4.7 Review

Privacy preservation in permissionless blockchain: A survey

Journal

DIGITAL COMMUNICATIONS AND NETWORKS
Volume 7, Issue 3, Pages 295-307

Publisher

KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2020.05.008

Keywords

Blockchain; Privacy; Cryptocurrency; Anonymity

Funding

  1. National Natural Science Foundation of China [61672410, 61802293]
  2. Academy of Finland [308087, 314203, 335262]
  3. Key Lab of Information Network Security, Ministry of Public Security [C18614]
  4. open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation, P.R. China [CLDL-20182119]
  5. National Postdoctoral Program for Innovative Talents [BX20180238]
  6. China Postdoctoral Science Foundation [2018M633461]
  7. Shaanxi Innovation Team [2018TD-007]
  8. 111 project [B16037]

Ask authors/readers for more resources

The paper analyzed the characteristics, potential privacy threats, and unique privacy requirements of permissionless blockchain, evaluated existing privacy preservation technologies based on proposed criteria, and identified open research issues and future research directions from the perspective of privacy issues.
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the initial cryptocurrency to the Internet of Things (IoT) and Vehicular Ad-Hoc Networking (VANET), which is considered as the beginning of rewriting our digital infrastructure. However, blockchain confronts some privacy risks that hinder its practical applications. Though numerous surveys reviewed the privacy preservation in blockchain, they failed to reveal the latest advances, nor have they been able to conduct a unified standard comprehensive classification of the privacy protection of permissionless blockchain. Therefore, in this paper, we analyze the specific characteristics of permissionless blockchain, summarize the potential privacy threats, and investigate the unique privacy requirements of blockchain. Existing privacy preservation technologies are carefully surveyed and evaluated based on our proposed evaluation criteria. We finally figure out open research issues as well as future research directions from the perspective of privacy issues.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available