{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T20:58:57Z","timestamp":1743109137454,"version":"3.40.3"},"publisher-location":"Cham","reference-count":48,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030578046"},{"type":"electronic","value":"9783030578053"}],"license":[{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,28]],"date-time":"2020-08-28T00:00:00Z","timestamp":1598572800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-57805-3_3","type":"book-chapter","created":{"date-parts":[[2020,8,27]],"date-time":"2020-08-27T13:04:15Z","timestamp":1598533455000},"page":"23-34","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Evolution of Privacy in the Blockchain: A Historical Survey"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8380-2962","authenticated-orcid":false,"given":"Sergio","family":"Marciante","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2444-5384","authenticated-orcid":false,"given":"\u00c1lvaro","family":"Herrero","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,28]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/TSMC.2018.2854904","volume":"48","author":"Y Yuan","year":"2018","unstructured":"Yuan, Y., Wang, F.: Blockchain and cryptocurrencies: model, techniques, and applications. IEEE Trans. Syst. Man Cybern.: Syst. 48, 1421\u20131428 (2018). \nhttps:\/\/doi.org\/10.1109\/TSMC.2018.2854904","journal-title":"IEEE Trans. Syst. Man Cybern.: Syst."},{"doi-asserted-by":"publisher","unstructured":"Minsky, N.: Decentralized governance of distributed systems via interaction control. In: Lecture Notes in Computer Science, pp. 374\u2013400. Springer, Heidelberg (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-29414-3_20","key":"3_CR2","DOI":"10.1007\/978-3-642-29414-3_20"},{"key":"3_CR3","volume-title":"Mastering Bitcoin: Programming the Open Blockchain","author":"A Antonopoulos","year":"2017","unstructured":"Antonopoulos, A.: Mastering Bitcoin: Programming the Open Blockchain, 2nd edn. O\u2019Reilly Media, Inc., Boston (2017)","edition":"2"},{"doi-asserted-by":"publisher","unstructured":"Chowdhury, M., Colman, A., Kabir, A., Han, J., Sarda, P.: Blockchain versus database: a critical analysis. In: 12th IEEE International Conference on Big Data Science and Engineering, pp. 1348\u20131353. IEEE, New York (2018). \nhttps:\/\/doi.org\/10.1109\/TrustCom\/BigDataSE.2018.00186","key":"3_CR4","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00186"},{"key":"3_CR5","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/978-3-030-30429-4_4","volume-title":"BPM 2019","author":"M Lange","year":"2019","unstructured":"Lange, M., Leiter, C., Alt, R.: Defining and delimitating distributed ledger technology: results of a structured literature analysis. In: Di Ciccio, C. (ed.) BPM 2019, pp. 43\u201354. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-30429-4_4"},{"key":"3_CR6","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to time-stamp a digital document. J. Cryptol. 3, 99\u2013111 (1991). \nhttps:\/\/doi.org\/10.1007\/BF00196791","journal-title":"J. Cryptol."},{"doi-asserted-by":"publisher","unstructured":"Bleumer, G.: Chaum blind signature scheme. In: van Tilborg, H.C.A. (ed.). Encyclopedia of Cryptography and Security, pp. 74\u201375. Springer, Boston (2005). \nhttps:\/\/doi.org\/10.1007\/0-387-23483-7_57","key":"3_CR7","DOI":"10.1007\/0-387-23483-7_57"},{"key":"3_CR8","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1007\/11426639_18","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"J Camenisch","year":"2005","unstructured":"Camenisch, J., Hohenberger, S., Lysyanskaya, A.: Compact e-cash. In: Cramer, R. (ed.) Advances in Cryptology \u2013 EUROCRYPT 2005, pp. 302\u2013321. Springer, Heidelberg (2005). \nhttps:\/\/doi.org\/10.1007\/11426639_18"},{"doi-asserted-by":"publisher","unstructured":"Sander, T., Ta-Shma, A.: