2019
DOI: 10.1016/j.jnca.2018.10.020
|View full text |Cite
|
Sign up to set email alerts
|

A survey on privacy protection in blockchain system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
261
0
18

Year Published

2019
2019
2022
2022

Publication Types

Select...
6
1
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 646 publications
(335 citation statements)
references
References 11 publications
0
261
0
18
Order By: Relevance
“…We find publications that are motivated by the upward trend of Blockchain's use, advocate the use of it in education [19]. However, there are studies based on the very foundations of Blockchain that question it as a private and secure technology [20][21][22][23][24]. All of them repeat a series of security flaws that can be included in different categories: Identity filtering, Lack of transactional privacy, Private Key insecurity, Vulnerabilities in Smart Contracts, Discovery of user identities and Quantum computing.…”
Section: Methodsmentioning
confidence: 98%
“…We find publications that are motivated by the upward trend of Blockchain's use, advocate the use of it in education [19]. However, there are studies based on the very foundations of Blockchain that question it as a private and secure technology [20][21][22][23][24]. All of them repeat a series of security flaws that can be included in different categories: Identity filtering, Lack of transactional privacy, Private Key insecurity, Vulnerabilities in Smart Contracts, Discovery of user identities and Quantum computing.…”
Section: Methodsmentioning
confidence: 98%
“…In this regard, blockchain has emerged as one of the most prominent technique to meet the security requirements of the system in an effective way [6,7]. One of the most popular examples where blockchain has been primarily used for providing the security is the exchange of crypto-currency known as Bitcoin [8].…”
Section: Accepted Manuscriptmentioning
confidence: 99%
“…While there has been a lot of attention towards the blockchain technology, there are relatively few surveys conducted in this area. These survyes can be classified into one of the 3 categories: 1) applications [5][6][7][8][9][10][11][12][13], 2) privacy issues and security threats [14][15][16], and 3) consensus protocols [1,[17][18][19].…”
Section: Related Surveysmentioning
confidence: 99%
“…Concerning security threats and privacy issues, Li et al [14] investigated different threats such as double spending, 51% attack, private key security, vulnerable and malicious activities, and data privacy in the blockchain network. Feng et al [15] reviewed the different privacy threats and provided a taxonomy of existing cryptographic defense mechanisms to tackle those threats. Park et al [16] presented the security challenges and associated solutions in the bitcoin network.…”
Section: Related Surveysmentioning
confidence: 99%