Please wait a minute...
Journal of ZheJiang University (Engineering Science)  2022, Vol. 56 Issue (1): 1-15    DOI: 10.3785/j.issn.1008-973X.2022.01.001
    
Review of blockchain data security management and privacy protection technology research
Xiu-bo LIANG(),Jun-han WU,Yu ZHAO,Ke-ting YIN*()
School of Software Technology, Zhejiang University, Hangzhou 310058, China
Download: HTML     PDF(790KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

The researches on data security management and privacy protection technologies at home and abroad were analyzed and summarized aiming at current problems in blockchain security, such as unreasonable data management mode, unreliable data sharing scheme, smart contract vulnerabilities not easily fixed and incomplete privacy protection of multiple types of data. Various security problems and reasonable solutions in current blockchain systems were outlined from four aspects: data storage security, data privacy security, data access security and data sharing security. The challenges and future research directions of data security in blockchain were discussed. Some reference for the future work of researchers was provided in the field of blockchain security.



Key wordsblockchain      data management      privacy protection      secure storage      secure access      secure sharing     
Received: 04 September 2021      Published: 05 January 2022
CLC:  TP 399  
Fund:  国家重点研发计划资助项目(2019YFB1404903).
Corresponding Authors: Ke-ting YIN     E-mail: xiubo@zju.edu.cn;yinkt@zju.edu.cn
Cite this article:

Xiu-bo LIANG,Jun-han WU,Yu ZHAO,Ke-ting YIN. Review of blockchain data security management and privacy protection technology research. Journal of ZheJiang University (Engineering Science), 2022, 56(1): 1-15.

URL:

https://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2022.01.001     OR     https://www.zjujournals.com/eng/Y2022/V56/I1/1


区块链数据安全管理和隐私保护技术研究综述

针对当前区块链安全方面存在数据管理模式不合理、数据共享方案不可靠、智能合约漏洞不易修复和多类型数据隐私保护不完善等问题,分析并总结了国内外关于数据安全管理和隐私保护技术的文献. 从数据存储安全、数据隐私安全、数据访问安全和数据共享安全4个方面来概括目前区块链系统存在的各类安全问题及合理的解决方案,讨论区块链实现数据安全面临的挑战及未来的研究方向,为区块链安全领域相关人员未来的研究工作提供了一定的参考.


关键词: 区块链,  数据管理,  隐私保护,  安全存储,  安全访问,  安全共享 
Fig.1 Technologies related to data security management and privacy protection in blockchain
Fig.2 Node reliability validation model architecture[12]
混币机制 特点 混币花费 DoS攻击风险 女巫攻击风险 盗窃危险 混币数量 延迟 不可链接性
Mixcoin[23] 混合中心 需要 不限 一般
Blindcoin[24] 盲签名 需要 中等 不限 一般
Blind-mixing[25] 椭圆曲线+盲签名 需要 中等 不限 一般
Dash 多中心 需要 中等
CoinJoin[26] 多轮签名 不需要 一般
Xim[27] 多轮混合 不需要 中等 中等
Monero 环签名 不需要 不限
CoinShuffle[28] 解密混合网络 不需要 中等
CoinShuffle++[29] DC-nets 不需要 中等
CoinParty[30] 多方安全计算 不需要 中等
CoinMingle[31] 环签名 不需要 不限
Tab.1 Comparison of characteristics of various coin blending mechanisms
Fig.3 General process of blockchain-based distributed PKI system
区块链 关系型语义 数据完整性保护 数据隐私保护
ChainSQL[64]
BigchainDB[65]
EtherQL[66]
SEBDB[68]
BlockchainDB[70-71]
vChain[9]
Searchain[75]
Tab.2 Comparison of blockchain single party data trusted query performance
[1]   祝烈煌, 高峰, 沈蒙, 等 区块链隐私保护研究综述[J]. 计算机研究与发展, 2017, 54 (10): 2170- 2186
