[1] Nakamoto S. Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2019-9-21] http://bitcoin.org/bitcoin.pdf. [2] Reid F, Harrigan M. An analysis of anonymity in the Bitcoin system[C]//Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust, IEEE, 2011:1318-1326. [3] Katz J. Digital signatures[M]. Berlin:Springer, 2010:3-33. [4] Noether S. Ring signature confidential transactions for Monero[R/OL]. 2015[2019-11-03]. http://eprint.iacr.org/2015/1098. [5] Shen N, Mackenzie A, Lab T M. Ring confidential transactions[J]. Ledger, 2016(1):1-18. [6] Maxwell G. Coinjoin:Bitcoin privacy for the real world[EB/OL]. 2013[2019-11-07]. https://bitcointalk.org/index.php?topic=279249. [7] Bissias G, Ozisik A P, Levine B N, et al. Sybil-resistant mixing for Bitcoin[C]//Proceedings of the Workshop on Privacy in the Electronic Society, 2014:149-158. [8] Miers I, Garman C, Green M, et al. Zerocoin:anonymous distributed E-cash from Bitcoin[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2013:397-411. [9] Sasson E B, Chiesa A, Garman C, et al. Zerocash:decentralized anonymous payments from Bitcoin[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2014:459-474. [10] Bensasson E, Chiesa A, Genkin D, et al. SNARKs for C:verifying program executions succinctly and in zero knowledge[J]. Lecture Notes in Computer Science, 2013, 8043:90-108. [11] Wu Y B, Fan H N, Wang X Y, et al. A regulated digital currency[J]. Science China:Information Sciences, 2019, 62(3):032109. https://doi.org/10.1007/s11432-018-9611-3. [12] Naganuma K, Yoshino M, Sato H, et al. Auditable Zerocoin[C]//IEEE European Symposium on Security and Privacy Workshops. Piscataway, NJ:IEEE Press, 2017:59-63. [13] Narula N, Vasquez W, Virza M. ZkLedger:privacy-preserving auditing for distributed ledgers[C]//The 15th USENIX Symposium on Networked Systems Design and Implementation, 2018:65-80. [14] Wüst K, Kostiainen K, Capkun V, et al. PRCash:fast, private and regulated transactions for digital currencies[C]//Financial Cryptography and Data Security. Berlin:Springer, 2019:158-178. [15] Jedusor T E. Mimblewimble[R/OL].[2019-11-18]. https://download.wpsoftware.net/bitcoin/wizardry/mimblewimble.txt. [16] Morais E, Koens T, Wijk C, et al. A survey on zero knowledge range proofs and applications[J]. SN Applied Sciences, 2019, 1(8):1-17. [17] Frankle J, Park S, Shaar D, et al. Practical accountability of secret processes[C]//The 27th USENIX Security Symposium, 2018:657-674. [18] Saia J, Zamani M. Recent results in scalable multi-party computation[C]//International Conference on Current Trends in Theory and Practice of Informatics. Berlin:Springer, 2015:24-44. [19] Chen Y, Ma X. PGC:pretty good confidential transaction system with accountability[EB/OL]. 2019[2019-11-18]. https://eprint.iacr.org/2019/319. [20] Bunz B, Bootle J, Boneh D, et al. Bulletproofs:short proofs for confidential transactions and more[C]//IEEE Symposium on Security and Privacy. Piscataway, NJ:IEEE Press, 2018:315-334. [21] Elgamal T. A public key cryptosystem and a signature scheme based on discrete logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4):469-472. [22] 杨浩淼, 孙世新, 李洪伟. 双线性Diffie-Hellman问题研究[J]. 四川大学学报(工程科学版), 2006(2):137-140. Yang H M, Sun S X, Li H M. Research on bilinear Diffie-Hellman problem[J]. Journal of Sichuan University (Engineering Science Edition), 2006(2):137-140. (in Chinese) [23] Saberhagen N. Cryptonote v2.0[EB/OL]. 2018[2019-11-20]. https://download.csdn.net/download/cqliuqiang/10459878. |