2019 IEEE International Conference on Pervasive Computing and Communications (PerCom 2019
DOI: 10.1109/percom.2019.8767412
|View full text |Cite
|
Sign up to set email alerts
|

Aggregating Crowd Wisdom via Blockchain: A Private, Correct, and Robust Realization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
4

Relationship

1
7

Authors

Journals

citations
Cited by 47 publications
(25 citation statements)
references
References 31 publications
0
25
0
Order By: Relevance
“…To the best of our knowledge, there is no study on the examination of Bitcoin in terms of differential privacy in the literature. There are studies combining differential privacy and blockchain [20,21,22,23,24] mostly in general areas. Privacy-preserving solutions for general blockchain structure were studied in [20], and differential privacy was mentioned as a potential solution very briefly.…”
Section: A Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To the best of our knowledge, there is no study on the examination of Bitcoin in terms of differential privacy in the literature. There are studies combining differential privacy and blockchain [20,21,22,23,24] mostly in general areas. Privacy-preserving solutions for general blockchain structure were studied in [20], and differential privacy was mentioned as a potential solution very briefly.…”
Section: A Related Workmentioning
confidence: 99%
“…There are studies combining differential privacy and blockchain [20,21,22,23,24] mostly in general areas. Privacy-preserving solutions for general blockchain structure were studied in [20], and differential privacy was mentioned as a potential solution very briefly. Differential privacy was used in [21] while aggregating crowd data via blockchain by a service provider before sharing it with a data consumer.…”
Section: A Related Workmentioning
confidence: 99%
“…To improve the blockchain's performance and guarantee its security, previous works [4][5][6][7] have used a TEE as an off-chain component, decoupling from the blockchain to provide efficient computation and eventually persisting the state data in the blockchain. Matetic et al [5] presented an approach that protects the privacy of light clients in Bitcoin by leveraging TEEs.…”
Section: Tee and Blockchainsmentioning
confidence: 99%
“…A trusted execution environment (TEE) [1] has been used in many applications [2][3][4] to provide secure and trusted computing. It is widely used to be a secure component to address the performance issues of blockchain-based systems [4][5][6][7][8], in which a common architecture adopted by the systems is to decouple the TEE from the blockchain to provide off-chain trusted computing. Its design extends trust from the blockchain to the TEE to improve system performance.…”
Section: Introductionmentioning
confidence: 99%
“…The transparency and correctness of computation on the blockchain [24] ensure that the whole coupon redemption process is transparent and correctly enforced. This guarantees that a successfully redeemed coupon must be valid (through enforced signature verification) and cannot be reused; the vendor cannot cheat in the coupon redemption rates for underpaying/repudiating services fees to the broker.…”
Section: Security Analysismentioning
confidence: 99%