Submitted Successfully!
To reward your contribution, here is a gift for you: A free trial for our video production service.
Thank you for your contribution! You can also upload a video entry or images related to this topic.
Version Summary Created by Modification Content Size Created at Operation
1 -- 3856 2023-08-23 16:07:49 |
2 Reference format revised. Meta information modification 3856 2023-08-24 08:55:19 |

Video Upload Options

Do you have a full video?

Confirm

Are you sure to Delete?
Cite
If you have any further questions, please contact Encyclopedia Editorial Office.
Valadares, D.C.G.; Perkusich, A.; Martins, A.F.; Kamel, M.B.M.; Seline, C. Privacy-Preserving Blockchain Technologies. Encyclopedia. Available online: https://encyclopedia.pub/entry/48386 (accessed on 07 July 2024).
Valadares DCG, Perkusich A, Martins AF, Kamel MBM, Seline C. Privacy-Preserving Blockchain Technologies. Encyclopedia. Available at: https://encyclopedia.pub/entry/48386. Accessed July 07, 2024.
Valadares, Dalton Cézane Gomes, Angelo Perkusich, Aldenor Falcão Martins, Mohammed B. M. Kamel, Chris Seline. "Privacy-Preserving Blockchain Technologies" Encyclopedia, https://encyclopedia.pub/entry/48386 (accessed July 07, 2024).
Valadares, D.C.G., Perkusich, A., Martins, A.F., Kamel, M.B.M., & Seline, C. (2023, August 23). Privacy-Preserving Blockchain Technologies. In Encyclopedia. https://encyclopedia.pub/entry/48386
Valadares, Dalton Cézane Gomes, et al. "Privacy-Preserving Blockchain Technologies." Encyclopedia. Web. 23 August, 2023.
Privacy-Preserving Blockchain Technologies
Edit

The main characteristics of blockchains, such as security and traceability, have enabled their use in many distinct scenarios, such as the rise of new cryptocurrencies and decentralized applications (dApps). However, part of the information exchanged in the typical blockchain is public, which can lead to privacy issues. To avoid or mitigate these issues, some blockchains are applying mechanisms to deal with data privacy. Trusted execution environments, the basis of confidential computing, and secure multi-party computation are two technologies that can be applied in that sense. 

security trusted execution environments confidential computing technical analysis privacy preservation

1. Introduction

A blockchain is a decentralized chain of blocks that register lists of transactions, organizing them hierarchically [1]. Every block added to a blockchain must be mathematically validated by its nodes. This characteristic provides security for the transactions, allowing their auditability. There are three categories of blockchains [2][3]: public, in which anyone can read, send, or receive transactions and any node can participate in the consensus protocol, making decisions regarding the transactions to be accepted; consortium, in which only a set of participants have influence on the consensus process, although anyone can read in the network; and private, in which a unique participant has write permissions and can control the consensus process, although read permissions can be open to anyone or to a set of participants.
Although blockchain technology has gained attention with the rise of Bitcoin [4], many application ideas have emerged since then [5], mainly because of technological advances, such as the adoption of smart contracts, which allow code execution in the blockchain nodes. This evolution runs from Blockchain 1.0 with digital currencies, passing by Blockchain 2.0 with smart contracts, and reaching what we now have: Blockchain 3.0, with a high level of trust, security, and accountability [2][6][7][8][9][10]. Due to the distributed nature of blockchains, many of these new applications are called dApps (decentralized applications). This market is growing fast, with much financial and academic (research) investment.
Generally, a blockchain should ensure the following security characteristics: tamper-resistant, pseudonymity, consistency, and resistance to DDoS (distributed denial-of-service) and double-spending attacks [2]. Although these characteristics provide a good level of security, many applications may demand additional properties. For instance, even with pseudonymity achieved, an adversary can perform de-anonymization inference attacks, gathering user transactions and background knowledge to infer the user’s true identity. Even considering a user can have various pseudonymous addresses, all transactions on the ledger are publicly traceable using the sender’s and recipient’s addresses. In this way, simple analyses can relate the transactions to the used addresses, which can lead to discovering the total amount and number of bitcoins moved to a specific account, for instance. Additionally, it is possible to link multiple accounts that use a unique IP address to sent and received transactions.
Another common characteristic that can be a problem for some blockchains is the lack of confidentiality once addresses and transactions’ contents are available publicly. When considering smart contracts, a requirement is that data and code should be publicly available, which can also be a target for adversaries exploiting these data to infer information from the users.
Despite the security properties provided by the blockchains, we still have privacy issues because privacy leakage can occur by using publicly available transaction information. Because of this, new blockchains are adopting mechanisms to enhance security and privacy [11]. Besides using specific protocols that require encrypting the sensitive data, some require that part of the blockchain nodes, at least the validators, run on a trusted execution environment (TEE), which executes code in a protected and isolated region of memory. This way, only a TEE application should process the sensitive information. Other blockchains have adopted cryptographic protocols such as secure multi-party computation (SMPC), which distributes the computation of a secret among multiple parties with no party knowing about other parties’ data, and zero-knowledge proof (ZKP), which provides a layer of confidentiality for parties who do not wish to disclose their financial activities publicly.
An example of an application that benefits from these mechanisms is the protection and privacy of authorial content, such as music and images, which need to be stored and negotiated between different parties considering the attribution of NFTs (non-fungible tokens). Thus, a creator may wish to protect the created content and rent or sell it so that only the NFT’s owner can access it (see Darkblock.io (https://www.darkblock.io/)). In addition to protecting the contents, this type of application can also protect the privacy of those who carry out the transactions.

