2020
DOI: 10.1109/access.2020.2994294
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Privacy Protection of Blockchain: The Technology and Application

Abstract: As a kind of point-to-point distributed public ledger technology, blockchain has been widely concerned in recent years. The privacy protection of blockchain technology has always been the core issue of people's attention. In this paper, some existing solutions to the current problems of user identity and transaction privacy protection are surveyed, including coin mixing mechanism, zero knowledge proof, ring signature and other technologies. Secondly, five typical applications of privacy protection technology b… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
36
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
4

Relationship

1
8

Authors

Journals

citations
Cited by 63 publications
(36 citation statements)
references
References 51 publications
0
36
0
Order By: Relevance
“…These blocks can be used to create and verify transactions using hashing and cryptographic algorithms. Zero-knowledge proof (ZKP) is a new technology to add more security to the blockchain technology by using a third party, called the "prover", who can prove and verify the value without getting any information about the transaction, but who only possesses the secret information [46][47][48]. Liu, in 2019, used ZKP and multi-factor authentications to secure the verifier identity, which can also be used in many IoT devices and applications.…”
Section: Discussionmentioning
confidence: 99%
“…These blocks can be used to create and verify transactions using hashing and cryptographic algorithms. Zero-knowledge proof (ZKP) is a new technology to add more security to the blockchain technology by using a third party, called the "prover", who can prove and verify the value without getting any information about the transaction, but who only possesses the secret information [46][47][48]. Liu, in 2019, used ZKP and multi-factor authentications to secure the verifier identity, which can also be used in many IoT devices and applications.…”
Section: Discussionmentioning
confidence: 99%
“…Consortium blockchain, also known as "permissioned chain", is a semi-closed blockchain, which refers to a blockchain that is jointly managed by multiple industry institutions. Only members of the consortium can read, write and send all or part of the data [17]. It fundamentally closes the channels for unauthorized nodes to access data, realizes complete authority control and security guarantee, and significantly reduces the risk of blockchain privacy leakage [18].…”
Section: Consortium Blockchainmentioning
confidence: 99%
“…As blockchain's core lies with P2P network, it has benefited from previous extensive work on P2P systems popularly used in file sharing applications to boost the performance and avoid SPoF. Moreover, blockchain technology has improved some aspects of the P2P Network to provide high-efficiency consensus protocols [9][10][11], identity privacy [12,13] and security of transactions [14]. The distributed topology controlling in blockchain's P2P network is one of the aspects studied.…”
Section: Related Work and Backgroundmentioning
confidence: 99%