Realizing privacy aspects in blockchain networks

The right to personal privacy is known as a fundamental human right allowing people to restrict access to their personal information. The decentralized nature of blockchain networks, often involving the publicity of ledger information, can come into conflict with this right. This is in particular the case when the blockchain maintains sensitive information such as financial credits or medical information. In this paper, we discuss this interaction. We first describe multiple aspects of privacy such as its practical limit towards authorities, its potential vulnerability, and its association with technological systems such as blockchain networks. Towards answering these challenges, we survey a wide range of techniques relying on tools from the areas of cryptography, distributed system, and hardware architecture. We explain how each can be used to enhance privacy in blockchain networks following their unique nature. We further conclude that none of the available techniques can fully answer the complex practical requirements, and that practical solutions should combine both centrally controlled and decentralized systems.

[1]  Silvio Micali,et al.  Computationally Sound Proofs , 2000, SIAM J. Comput..

[2]  Tal Z. Zarsky,et al.  Incompatible: The GDPR in the Age of Big Data , 2017 .

[3]  Ralph C. Merkle,et al.  Secrecy, authentication, and public key systems , 1979 .

[4]  J. Gans,et al.  Some simple economics of the blockchain , 2016, Commun. ACM.

[5]  Prateek Saxena,et al.  Obscuro: A Bitcoin Mixer using Trusted Execution Environments , 2018, IACR Cryptol. ePrint Arch..

[6]  S. Matthew Weinberg,et al.  Arbitrum: Scalable, private smart contracts , 2018, USENIX Security Symposium.

[7]  Pawel Rotter,et al.  RFID implants: Opportunities and and challenges for identifying people , 2008, IEEE Technology and Society Magazine.

[8]  Jens Groth,et al.  Short Non-interactive Zero-Knowledge Proofs , 2010, ASIACRYPT.

[9]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[10]  Thomas N. Theis,et al.  The End of Moore's Law: A New Beginning for Information Technology , 2017, Computing in Science & Engineering.

[11]  Eli Ben-Sasson,et al.  Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture , 2014, USENIX Security Symposium.

[12]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[13]  Ghassan O. Karame,et al.  On the privacy provisions of Bloom filters in lightweight bitcoin clients , 2014, IACR Cryptol. ePrint Arch..

[14]  Sean Turner,et al.  Transport Layer Security , 2014, IEEE Internet Computing.

[15]  J. Slemrod,et al.  Taxes on the Internet: Deterrence Effects of Public Disclosure , 2013, SSRN Electronic Journal.

[16]  Martin Hirt,et al.  Perfectly-Secure MPC with Linear Communication Complexity , 2008, TCC.

[17]  Jason Teutsch,et al.  A scalable verification solution for blockchains , 2019, ArXiv.

[18]  Anuraag A Vazirani,et al.  Blockchain vehicles for efficient Medical Record management , 2020, npj Digital Medicine.

[19]  Emmanuel Stapf,et al.  Trusted Execution Environments: Properties, Applications, and Challenges , 2020, IEEE Security & Privacy.

[20]  Michael Friedewald,et al.  Seven Types of Privacy , 2013, European Data Protection.

[21]  Frank Stajano,et al.  The Quest to Replace Passwords: A Framework for Comparative Evaluation of Web Authentication Schemes , 2012, 2012 IEEE Symposium on Security and Privacy.

[22]  Pedro Moreno-Sanchez,et al.  SoK: Layer-Two Blockchain Protocols , 2020, Financial Cryptography.

[23]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[24]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[25]  Yuval Ishai,et al.  On Efficient Zero-Knowledge PCPs , 2012, TCC.

[26]  Fan Zhang,et al.  Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts , 2018, 2019 IEEE European Symposium on Security and Privacy (EuroS&P).

[27]  Carsten Lund,et al.  Proof verification and the hardness of approximation problems , 1998, JACM.

[28]  Steve Kremer,et al.  An Extensive Formal Analysis of Multi-factor Authentication Protocols , 2018, 2018 IEEE 31st Computer Security Foundations Symposium (CSF).

[29]  Silvio Micali,et al.  The Knowledge Complexity of Interactive Proof Systems , 1989, SIAM J. Comput..

[30]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[31]  Janet Zandy Universal Declaration of Human Rights , 2019, Radical Teacher.

[32]  G.E. Moore,et al.  Cramming More Components Onto Integrated Circuits , 1998, Proceedings of the IEEE.