2. Background

2.1. Blockchain Principles

A blockchain can be viewed as a distributed ordered data structure with a time stamp where only data are appended. Blockchains’ additional properties include immutability, transparency, censorship resistance, and decentralization, enabling a distributed peer-to-peer network. For such a network, non-trusting members can verifiably interact without needing a trusted member [11][12]. Application fields are Internet of Things [13], vehicular networks [14], energy [15], supply chains, transport and logistics [16], and healthcare [17], among many others [5][18]. Blockchain was introduced in the white paper by S. Nakamoto [4] on Bitcoin. It is a distributed ledger that uses independent computers (nodes) to record, share, and synchronize transactions in their respective electronic ledgers, connected in a peer-to-peer network. Transactions are the fundamental units in a blockchain. A definite number of transactions are stored in a block, and blocks are continuously and sequentially appended, resulting in a chain. This highlights the significance of decentralization, where most entities participating in the blockchain are authentic and make the decision collectively based on a consensus mechanism.
Different consensus mechanisms exist [19][20][21], and the one most often used is proof-of-work (PoW). PoW requires solving a complicated computational process, such as finding hashes with specific patterns for authentication and verification. Proof-of-stake (PoS) protocols split stake blocks proportionally to the current wealth of miners [22] instead of splitting blocks proportionally to the relative hash rates of miners, providing a fairer selection mechanism and avoiding the domination of stronger participants. Many blockchains, such as Ethereum in 2022, are gradually shifting to PoS, motivated by the lower power consumption and improved scalability. Byzantine fault tolerance [23] and its variants [5][21][24] are examples of other possible consensus mechanisms.
Blockchain networks can be classified in different ways [5][22][24][25] considering the network’s management and permissions as public, private, and federated or hybrid. New users or node miners can join anytime in public blockchains, also known as permissionless. Additionally, participants can perform operations such as transactions or contracts. On the other hand, in private blockchains, where federated belongs to the permissioned blockchain category, a whitelist of allowed users is usually defined with particular characteristics and permissions over the network operations. A critical security aspect is that Sybil attacks are almost impossible there [26][27], so private blockchain networks can avoid expensive PoW mechanisms. Instead, a more comprehensive range of consensus protocols based on disincentives can be adopted. A federated blockchain is a hybrid combination of public and private blockchains [24]. Although it shares similar scalability and privacy protection levels with a private blockchain, the main difference is that a set of nodes, called leader nodes, is selected instead of a single entity to verify the transaction processes. This enables a partially decentralized design where leader nodes can grant permissions to other users.

