4.7 Review

Privacy preservation in permissionless blockchain: A survey

期刊

DIGITAL COMMUNICATIONS AND NETWORKS
卷 7, 期 3, 页码 295-307

出版社

KEAI PUBLISHING LTD
DOI: 10.1016/j.dcan.2020.05.008

关键词

Blockchain; Privacy; Cryptocurrency; Anonymity

资金

  1. National Natural Science Foundation of China [61672410, 61802293]
  2. Academy of Finland [308087, 314203, 335262]
  3. Key Lab of Information Network Security, Ministry of Public Security [C18614]
  4. open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation, P.R. China [CLDL-20182119]
  5. National Postdoctoral Program for Innovative Talents [BX20180238]
  6. China Postdoctoral Science Foundation [2018M633461]
  7. Shaanxi Innovation Team [2018TD-007]
  8. 111 project [B16037]

向作者/读者索取更多资源

The paper analyzed the characteristics, potential privacy threats, and unique privacy requirements of permissionless blockchain, evaluated existing privacy preservation technologies based on proposed criteria, and identified open research issues and future research directions from the perspective of privacy issues.
Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain has shown a good application prospect in many fields, from the initial cryptocurrency to the Internet of Things (IoT) and Vehicular Ad-Hoc Networking (VANET), which is considered as the beginning of rewriting our digital infrastructure. However, blockchain confronts some privacy risks that hinder its practical applications. Though numerous surveys reviewed the privacy preservation in blockchain, they failed to reveal the latest advances, nor have they been able to conduct a unified standard comprehensive classification of the privacy protection of permissionless blockchain. Therefore, in this paper, we analyze the specific characteristics of permissionless blockchain, summarize the potential privacy threats, and investigate the unique privacy requirements of blockchain. Existing privacy preservation technologies are carefully surveyed and evaluated based on our proposed evaluation criteria. We finally figure out open research issues as well as future research directions from the perspective of privacy issues.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.7
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据