Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Survey of anonymity and tracking technology in Monero
Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG
Journal of Computer Applications    2022, 42 (1): 148-156.   DOI: 10.11772/j.issn.1001-9081.2021020296
Abstract1439)   HTML73)    PDF (723KB)(586)       Save

Virtual digital currency provides a breeding ground for terrorist financing, money laundering, drug trafficking and other criminal activities. As a representative emerging digital currency, Monero has a universally acknowledged high anonymity. Aiming at the problem of using Monroe anonymity to commit crimes, Monero anonymity technology and tracking technology were explored as well as the research progresses were reviewed in recent years, so as to provide technical supports for effectively tackling the crimes based on blockchain technology. In specific, the evolution of Monero anonymity technology was summarized, and the tracking strategies of Monero anonymity technology in academic circles were sorted out. Firstly, in the anonymity technologies, ring signature, guaranteed unlinkability (one-off public key), guaranteed untraceability, and the important version upgrading for improving anonymity were introduced. Then, in tracking technologies, the attacks such as zero mixin attack, output merging attack, guess-newest attack, closed set attack, transaction flooding attack, tracing attacks from remote nodes and Monero ring attack were introduced. Finally, based on the analysis of anonymity technologies and tracking strategies, four conclusions were obtained: the development of anonymity technology and the development of tracking technology of Monero promote each other; the application of Ring Confidential Transactions (RingCT) is a two-edged sword, which makes the passive attack methods based on currency value ineffective, and also makes the active attack methods easier to succeed; output merging attack and zero mixin attack complement each other; Monero’s system security chain still needs to be sorted out.

Table and Figures | Reference | Related Articles | Metrics
Group decision-making model based on incomplete probability information
DAI Yiyu, CHEN Jiang
Journal of Computer Applications    2018, 38 (10): 2822-2826.   DOI: 10.11772/j.issn.1001-9081.2018030657
Abstract356)      PDF (856KB)(292)       Save
A group decision making model based on optimization model and consistency adjustment algorithm was established for the group decision problems with incomplete occurrence probability information of hesitant fuzzy elements. First of all, some new concepts were introduced, including Probability Incomplete Hesitant Fuzzy Preference Relations (PIHFPRs), the expected consistency of PIHFPRs and the acceptable additive expected consistency of PIHFPRs. Secondly, the minimization of deviations between PIHFPRs and the weight vectors was regarded as the objective function, a linear optimization model was constructed to calculate the probability information of the PIHFPRs. Then, by using the integrated operator for weighted probability incomplete hesitant fuzzy preference relations, the comprehensive PIHFPR was determined. A group consistency adjustment algorithm was further designed, which not only makes the adjusted PIHFPRs are acceptable expected consistent, but also can obtain the weight vectors for alternatives. Finally, the proposed group decision-making model was applied to a numerical example about the selection of block chain. Experimental results show that the decision-making results are reasonable and reliable, and the actual situation can be reflected.
Reference | Related Articles | Metrics