2.2. Trusted Execution Environments

Trusted execution environments (TEEs) are the basis for confidential computing, which protects data during processing [28]. The TEEs provide a means to create a protected and isolated environment to process data securely, i.e., a TEE creates a tamper-resistant region of memory running with a separated kernel and considering the separation into two execution environments: the “trusted world” and the “normal world” [29]. The isolated and protected environment is the trusted world, which guarantees state integrity for memory and CPU, code authenticity, and confidentiality for data and code.
A TEE application aims to reduce the attack surface, which is limited to the CPU boundary and prevents direct attacks on the sensitive data or code in memory. The idea is that the data enter the trusted world encrypted, are decrypted, and processed securely inside the trusted world, and the results return to the normal world encrypted [29]. The TEE applications maintain data and code confidentiality even if an adversary gets control of the physical machine.

2.3. Multi-Party Computation

Multi-party computation (MPC) is a cryptographic protocol that allows a set of parties to perform a distributed function. MPC uses the inputs of the parties in a privacy-preserving manner to execute a function and obtain the results based on those values, without revealing the inputs. Each party encrypts its input and shares the encrypted value with other parties. Therefore, the confidentiality and privacy of the shared values are preserved, and no single party during the process is able to obtain the inputs of other parties. This aspect ensures confidentiality of the inputs, which is crucial in many sensitive domains such as finance [30], healthcare [31], and data sharing between organizations [32]. The parties in MPC then collaborate to jointly obtain the final result, which none of them is able to obtain individually.

2.4. Zero-Knowledge Proof

Zero-knowledge proof (ZKP) is a cryptographic concept that allows one party (a prover) to be able to prove that a statement is true (e.g., knowledge of a particular secret) to another party (a verifier), without revealing any information about the statement except the validity of the statement. The process of ZKP can involve a sequence of interactive interactions between the prover and verifier, in which the prover attempts to authenticate the statement by sharing specific information while maintaining confidentiality and privacy of the statement itself. Based on these interactions, the verifier will be able to securely validate the truthfulness of the claim of the prover without compromising the underlying information. Typically, there are three phases in a ZKP framework [33]. In the witness phase, the prover prepares a proof based on the statement and sends it to the verifier. In the challenge phase, the verifier prepares a challenge based on the received proof and sends it to the prover. In the response phase, the prover solves the challenge and sends the response to the verifier.

