我的博客

区块链相关论文

目录
  1. 比特币
    1. Bitcoin: A peer-to-peer electronic cash system
    2. 综述
    3. 价格预测
    4. 数据分析
    5. 比特币地址分类
    6. 比特币匿名性
    7. 混币
    8. 用户识别
    9. 溯源
    10. 去匿名
    11. 反洗钱
    12. 其他
    13. 可视化
    14. 图神经网络算法
  2. 区块链安全
    1. On distributed ledgers security and illegal uses
    2. Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views

区块链(Blockchain)起源于比特币(但是比特币白皮书中没有出现这个单词),是一种基于 P2P 网络的,分布式的、集体决策的系统。

比特币

Bitcoin: A peer-to-peer electronic cash system

完全分布式

基于 CPU 的工作量证明

理论上有条件的不可逆转

Eyal, Ittay, and Emin Gün Sirer. “Majority is not enough: Bitcoin mining is vulnerable.” Communications of the ACM 61.7 (2018): 95-102.

综述

刘壮,袁磊.比特币研究新进展:属性、乱象与监管[J].金融与经济,2019(09):44-49+10.

比特币的这些原罪给执法机关对这类犯罪的防控、侦查和惩治都带来了很大的挑战。尽管各国先后出台各种措施以打击借助比特币的违法犯罪行为,但收效甚微。Foley et al.(2018)借助比特币的技术特性,[…]
摘自:比特币研究新进展:属性、乱象与监管
在中国知网查看:http://kns.cnki.net//KXReader/Detail?TIMESTAMP=637096204195368750&DBCODE=CJFQ&TABLEName=CJFDTEMP&FileName=JTJJ201909008&RESULT=1&SIGN=1IK1QAEc8z1OGPUSpkn3p3xVBG8%3d


Mauro C , Kumar E S , Chhagan L , et al. A Survey on Security and Privacy Issues of Bitcoin[J]. IEEE Communications Surveys & Tutorials, 2018:1-1.

Blockchain: The state of the art and future trends

李燕,马海英,王占君.区块链关键技术的研究进展[J].计算机工程与应用,2019,55(20):13-23+100.

价格预测

[1]艾青. 比特币交易趋势预测的研究[D].北京邮电大学,2016.

[1]孙坚. 基于经验模态分解方法的比特币价格波动分析及预测方法研究[D].湖南大学,2018.

[1]陈豪. 比特币的经济学分析[D].浙江大学,2015.

Advanced model calibration on bitcoin options Dilip B. Madan;;Sofie Reyners;;Wim Schoutens Digital Finance 2019-11-12

[1]Thomas Walther,Tony Klein,Elie Bouri. Exogenous drivers of Bitcoin and Cryptocurrency volatility – A mixed data sampling approach to forecasting[J]. Journal of International Financial Markets, Institutions & Money,2019.

数据分析

Hong S, Kim H. Analysis of Bitcoin Exchange Using Relationship of Transactions and Addresses[C]//2019 21st International Conference on Advanced Communication Technology (ICACT). IEEE, 2019: 67-70.

比特币地址分类

毛洪亮,吴震,贺敏,唐积强,沈蒙.基于启发式的比特币地址聚类方法[J].北京邮电大学学报,2018,41(02):27-31.

https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2018&filename=BJYD201802005&uid=WEEvREcwSlJHSldRa1FhdXNXaEhoOHRsbjBrUTQwNURTY29HRWxvSE8yUT0=$9A4hF_YAuvQ5obgVAqNKPCYcEjKensW4IQMovwHtwkF4VYPoHbKxJw!!&v=MDk5NTBSckZ5L2dVNzNBSnlmU2FyRzRIOW5Nclk5RllZUjhlWDFMdXhZUzdEaDFUM3FUcldNMUZyQ1VSTE9lWnU=

介绍了三种启发式规则:

  1. 多输入交易地址聚类
  2. 产量交易(coinbase)地址聚类
  3. 基于找零地址的聚类

介绍了找零地址识别算法

他的参考文献

A new payment system for enhancing location privacy of electric vehicles 电动车支付系统 2014

An analysis of anonymity in the Bitcoin system 2011

A fistful of Bitcoins:characterizing payments among men with no names 2016

Evaluating user privacy in Bitcoin 2013

Identifying Bitcoin users by transaction behavior 2015

Behind closed doors:measurement and analysis of Crypto Locker ransoms in Bitcoin 2016

A.Quantitative analysis of the full Bitcoin transaction graph 2013

Behavior pattern clustering in blockchain networks 2017

Bit Iodine:extracting intelligence from the Bitcoin network 2014


比特币匿名性

Reid F , Harrigan M . An Analysis of Anonymity in the Bitcoin System[J]. 2011.

