2022
DOI: 10.1007/s12046-022-01931-1
|View full text |Cite
|
Sign up to set email alerts
|

Challenges in making blockchain privacy compliant for the digital world: some measures

Abstract: Due to the pandemic, most of the personal transactions relating to finance, commerce and healthcare services have gone online making privacy preservation a critical requirement. Consequently, privacy has been made a critical parameter in Data Protection Regulations leading to the search for such a privacy compliant system which is also resilient to attacks. A detailed analysis of the Blockchain technology, which is becoming popular for secure applications in the finance sector, indicates that there are several… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(2 citation statements)
references
References 48 publications
0
2
0
Order By: Relevance
“…The majority of other cryptocurrency uses digital signatures and cryptocurrency mining to store data on a public ledger that cannot be altered retroactively without altering all subsequent blocks: blockchains that use the hashing algorithm. As security and privacy of a blockchain solely depends on the hashing and digital signatures, a number of researchers 26,27,28,29,30,31,32 have discussed about how the fast progress of quantum computing has opened up the possibilities of attacks on blockchains through Grover's and Shor's algorithms. ECDSA is mainly used as a way to sign digitally.…”
Section: Discussionmentioning
confidence: 99%
“…The majority of other cryptocurrency uses digital signatures and cryptocurrency mining to store data on a public ledger that cannot be altered retroactively without altering all subsequent blocks: blockchains that use the hashing algorithm. As security and privacy of a blockchain solely depends on the hashing and digital signatures, a number of researchers 26,27,28,29,30,31,32 have discussed about how the fast progress of quantum computing has opened up the possibilities of attacks on blockchains through Grover's and Shor's algorithms. ECDSA is mainly used as a way to sign digitally.…”
Section: Discussionmentioning
confidence: 99%
“…Despite several advantages, blockchain faces privacy issues due to its transparency [13] . In a public blockchain, all transactions are recorded on a distributed ledger and the ledger is accessible by anyone being part of the blockchain.…”
Section: Introductionmentioning
confidence: 99%