2019 IEEE Canadian Conference of Electrical and Computer Engineering (CCECE) 2019
DOI: 10.1109/ccece.2019.8861821
|View full text |Cite
|
Sign up to set email alerts
|

Integrating Privacy Enhancing Techniques into Blockchains Using Sidechains

Abstract: Blockchains are turning into decentralized computing platforms and are getting worldwide recognition for their unique advantages. There is an emerging trend beyond payments that blockchains could enable a new breed of decentralized applications, and serve as the foundation for Internet's security infrastructure. The immutable nature of the blockchain makes it a winner on security and transparency; it is nearly inconceivable for ledgers to be altered in a way not instantly clear to every single user involved. H… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2020
2020
2021
2021

Publication Types

Select...
5
3
1

Relationship

2
7

Authors

Journals

citations
Cited by 47 publications
(13 citation statements)
references
References 20 publications
0
13
0
Order By: Relevance
“…e probability will be incremented as the number of participants is smaller to 1. Adopting a variant of the TOR and similar to the concept of Mixnet implementation [29], a study [30] introduces an implementation of the Garlic Routing (GOR) on a sidechain in which all transactions created on the main chain are required to route through a sidechain's smart contract mesh in order to conceal creators' identities. e more complexity in sidechain topology, the more often the sender's address is encapsulated and concealed.…”
Section: H[h (A) || H (B)] H [ H (C) || H (D)] H[h[h (A) || H (B)] || H[h (C) || H (D)]mentioning
confidence: 99%
“…e probability will be incremented as the number of participants is smaller to 1. Adopting a variant of the TOR and similar to the concept of Mixnet implementation [29], a study [30] introduces an implementation of the Garlic Routing (GOR) on a sidechain in which all transactions created on the main chain are required to route through a sidechain's smart contract mesh in order to conceal creators' identities. e more complexity in sidechain topology, the more often the sender's address is encapsulated and concealed.…”
Section: H[h (A) || H (B)] H [ H (C) || H (D)] H[h[h (A) || H (B)] || H[h (C) || H (D)]mentioning
confidence: 99%
“…Shared Data Layer: contains the core blockchain and its overlay network. It is still based on the core blockchain protocol but it is used to build networks (called sidechains [36]- [38]) that work in parallel to the mainstream chain to Figure 2. An overview of BAD being used as a tool to avoid known blockchain-based attacks to be repeated over time perform tasks that the mainstream chain cannot solve while still relaying on the same data structures.…”
Section: B Application Stackmentioning
confidence: 99%
“…Moreover, the centralized nature of gateway has a risk of one-point failure, which limits its application in the smart community due to the stringent QoS requirement [23]. A sidechain-based routing protection scheme was proposed in order to improve the resistance abilities for the Garlic Routing and Onion Routing frameworks to privacy attacks [24]. With the proposed Garlic Onion Routing technique, the sidechain protected the routing process from inaccurate information uploading and data tampering.…”
Section: Related Solutionsmentioning
confidence: 99%