Auditable, anonymous electronic cash extended abstract. In: Advances in Cryptology\u2014CRYPTO 1999, pp. 555\u2013572. Springer, Heidelberg (1999). \nhttps:\/\/doi.org\/10.1007\/3-540-48405-1_35","key":"3_CR9","DOI":"10.1007\/3-540-48405-1_35"},{"key":"3_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2017.08.020","author":"X Li","year":"2017","unstructured":"Li, X., Jiang, P., Chen, T., Luo, X., Wen, Q.: A survey on the security of blockchain systems. Future Gener. Comput. Syst. (2017). \nhttps:\/\/doi.org\/10.1016\/j.future.2017.08.020","journal-title":"Future Gener. Comput. Syst."},{"unstructured":"Stimolo, S.: 18 million mined bitcoins in total. Only 3 million remain (2019). \nhttps:\/\/en.cryptonomist.ch\/2019\/10\/19\/18-million-mined-bitcoins-in-total\/\n\n. Accessed 20 Feb 2020","key":"3_CR11"},{"key":"3_CR12","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume-title":"Advances in Cryptology","author":"D Chaum","year":"1983","unstructured":"Chaum, D.: Blind signatures for untraceable payments. In: Chaum, D., Rivest, R.L., Sherman, A.T. (eds.) Advances in Cryptology, pp. 199\u2013203. Springer, Boston (1983)"},{"unstructured":"Szabo, N.: Bit Gold. \nhttp:\/\/unenumerated.blogspot.com\/2005\/12\/bit-gold.html\n\n. Accessed 20 Feb 2020","key":"3_CR13"},{"key":"3_CR14","doi-asserted-by":"publisher","first-page":"2084","DOI":"10.1109\/COMST.2016.2535718","volume":"18","author":"F Tschorsch","year":"2016","unstructured":"Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: a technical survey on decentralized digital currencies. IEEE Commun. Surv. Tutor. 18, 2084\u20132123 (2016)","journal-title":"IEEE Commun. Surv. Tutor."},{"issue":"160","key":"3_CR15","first-page":"160","volume":"4","author":"R Grinberg","year":"2011","unstructured":"Grinberg, R.: Bitcoin: an innovative alternative digital currency. Hastings Sci. Technol. Law J. 4(160), 160 (2011)","journal-title":"Hastings Sci. Technol. Law J."},{"doi-asserted-by":"publisher","unstructured":"Pilkington, M.: Blockchain Technology: Principles and Applications. Edward Elgar (2016). \nhttps:\/\/doi.org\/10.4337\/9781784717766.00019","key":"3_CR16","DOI":"10.4337\/9781784717766.00019"},{"doi-asserted-by":"publisher","unstructured":"Bos, J.W., Halderman, J.A., Heninger, N., Moore, J., Naehrig, M., Wustrow, E.: Elliptic curve cryptography in practice. In: International Conference on Financial Cryptography and Data Security, pp. 157\u2013175. Springer (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-45472-5_11","key":"3_CR17","DOI":"10.1007\/978-3-662-45472-5_11"},{"unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Manubot (2019)","key":"3_CR18"},{"doi-asserted-by":"publisher","unstructured":"Karame, G., Androulaki, E., Capkun, S.: Double-spending fast payments in Bitcoin. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 906\u2013917 (2012). \nhttps:\/\/doi.org\/10.1145\/2382196.2382292","key":"3_CR19","DOI":"10.1145\/2382196.2382292"},{"doi-asserted-by":"publisher","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the Bitcoin network. In: Financial Cryptography and Data Security, pp. 457\u2013468. Springer, Heidelberg (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-662-45472-5_29","key":"3_CR20","DOI":"10.1007\/978-3-662-45472-5_29"},{"doi-asserted-by":"publisher","unstructured":"Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better\u2014How to make Bitcoin a better currency. In: International Conference on Financial Cryptography and Data Security, pp. 399\u2013414. Springer (2012). \nhttps:\/\/doi.org\/10.1007\/978-3-642-32946-3_29","key":"3_CR21","DOI":"10.1007\/978-3-642-32946-3_29"},{"doi-asserted-by":"publisher","unstructured":"Halpin, H., Piekarska, M.: Introduction to