ZHU Lie-huang, GAO Feng, SHEN Meng, et al Survey on privacy preserving techniques for blockchain technology[J]. Journal of Computer Research and Development, 2017, 54 (10): 2170- 2186
doi: 10.7544/issn1000-1239.2017.20170471
[2]   张奥, 白晓颖 区块链隐私保护研究与实践综述[J]. 软件学报, 2020, 31 (5): 1406- 1434
ZHANG Ao, BAI Xiao-ying Survey of research and practices on blockchain privacy protection[J]. Journal of Software, 2020, 31 (5): 1406- 1434
[3]   李董, 魏进武 区块链技术原理、应用领域及挑战[J]. 电信科学, 2016, 32 (12): 20- 26
LI Dong, WEI Jin-wu Theory, application fields and challenge of the blockchain technology[J]. Telecommunications Science, 2016, 32 (12): 20- 26
[4]   王千阁, 何蒲, 聂铁铮, 等 区块链系统的数据存储与查询技术综述[J]. 计算机科学, 2018, 45 (12): 12- 18
WANG Qian-ge, HE Pu, NIE Tie-zheng, et al Survey of data storage and query techniques in blockchain systems[J]. Computer Science, 2018, 45 (12): 12- 18
[5]   王宗慧, 张胜利, 金石, 等 区块链数据隐私保护研究[J]. 物联网学报, 2018, 2 (3): 71- 81
WANG Zong-hui, ZHANG Sheng-li, JIN Shi, et al Survey on privacy preserving techniques for blockchain[J]. Chinese Journal on Internet of Things, 2018, 2 (3): 71- 81
[6]   钱卫宁, 邵奇峰, 朱燕超, 等 区块链与可信数据管理: 问题与方法[J]. 软件学报, 2018, 29 (1): 150- 159
QIAN Wei-ning, SHAO Qi-feng, ZHU Yan-chao, et al Research problems and methods in blockchain and trusted data management[J]. Journal of Software, 2018, 29 (1): 150- 159
[7]   张志威, 王国仁, 徐建良, 等 区块链的数据管理技术综述[J]. 软件学报, 2020, 31 (9): 2903- 2925
ZHANG Zhi-wei, WANG Guo-ren, XU Jian-liang, et al Survey on data management in blockchain systems[J]. Journal of Software, 2020, 31 (9): 2903- 2925
[8]   EL-HINDI M, BINNIG C, ARASU A, et al. BlockchainDB: a shared database on blockchains [C]// Proceedings of the VLDB Endowment. Los Angeles: VLDB, 2019: 1597-1609.
[9]   XU Cheng, ZHANG Ce, XU Jian-liang. vchain: enabling verifiable boolean range queries over blockchain databases [C]// Proceedings of the 2019 International Conference on Management of Data. New York: ACM, 2019: 141-158.
[10]   The blockchain size of Bitcoin [EB/OL]. [2021-08-25]. https://www.blockchain.com/charts/blocks-size.
[11]   The blockchain size of Ethereum [EB/OL]. [2021-08-25]. https://blockchair.com/ethereum/charts/blockchain-size.
[12]   JIA Da-yu, XIN Jun-chang, WANG Zhi-qiong, et al. ElasticChain: support very large blockchain by reducing data redundancy [C]// Proceedings of the Asia-Pacific Web and Web-Age Information Management Joint International Conference on Web and Big Data. Cham: Springer, 2018: 440-454.
[13]   贾大宇, 信俊昌, 王之琼, 等 存储容量可扩展区块链系统的高效查询模型[J]. 软件学报, 2019, 30 (9): 2655- 2670
JIA Da-yu, XIN Jun-chang, WANG Zhi-qiong, et al Efficient query model for storage capacity scalable blockchain system[J]. Journal of Software, 2019, 30 (9): 2655- 2670
[14]   AHLSWEDE R, NING C, LI S Y R, et al Network information flow[J]. IEEE Transactions on Information Theory, 2000, 46 (4): 1204- 1216
doi: 10.1109/18.850663
[15]   DAI Ming-jun, ZHANG Sheng-li, WANG Hui, et al A low storage room requirement framework for distributed ledger in blockchain[J]. IEEE Access, 2018, 6: 22970- 22975
doi: 10.1109/ACCESS.2018.2814624
[16]   RAMAN R K, VARSHNEY L R. Dynamic distributed storage for scaling blockchains [C]// Dynamic Distributed Storage for Scaling Blockchains. Vail: IEEE, 2018: 2619-2623.
