Abstract
Blockchain as a database that can be distributed storage, it has the characteristics of non-tampering, decentralization and strong security. With the continuous development and application of the blockchain, it has begun to expose more and more privacy leaks. In this paper the existing privacy protection schemes of blockchain from three aspects: data distortion, cryptography and off-chain technology in introduced, which aims to provide theoretical support for the research on privacy protection of blockchains.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Swan, M. 2015. Blockchain: Blueprint for a new economy. O’Reilly Media, Inc.
Panetta, K. 2016. Gartner’s top 10 strategic technology trends for 2017. Smarter with Gartner.
Technical report by the UK government chief scientific adviser[EB/OL]. 02 June 2019. https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/492972/gs16-1-distributed-ledger-technology.pdf.
Ministry of Industry and Information Technology. Blockchain technology and application development white paper [EB/OL]. 05 July 2019. http://www.fullrich.com/Uploads/article/file/2016/1020/580866e374069.pdf.
Ministry of Industry and Information Technology. Blockchain industry white paper of china [EB/OL]. 15 June 2019. http://www.miit.gov.cn/n1146290/n1146402/n1146445/c6180238/part/6180297.pdf.
Au, M.H., J.K. Liu, J. Fang, et al. 2014. A new payment system for enhancing location privacy of electric vehicles. IEEE Transactions on Vehicular Technology 63 (1): 3–18.
Bitcoin: a peer-to-peer electronic cash system [EB/OL]. 05 July 2019. https://bitcoin.org/bitcoin.pdf.
Yong, Y., and W. Feiyue. 2016. Blockchain: The state of the art and future trends. Acta Automatica Sinica 42 (4): 481–494.
Reid, F., and M. Harrigan. 2013. An analysis of anonymity in the bitcoin system. In Security and privacy in social networks, 197–223. New York, NY: Springer.
Goldfeder, S., H. Kalodner, D. Reisman, et al. 2018. When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies. Proceedings on Privacy Enhancing Technologies 2018 (4): 179–199.
Androulaki, E., G.O. Karame, M. Roeschlin, et al. 2013. Evaluating user privacy in bitcoin. International Conference on Financial Cryptography and Data Security, pp. 34–51.
Meiklejohn, S., M. Pomarole, G. Jordan, et al. 2013. A fistful of bitcoins: Characterizing payments among men with no names. Conference on Internet Measurement Conference, pp. 127–140.
Koshy, P., D. Koshy, and P. Mcdaniel. 2014. An analysis of anonymity in bitcoin using p2p network traffic. International Conference on Financial Cryptography and Data Security, pp. 469–485.
Biryukov, A., D. Khovratovich, and I. Pustogarov. 2014. Deanonymisation of clients in bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 15–29.
Battista, G.D., V.D. Donato, M. Patrignani, et al. 2015. Bitconeview: Visualization of flows in the bitcoin transaction graph. IEEE Symposium on Visualization for Cyber Security (VizSec), pp. 1–8.
Ron, D, and A. Shamir. 2013. Quantitative analysis of the full bitcoin transaction graph. International Conference on Financial Cryptography and Data Security, pp. 6–24.
Fleder, M., M.S. Kester, S. Pillai. 2015. Bitcoin transaction graph analysis. Computer Science.
Monaco, J.V. 2015. Identifying bitcoin users by transaction behavior. In biometric and surveillance technology for human and activity identification XII, p. 945704.
Liao, K., Z. Zhao, A. Doupé, et al. 2016. Behind closed doors: Measurement and analysis of CryptoLocker ransoms in Bitcoin. APWG Symposium on Electronic Crime Research (eCrime) 2016: 1–13.
Qinghe, Z. 2018. Research on identity and access control technology in blockchain. Beijing Jiaotong University.
Maxwell, G. 2013. CoinJoin: Bitcoin privacy for the real world. In Post on Bitcoin forum.
Ruffing, T., P. Moreno-Sanchez, and A. Kate. 2014. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security, pp. 345–364.
‘Dark Wallet’ is about to make bitcoin money laundering easier than ever [EB/OL]. 05 July 2019. https://www.wired.com/2014/04/dark-wallet/.
Ziegeldorf, J.H., F. Grossmann, M. Henze, et al. 2015. Coinparty: Secure multi-party mixing of bitcoins. In Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 75–86.
Bonneau, J., A. Narayanan, A. Miller, et al. 2014. Mixcoin: Anonymity for bitcoin with accountable mixes. International Conference on Financial Cryptography and Data Security, pp. 486–504.
Valenta, L., and B. Rowan. 2015. Blindcoin: Blinded, accountable mixes for bitcoin. International Conference on Financial Cryptography and Data Security, pp. 112–126.
Dash is digital cash [EB/OL]. 05 July 2019. https://www.dash.org/.
Hao, W., S. Xiangfu, K. Junming, et al. 2017. Blockchain and privacy preserving mechanisms in cryptocurrency. Netinfo Security 07: 32–39.
Noether, S., and A. Mackenzie. 2016. Ring confidential transactions. Ledger 1: 1–18.
Miller, A, M. Möser, K. Lee, et al. 2017. An empirical analysis of linkability in the Monero blockchain. Arxiv preprint 1704.
Miers, I., C. Garman, M. Green, et al. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In 2013 IEEE Symposium on Security and Privacy, pp. 397–411. IEEE.
Sasson, E.B., A. Chiesa, C. Garman, et al. 2014. Zerocash: Decentralized anonymous payments from bitcoin. IEEE Symposium on Security and Privacy (SP) 2014: 459–474.
Ben-Sasson, E., D. Genkin, A. Chiesa, et al. 2013. SNARKs for C: Verifying program executions succinctly and in zero knowledge, Advances in Cryptology–CRYPTO, pp. 90–108. Springer.
Cecchetti, E., F. Zhang, Y. Ji, et al. 2017. Solidus: Confidential distributed ledger transactions via PVORM. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 701–717.
Decker, C., and Wattenhofer R. 2015. A fast and scalable payment network with bitcoin duplex micropayment channels. International Symposium on Stabilization, Safety, and Security of Distributed Systems, pp. 3–18.
Sprites: Payment channels that go faster than lightning[EB/OL]. 05 July 2019. https://arxiv.org/pdf/1702.05812.pdf.
Conti, M., E. Sandeep K., C. Lal, et al. 2017. A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials PP (99): 1–1.
Sankar, L.S., M. Sindhu, and M. Sethumadhavan. 2017. Survey of consensus protocols on blockchain applications. In 2017 4th International Conference on Advanced Computing and Communication Systems (ICACCS), pp. 1–5.
Heilman, E., F. Baldimtsi, and S. Goldberg. 2016. Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions. International conference on financial cryptography and data security, pp. 43–60.
Acknowledgements
This work was supported in part by the National Natural Science Foundation of China (No. 61661019); the Higher Education Reform Key Project of Hainan Prov-ince (No. Hnjg2017ZD-1).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
yu, T., Cao, C. (2020). Privacy Protection in Blockchain Systems: A Review. In: Huang, C., Chan, YW., Yen, N. (eds) Data Processing Techniques and Applications for Cyber-Physical Systems (DPTA 2019). Advances in Intelligent Systems and Computing, vol 1088. Springer, Singapore. https://doi.org/10.1007/978-981-15-1468-5_241
Download citation
DOI: https://doi.org/10.1007/978-981-15-1468-5_241
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-1467-8
Online ISBN: 978-981-15-1468-5
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)