Journal of Computer Applications ›› 2022, Vol. 42 ›› Issue (1): 148-156.DOI: 10.11772/j.issn.1001-9081.2021020296
• Cyber security • Previous Articles Next Articles
Dingkang LIN(), Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG
Received:
2021-03-01
Revised:
2021-04-15
Accepted:
2021-04-16
Online:
2021-04-29
Published:
2022-01-10
Contact:
Dingkang LIN
About author:
LIN Dingkang, born in 2001. His research interests include blockchain, digital currency.Supported by:
通讯作者:
林定康
作者简介:
林定康(2001—),男,湖北十堰人,主要研究方向:区块链、数字货币基金资助:
CLC Number:
Dingkang LIN, Jiaqi YAN, Nandeng BA, Zhenhao FU, Haochen JIANG. Survey of anonymity and tracking technology in Monero[J]. Journal of Computer Applications, 2022, 42(1): 148-156.
林定康, 颜嘉麒, 巴楠登, 符朕皓, 姜皓晨. 门罗币匿名及追踪技术综述[J]. 《计算机应用》唯一官方网站, 2022, 42(1): 148-156.
Add to citation manager EndNote|Ris|BibTeX
URL: https://www.joca.cn/EN/10.11772/j.issn.1001-9081.2021020296
1 | LUNTOVSKYY A, GUETTER D. Cryptographic technology blockchain and its applications[C]// Proceedings of the 2018 International Conference on Information and Telecommunication Technologies and Radio Electronics, LNEE560. Cham: Springer, 2019: 14-33. |
2 | REDDY E, MINNAAR A. Cryptocurrency: a tool and target for cybercrime[J]. Acta Criminologica: African Journal of Criminology, 2018, 31(3): 71-92. |
3 | IRWIN A S M, URNER A B. Illicit Bitcoin transactions: challenges in getting to the who, what, when and where[J]. Journal of Money Laundering Control, 2018, 21(3): 297-313. 10.1108/jmlc-07-2017-0031 |
4 | IRWIN A S M, MI8LAD G. The use of crypto-currencies in funding violent jihad[J]. Journal of Money Laundering Control, 2016, 19(4): 407-425. |
5 | 乔晶花. 全球毒情新趋势与国际治理新挑战[J]. 现代世界警察, 2020(9): 13-17. |
QIAO J H. Global drug abuse and its challenge to drug control[J]. Modern World Police, 2020(9): 13-17. | |
6 | RÜTH J, ZIMMERMANN T, WOLSING K, et al. Digging into browser-based crypto mining[C]// Proceedings of the 2018 Internet Measurement Conference. New York: ACM, 2018: 70-76. 10.1145/3278532.3278539 |
7 | NAKAMOTO S. Bitcoin: a peer-to-peer electronic cash system[EB/OL]. [2021-01-01].. 10.2139/ssrn.3440802 |
8 | HARRIGAN M, FRETTER C. The unreasonable effectiveness of address clustering[C]// Proceedings of the 2016 International IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress. Piscataway: IEEE, 2016: 368-373. 10.1109/uic-atc-scalcom-cbdcom-iop-smartworld.2016.0071 |
9 | van SABERHAGEN N. CryptoNote v2.0[EB/OL]. [2021-01-01].. |
10 | DUFFIELD E, DIAZ D. Dash: a payments-focused cryptocurrency[EB/OL]. [2021-01-01].. |
11 | SASSON E BEN, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from Bitcoin[C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. Piscataway: IEEE, 2014: 459-474. 10.1109/sp.2014.36 |
12 | 门罗币官网中文版[EB/OL]. [2021-01-01].. 10.1145/371920.372097 |
— Chinese Version[EB/OL]. [2021-01-01].10.1145/371920.372097 | |
13 | WIJAYA D A, LIU J K, STEINFELD R, et al. On the unforkability of Monero[C]// Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. New York: ACM, 2019: 621-632. 10.1145/3321705.3329823 |
14 | SINGH K, HEULOT N, HAMIDA E B. Towards anonymous, unlinkable, and confidential transactions in blockchain[C]// Proceedings of the 2018 IEEE International Conferences on Internet of Things, Green Computing and Communications, Cyber, Physical and Social Computing, Smart Data, Blockchain, Computer and Information Technology. Piscataway: IEEE, 2018: 1642-1649. 10.1109/cybermatics_2018.2018.00274 |
15 | YU J S, AU M H A, ESTEVES-VERISSIMO P. Re-thinking untraceability in the CryptoNote-style blockchain[C]// Proceedings of the IEEE 32nd Computer Security Foundations Symposium. Piscataway: IEEE, 2019: 94-107. 10.1109/csf.2019.00014 |
16 | LIU J K, AU M H, SUSILO W, et al. Linkable ring signature with unconditional anonymity[J]. IEEE Transactions on Knowledge and Data Engineering, 2014, 26(1): 157-165. 10.1109/tkde.2013.17 |
