[1] 中国区块链技术和产业发展论坛.区块链技术和应用发展报告[R]. 北京:中国区块链技术和产业发展论坛.2016
[2] 中国区块链技术和产业发展论坛.CBD-Forum-001-2017区块链参考架构 [S].北京:中国区块链技术和产业发展论坛.2017
[3] Douceur J. The sybil attack[C]//Proc of the 1st Int Workshop on Peer-to-peer Systems. 2002
[4] Heilman E, Kendler A, Zohar A, et al. Eclipse attacks on Bitcoin’s peer-to-peer network[C]//Proc of the 24th USENIX Security Symp. Berkeley, CA:USENIX Association, 2015
[5] Nakamoto S.Bitcoin:A peer-to-peer electronic cash system[EB/OL]. 2008[2019-12-16]. http://bitcoin.org/bitcoin.pdf
[6] Goldschlag D, Reed M, Syverson P. Onion routing[J]. Communications of the ACM, 1999, 42(2):39-41
[7] Biryukov A , Pustogarov I , Weinmann R. Trawling for tor hidden services: Detection, measurement, deanonymization[C]//Proc of 2013 IEEE Symp on Security and Privacy. Piscataway, NJ:IEEE , 2013
[8] Rivest R L, Shamir A, Tauman Y. How to leak a secret[C] //Proc of the 7th Int Conf on the Theory and Application of Cryptology and Information Security. Berlin:Springer, 2001
[9] Goldwasser S, Micali S, Rackoff C. The knowledge complexity of interactive proof systems[C]//Proc of the 17th ACM. New York:ACM, 1985:291-304