[17]   QI Xiao-dong, ZHANG Zhao, JIN Che-qing, et al A reliable storage partition for permissioned blockchain[J]. IEEE Transactions on Knowledge and Data Engineering, 2020, 33 (1): 14- 27
[18]   HEPP T, SHARINGHOUSEN M, EHRET P, et al On-chain vs. off-chain storage for supply-and blockchain integration[J]. it-Information Technology, 2018, 60 (5/6): 283- 291
[19]   ALI S, WANG G, WHITE B, et al. A blockchain-based decentralized data storage and access framework for pinger [C]// Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering. New York: IEEE, 2018: 1303-1308.
[20]   AYOADE G, KARANDE V, KHAN L, et al. Decentralized IoT data management using blockchain and trusted execution environment [C]// Proceedings of the 2018 IEEE International Conference on Information Reuse and Integration. Salt Lake City: IEEE, 2018: 15-22.
[21]   XIAO Yang, ZHANG Ning, LI Jin, et al. PrivacyGuard: enforcing private data usage control with blockchain and attested off-chain contract execution [C]// Proceedings of the European Symposium on Research in Computer Security. Cham: Springer, 2020: 610-629.
[22]   REID F, HARRIGAN M. An analysis of anonymity in the bitcoin system [M]// Security and privacy in social networks. New York: [s. n. ], 2013: 197-223.
[23]   BONNEAU J, NARAYANAN A, MILLER A, et al. Mixcoin: anonymity for bitcoin with accountable mixes [C]// International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2014: 486-504.
[24]   VALENTA L, ROWAN B. Blindcoin: blinded, accountable mixes for bitcoin [C]// Proceedings of the International Conference on Financial Cryptography and Data Security. Berlin: Springer, 2015: 112-126.
[25]   SHENTU Qing-chun, YU Jian-ping. A blind-mixing scheme for Bitcoin based on an elliptic curve cryptography blind digital signature algorithm [EB/OL]. (2017-06-10). https://org/ftp/arxiv/papers/1510/1510.05833.pdf.
[26]   MAXWELL G. CoinJoin: Bitcoin privacy for the real world [EB/OL]. (2013-08-22). https://bitcointalk.org/index.php?topic=279249.0.
[27]   BISSIAS G, OZISIK A P, LEVINE B N, et al. Sybil-resistant mixing for bitcoin [C]// Proceedings of the 13th Workshop on Privacy in the Electronic Society. Scottsdale: [s. n.], 2014: 149-158.
[28]   RUFFING T, MORENO S P, KATE A. Coinshuffle: practical decentralized coin mixing for Bitcoin [C]// Proceedings of the European Symposium on Research in Computer Security. Cham: Springer, 2014: 345-364.
[29]   RUFFING T, MORENO S P, KATE A. P2P mixing and unlinkable bitcoin transactions [C]// Proceedings of NDSS. San Diego: [s. n. ], 2017: 1-15.
[30]   ZIEGELDORF J H, GROSSMANN F, HENZE M, et al. Coinparty: secure multi-party mixing of bitcoins [C]// Proceedings of the 5th ACM Conference on Data and Application Security and Privacy. New York: ACM, 2015: 75-86.
[31]   XU Mi-xue, YUAN Chao, SI Xue-ming, et al. CoinMingle: a decentralized coin mixing scheme with a mutual recognition delegation strategy [M]// Proceedings of the 1st IEEE International Conference on Hot Information-Centric Networking. [S. l. ]: IEEE, 2018: 160-166.
[32]   SNOW P, DEERY B, LU J, et al. Factom: business processes secured by immutable audit trails on the blockchain [R]. Texas: Factom, 2014.
[33]   HOU Yi-bin, LIANG Xun, ZHAN Xiao-yu Block chain based architecture model of electronic evidence system[J]. Computer Science, 2018, 45 (6A): 348- 351
[34]   HUANG Xiao-fang, XU Lei, YANG Xi Blockchain model of cloud forensics[J]. Journal of Beijing University of Posts and Telecommunications, 2017, 40 (6): 120- 124
[35]   AZARIA A, EKBLAW A, VIEIRA T, et al. Medrec: using blockchain for medical data access and permission management [C]// Proceedings of the 2016 2nd International Conference on Open and Big Data. Vienna: IEEE, 2016: 25-30.