3. Privacy-Based Blockchains

3.1. Secret Network

Secret Network is a blockchain based on Cosmos (https://cosmos.network/) and built with the Cosmos SDK (https://v1.cosmos.network/sdk), which aims to provide privacy, smart contracts, scalability, and interoperability. It employs proof-of-stake using Tendermint’s (https://docs.tendermint.com/master/introduction/what-is-tendermint.html) Byzantine fault-tolerant consensus algorithms and uses CosmWasm (https://cosmwasm.com/) for integration with Cosmos SDK and its ecosystem. The CosmWasm provides secure architecture, tools for developing and testing smart contracts, and Cosmos Inter-Blockchain Communication Protocol (IBC) (https://ibcprotocol.org/) integration. The IBC allows interoperability with other blockchain networks. The native token of the Secret Network is the SCRT, and its smart contracts are called secret contracts (https://docs.scrt.network/dev/secret-contracts.html).
The SNIP-20 (Secret Network Improvement Proposal) (https://github.com/SecretFoundation/SNIPs/blob/master/SNIP-20.md) specifies the interactions among tokens and contracts. It is based on Ethereum’s ERC-20 (https://ethereum.org/en/developers/docs/standards/tokens/erc-20/) and ERC-777 (https://ethereum.org/pt/developers/docs/standards/tokens/erc-777/) standards and is a superset of CosmWasm’s CW-20 (https://docs.cosmwasm.com/cw-plus/0.9.0/cw20/spec/). SecretSCRT (sSCRT) is the first implementation of the SNIP-20 specification and has the following guarantees: all balances and transaction arguments in a transfer are encrypted. Viewing keys can be created to allow third parties or other contracts to access private information (e.g., balance). The token wSCRT is a wrapped SCRT on Ethereum used to provide liquidity and can be redeemed for sSCRT/SCRT (1:1) using the Ethereum–Secret Network bridge (https://bridge.scrt.network/). The secret contracts are Rust-based smart contracts that compile to WebAssembly (wasm). Every six seconds, a block is created and appended to the network, with a limit of 22 transactions per second (however, the theoretical limit is 10,000 transactions per second with the current architecture and protocol) [34].
The network applies encryption protocols, key management, and confidential computing to achieve data privacy. Thus, trusted execution environments (TEEs) are required to protect data processing in all of the network’s validator nodes. Inputs, outputs, and states can be encrypted and securely processed inside a TEE. The consensus seed (256 bits) is the most critical part of the Secret Network encryption schema, being sealed and stored at \$HOME/.sgx\_secrets/consensus\_seed.sealed in the validator nodes. The protocol uses the consensus seed and HKDF-SHA256 (https://www.devglan.com/online-tools/hmac-sha256-online) to derive keys. The public keys are published to the Secret Network genesis.json. Curve25519 (https://cr.yp.to/ecdh.html) is used to generate asymmetric encryption keys, and ECDH (elliptic-curve Diffie–Hellman) is used to derive symmetric encryption keys. These symmetric keys are used to encrypt data with AES-128-SIV.
Secret NFTs, defined by the SNIP-721 (https://github.com/SecretFoundation/SNIPs/blob/master/SNIP-721.md) and based on ERC721 (https://eips.ethereum.org/EIPS/eip-721), allow the NFT owner to decide what data are public and what are private. These NFTs have a name, a value, and a privacy level. The privacy level can be public, protected, or private. For the public level, all the data are publicly available. For the protected level, only some property names are public. For the private level, only the owner can see the name and the value. When an NFT is sold, Stash (https://stashh.io/faq) charges a fee of 2.75% of the NFT price or 0.05 sSCRT, which is automatically deducted by the platform. A small SCRT amount is also required to pay operation fees to the Secret Network. The NFT is encrypted, uploaded to IPFS (https://ipfs.io/), and pinned via Pinata (https://www.pinata.cloud/). Its public preview is available at Azure. A creator can specify a royalty to be deducted automatically by the platform whenever a collector sells the NFT.

3.2. Oasis Network

The Oasis blockchain [35] is a smart contract platform that provides scalability and privacy. Its smart contracts can be efficiently verified and confidentially executed. Oasis was designed to be:
  • Flexible—easy to modify system parameters;
  • Extensible—easy to add new components like confidential computing techniques;
  • Scalable—throughput should increase with the number of nodes;
  • Secure—the system should enforce security policies and provide confidential computing;
  • Fault-isolated—the system should be fault-tolerant in terms of security and performance.
Oasis’ native token is called ROSE (although the native token of the testnet is TEST). The average time to generate a new block is 6 s.
The platform has a modular design containing two main layers: the consensus layer and the paratimes layer [36]. The name paratimes comes from parallel runtimes, which means multiple runtimes can run simultaneously in the network. A verifiable computing implementation (discrepancy detection) provides an optimized consensus execution that is more efficient than traditional BFT (Byzantine fault tolerance) techniques, improving the smart contracts’ scalability. The consensus layer is based on the Tendermint BFT consensus protocol, uses proof-of-stake as the block proposer protocol, and can be replaced by another consensus mechanism, i.e., allows easy changing of the consensus mechanism.

