2016 IEEE Symposium on Security and Privacy (SP) 2016
DOI: 10.1109/sp.2016.55
|View full text |Cite
|
Sign up to set email alerts
|

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

1
874
0
7

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 1,758 publications
(957 citation statements)
references
References 29 publications
1
874
0
7
Order By: Relevance
“…In particular, we believe their use here could possibly be adapted to replace verifiers in optimistic fair exchange protocols and other related work. This can largely be enabled by using zero knowledge proofs of knowledge in order to facilitate manipulation of private data (see, for example, Hawk [7]). …”
Section: Automated Verifiersmentioning
confidence: 99%
“…In particular, we believe their use here could possibly be adapted to replace verifiers in optimistic fair exchange protocols and other related work. This can largely be enabled by using zero knowledge proofs of knowledge in order to facilitate manipulation of private data (see, for example, Hawk [7]). …”
Section: Automated Verifiersmentioning
confidence: 99%
“…In the aspect of using blockchain technology to solve practical problems and providing specific implementation details, Guy Zyskind [15] proposed a decentralized personal information management system in which bit-coins can be used to pass storage, query, and data analysis instructions through some agreement, ensuring that users own and control their own information, but the paper doesn't propose a specific case of application, neither does it provide any personal privacy theory on the issue. Ahmed Kosba [7] Using Blockchain to Protect Personal Privacy in the Scenario of Online Taxi-hailing 887 argue that the current blockchain trading environment lacks the privacy protection of transactions, and that money flows between virtual addresses are completely exposed to the blockchain environment, so they propose a decentralized intelligent contract system called Hawk to protect the privacy of transactions by avoiding the clear text storage form of financial transactions on the blockchain. But the method can only protect the privacy of transaction information, which lacks a broader field of real life application.…”
Section: Introductionmentioning
confidence: 99%
“…Blockchain-based [1] identity management (IDM) [2] services can associate information without relying on specific centralized third-party authority because it is possible to record and distribute trusted identities [3]. The IDM services [4][5] using Ethereum platform [6] solve the problems of the isolated authentication environment and the centralized IDM security in the traditional IDM services.…”
Section: Introductionmentioning
confidence: 99%