[36]   ZHANG Meng, WANG Shen, ZHANG Pan, et al. Protecting data privacy for permissioned Blockchains using identity-based encryption [C]// Proceedings of the 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference. Chengdu: IEEE, 2019: 602-605.
[37]   王瑞锦, 唐榆程, 张巍琦, 等 基于同态加密和区块链技术的车联网隐私保护方案[J]. 网络与信息安全学报, 2020, 6 (1): 46- 53
WANG Rui-jin, TANG Yu-cheng, ZHANG Wei-qi, et al Privacy protection scheme for internet of vehicles based on homomorphic encryption and block chain technology[J]. Chinese Journal of Network and Information Security, 2020, 6 (1): 46- 53
[38]   刘彦松, 夏琦, 李柱, 等 基于区块链的链上数据安全共享体系研究[J]. 大数据, 2020, 6 (5): 92- 105
LIU Yan-song, XIA Qi, LI Zhu, et al Research on secure data sharing system based on blockchain[J]. Big Data Research, 2020, 6 (5): 92- 105
[39]   MA Shun-li, DENG Yi, HE De-biao, et al An efficient NIZK scheme for privacy-preserving transactions over account-model blockchain[J]. IEEE Transactions on Dependable and Secure Computing, 2021, 18 (2): 641- 651
doi: 10.1109/TDSC.2020.2969418
[40]   MIERS I, GARMAN C, GREEN M, et al. Zerocoin: anonymous distributed e-cash from bitcoin [C]// Proceedings of the 2013 IEEE Symposium on Security and Privacy. Washington: IEEE, 2013: 397-411.
[41]   SASSON E B, CHIESA A, GARMAN C, et al. Zerocash: decentralized anonymous payments from bitcoin [C]// Proceedings of the 2014 IEEE Symposium on Security and Privacy. Berkeley: IEEE, 2014: 459-474.
[42]   GUAN Zhang-huang, WAN Zhi-guo, YANG Yang, et al. Blockmaze: an efficient privacy-preserving account-model blockchain based on zk-SNARKs [EB/OL]. (2020-09-18). https://ieeexplore.ieee.org/document/9200775.
[43]   FROMKNECHT C, VELICANU D, YAKOUBOY S. A decentralized public key infrastructure with identity retention [EB/OL]. (2014-11-11). https://allquantor.at/blockchainbib/pdf/fromknecht2014decentralized.pdf.
[44]   FROMKNECHT C, VELICANU D, YAKOUBOY S. Certcoin: a namecoin based decentralized authentication system 6.857 class project [EB/OL]. (2014-03-14). http://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf.
[45]   AXON L. Privacy-awareness in blockchain-based PKI [EB/OL]. (2015-10-20). https://ora.ox.ac.uk/objects/uuid:f8377b69-599b-4cae-8df0-f0cded53e63b.
[46]   AXON L, GOLDSMITH M. PB-PKI: a privacy-aware blockchain-based PKI [C]// 14th International Conference on Security and Cryptography. Washington: [s. n. ]. 2016: 311-318.
[47]   ALI M, NELSON J, SHEA R, et al. Blockstack: a global naming and storage system secured by blockchains [C]// Proceedings of the USENIX Annual Technical Conference. Berkeley: USENIX, 2016: 181-194.
[48]   KALODNER H, CARLSTEN M, ELLENBOGEN P, et al. An empirical study of namecoin and lessons for decentralized namespace design [C]// Proceedings of WEIS. Delft: [s. n. ], 2015.
[49]   BUI T, AURA T. Application of public ledgers to revocation in distributed access control [C]// Proceedings of International Conference on Information and Communications Security. Cham: Springer, 2018: 781-792.
[50]   MATSUMOTO S, REISCHUK R. IKP: turning a PKI around with decentralized automated incentives [C]// Proceedings of 2017 IEEE Symposium on Security and Privacy. San Jose: IEEE, 2017: 410-426.
[51]   CHEN Jing, YAO Shi-xiong, YUAN Quan, et al. Certchain: public and efficient certificate audit based on blockchain for tls connections [C]// Proceedings of IEEE INFOCOM 2018-IEEE Conference on Computer Communications. Hawaii: IEEE, 2018: 2060-2068.