3.3. Phala

Phala Network (PHA) focuses on secure and private distributed computing [37]. The project started in 2018. Phala is a Web 3.0 computing cloud that supports data privacy while remaining trustless. It offers a service to access distributed computing TEE Secure Enclave through a blockchain [38]. Any participant wishing to purchase secure computer resources and services can do so by acquiring the Phala Network token (PHA) to access it through Polkadot (https://polkadot.network/). The users can access the same services through Polkadot’s Canary Network, Kusama (https://kusama.network/), using PHA or its specific token, K-PHA. The vision is to become the world’s largest P2P computing network, a decentralized cloud based on Web3.
Phala is a Polkadot parachain developed based on the Substrate framework (https://substrate.io/). Thus, it gains access to all of Polkadot’s features, but mainly the relay chain service that provides bridge services to other blockchains. Phala achieves scalability by implementing two software design patterns: event sourcing and CQRS (command query responsibility segregation) (https://www.eventstore.com/cqrs-pattern) [38]. Event sourcing is construed when the events causing state transitions are recorded in an appendonly log instead of storing the latest state of the data. The events receive timestamps and can be re-accessed to rebuild the state at any time. The second software pattern is the CQRS, which handles read/write operations separately. Such engineering decisions are based on the claim that these patterns make the system scale and avoid conflicts.

3.4. Integritee

Integritee is the new name for a parachain from a W3 foundation grant called Substratee, having the objective to provide a trusted off-chain compute framework for substrate blockchains (SubstraTEE GitHub) (https://github.com/integritee-network/substraTEE).
It is now under a company called Integritee AG (https://integritee.network/company), which is responsible for driving the development and community efforts for Integritee. The network launched its token TEER to cover payment and governance [39]. Until recently, it has operated its mainnet as an independent project. In February 2022, the community successfully secured a parachain slot in Kusama through a crowd loan process, where they provided rewards for those earlier investors. Their book (Integritee Book) [40] defined Integritee as a framework for parity substrate, allowing it to call a custom state transition function (STF) inside a TEE, namely an Intel SGX enclave, thereby providing confidentiality and integrity. The enclaves operate in an encrypted state that can be read and written to only by a set of provisioned and remote-attested enclaves.
The Integritee website states that the community aims to be the blockchain choice for a secure operating environment that will be scalable, decentralized, and trusted. The company behind Integritee declares that they can scale up to 1 M transactions per second (TPS) due to the decentralized choice of using Polkadot and Kusama infrastructure. The tokenomics of Integritee provide a cap on the token availability of 10 M TEER for the project [41].

3.5. Ternoa

Ternoa’s founder created this blockchain to share his memories with his children in the future. The NFTs work as the vehicle for data transmission and data handling. Ternoa provides the means to store data permanently in any format, with the user controlling access and availability [42]. CAPS is the token of the Ternoa blockchain used for payment and governance of transactions.
Ternoa allows secure data storage and transmission, providing an SDK to help develop and integrate applications [42]. It is based on the Substrate (https://substrate.io/) framework and the Polkadot blockchain, and it is designed to be a parachain of Polkadot. Thus, Ternoa enables the connection to other Polkadot-based blockchains. For decentralized storage, it uses other blockchains such as Storj (https://www.storj.io/), Sia (https://sia.tech/), or Arweave (https://www.arweave.org/). The Rust language is used to develop the smart contracts, and the NFTs are based on the ERC721 standard.
As Ternoa is a Polkadot-based blockchain, the community claims that it consumes approximately 0.001% of the Bitcoin blockchain’s energy consumption. This reduced consumption is possible because the Ternoa blockchain uses proof-of-stake (NPOS—nominated proof-of-stake) as the block proposer protocol instead of proof-of-work (PoW) [43]. The PoW consumption is estimated at 48.14 kWh per transaction, while the NPoS consumption is estimated in 0.8 GWh per year (800,000 kWh) [44].

