2019
DOI: 10.1002/spy2.89
|View full text |Cite
|
Sign up to set email alerts
|

Research on privacy enhancement scheme of blockchain transactions

Abstract: Blockchain is the supporting technology for cryptocurrencies, which can be used to record transaction information among users. However, the information on blockchain can be accessed and verified by any user. To some extent, it is effortless to acquire users' identities, transaction privacy information by means of transaction tracing technology and data analysis technology. In order to tackle the above problems, we proposed a transaction privacy enhancement scheme based on the computational Diffie‐Hellman probl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
9
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 9 publications
(9 citation statements)
references
References 21 publications
0
9
0
Order By: Relevance
“…Feng et al. (2019) propose a group‐signature scheme in which multiple transactions are synthesized into one transaction, which conceals the exact identity of the transactor. We draw on these ideas towards building a secure, accountable, and privacy‐preserving data marketplace.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Feng et al. (2019) propose a group‐signature scheme in which multiple transactions are synthesized into one transaction, which conceals the exact identity of the transactor. We draw on these ideas towards building a secure, accountable, and privacy‐preserving data marketplace.…”
Section: Related Workmentioning
confidence: 99%
“…For general‐purpose scenarios, we embrace a mixing service center mechanism, which has been widely adopted by popular platforms such as BitcoinFog and SendShared, to protect privacy and ensure anonymity for cryptocurrencies (Feng et al. 2019). The mixing service center arbitrarily chooses a certain number of transaction requests in its transaction pool, forming a transaction list.…”
Section: Architecture Designmentioning
confidence: 99%
“…In this article we have presented a detection technique applicable to any crypto-ransomware. In comparison, there is a subset of the literature that describes ransomware detection techniques targeting a single ransomware strain (Ahmadian & Shahriari, 2016;Alam et al, 2018;Feng et al, 2017;Kara & Aydos, 2022;Quinkert et al, 2018). They base the detection on searching for some special behaviour shown by the selected strain and therefore they are hardly generalizable to other ransomware families.…”
Section: Comparison Of Effectivenessmentioning
confidence: 99%
“…In a group signature, any group member is allowed to generate signatures anonymously representing the entire group, and a signature can be opened to reveal the misbehaved members in case of a dispute. Consequently, group signature has been proved to be an appropriate way to ensure authentication, anonymity, and traceability in numerous privacy-preserving intricate schemes [10][11][12].…”
mentioning
confidence: 99%