[52]   WANG Ze, LIN Jing-qiang, CAI Quan-wei, et al Blockchain-based certificate transparency and revocation transparency[J]. IEEE Transactions on Dependable and Secure Computing, 2020, 10958: 144- 162
[53]   刘敖迪, 杜学绘, 王娜, 等 基于区块链的大数据访问控制机制[J]. 软件学报, 2019, 30 (9): 2636- 2654
LIU Ao-di, DU Xue-hui, WANG Na, et al Blockchain-based access control mechanism for big data[J]. Journal of Software, 2019, 30 (9): 2636- 2654
[54]   YUAN E, TONG J. Attributed based access control for web services [C]// Proceedings of IEEE International Conference on Web Services. Washington: IEEE, 2005.
[55]   AZARIA A, EKBLAW A, VIEIRA T, et al. Medrec: using blockchain for medical data access and permission management [C]// Proceedings of 2016 2nd International Conference on Open and Big Data. Vienna: IEEE, 2016: 25-30.
[56]   EKBLAW A, AZARIA A, HALAMKA J, et al. A case study for blockchain in healthcare: “MedRec” prototype for electronic health records and medical research data [C]// Proceedings of IEEE Open and Big Data Conference. Washington: IEEE, 2016: 13.
[57]   CRUZ J, KAJI Y, YANAI N RBAC-SC: role-based access control using smart contract[J]. IEEE Access, 2018, 6: 12240- 12251
doi: 10.1109/ACCESS.2018.2812844
[58]   DING Xiang-wu, YANG Jian-ming. An access control model and its application in blockchain [C]// Proceedings of 2019 International Conference on Communications, Information System and Computer Engineering. Haikou: IEEE, 2019: 163-167.
[59]   ALANSARI S, PACI F, SASSONE V. A distributed access control system for cloud federations [C]// Proceedings of 2017 IEEE 37th International Conference on Distributed Computing Systems. Atlanta: IEEE, 2017: 2131-2136.
[60]   ALANSARI S, PACI F, MARGHERI A, et al. Privacy-preserving access control in cloud federations [C]// Proceedings of 2017 IEEE 10th International Conference on Cloud Computing. Hawaii: IEEE, 2017: 757-760.
[61]   OUADDAH A, ABOU E A, AIT O A FairAccess: a new blockchain-based access control framework for the Internet of things[J]. Security and Communication Networks, 2016, 9 (18): 5943- 5964
doi: 10.1002/sec.1748
[62]   OUADDAH A, ABOU E A, AIT O A. Towards a novel privacy-preserving access control model based on blockchain technology in IoT [M]// Europe and MENA cooperation advances in information and communication technologies. Cham: Springer, 2017: 523-533.
[63]   LE T, MUTKA M. CapChain: a privacy preserving access control framework based on blockchain for pervasive environments [C]// Proceedings of 2018 IEEE International Conference on Smart Computing. Sicily: IEEE, 2018: 57-64.
[64]   Beijing PeerSafe Technology Co. , Ltd. White paper for blockchain database application platform [EB/OL]. (2019-01-10). http://blockchain.peersafe.com/PDF/ChainSQL-whitepaper.pdf.
[65]   MCCONAGHY T, MARQUES R, MULLER A, et al. Bigchaindb: a scalable blockchain database [EB/OL]. (2018-03-14). https://www.bigchaindb.com/whitepaper.
[66]   LI Yang, ZHENG Kai, YAN Ying, et al. EtherQL: a query layer for blockchain system [C]// Proceedings of International Conference on Database Systems for Advanced Applications. Cham: Springer, 2017: 556-567.
[67]   焦通, 申德荣, 聂铁铮, 等 区块链数据库: 一种可查询且防篡改的数据库[J]. 软件学报, 2019, 30 (9): 2671- 2685
JIAO Tong, SHEN De-rong, NIE Tie-zheng, et al BlockchainDB: querable and immutable database[J]. Journal of Software, 2019, 30 (9): 2671- 2685
[68]   ZHU Yan-chao, ZHANG Zhao, JIN Che-qing, et al. Sebdb: semantics empowered blockchain database [C]// Proceedings of 2019 IEEE 35th International Conference on Data Engineering. Macao: IEEE, 2019: 1820-1831.
