Page 365 - 《软件学报》2021年第7期
P. 365

姚前  等:区块链系统中身份管理技术研究综述                                                          2283


                 [5]    Zhu LH, Gao F, Shen M, et al. Survey on privacy preserving techniques for blockchain technology. Journal of Computer Research
                     and Development, 2017,54(10):2170–2186 (in Chinese with English abstract).
                 [6]    Genkin D, Papadopoulos D, Papamanthou C. Privacy in decentralized cryptocurrencies. Communications of the ACM, 2018,61(6):
                     78–88.
                 [7]    Fu S, Xu HX, et al. A survey on anonymity of digital currency. Chinese Journal of Computers, 2019,42(5):1045–1062 (in Chinese
                     with English abstract).
                 [8]    Zhang  A,  Bai XY. Survey of  research  and practices on blockchain privacy protection.  Ruan Jian  Xue  Bao/Journal of Software,
                     2020,31(5):1406−1434  (in Chinese with English abstract).  http://www.jos.org.cn/1000-9825/5967.htm [doi:  10.13328/j.cnki.jos.
                     005967]
                 [9]    Dash. https://www.dash.org/
                [10]    Monero. https://www.getmonero.org/
                [11]    Sasson EB, Chiesa A, Garman C, et al. Zerocash: Decentralized anonymous payments from bitcoin. In: Proc. of the IEEE Symp. on
                     Security and Privacy 2014. IEEE, 2014. 459–474.
                [12]    Danezis  G,  Meiklejohn S. Centrally  banked  cryptocurrencies.  In: Proc. of the  Network  and Distributed System Security Symp.
                     Internet Society, 2016. 1–14.
                [13]    Corda. https://www.corda.net/
                [14]    Hyperledger Foundation. Hyperledger Fabric. https://github.com/hyperledger/fabric
                [15]    Androulaki E, Barger A, Bortnikov V, et al. Hyperledger Fabric: A distributed operating system for permissioned blockchains. In:
                     Proc. of the 13th European Systems Conf. New York: ACM, 2018. 30–45.
                [16]    Ethereum. https://www.ethereum.org/zh/
                [17]    Ethereum. ERC20. https://github.com/ethereum/EIPs/blob/master/EIPS/eip-20-token-standard.md
                [18]    Facebook. Libra White Paper. https://libra.org/en-US/white-paper/
                [19]    Bitcoin. Hierarchical Deterministic Wallets. https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki
                [20]    IPFS. https://github.com/ipfs/
                [21]    W3C. DID. https://www.w3.org/TR/did-core/
                [22]    W3C. Verifiable Credential. https://www.w3.org/TR/vc-data-model/
                [23]    微众银行. WeIdentity. https://github.com/WeBankFinTech/WeIdentity
                [24]    趣链科技.趣链. https://github.com/hyperchain
                [25]    微众银行. FISCO BCOS. https://github.com/bcosorg
                [26]    Cachin C.  Architecture of the hyperledger blockchain  Fabric. In: Proc.  of the  Workshop  on Distributed  Cryptocurrencies  and
                     Consensus Ledgers. Zurich: IBM Research, 2016. 1–4.
                [27]    Camenisch J, Van Herreweghen E. Design and implementation of the idemix anonymous credential system. In: Proc. of the 9th
                     ACM Conf. on Computer and Communications Security. New York: ACM, 2002. 21–30.
                [28]    Camenisch J, Lysyanskaya A. Signature schemes and anonymous credentials from bilinear maps. In: Proc. of the CRYPTO 2004.
                     Berlin: Springer-Verlag, 2004. 56–72.
                [29]    Au MH, Susilo W, Mu Y. Constant-size dynamic k-TAA. In: Proc. of the Int’l Conf. on Security and Cryptography for Networks.
                     Berlin: Springer-Verlag, 2006. 111–125.
                [30]    Camenisch J, Drijvers M, Lehmann A. Anonymous attestation using the strong Diffie Hellman assumption revisited. In: Proc. of
                     the Int’l Conf. on Trust and Trustworthy Computing. Berlin: Springer-Verlag, 2016. 87–101.
                [31]    Camenisch J, Dubovitskaya M, Enderlein RR, et al. Concepts and languages for privacy-preserving attribute-based authentication.
                     Journal of Information Security and Applications, 2014,19(1):25–44.
                [32]    Corda. Corda API references. https://docs.corda.net/api-identity.html
                [33]    Boneh D, Boyen X, Shacham H. Short group signatures. In: Proc. of the CRYPTO. Berlin: Springer-Verlag, 2004. 41–55.
                [34]    Reid F, Harrigan M. An analysis of anonymity in the bitcoin system. In: Proc. of the Security and Privacy in Social Networks.
                     Berlin: Springer-Verlag, 2013. 197–223.
                [35]    Liao K, Zhao Z, Doupé A, et al. Behind closed doors: Measurement and analysis of CryptoLocker ransoms in bitcoin. In: Proc. of
                     the APWG Symp. on Electronic Crime Research. IEEE, 2016. 1–13.
   360   361   362   363   364   365   366   367   368   369   370