Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure 2020
DOI: 10.1145/3384943.3409416
|View full text |Cite
|
Sign up to set email alerts
|

Review of Techniques for Privacy-Preserving Blockchain Systems

Abstract: Privacy plays a central role in many application domains that utilize blockchain technology. It is central in Personal Data Management, Electronic Health records, or systems that interact with any public institution. However, blockchains are subject to potential privacy issues such as transaction linkability, compliance with data protection regulations, on-chain data privacy, and malicious smart contracts. To deal with these challenges, novel privacy-preserving solutions based on crypto-privacy techniques are … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 17 publications
(5 citation statements)
references
References 78 publications
(61 reference statements)
0
4
0
Order By: Relevance
“…[16] focuses on the role of these techniques in preserving data privacy in decentralized systems and on the importance of a balance between accessibility and security. In [17], the authors delve into privacy-preserving approaches such as zero-knowledge proofs and homomorphic encryption. These studies emphasize the development of techniques that secure data without compromising privacy.…”
Section: Data Security and Privacy Methodsmentioning
confidence: 99%
“…[16] focuses on the role of these techniques in preserving data privacy in decentralized systems and on the importance of a balance between accessibility and security. In [17], the authors delve into privacy-preserving approaches such as zero-knowledge proofs and homomorphic encryption. These studies emphasize the development of techniques that secure data without compromising privacy.…”
Section: Data Security and Privacy Methodsmentioning
confidence: 99%
“…Form another hand, full homomorphic encryption can support encrypted image processing, For example chatbot get the image from user and forward it to deep learning model for further processing and the result is transmitted back to chatbot to be displayed for user accordingly [73]. So the implementation of FHE can improve data security/privacy during transmission between user and chatbot [74].…”
Section: Data Transmission Security/privacymentioning
confidence: 99%
“…Data collection and analysis performed by Nasir Ahmad Jalali and Professor Chen Hongsong provide supervision as well as reviewed the paper for quality improvement. blockchain and data blocks structure [52] Figure 8 Homomorphic encryption operational structure [74] Figure 9 Main framework to enhance chatbot security and privacy Accuracy between centralized and distributed (FL)…”
Section: Declarationsmentioning
confidence: 99%
“…Such networks are favored when an organization wants a blockchain with access and participation of some members. Additionally, no person can have the right to access the data or participate in transactions within the blockchain [43]. Such a blockchain is controlled by the organizations themselves and can be used for protecting the assets of customers; managing digital identities supply chains, etc.…”
Section: Private Blockchainmentioning
confidence: 99%