Page 365 - 《软件学报》2021年第7期
P. 365
姚前 等:区块链系统中身份管理技术研究综述 2283
[5] Zhu LH, Gao F, Shen M, et al. Survey on privacy preserving techniques for blockchain technology. Journal of Computer Research
and Development, 2017,54(10):2170–2186 (in Chinese with English abstract).
[6] Genkin D, Papadopoulos D, Papamanthou C. Privacy in decentralized cryptocurrencies. Communications of the ACM, 2018,61(6):
78–88.
[7] Fu S, Xu HX, et al. A survey on anonymity of digital currency. Chinese Journal of Computers, 2019,42(5):1045–1062 (in Chinese
with English abstract).
[8] Zhang A, Bai XY. Survey of research and practices on blockchain privacy protection. Ruan Jian Xue Bao/Journal of Software,
2020,31(5):1406−1434 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/5967.htm [doi: 10.13328/j.cnki.jos.
005967]
[9] Dash. https://www.dash.org/
[10] Monero. https://www.getmonero.org/
[11] Sasson EB, Chiesa A, Garman C, et al. Zerocash: Decentralized anonymous payments from bitcoin. In: Proc. of the IEEE Symp. on
Security and Privacy 2014. IEEE, 2014. 459–474.
[12] Danezis G, Meiklejohn S. Centrally banked cryptocurrencies. In: Proc. of the Network and Distributed System Security Symp.
Internet Society, 2016. 1–14.
[13] Corda. https://www.corda.net/
[14] Hyperledger Foundation. Hyperledger Fabric. https://github.com/hyperledger/fabric
[15] Androulaki E, Barger A, Bortnikov V, et al. Hyperledger Fabric: A distributed operating system for permissioned blockchains. In:
Proc. of the 13th European Systems Conf. New York: ACM, 2018. 30–45.
[16] Ethereum. https://www.ethereum.org/zh/
[17] Ethereum. ERC20. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20-token-standard.md
[18] Facebook. Libra White Paper. https://libra.org/en-US/white-paper/
[19] Bitcoin. Hierarchical Deterministic Wallets. https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki
[20] IPFS. https://github.com/ipfs/
[21] W3C. DID. https://www.w3.org/TR/did-core/
[22] W3C. Verifiable Credential. https://www.w3.org/TR/vc-data-model/
[23] 微众银行. WeIdentity. https://github.com/WeBankFinTech/WeIdentity
[24] 趣链科技.趣链. https://github.com/hyperchain
[25] 微众银行. FISCO BCOS. https://github.com/bcosorg
[26] Cachin C. Architecture of the hyperledger blockchain Fabric. In: Proc. of the Workshop on Distributed Cryptocurrencies and
Consensus Ledgers. Zurich: IBM Research, 2016. 1–4.
[27] Camenisch J, Van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proc. of the 9th
ACM Conf. on Computer and Communications Security. New York: ACM, 2002. 21–30.
[28] Camenisch J, Lysyanskaya A. Signature schemes and anonymous credentials from bilinear maps. In: Proc. of the CRYPTO 2004.
Berlin: Springer-Verlag, 2004. 56–72.
[29] Au MH, Susilo W, Mu Y. Constant-size dynamic k-TAA. In: Proc. of the Int’l Conf. on Security and Cryptography for Networks.
Berlin: Springer-Verlag, 2006. 111–125.
[30] Camenisch J, Drijvers M, Lehmann A. Anonymous attestation using the strong Diffie Hellman assumption revisited. In: Proc. of
the Int’l Conf. on Trust and Trustworthy Computing. Berlin: Springer-Verlag, 2016. 87–101.
[31] Camenisch J, Dubovitskaya M, Enderlein RR, et al. Concepts and languages for privacy-preserving attribute-based authentication.
Journal of Information Security and Applications, 2014,19(1):25–44.
[32] Corda. Corda API references. https://docs.corda.net/api-identity.html
[33] Boneh D, Boyen X, Shacham H. Short group signatures. In: Proc. of the CRYPTO. Berlin: Springer-Verlag, 2004. 41–55.
[34] Reid F, Harrigan M. An analysis of anonymity in the bitcoin system. In: Proc. of the Security and Privacy in Social Networks.
Berlin: Springer-Verlag, 2013. 197–223.
[35] Liao K, Zhao Z, Doupé A, et al. Behind closed doors: Measurement and analysis of CryptoLocker ransoms in bitcoin. In: Proc. of
the APWG Symp. on Electronic Crime Research. IEEE, 2016. 1–13.