2020
DOI: 10.1504/ijcse.2020.113183
|View full text |Cite
|
Sign up to set email alerts
|

Enhancing user and transaction privacy in bitcoin with unlinkable coin mixing scheme

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…Finally, Cluster #6, centered on 'privacy', delves into the intellectual labyrinth of privacy issues within the bitcoin ecosystem. It accentuates the importance and implications of maintaining privacy and anonymity in cryptocurrency transactions (Ansah and Adu-Gyamfi 2020;Conti et al 2018). From exploring 'blockchain security' to 'ICO', this cluster illustrates an ongoing discourse on how privacy considerations shape the landscape of the cryptocurrency world.…”
Section: Findings From Co-word Analysismentioning
confidence: 96%
“…Finally, Cluster #6, centered on 'privacy', delves into the intellectual labyrinth of privacy issues within the bitcoin ecosystem. It accentuates the importance and implications of maintaining privacy and anonymity in cryptocurrency transactions (Ansah and Adu-Gyamfi 2020;Conti et al 2018). From exploring 'blockchain security' to 'ICO', this cluster illustrates an ongoing discourse on how privacy considerations shape the landscape of the cryptocurrency world.…”
Section: Findings From Co-word Analysismentioning
confidence: 96%
“…Data and sociological mining face significant obstacles in protecting users' personal information. Using an elliptic curve and a ring signature, [36] developed a system to ensure the anonymity of miners and the confidentiality of their data while they operate in a decentralized network. Because of its constant lack of resources, edge computing requires constant upgrades.…”
Section: Elliptic Curve Cryptography In Blockchain Applicationmentioning
confidence: 99%
“…User privacy is the most difficult challenge to overcome in regard to data mining and sociological mining. [31] created a blockchain-based privacy protection scheme with a ring signature and an elliptic curve that adds privacy to data storage and performs anonymous mining in a secure manner. Edge computing is always resource-starved, and enhancement needs to be in place for continuous improvement.…”
Section: Application Of Elliptic Curve Cryptography In Blockchainmentioning
confidence: 99%
“…They showed that application of ECC significantly help to improve the overall performance. Healthcare Storage optimisation, Efficiency improvement, Access control, Authentication, Security enhancement, Privacy, Identity management [22], [23], [28], [36], [37] IoT Mobile Privacy, Authentication, Key generation, Privacy-preserving, Security enhancement [35], [26] Security Enhancement Enhance security, Runtime optimisation [42], [72] ECDSA Cloud Cloud storage Performance improvement, Security enhancement, Storage, Signature , Privacy, Data management [27], [33], [41], [31] Cryptocurrency Signature generation verification, Provability, Privacy, Enhanced security, Identity Key management [29], [34], [38], [40], [24] Electric vehicle Storage, Security enhancement, Privacy, protection [37], [25], [39] Table 3: Application of ECC in blockchain.…”
Section: Application Of Elliptic Curve Cryptography In Blockchainmentioning
confidence: 99%