Jeff Garzik, a member of Bitcoin’s development team, is quoted as saying it would be unwise “to attempt major illicit transactions with Bitcoin, given existing statistical analysis techniques deployed in the field by law enforcement”1 ;

匿名性不是比特币设计的首要目标。

wikileaks bitcoin address 1HB5XMLmzFVj8ALj6mfBsbifRoD4miY36v

构建交易网络和用户网络


祝烈煌,高峰,沈蒙,李艳东,郑宝昆,毛洪亮,吴震.区块链隐私保护研究综述[J].计算机研究与发展,2017,54(10):2170-2186.

混币

李雪莲, 王海玉, 高军涛, et al. 一种匿名可撤销的比特币混淆方案[J]. 电子与信息学报, 2019, 41(8).

费天龙,郭静,鲁宁,史闻博.基于可信监管方的比特币强匿名混淆策略[J].中国电子科学研究院学报,2019,14(09):960-966.

Ziegeldorf J H , Matzutt R , Henze M , et al. Secure and anonymous decentralized Bitcoin mixing[J]. Future Generation Computer Systems, 2016:S0167739X16301297.

Ziegeldorf J H , Grossmann F , Henze M , et al. CoinParty: Secure Multi-Party Mixing of Bitcoins.[J]. 2015.

Valenta L , Rowan B . Blindcoin: Blinded, Accountable Mixes for Bitcoin[C]// International Conference on Financial Cryptography and Data Security. Springer, Berlin, Heidelberg, 2015.


Morenosanchez P, Ruffing T, Kate A. CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin[M]// Computer Security - ESORICS 2014. 2014.

第三方混币

Bitcoin Fog. http://www.bitcoinfog.com
BitLaundry. http://app.bitlaundry.com
BitLaunder. https://bitlaunder.com

Mixcoin

Zerocoin
Danezis, G., Fournet, C., Kohlweiss, M., Parno, B.: Pinocchio Coin: Building Zerocoin from a succinct pairing-based proof system. In: Proc. of the 1st ACM Workshop on Language Support for Privacy-enhancing Technologies. PETShop’13, ACM (2013) 27–30 19. Garman, C., Green, M., Miers, I., Rubin, A.D.: Rational Zero: Economic security for Zerocoin with everlasting anonymity. In: 1st Workshop on Bitcoin Research. (2014) 20. Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from Bitcoin. In: Proc. of the 35th Symposium on Security and Privacy. S&P’14, IEEE (2014)

用户识别

Cazabet R , Rym B , Matthieu L , et al. Tracking bitcoin users activity using community detection on a network of weak signals[J]. 2017.

溯源

蔡霖翔. 区块链数字货币资金流追溯研究[D].中国人民公安大学,2019.

url

去匿名

邢尧. 比特币交易网络的去匿名化技术研究[D].东南大学,2017.

url

反洗钱

Moser M , Bohme R , Breuker D . An inquiry into money laundering tools in the Bitcoin ecosystem[C]// 2013 eCrime Researchers Summit (eCRS). IEEE, 2013.

其他

U.S. Marshals Accidentally Reveal Email Addresses of Potential Bitcoin Buyers

url

可视化

McGinn, Dan, Birch, David, Akroyd, David,等. Visualizing Dynamic Bitcoin Transaction Patterns[J]. Big Data, 4(2):109-119.

图神经网络算法

Weber M , Domeniconi G , Chen J , et al. Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics[J]. 2019.

区块链安全

On distributed ledgers security and illegal uses

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE

link

对比了多个分布式账本技术(Distributed Ledger Technologies,DLTs): Bitcoin, Ripple, Ethereum, Hyperledger, Algorand and IOTA

Assessing blockchain selfish mining in an imperfect network: Honest and selfish miner views

COMPUTERS & SECURITY

link

使用马尔可夫模型分辨自私矿工和诚实矿工

评论无需登录,可以匿名,欢迎评论!