17 | RIVEST R L, SHAMIR A, TAUMAN Y. How to leak a secret[C]// Proceedings of the 2001 International Conference on Theory and Application of Cryptology and Information Security, LNCS2248. Berlin: Springer, 2001:552-565. |
18 | SILVERMAN J H. The Arithmetic of Elliptic Curves, GTM 106[M]. 2nd ed. New York: Springer, 2009:376-386. 10.1007/978-0-387-09494-6_3 |
19 | SUN S F, AU M H, LIU J K, et al. RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero[C]// Proceedings of the 2017 European Symposium on Research in Computer Security, LNCS10493. Cham: Springer, 2017: 456-474. |
20 | LIU J K, WEI V K, WONG D C. Linkable spontaneous anonymous group signature for ad hoc groups[C]// Proceedings of the 2004 Australasian Conference on Information Security and Privacy, LNCS3108. Berlin: Springer, 2004: 325-335. |
21 | NOETHER S, NOETHER S. Monero is not that mysterious: MRL-0003[R/OL]. (2014-09-25) [2021-01-01].. 10.1177/0003603x1405900303 |
22 | The Monero Project. MiniNero: a Python reimplementation of the one-time ring signatures as found in Monero[CP/OL]. [2021-01-01].. 10.5373/jardcs/v12sp1/20201050 |
23 | FUJISAKI E, SUZUKI K. Traceable ring signature[C]// Proceedings of the 2007 International Workshop on Public Key Cryptography, LNCS4450. Berlin: Springer, 2007: 181-200. 10.1007/978-3-540-71677-8_13 |
24 | MERCER R. Privacy on the blockchain: unique ring signatures[R/OL]. (2016-12-25) [2021-01-01].. |
25 | NOETHER S. Ring signature confidential transactions for Monero[EB/OL]. (2015-12-17) [2021-01-01].. 10.5195/ledger.2016.34 |
26 | The Monero Project. Monero: triangular distribution to choose recent outputs more often for mixins[CP/OL]. [2021-01-01].. 10.1093/benz/9780199773787.article.b00124527 |
27 | YU Z X, AU M H, YU J S, et al. New empirical traceability analysis of CryptoNote-style blockchains[C]// Proceedings of the 2019 International Conference on Financial Cryptography and Data Security, LNCS11598. Cham: Springer, 2019: 133-149. |
28 | NOETHER S, MACKENZIE A, The Monero Research Lab. Ring confidential transactions [J]. Ledger, 2016, 1: No.34. 10.5195/ledger.2016.34 |
29 | Official site of Monero. Moneropedia — RingCT[EB/OL]. [2021-01-01].. 10.1007/978-3-319-66399-9_25 |
30 | KUMAR A, FISCHER C, TOPLE S, et al. A traceability analysis of Monero’s blockchain[C]// Proceedings of the 2017 European Symposium on Research in Computer Security, LNCS10493. Cham: Springer, 2017: 153-173. |
31 | MÖSER M, SOSKA K, HEILMAN E, et al. An empirical analysis of traceability in the Monero blockchain[J]. Proceedings on Privacy Enhancing Technologies, 2018, 2018(3): 143-163. 10.1515/popets-2018-0025 |
32 | YE C, OJUKWU C, HSU A, et al. Alt-coin traceability[EB/OL]. (2020-07-07) [2021-01-01].. |
33 | CHERVINSKI J A M, KREUTZ D, YU J S. FloodXMR: low-cost transaction flooding attack with Monero’s bulletproof protocol[EB/OL]. (2019-05-10) [2021-01-01].. |
34 | LEE K, MILLER A. Authenticated data structures for privacy-preserving Monero light clients[C]// Proceedings of the 2018 IEEE European Symposium on Security and Privacy Workshops. Piscataway: IEEE, 2018: 20-28. 10.1109/eurospw.2018.00010 |
35 | CAO T, YU J S, DECOUCHANT J, et al. Exploring the Monero peer-to-peer network[C]// Proceedings of the 2020 International Conference on Financial Cryptography and Data Security, LNCS12059. Cham: Springer, 2020: 578-594. |
36 | HEILMAN E, KENDLER A, ZOHAR A, et al. Eclipse attacks on Bitcoin peer-to-peer network[C]// Proceedings of the 24th USENIX Security Symposium. Berkeley: USENIX Association, 2015: 129-144. |
37 | WIJAYA D A, LIU J, STEINFELD R, et al. Monero ring attack: recreating zero mixin transaction effect[C]// Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International Conference on Big Data Science and Engineering. Piscataway: IEEE, 2018:1196-1201. 10.1109/trustcom/bigdatase.2018.00165 |