[69]   蔡磊, 朱燕超, 郭庆兴, 等 面向区块链的高效物化视图维护和可信查询[J]. 软件学报, 2020, 31 (3): 680- 694
CAI Lei, ZHU Yan-chao, GUO Qing-xing, et al Efficient materialized view maintenance and trusted query for blockchain[J]. Journal of Software, 2020, 31 (3): 680- 694
[70]   EL-HINDI M, HEYDEN M, BINNIG C, et al. Blockchaindb-towards a shared database on blockchains [C]// Proceedings of the 2019 International Conference on Management of Data. New York: ACM, 2019: 1905-1908.
[71]   EL-HINDI M, BINNIG C, ARASU A, et al. BlockchainDB: a shared database on blockchains [C]// Proceedings of the VLDB Endowment. Tokyo: VLDB, 2019: 1597-1609.
[72]   XU Cheng, CHEN Qian, HU Hai-bo, et al Authenticating aggregate queries over set-valued data with confidentiality[J]. IEEE Transactions on Knowledge and Data Engineering, 2017, 30 (4): 630- 644
[73]   RAMACHANDRAN A, KANTARCIOGLU D. Using blockchain and smart contracts for secure data provenance management [EB/OL]. (2017-09-28). https://arxiv.org/abs/1709.10000v1#.
[74]   RUAN P, CHEN G, DINH T T A, et al. Fine-grained, secure and efficient data provenance on blockchain systems [C]// Proceedings of the VLDB Endowment. Tokyo: VLDB, 2019: 975-988.
[75]   JIANG Peng, GUO Fu-chun, LIANG Kai-tai, et al Searchain: blockchain-based private keyword search in decentralized storage[J]. Future Generation Computer Systems, 2020, 107: 781- 792
doi: 10.1016/j.future.2017.08.036
[76]   CAI Cheng-jun, YUAN Xing-jiang, WANG Cong. Towards trustworthy and private keyword search in encrypted decentralized storage [C]// Proccedings of 2017 IEEE International Conference on Communications. San Diego: IEEE, 2017: 1-7.
[77]   CHEN Lan-xiang, LEE Wai-kong, CHANG Chin-chen, et al Blockchain based searchable encryption for electronic health record sharing[J]. Future Generation Computer Systems, 2019, 95: 420- 429
doi: 10.1016/j.future.2019.01.018
[78]   ZHENG Bao-kun, ZHU Lie-huang, SHEN Meng, et al Scalable and privacy-preserving data sharing based on blockchain[J]. Journal of Computer Science and Technology, 2018, 33 (3): 557- 567
doi: 10.1007/s11390-018-1840-5
[79]   LI Yue, HUANG Jun-qin, QIN Sheng-zhi, et al. Big data model of security sharing based on blockchain [C]// Proceedings of 2017 3rd International Conference on Big Data Computing and Communications. Chengdu: IEEE, 2017: 117-121.
[80]   SHEN Meng, TANG Xiang-yun, ZHU Lie-huang, et al Privacy-preserving support vector machine training over blockchain-based encrypted IoT data in smart cities[J]. IEEE Internet of Things Journal, 2019, 6 (5): 7702- 7712
doi: 10.1109/JIOT.2019.2901840
[81]   ZHANG Ai-qing, LIN Xiao-dong Towards secure and privacy-preserving data sharing in e-health systems via consortium blockchain[J]. Journal of Medical Systems, 2018, 42 (8): 1- 18
[82]   ZIKRATOV I, KUZMIN A, AKIMENKO V, et al. Ensuring data integrity using blockchain technology [C]// Proceedings of 2017 20th Conference of Open Innovations Association. Petersburg: IEEE, 2017: 534-539.
[83]   LIU C H, LIN Q X, WEN S L Blockchain-enabled data collection and sharing for industrial IoT with deep reinforcement learning[J]. IEEE Transactions on Industrial Informatics, 2018, 15 (6): 3516- 3526
[84]   LIANG Xue-ping, ZHAO Juan, SHETTY S, et al. Integrating blockchain for data sharing and collaboration in mobile healthcare applications [C]// Proceedings of 2017 IEEE 28th Annual International Symposium on Personal, Indoor, and Mobile Radio Communications. Montreal: IEEE, 2017: 1-5.