3.6. NuCypher

NuCypher [45] is a data encryption and protection layer for Ethereum (and eventually other public networks) and decentralized applications (dApps) that do no rely on a central service provider. The protocol, which the team calls a decentralized key management system (KMS), allows developers to store, share, and manage private data on public blockchains. Developers receive this encryption service via a network of NuCypher nodes in exchange for a fee (paid for in ETH). Participants can only spin up a node by staking NuCypher’s token, NU, on the network as collateral.
NuCypher is a blockchain-based cryptographic infrastructure for privacy-preserving applications, dynamic control access, secrets management, and secure computation [45][46]. Additionally, NuCypher enables users to manage a range of computational secrets, such as identity and access management (IAM) tokens and database and secure shell (SSH) credentials to access servers remotely.
NuCypher uses a decentralized network to remove the dependency on central service providers, to create a proxy re-encryption for cryptographic access control, and to generate a token incentive mechanism to ensure reliability, availability, and correctness [47][48]. Because of proxy re-encryption, an unencrypted symmetric key that can decrypt private data is never exposed server-side. There is no single point of security failure. Even if compromised, hackers would only obtain re-encryption keys, as access to the file is still protected.
The technology provides a decentralized key management system based on blockchain technology and claims it can be used in DDRM, decentralized digital rights management, for secret key transformation [48]. In NuCypher’s network, the content key is encrypted by the owner’s public key, and only the owner’s private key can decrypt it. With authorization from the owner, the encrypted key will be fragmented and re-encrypted by several proxy nodes. Nodes are unaware of each other and cannot collude with the receiver. After re-encryption, the receiver collects the re-encrypted fragments and decrypts them.

3.7. Lit Protocol

The Lit (lockable interactive token) Protocol is a decentralized access control protocol running on top of Ethereum and other Ethereum virtual machine (EVM) chains (full-list EVM chains) (https://github.com/LIT-Protocol/lit-js-sdk/blob/main/src/lib/constants.js#L14). Lit on-chain access control conditions allow for [49]:
  • Encrypting and locking static content among images, videos, and music behind an on-chain condition such as ownership of an NFT;
  • Decrypting static content that was locked behind an on-chain condition;
  • Authorizing network signatures that provide access to dynamic content (for example, a server or network resource) behind an on-chain condition;
  • Requesting a network-signed JWT (JSON web token authentication) that provisions access and authorization to dynamic content behind an on-chain condition.
With this functionality, the Lit protocol enables the creation of locked NFTs that only their owners can unlock [50]. It also allows access to a given server or network resource only to NFT owners. Rather than a simple JPEG, Lit NFTs can be HTML/JS/CSS webpages that can be interactive and dynamic.
The network acts as a decentralized access control list (ACL) that leverages on-chain data to grant users access to content, software, and other decentralized networks [51]. Lit supports many standard contracts and plans to support any RPC call soon. The Lit Protocol is in an alpha state (the “AlphaNet”), and the creators are running all the nodes.
For static content, the SDK encrypts the user’s content and uploads the conditions for decryption to each Lit Protocol node. When someone wants to access the content, the SDK requests a message signature from the user’s wallet that proves the user owns the NFT associated with the content to each Lit Protocol node. The Lit Protocol nodes will then send down the decryption shares, and the SDK will combine them and decrypt the content.

3.8. Summary

Figure 1 shows seven privacy-preserving blockchain technologies. Table 1 summarizes the properties of the discussed technologies, in terms of the blockchain basis, token name, TEE support, MPC, and ZKP.
Figure 1. Privacy-preserving blockchains.
Table 1. Comparison among the privacy-preserving blockchain technologies.
Technology Blockchain Basis Token Name TEE MPC ZKP
Secret Cosmos SCRT
Oasis Ethereum ROSE
Phala Polkadot PHA
Integritee Polkadot TEER
Ternoa Polkadot CAPS
NuCypher Ethereum NU
Lit Protocol Ethereum -