38 | LIU Q Y, LIU Z, LONG Y, et al. Making Monero hard-to-trace and more efficient[C]// Proceedings of the 18th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/13th IEEE International Conference on Big Data Science and Engineering. Piscataway: IEEE, 2019: 514-521. 10.1109/trustcom/bigdatase.2019.00075 |
39 | WIJAYA D A, LIU J, STEINFELD R, et al. Anonymity reduction attacks to Monero[C]// Proceedings of the 2018 International Conference on Information Security and Cryptology, LNCS11449. Cham: Springer, 2019: 86-100. |
40 | HINTEREGGER A, HASLHOFER B. Short paper: an empirical analysis of Monero cross-chain traceability[C]// Proceedings of the 2019 International Conference on Financial Cryptography and Data Security, LNCS11598. Cham: Springer, 2019: 150-157. |
41 | BORGGREN N, KIM H Y, YAO L H, et al. Simulated blockchains for machine learning traceability and transaction values in the Monero network[EB/OL]. (2020-01-12) [2021-01-01].. |
[1] | Tingwei CHEN, Jiacheng ZHANG, Junlu WANG. Random validation blockchain construction for federated learning [J]. Journal of Computer Applications, 2024, 44(9): 2770-2776. |
[2] | Xiaoling SUN, Danhui WANG, Shanshan LI. Dynamic ciphertext sorting and retrieval scheme based on blockchain [J]. Journal of Computer Applications, 2024, 44(8): 2500-2505. |
[3] | Baoyan SONG, Junxiang DING, Junlu WANG, Haolin ZHANG. Consortium blockchain modification method based on chameleon hash and verifiable secret sharing [J]. Journal of Computer Applications, 2024, 44(7): 2087-2092. |
[4] | He HUANG, Yu JIN. Cloud data auditing scheme based on voting and Ethereum smart contracts [J]. Journal of Computer Applications, 2024, 44(7): 2093-2101. |
[5] | Jiao LI, Xiushan ZHANG, Yuanhang NING. Blockchain sharding method for reducing cross-shard transaction proportion [J]. Journal of Computer Applications, 2024, 44(6): 1889-1896. |
[6] | Lipeng ZHAO, Bing GUO. Blockchain consensus improvement algorithm based on BDLS [J]. Journal of Computer Applications, 2024, 44(4): 1139-1147. |
[7] | Meihong CHEN, Lingyun YUAN, Tong XIA. Data classified and graded access control model based on master-slave multi-chain [J]. Journal of Computer Applications, 2024, 44(4): 1148-1157. |
[8] | Gaimei GAO, Jin ZHANG, Chunxia LIU, Weichao DANG, Shangwang BAI. Privacy protection scheme for crowdsourced testing tasks based on blockchain and CP-ABE policy hiding [J]. Journal of Computer Applications, 2024, 44(3): 811-818. |
[9] | Haifeng MA, Yuxia LI, Qingshui XUE, Jiahai YANG, Yongfu GAO. Attribute-based encryption scheme for blockchain privacy protection [J]. Journal of Computer Applications, 2024, 44(2): 485-489. |
[10] | Yiting WANG, Wunan WAN, Shibin ZHANG, Jinquan ZHANG, Zhi QIN. Linkable ring signature scheme based on SM9 algorithm [J]. Journal of Computer Applications, 2024, 44(12): 3709-3716. |
[11] | Deyuan LIU, Jingquan ZHANG, Xing ZHANG, Wunan WAN, Shibin ZHANG, Zhi QIN. Cross-chain identity authentication scheme based on certificate-less signcryption [J]. Journal of Computer Applications, 2024, 44(12): 3731-3740. |
[12] | Keshuo SUN, Haiying GAO, Yang SONG. Multi-authority attribute-based encryption scheme for private blockchain over public blockchain [J]. Journal of Computer Applications, 2024, 44(12): 3699-3708. |
[13] | Peng FANG, Fan ZHAO, Baoquan WANG, Yi WANG, Tonghai JIANG. Development, technologies and applications of blockchain 3.0 [J]. Journal of Computer Applications, 2024, 44(12): 3647-3657. |
[14] | Ziqian CHEN, Kedi NIU, Zhongyuan YAO, Xueming SI. Review of blockchain lightweight technology applied to internet of things [J]. Journal of Computer Applications, 2024, 44(12): 3688-3698. |
[15] | Tingting GAO, Zhongyuan YAO, Miao JIA, Xueming SI. Overview of on-chain and off-chain consistency protection technologies [J]. Journal of Computer Applications, 2024, 44(12): 3658-3668. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||