浏览全部资源
扫码关注微信
西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "傅晓彤(1977-),女,陕西西安人,博士,西安电子科技大学副教授,主要研究方向为公钥密码学及其应用。" ]
[ "陈思(1993-),女,河南商丘人,西安电子科技大学硕士生,主要研究方向为公钥密码学及其在密码货币中的应用。" ]
[ "张宁(1979-),女,陕西宝鸡人,博士,西安电子科技大学副教授,主要研究方向为椭圆曲线公钥密码学、密码货币。" ]
网络出版日期:2017-07,
纸质出版日期:2017-07-25
移动端阅览
傅晓彤, 陈思, 张宁. 基于代理的密码货币支付系统[J]. 通信学报, 2017,38(7):199-206.
Xiao-tong FU, Si CHEN, Ning ZHANG. Proxy-cryptocurrency payment system[J]. Journal on communications, 2017, 38(7): 199-206.
傅晓彤, 陈思, 张宁. 基于代理的密码货币支付系统[J]. 通信学报, 2017,38(7):199-206. DOI: 10.11959/j.issn.1000-436x.2017121.
Xiao-tong FU, Si CHEN, Ning ZHANG. Proxy-cryptocurrency payment system[J]. Journal on communications, 2017, 38(7): 199-206. DOI: 10.11959/j.issn.1000-436x.2017121.
利用区块链技术实现的去中心化的密码货币被誉为有史以来最成功的密码货币。用户以公钥作为账户地址,使交易具备匿名性,即隐私的可保护性。然而区块链上记录的交易信息,会给用户隐私带来潜在的泄露威胁;此外,为了防止重复花费,系统约定只有在目标区块之后又有k个后续区块产生才能确认该目标区块上的交易是有效的,这段等待后续区块生成的时间较长,大大降低了交易效率。针对以上问题,提出一种基于代理的密码货币支付系统模型,并给出了基于盲签名算法的实现方案,通过在支付阶段引入代理,缩短了交易确认时间,提高了交易效率,同时,更好地实现了用户的匿名性即隐私保护功能。
The decentralized cryptocurrency which was based on block chain has been thought the most successful one in history.In the system
public keys were used as the users’ accounts which guaranteed the anonymity in real transactions.However
all the transaction information was recorded in the block chain
it was a potential threat for users’ privacy which might leak the payment information.Moreover
to avoid double-spending
it was agreed that the transaction on the target block was valid only if another k blocks were generated after the target one.The long waiting time reduced the efficiency of the payment system.A model of payment system based on a proxy-cryptocurrency was proposed
and a solution based on blind signature techniques was proposed.The scheme introduced a proxy in the payment phase
by which transaction confirmation time could be reduced and the transaction efficiency could be improved.Meanwhile
the system implements better anonymity
namely as the privacy protection function.
NAKAMOTO S . Bitcoin:a peer-to-peer electronic cash system [J ] . Consulted , 2008 , 1 ( 2012 ): 28 .
GERVAIS A , CAPKUN S , KARAME G O , et al . On the privacy provisions of Bloom filters in lightweight bitcoin clients [C ] // Computer Security Applications Conference . 2014 : 326 - 335 .
BONNEAU J , MILLER A , CLARK J , et al . SoK:research perspectives and challenges for bitcoin and cryptocurrencies [C ] // 2015 IEEE Symposiumon Security and Privacy . 2015 : 104 - 121 .
NARAYANAN A , BONNEAU J , FELTEN E , et al . Bitcoin and cryptocurrency technologies [M ] . America : Princeton University Press , 2016 .
KARAME G O , ANDROULAKI E , CAPKUN S . Double-spending fast payments in bitcoin [C ] // ACM Conference on Computer and Communications Security . 2012 : 906 - 917 .
EYAL I , SIRER E G . Majority is not enough:bitcoin mining is vulnerable [M ] // Financial Cryptography and Data Security . Springer Berlin Heidelberg , 2014 .
KOSHY P , KOSHY P , MCDANIEL P . An analysis of anonymity in bitcoin using P2P network traffic [C ] // Finanical Cryptography and Data Security . 2014 : 469 - 485 .
MEIKLEJOHN S , POMAROLE M , JORDAN G , et al . A fistful of bitcoins:charaterizing payments among men with no names [C ] // The 2013 Conference on Internet Measurement Conference . 2013 : 127 - 140 .
REID F , HARRIGAN M . An analysis of anonymity in the bitcoin system [C ] // In Security and Privacy in Social Networks . 2012 : 197 - 223 .
张方国 , 王常杰 , 王育民 . 基于椭圆曲线的数字签名与盲签名 [J ] . 通信学报 , 2001 , 22 ( 8 ): 22 - 28 .
ZHANG F G , WANG C J , WANG Y M . Digital signature and blind signature based on elliptic curve [J ] . Journal on Communications , 2001 , 22 ( 8 ): 22 - 28 .
JOHNSON D , MENEZES A , VANSTONE S . The elliptic digital signature algorithm(ECDSA) [J ] . International Journal of Information Security , 2010 , 1 ( 1 ): 36 - 63 .
ANDREAS M A . Mastering bitcoin [M ] . O'Reilly Media , 2014 .
ABE M , FUJISAKI E . How to date blind signatures [M ] . Berlin : Springer , 1996 : 244 - 251 .
MIERS I , GAMAN C , GREEN M , et al . Zerocoin:anonymous distributed e-cash from bitcoin [C ] // 2013 IEEE Symposium on Security and Privacy , 2013 : 97 - 411 .
BENSASSON E , CHIESA A , GAMAN C , et al . Zerocash:decentralized anonymous payments from bitcoin [C ] // 2014 IEEE Symposium on Security and Privacy (SP) . 2014 : 459 - 474 .
RUFFING T , MORENO P , KATE A . Coin shuffle:practical decentralized coin mixing for bitcoin [M ] // Computer Security-ESORICS : Springer , 2014 : 345 - 364 .
BONNEAU J , NARAYANAN , MILLER A , et al . Mixcoin:anonymity for bitcoin with accountable mixes [C ] // Financial Cryptography and Data Security . 2014 : 486 - 504 .
VLENTA L , ROWAN B . Blindcoin:blinded,accountable mixes for bitcoin [C ] // Financial Cryptography and Data Security . 2015 : 112 - 126 .
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router [J ] . Journal of the Franklin Institute , 2004 , 239 ( 2 ): 135 - 139 .
DOUCEUR J R , . The sybil attack [C ] // First International Workshop on Peer-to-Peer Systems . 2002 : 251 - 260 .
0
浏览量
1361
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构