References

  1. Aste, T.; Tasca, P.; Di Matteo, T. Blockchain Technologies: The Foreseeable Impact on Society and Industry. Computer 2017, 50, 18–28.
  2. Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019, 52, 1–34.
  3. Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156.
  4. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260.
  5. Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat. Inform. 2019, 36, 55–81.
  6. Fatima, N.; Agarwal, P.; Sohail, S.S. Security and Privacy Issues of Blockchain Technology in Health Care—A Review. In ICT Analysis and Applications; Fong, S., Dey, N., Joshi, A., Eds.; Springer: Singapore, 2022; pp. 193–201.
  7. Chander, B. Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions. In Smart City Infrastructure; John Wiley & Sons, Ltd.: Hoboken, NJ, USA, 2022; Chapter 1; pp. 1–32.
  8. Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H. Blockchain technology as a Fog computing security and privacy solution: An overview. Comput. Commun. 2022, 182, 129–152.
  9. Qahtan, S.; Sharif, K.Y.; Zaidan, A.A.; Alsattar, H.A.; Albahri, O.S.; Zaidan, B.B.; Zulzalil, H.; Osman, M.H.; Alamoodi, A.H.; Mohammed, R.T. Novel Multi Security and Privacy Benchmarking Framework for Blockchain-Based IoT Healthcare Industry 4.0 Systems. IEEE Trans. Ind. Inform. 2022, 18, 6415–6423.
  10. Jayabalan, J.; Jeyanthi, N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel Distrib. Comput. 2022, 164, 152–167.
  11. Gimenez-Aguilar, M.; de Fuentes, J.M.; Gonzalez-Manzano, L.; Arroyo, D. Achieving cybersecurity in blockchain-based systems: A survey. Future Gener. Comput. Syst. 2021, 124, 91–118.
  12. Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303.
  13. Issa, W.; Moustafa, N.; Turnbull, B.; Sohrabi, N.; Tari, Z. Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 2023, 55, 1–43.
  14. Grover, J. Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review. Veh. Commun. 2022, 34, 100458.
  15. Gawusu, S.; Zhang, X.; Ahmed, A.; Jamatutu, S.A.; Miensah, E.D.; Amadu, A.A.; Osei, F.A.J. Renewable energy sources from the perspective of blockchain integration: From theory to application. Sustain. Energy Technol. Assess. 2022, 52, 102108.
  16. Pournader, M.; Shi, Y.; Seuring, S.; Koh, S.L. Blockchain applications in supply chains, transport and logistics: A systematic review of the literature. Int. J. Prod. Res. 2020, 58, 2063–2081.
  17. Saeed, H.; Malik, H.; Bashir, U.; Ahmad, A.; Riaz, S.; Ilyas, M.; Bukhari, W.A.; Khan, M.I.A. Blockchain technology in healthcare: A systematic review. PLoS ONE 2022, 17, e0266462.
  18. Abou Jaoude, J.; George Saade, R. Blockchain Applications – Usage in Different Domains. IEEE Access 2019, 7, 45360–45381.
  19. Lashkari, B.; Musilek, P. A Comprehensive Review of Blockchain Consensus Mechanisms. IEEE Access 2021, 9, 43620–43652.
  20. Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada, 5–8 October 2017; pp. 2567–2572.
  21. Nijsse, J.; Litchfield, A. A Taxonomy of Blockchain Consensus Methods. Cryptography 2020, 4, 32.
  22. Pilkington, M. Blockchain technology: Principles and applications. In Research Handbook on Digital Transformations; Edward Elgar Publishing: Cheltenham, UK, 2016.
  23. Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461.
  24. Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375.
  25. Zhang, J.; Zhong, S.; Wang, T.; Chao, H.C.; Wang, J. Blockchain-based systems and applications: A survey. J. Internet Technol. 2020, 21, 1–14.
  26. Platt, M.; McBurney, P. Sybil attacks on identity-augmented Proof-of-Stake. Comput. Netw. 2021, 199, 108424.
  27. Hafid, A.; Hafid, A.S.; Samih, M. A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols. IEEE Trans. Emerg. Top. Comput. 2022, 11, 126–136.
