Privacy preservation in permissionless blockchain: A survey

被引:90
作者
Peng, Li [1 ]
Feng, Wei [1 ]
Yan, Zheng [1 ,2 ]
Li, Yafeng [3 ]
Zhou, Xiaokang [4 ,5 ]
Shimizu, Shohei [4 ,5 ]
机构
[1] Xidian Univ, Sch Cyber Engn, Xian 710071, Peoples R China
[2] Aalto Univ, Dept Commun & Networking, Espoo 02150, Finland
[3] China Elect Technol Grp Corp, Res Inst 20, Xian 710061, Peoples R China
[4] Shiga Univ, Fac Data Sci, Hikone, Japan
[5] RIKEN Ctr Adv Intelligence Project, Tokyo, Japan
基金
中国国家自然科学基金; 中国博士后科学基金; 芬兰科学院;
关键词
Blockchain; Privacy; Cryptocurrency; Anonymity; ARCHITECTURE; PROTECTION; CONTRACTS; SCHEME;
D O I
10.1016/j.dcan.2020.05.008
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the initial cryptocurrency to the Internet of Things (IoT) and Vehicular Ad-Hoc Networking (VANET), which is considered as the beginning of rewriting our digital infrastructure. However, blockchain confronts some privacy risks that hinder its practical applications. Though numerous surveys reviewed the privacy preservation in blockchain, they failed to reveal the latest advances, nor have they been able to conduct a unified standard comprehensive classification of the privacy protection of permissionless blockchain. Therefore, in this paper, we analyze the specific characteristics of permissionless blockchain, summarize the potential privacy threats, and investigate the unique privacy requirements of blockchain. Existing privacy preservation technologies are carefully surveyed and evaluated based on our proposed evaluation criteria. We finally figure out open research issues as well as future research directions from the perspective of privacy issues.
引用
收藏
页码:295 / 307
页数:13
相关论文
共 102 条
  • [1] Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
  • [2] Androulaki Elli, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P161, DOI 10.1007/978-3-319-08593-7_11
  • [3] [Anonymous], 2016, Blockchain as a Service for IoT, DOI [10.1109/iThings-GreenCom-CPSComSmartData.2016.102, DOI 10.1109/ITHINGS-GREENCOM-CPSCOMSMARTDATA.2016.102]
  • [4] [Anonymous], 2018, P PRIV ENHANCING TEC
  • [5] Bach LM, 2018, 2018 41ST INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), P1545, DOI 10.23919/MIPRO.2018.8400278
  • [6] Zerocash: Decentralized Anonymous Payments from Bitcoin
    Ben-Sasson, Eli
    Chiesa, Alessandro
    Garmant, Christina
    Green, Matthew
    Miers, Ian
    Tromer, Eran
    Virza, Madars
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 459 - 474
  • [7] Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
  • [8] Biswas K, 2016, PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS
  • [9] IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY
  • [10] IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), P1392, DOI [10.1109/HPCC-SmartCity-DSS.2016.0198, 10.1109/HPCC-SmartCity-DSS.2016.178]