//Proceedings of the 2014 23rd USENIX Security Symposium. Berkeley: USENIX Association, 2014: 781-796. |
[30] | BEN-SASSON E, CHIESA A, GREEN M, et al. Secure Sampling of Public Parameters for Succinct Zero Knowledge Proofs [C]//Proceedings of the 2015 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2015: 287-304 |
[31] | BEN-SASSON E, BENTOV L, HORESH Y, et al. Scalable Zero Knowledge with No Trusted Setup [C]//Lecture Notes in Computer Science: 11694. Heidelberg: Springer Verlag, 2019: 701-732. |
[32] | Suterusu. Suterusu Yellowpaper (V 0.2)[EB/OL]. [2020-04-26]. https://www.suterusu.io/#pwa__technology. |
[33] | BUNZ B, BOOTLE J, BONEH D, et al. Bulletproofs: Short Proofs for Confidential Transactions and More [C]//Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 315-334 |
[34] | DAMGARD I, NIELSEN J, POLYCHRONIADOU A, et al. On the Communication Required for Unconditionally Secure Multiplication [C]//Lecture Notes in Computer Science: 9815. Heidelberg: Springer Verlag, 2016: 459-488. |
[35] | ZHOU L, WANG L, SUN Y, et al. AntNest: Fully Non-Interactive Secure Multi-Party Computation[J]. IEEE Access, 2018,6:75639-75649. |
[36] | BENHAMOUDA F, HALEVI S, HALEVI T. Supporting Private Data on Hyperledger Fabric with Secure Multiparty Computation [C]//Proceedings of the 2018 IEEE International Conference on Cloud Engineering. Piscataway: IEEE, 2018: 357-363. |
[37] | PEDERSEN T P. Non-interactive and Information-theoretic Secure Verifiable Secret Sharing [C]//Lecture Notes in Computer Science: 576. Heidelberg: Springer Verlag, 1992: 129-140. |
[38] | BUNZ B, BOOTLE J, BONEH D, et al. Bulletproofs: Efficient Range Proofs for Confidential Transactions[C/OL]. [2020-04-26].https://eprint.iacr.org/2017/1066.pdf. |
[39] | NARULA N, VASQUEZ W, VIRZA M. Privacy-preserving Auditing for Distributed Ledgers [C]// Proceedings of the 2018 15th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2018: 65-80. |
[40] | CATALANO D, FIORE D. Vector Commitments and Their Applications [C]//Lecture Notes in Computer Science: 7778. Heidelberg: Springer Verlag, 2013: 55-72. |
[41] | LAI R W F, MALAVOLTA G. Subvector Commitments with Application to Succinct Arguments [C]//Lecture Notes in Computer Science: 11692. Heidelberg: Springer Verlag, 2019: 530-560. |
[42] | EYAL I, GENCER A E, SIRER E G, et al. Bitcoin-NG: a Scalable Blockchain Protocol [C]//Proceedings of the 2016 13th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2016: 45-59. |
[43] | GILAD Y, HEMO R, MICALI S, et al. Algorand: Scaling Byzantine Agreements for Cryptocurrencies [C]//Proceedings of the 2017 26th Symposium on Operating Systems Principles. New York: ACM, 2017: 51-68. |
[44] | DECKER C, SEIDEL J, WATTENHOFER R. Bitcoin Meets Strong Consistency [C]//Proceedings of the 2016 17th International Conference on Distributed Computing and Networking. New York: ACM, 2016: a13. |
[45] | ABRAHAM I, MALKHI D, NAYAK K, et al. Solida: a Blockchain Protocol Based on Reconfigurable Byzantine Consensus[CP/OL]. [2020-04-26].https://arxiv.org/pdf/1612.02916.pdf. |
[46] | KOKORIS-KOGIAS E, JOVANOVIC P, GAILLY N, et al. Enhancing Bitcoin Security and Performance with Strong Consistency Via Collective Signing [C]//Proceedings of the 2016 25th USENIX Security Symposium. Berkeley: USENIX Association, 2016: 279-296. |
[47] | LUU L, NARAYANAN V, ZHENG C, et al. A Secure Sharding Protocol for Open Blockchains [C]// Proceedings of the 2016 ACM Conference on Computer and Communications Security. New York: ACM, 2016: 17-30. |
[48] | KOKORIS-KOGIAS E, JOVANOVIC P, GASSER L, et al. OmniLedger: a Secure, Scale-out, Decentralized Ledger via Sharding [C]//Proceedings of the 2018 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2018: 583-598. |
[49] | ZAMANI M, MOVAHEDI M, RAYKOVA M. RapidChain: Scaling Blockchain Via Full Sharding [C]//Proceedings of the 2018 ACM Conference on Computer and Communications Security. New York: ACM, 2018: 931-948. |
[50] | WANG J, WANG H. Monoxide: Scale out Blockchains with Asynchronous Consensus Zones [C]// Proceedings of the 2019 16th USENIX Symposium on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2019: 95-112. |