  28. Valadares, D.C.G.; Will, N.C.; Spohn, M.A.; de Souza Santos, D.F.; Perkusich, A.; Gorgônio, K.C. Confidential computing in cloud/fog-based Internet of Things scenarios. Internet Things 2022, 19, 100543.
  29. Valadares, D.C.G.; Will, N.C.; Caminha, J.; Perkusich, M.B.; Perkusich, A.; Gorgônio, K.C. Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications. IEEE Access 2021, 9, 80953–80969.
  30. Byrd, D.; Polychroniadou, A. Differentially private secure multi-party computation for federated learning in financial applications. In Proceedings of the First ACM International Conference on AI in Finance, New York, NY, USA, 15–16 October 2020; pp. 1–9.
  31. Dong, X.; Randolph, D.A.; Weng, C.; Kho, A.N.; Rogers, J.M.; Wang, X. Developing high performance secure multi-party computation protocols in healthcare: A case study of patient risk stratification. AMIA Summits Transl. Sci. Proc. 2021, 2021, 200.
  32. Agahari, W.; Ofe, H.; de Reuver, M. It is not (only) about privacy: How multi-party computation redefines control, trust, and risk in data sharing. Electron. Mark. 2022, 32, 1577–1602.
  33. Garg, S.; Jain, A.; Sahai, A. Leakage-resilient zero knowledge. In Proceedings of the Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2011; Springer: Berlin/Heidelberg, Germany, 2011. Proceedings 31. pp. 297–315.
  34. Secret Network: A Privacy-Preserving Secret Contract & Decentralized Application Platform. Available online: https://bit.ly/3XU64LB (accessed on 10 July 2022).
  35. The Oasis Blockchain Platform. Available online: https://bit.ly/41kzwgo (accessed on 10 July 2022).
  36. Oasis Network Primer. Available online: https://bit.ly/3xK8RMw (accessed on 10 July 2022).
  37. What Is Phala Network (PHA)? Available online: https://bit.ly/3krDYt8 (accessed on 10 July 2022).
  38. Phala Network: A Secure Decentralized Cloud Computing Network Based on Polkadot. Available online: https://bit.ly/3lM7fz5 (accessed on 10 July 2022).
  39. All Systems Go for Integritee in the Coming Weeks. Available online: https://bit.ly/3DypWND (accessed on 10 July 2022).
  40. Integritee Book. Available online: https://bit.ly/3Iuus0G (accessed on 10 July 2022).
  41. Integritee Token Economics. Available online: https://bit.ly/3f15J8P (accessed on 10 July 2022).
  42. TERNOA—White Paper. Available online: https://bit.ly/3LnJSok (accessed on 10 July 2022).
  43. The Ternoa blockchain. Available online: https://bit.ly/3SgaJ7R (accessed on 10 July 2022).
  44. Duchemin, N. Ternoa, Creating Environmentally-Friendly Augmented NFTs. Available online: https://bit.ly/3LpGoBz (accessed on 10 July 2022).
  45. NuCypher Documentation. Available online: https://bit.ly/3khF0YT (accessed on 10 December 2022).
  46. A Deep Dive into NuCypher. Available online: https://bit.ly/3IKDjfI (accessed on 10 December 2022).
  47. Egorov, M.; Wilkison, M.; Nuñez, D. NuCypher KMS: Decentralized key management system. In Proceedings of the Blockchain Protocol Analysis and Security Engineering. arXiv 2017, arXiv:1707.06140.
  48. Egorov, M.; Nuñez, D.; Wilkison, M. NuCypher: A proxy re-encryption network to empower privacy in decentralized systems. NuCypher whitepaper 2018.
  49. What Is the Lit Protocol? Available online: https://bit.ly/41tJFaW (accessed on 10 December 2022).
  50. Lit Protocol Use Cases. Available online: https://bit.ly/3Ze8NR6 (accessed on 10 December 2022).
  51. Introduction to Decentralized Access Control. Available online: https://bit.ly/3YUrKIB (accessed on 10 December 2022).
More
Information
Contributors MDPI registered users' name will be linked to their SciProfiles pages. To register with us, please refer to https://encyclopedia.pub/register : , , , ,
View Times: 554
Revisions: 2 times (View History)
Update Date: 24 Aug 2023
1000/1000
Video Production Service