security and privacy on the blockchain. In: 2017 EuroS&PW, Paris, pp. 1\u20133 (2017). \nhttps:\/\/doi.org\/10.1109\/EuroSPW.2017.43","key":"3_CR22","DOI":"10.1109\/EuroSPW.2017.43"},{"doi-asserted-by":"publisher","unstructured":"Karame, G., Androulaki, E., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in Bitcoin. In: International Conference on Financial Cryptography and Data Security. pp. 34\u201351. Springer, Heidelberg (2013). \nhttps:\/\/doi.org\/10.1007\/978-3-642-39884-1_4","key":"3_CR23","DOI":"10.1007\/978-3-642-39884-1_4"},{"unstructured":"Maxwell, G.: CoinJoin: Bitcoin privacy for the real world. \nhttps:\/\/bitcointalk.org\/index.php?topic=279249\n\n. Accessed 22 Feb 2020","key":"3_CR24"},{"doi-asserted-by":"publisher","unstructured":"Maurer, F., Neudecker, T., Florian, M.: Anonymous CoinJoin transactions with arbitrary values. In: Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 522\u2013529. IEEE, Sydney (2017). \nhttps:\/\/doi.org\/10.1109\/Trustcom\/BigDataSE\/ICESS.2017.280","key":"3_CR25","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.280"},{"doi-asserted-by":"publisher","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: CoinShuffle: practical decentralized coin mixing for Bitcoin. In: European Symposium on Research in Computer Security. Springer (2014). \nhttps:\/\/doi.org\/10.1007\/978-3-319-11212-1_20","key":"3_CR26","DOI":"10.1007\/978-3-319-11212-1_20"},{"doi-asserted-by":"publisher","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: P2P mixing and unlinkable Bitcoin transactions. In: Network and Distributed System Security Symposium (NDSS) (2017). \nhttps:\/\/doi.org\/10.14722\/ndss.2017.23415","key":"3_CR27","DOI":"10.14722\/ndss.2017.23415"},{"doi-asserted-by":"publisher","unstructured":"Ruffing, T., Moreno-Sanchez, P.: ValueShuffle: mixing confidential transactions for comprehensive transaction privacy in Bitcoin. In: Financial Cryptography and Data Security, pp. 133\u2013154 (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-70278-0_8","key":"3_CR28","DOI":"10.1007\/978-3-319-70278-0_8"},{"key":"3_CR29","doi-asserted-by":"publisher","first-page":"295","DOI":"10.6633\/IJNS.201703.19(2).14","volume":"19","author":"M Ibrahim","year":"2017","unstructured":"Ibrahim, M.: SecureCoin: a robust secure and efficient protocol for anonymous bitcoin ecosystem. Int. J. Netw. Secur. 19, 295\u2013312 (2017). \nhttps:\/\/doi.org\/10.6633\/IJNS.201703.19(2).14","journal-title":"Int. J. Netw. Secur."},{"doi-asserted-by":"publisher","unstructured":"Heilman, E., AlShenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: TumbleBit: an untrusted bitcoin-compatible anonymous payment hub. In: The Network and Distributed System Security Symposium (NDSS) (2017). \nhttps:\/\/doi.org\/10.14722\/ndss.2017.23086","key":"3_CR30","DOI":"10.14722\/ndss.2017.23086"},{"doi-asserted-by":"publisher","unstructured":"Miers, I., Garman, C., Green, M., Rubin, A.D.: Zerocoin: anonymous distributed e-cash from Bitcoin. In: Proceedings - IEEE Symposium on Security and Privacy, pp. 397\u2013411 (2013). \nhttps:\/\/doi.org\/10.1109\/SP.2013.34","key":"3_CR31","DOI":"10.1109\/SP.2013.34"},{"unstructured":"Poramin, I.: ZCoin - Academic Papers. \nhttps:\/\/zcoin.io\/tech\/\n\n. Accessed 20 Feb 2020","key":"3_CR32"},{"doi-asserted-by":"publisher","unstructured":"Ben-sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: decentralized anonymous payments from Bitcoin. In: IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014). \nhttps:\/\/doi.org\/10.1109\/SP.2014.36","key":"3_CR33","DOI":"10.1109\/SP.2014.36"},{"doi-asserted-by":"publisher","unstructured":"Groth, J.: Short Pairing-based non-interactive zero-knowledge arguments. In: ASIACRYPT 2010, pp. 321\u2013340. Springer, Heidelberg (2010). \nhttps:\/\/doi.org\/10.1007\/978-3-642-17373-8_19","key":"3_CR34","DOI":"10.1007\/978-3-642-17373-8_19"},{"unstructured":"Electric Coin Company: Zcash - Network Information. \nhttps:\/\/z.cash\/upgrade\/\n\n. Accessed 06 Feb 2020","key":"3_CR35"},{"unstructured":"Electric Coin Company: Zcash - How It Works. \nhttps:\/\/z.cash\/technology\n\n. Accessed 10 Jan 2020","key":"3_CR36"},{"unstructured":"Hopwood, D., Bowe, S., Hornby, T., Wilcox, N.: Zcash Protocol Specification. GitHub, San Francisco (2016)","key":"3_CR37"},{"unstructured":"Kappos, G., Yousaf, H., Maller, M., Meiklejohn, S.: An empirical analysis of anonymity in Zcash. In: 27th USENIX Security Symposium. USENIX Association, Baltimore (2018)","key":"3_CR38"},{"unstructured":"Van Saberhagen, N.: CryptoNote v 2.0. Cryptonote 1 (2013)","key":"3_CR39"},{"unstructured":"Alonso, K.M.: koe: Zero to Monero: First Edition (2018). \nhttps:\/\/www.getmonero.org\/library\/Zero-to-Monero-1-0-0.pdf","key":"3_CR40"},{"key":"3_CR41","first-page":"535","volume":"2018","author":"KM Alonso","year":"2018","unstructured":"Alonso, K.M., Herrera-Joancomart\u00ed, J.: Monero - privacy in the blockchain. IACR Cryptol. ePrint Arch. 2018, 535 (2018)","journal-title":"IACR Cryptol. ePrint Arch."},{"unstructured":"SerHack: Mastering Monero Book. \nhttps:\/\/github.com\/monerobook\/monerobook\n\n. Accessed 08 May 2020","key":"3_CR42"},{"doi-asserted-by":"publisher","unstructured":"M\u00f6ser, M., Soska, K., Heilman, E., Lee, K., Heffan, H., Srivastava, S., Hogan, K., Hennessey, J., Miller, A., Narayanan, A., Christin, N.: An empirical analysis of traceability in the Monero Blockchain. In: Proceedings on Privacy Enhancing Technologies 2018, pp. 143\u2013163 (2018). \nhttps:\/\/doi.org\/10.1515\/popets-2018-0025","key":"3_CR43","DOI":"10.1515\/popets-2018-0025"},{"doi-asserted-by":"crossref","unstructured":"Chaum, D., Van Heyst, E.: Group signatures. In: Workshop on the Theory and Application of Cryptographic Techniques, pp. 257\u2013265. Springer (1991)","key":"3_CR44","DOI":"10.1007\/3-540-46416-6_22"},{"doi-asserted-by":"publisher","unstructured":"Rivest, R., Shamir, A., Tauman, Y.: How to leak a secret. In: International Conference on the Theory and Application of Cryptology and Information Security, pp. 552\u2013565. Springer (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45682-1_32","key":"3_CR45","DOI":"10.1007\/3-540-45682-1_32"},{"key":"3_CR46","doi-asserted-by":"publisher","first-page":"1","DOI":"10.5195\/LEDGER.2016.34","volume":"1","author":"S Noether","year":"2016","unstructured":"Noether, S., Mackenzie, A., Lab, T.: Ring confidential transactions. Ledger 1, 1\u201318 (2016). \nhttps:\/\/doi.org\/10.5195\/LEDGER.2016.34","journal-title":"Ledger"},{"unstructured":"Astolfi, F., Kroese, J., Van Oorschot, J.: I2P-The Invisible Internet Project. Leiden University Web Technology Report (2015)","key":"3_CR47"},{"unstructured":"Marley, N.: Dash Whitepaper, 23 August 2018. \nhttps:\/\/github.com\/dashpay\/dash\/wiki\/Whitepaper\n\n. Accessed 20 Feb 2020","key":"3_CR48"}],"container-title":["Advances in Intelligent Systems and Computing","13th International Conference on Computational Intelligence in Security for Information Systems (CISIS 2020)"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-57805-3_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,7]],"date-time":"2020-09-07T11:08:56Z","timestamp":1599476936000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-57805-3_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,28]]},"ISBN":["9783030578046","9783030578053"],"references-count":48,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-57805-3_3","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,28]]},"assertion":[{"value":"28 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}