[51] | MCELHANEY J W. The Tangle[J]. Aba Journal, 2004,90(5):26-27. |
[52] | YANG L, BAGARIA V, WANG G, et al. Prism: Scaling Bitcoin by 10,000x[J/OL]. [2020-04-23].https://arxiv.org/pdf/1909.11261.pdf. |
[53] | POON J, BUTERIN V. Plasma: Scalable Autonomous Smart Contracts[J/OL]. [2020-04-23].https://plasma.io/plasma.pdf. |
[54] | JASON T, CHRISTIAN R. A Scalable Verification Solution for Blockchains[J/OL]. [2020-04-23]. https: //arxiv.org/pdf/1908.04756.pdf. |
[55] | WHITEHAT B, GLUCHOWSKI A, HARRY R, et al. Roll_up / roll_back snark side chain ~17000tps. [EB/OL].[2020-04-23].https://ethresear.ch/t/roll-up-roll-backsnark-side-chain-17000-tps/3675. |
[56] | BONNEAU J, MECKLER I, RAO V, et al. Coda: Decentralized Cryptocurrency at Scale[J/OL]. [2020-04-29]. https://eprint.iacr.org/2020/352.pdf. |
[57] | LEE J, NIKITIN K, SETTY S. Replicated State Machines without Replicated Execution[C/OL]. [2020-04-29].https://nikirill.com/files/piperine.pdf. |
[58] | EBERHARDT J, TAI S. ZoKrates - Scalable Privacy-Preserving Off-Chain Computations[C/OL]. [2020-04-29].https://ieeexplore.ieee.org/document/8726497. |
[59] | DRYJA T. Utreexo: A Dynamic Hash-based Accumulator Optimized for the Bitcoin UTXO Set[J/OL]. [2020-04-29]. https://eprint.iacr.org/2019/611.pdf. |
[1] | YANG Yanbo,ZHANG Jiawei,MA Jianfeng. Method for using the blockchain to protect data privacy of IoV [J]. Journal of Xidian University, 2021, 48(3): 21-30. |
[2] | ZHENG Xianchun,LI Hui,WANG Rui,YAN Haonan,DAI Rui,XIAO Mingchi. Survey of anonymous network applications and simulation platforms [J]. Journal of Xidian University, 2021, 48(1): 22-38. |
[3] | LI Jinze,WANG Zhonghao,LI Mengheng,QIN Tuanfa. Spectrum sharing management method for the small-area-blockchain based on district partition [J]. Journal of Xidian University, 2020, 47(6): 122-130. |
[4] | ZHAI Sheping,WANG Yijing,CHEN Siji. Research on the application of blockchain technology in the sharing of electronic medical records [J]. Journal of Xidian University, 2020, 47(5): 103-112. |
[5] | ZHANG Yinghao,LIU Xiaofan. Preliminary research on the blockchain protocol in satellite broadcasting network environment [J]. Journal of Xidian University, 2020, 47(5): 11-18. |
[6] | LI Han,ZHANG Chen,HUANG Hejiao,GUO Yu. Algorithm for encrypted search with forward secure updates and verification [J]. Journal of Xidian University, 2020, 47(5): 48-56. |
[7] | DING Yong,XIANG Hengkui,LUO Decun,ZOU Xiuqing,LIANG Hai. Scheme for electronic certificate storage by combining Fabric technology [J]. Journal of Xidian University, 2020, 47(5): 113-121. |
[8] | ZHAO Zijun,YING Zuobin,YANG Zhao,LIU Ximeng,MA Jianfeng. Recommendation of platoon members by combining the blockchain and vehicular social network [J]. Journal of Xidian University, 2020, 47(5): 122-129. |
[9] | SI Chengxiang,GAO Feng,ZHU Liehuang,GONG Guopeng,ZHANG Can,CHEN Zhuo,LI Ruiguang. Covert data transmission mechanism based on dynamic label in blockchain [J]. Journal of Xidian University, 2020, 47(5): 94-102. |
[10] | LAN Yiqin,ZHANG Fangguo,TIAN Haibo. Using Monero to realize covert communication [J]. Journal of Xidian University, 2020, 47(5): 19-27. |
[11] | WANG Jiaheng,LE Yuwei,ZHANG Bowen,GUO Ruiwei,GAO Zheng,WANG Ziyue,LING Xintong. Blockchain radio access network:a new architecture for future mobile communications [J]. Journal of Xidian University, 2020, 47(5): 3-10. |
[12] | TIAN Haibo,LIN Huizhi,LUO Peiran,SU Yinxue. Scheme for being able to regulate a digital currency with user privacy protection [J]. Journal of Xidian University, 2020, 47(5): 40-47. |
[13] | LIU Naian,CHEN Zhihao,LIU Guokun,LI Yang. Mechanism for proof-of-reputation consensus for blockchain validator nodes [J]. Journal of Xidian University, 2020, 47(5): 57-62. |
[14] | MA Shiyang,DONG Xuewen,QUAN Yining,TONG Wei,YANG Lingxiao. Method for evaluation of web services compatibility based on the blockchain’s consensus algorithm [J]. Journal of Xidian University, 2020, 47(5): 63-69. |
[15] | XIE Yixi,JI Lixin. Blockchain-based bio-inspired distributed detection approach [J]. Journal of Xidian University, 2020, 47(5): 70-76. |
|