[85]   YUE Xiao, WANG Hui-ju, JIN Da-wei, et al Healthcare data gateways: found healthcare intelligence on blockchain with novel privacy risk control[J]. Journal of Medical Systems, 2016, 40 (10): 1- 8
[86]   RAMAN R, VACULIN R, HIND M, et al. Trusted multi-party computation and verifiable simulations: a scalable blockchain approach [EB/OL]. (2018-09-22). https://arXiv.org/abs/1809.08438.
[87]   iCube: the world's first SMPC (secure multi-party computing) blockchain financial project [EB/OL]. (2017-11-20). https://www.8btc.com/article/153542.
[88]   Dianrong: Dianrong blockchain cloud service platform [EB/OL]. (2019-11-05). https://www.dianrongchain.com.
[89]   ZETZSCHE D A, AMER D W, BUCKLEY R P Decentralized finance[J]. Journal of Financial Regulation, 2020, 6 (2): 172- 203
doi: 10.1093/jfr/fjaa010
[90]   CACHIN C An information-theoretic model for steganography[J]. Information and Computation, 2004, 192 (1): 41- 56
doi: 10.1016/j.ic.2004.02.003
[91]   TIAN Jing, GOU Gao-peng, LIU Chang, et al. DLchain: a covert channel over blockchain based on dynamic labels [C]// Proceedings of International Conference on Information and Communications Security. Cham: Springer, 2019: 814-830.
[92]   司成祥, 高峰, 祝烈煌, 等 一种支持动态标签的区块链数据隐蔽传输机制[J]. 西安电子科技大学学报, 2020, 47 (5): 94- 102
SI Cheng-xiang, GAO Feng, ZHU Lie-huang, et al Covert data transmission mechanism based on dynamic label in blockchain[J]. Journal of Xidian University, 2020, 47 (5): 94- 102
[93]   GAO Feng, ZHU Lie-huang, GAI Ke-ke, et al Achieving a covert channel over an open blockchain network[J]. IEEE Network, 2020, 34 (2): 6- 13
doi: 10.1109/MNET.001.1900225
[94]   PARTALA J Provably secure covert communication on blockchain[J]. Cryptography, 2018, 2 (3): 1- 18
[1] Miao HE,Fen-hua BAI,Zhuo YU,Tao SHEN. Publicly verifiable secret sharing technology in blockchain[J]. Journal of ZheJiang University (Engineering Science), 2022, 56(2): 306-312.
[2] Si-han DONG,Jun-chang XIN,Kun HAO,Zhong-ming YAO,Jin-yi CHEN. A join query optimization algorithm in multi-blockchain environment[J]. Journal of ZheJiang University (Engineering Science), 2022, 56(2): 313-321.
[3] Xue-jiao LIU,Yi-dan YIN,Wei CHEN,Ying-jie XIA,Jia-li XU,Li-dong HAN. Secure data sharing scheme in Internet of Vehicles based on blockchain[J]. Journal of ZheJiang University (Engineering Science), 2021, 55(5): 957-965.
[4] Lei ZHANG,Jing ZHANG. Differential privacy protection scheme supporting high data utility and fault tolerance[J]. Journal of ZheJiang University (Engineering Science), 2019, 53(8): 1496-1505.
[5] SHENG Nian-zu, LI Fang, LI Xiao-feng, ZHAO He, ZHOU Tong. Data capitalization method based on blockchain smart contract for Internet of Things[J]. Journal of ZheJiang University (Engineering Science), 2018, 52(11): 2150-2158.
[6] PI Dun-Bei, CHEN Ke, CHEN Gang, DONG Jin-Xiang. Privacy protection method based on user profile of two-step sorting[J]. Journal of ZheJiang University (Engineering Science), 2010, 44(9): 1659-1665.
[7] BANG Zhi-Yu, LI Shan-Beng, YANG Chao-Hui, LIN Xin. Anonymous authorization in trust management[J]. Journal of ZheJiang University (Engineering Science), 2010, 44(5): 897-902.