2022
DOI: 10.1109/access.2022.3151784
|View full text |Cite
|
Sign up to set email alerts
|

Investigation and Application of Differential Privacy in Bitcoin

Abstract: Bitcoin is one of the best-known cryptocurrencies, which captivated researchers with its innovative blockchain structure. Examinations of this public blockchain resulted in many proposals for improvement in terms of anonymity and privacy. Generally used methods for improvement include mixing protocols, ring signatures, zero-knowledge proofs, homomorphic commitments, and off-chain storage systems. To the best of our knowledge, in the literature, there is no study examining Bitcoin in terms of differential priva… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 37 publications
0
2
0
Order By: Relevance
“…demonstrating the combination's effectiveness in privacy preservation, a key aspect of this study. [19] and Fan et al [20] explored the application of differential privacy in blockchain contexts, relevant to this study's emphasis on privacy-preserving techniques in blockchain systems [19] [20]. Xu et al [21] introduced a blockchain-enabled decentralized learning system [21], aligning with this research's focus on federated learning and privacy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…demonstrating the combination's effectiveness in privacy preservation, a key aspect of this study. [19] and Fan et al [20] explored the application of differential privacy in blockchain contexts, relevant to this study's emphasis on privacy-preserving techniques in blockchain systems [19] [20]. Xu et al [21] introduced a blockchain-enabled decentralized learning system [21], aligning with this research's focus on federated learning and privacy.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The formula is shown in Equation (3) . Both the values of ϵ and δ are expected to be small enough to ensure string differential privacy [37] . …”
Section: Privacy Analysismentioning
confidence: 99%
“…Numerous solutions [9,19,22,32,48] that encompass such areas as the use of ring signatures, smart contract mixing services, commitments schemes, and zeroknowledge proofs, among others, have been put forward. More recently, differential privacy [20] has been proposed; however, they all have diverse limitations. We refer the reader to a recent survey that elucidates on the aforementioned techniques [44].…”
Section: Introductionmentioning
confidence: 99%