A Survey on Privacy Protection of Blockchain: The Technology and Application

As a kind of point-to-point distributed public ledger technology, blockchain has been widely concerned in recent years. The privacy protection of blockchain technology has always been the core issue of people’s attention. In this paper, some existing solutions to the current problems of user identity and transaction privacy protection are surveyed, including coin mixing mechanism, zero knowledge proof, ring signature and other technologies. Secondly, five typical applications of privacy protection technology based on blockchain are proposed and analyzed, which are mainly divided into technology applications based on coin mixing protocol, encryption protocol, secure channel protocol and so on. Finally, in view of the shortages of the existing blockchain privacy protection technology, we explore future research challenges that need to be studied in order to preserve privacy in blockchain system, and looks forward to the future development direction.

[1]  Daniel Joseph,et al.  SHARVOT: Secret SHARe-Based VOTing on the Blockchain , 2018, 2018 IEEE/ACM 1st International Workshop on Emerging Trends in Software Engineering for Blockchain (WETSEB).

[2]  Benjamin Aziz,et al.  Enhancing IoT Security and Privacy with Distributed Ledgers - A Position Paper - , 2017, IoTBDS.

[3]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[4]  Yingshu Li,et al.  Data Linkage in Smart Internet of Things Systems: A Consideration from a Privacy Perspective , 2018, IEEE Communications Magazine.

[5]  Bing Pan,et al.  A Survey of Privacy-Preserving Techniques for Blockchain , 2019, ICAIS.

[6]  Eli Ben-Sasson,et al.  Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.

[7]  Zhang Fengwei,et al.  A Study of Using TEE on Edge Computing , 2019 .

[8]  Mohamed Baza,et al.  Privacy-Preserving Smart Parking System Using Blockchain and Private Information Retrieval , 2019, 2019 International Conference on Smart Applications, Communications and Networking (SmartNets).

[9]  Bharat K. Bhargava,et al.  A Blockchain-Enabled Trustless Crowd-Intelligence Ecosystem on Mobile Edge Computing , 2019, IEEE Transactions on Industrial Informatics.

[10]  Torben P. Pedersen Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.

[11]  Brian Neil Levine,et al.  Sybil-Resistant Mixing for Bitcoin , 2014, WPES.

[12]  Jeremy Clark,et al.  Mixcoin: Anonymity for Bitcoin with Accountable Mixes , 2014, Financial Cryptography.

[13]  Markku-Juhani O. Saarinen Arithmetic coding and blinding countermeasures for lattice signatures , 2018, Journal of Cryptographic Engineering.

[14]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[15]  Huanguo Zhang Research and Development of Trusted Computing in China , 2008, 2008 Third Asia-Pacific Trusted Infrastructure Technologies Conference.

[16]  Michael S. Kester,et al.  Bitcoin Transaction Graph Analysis , 2015, ArXiv.

[17]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[18]  Yang Gao,et al.  An incentive mechanism with privacy protection in mobile crowdsourcing systems , 2016, Comput. Networks.

[19]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[20]  Adam Mackenzie,et al.  MRL-0004 Improving Obfuscation in the CryptoNote Protocol , 2015 .

[21]  Gang Qu,et al.  BARS: A Blockchain-Based Anonymous Reputation System for Trust Management in VANETs , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[22]  Heekuck Oh,et al.  A Simple Yet Efficient Approach to Combat Transaction Malleability in Bitcoin , 2014, WISA.

[23]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[24]  Jianping Yu,et al.  A Blind-Mixing Scheme for Bitcoin based on an Elliptic Curve Cryptography Blind Digital Signature Algorithm , 2015, ArXiv.

[25]  Shen Noether,et al.  Ring Confidential Transactions , 2016, Ledger.

[26]  Ivan Damgård,et al.  Asynchronous Multiparty Computation: Theory and Implementation , 2008, IACR Cryptol. ePrint Arch..

[27]  Prateek Saxena,et al.  A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.

[28]  Klaus Wehrle,et al.  CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.

[29]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[30]  Sherali Zeadally,et al.  A survey on privacy protection in blockchain system , 2019, J. Netw. Comput. Appl..

[31]  Iddo Bentov,et al.  Sprites and State Channels: Payment Networks that Go Faster Than Lightning , 2017, Financial Cryptography.

[32]  Ethan Heilman,et al.  Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions , 2016, Financial Cryptography Workshops.

[33]  Silvio Micali,et al.  The knowledge complexity of interactive proof-systems , 1985, STOC '85.

[34]  Fabio Antonelli,et al.  IoT data privacy via blockchains and IPFS , 2017, IOT.

[35]  Mihir Bellare,et al.  The Security of Cipher Block Chaining , 1994, CRYPTO.

[36]  Gao Feng,et al.  Survey on Privacy Preserving Techniques for Blockchain Technology , 2017 .

[37]  Cong Wang,et al.  Searching an Encrypted Cloud Meets Blockchain: A Decentralized, Reliable and Fair Realization , 2018, IEEE INFOCOM 2018 - IEEE Conference on Computer Communications.

[38]  George Danezis,et al.  Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.

[39]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[40]  Raylin Tso,et al.  Distributed E-Voting and E-Bidding Systems Based on Smart Contract , 2019, Electronics.

[41]  Baocheng Wang,et al.  Large-scale Election Based On Blockchain , 2017, IIKI.

[42]  C Karthik,et al.  An Overview of Blockchain Technology , 2018, International Research Journal of Electronics and Computer Engineering.

[43]  Zhipeng Cai,et al.  A Private and Efficient Mechanism for Data Uploading in Smart Cyber-Physical Systems , 2020, IEEE Transactions on Network Science and Engineering.

[44]  Guishan Dong,et al.  区块链应用中的隐私保护策略研究 (Research on Privacy Protection Strategies in Blockchain Application) , 2019, 计算机科学.

[45]  Alex Pentland,et al.  Decentralizing Privacy: Using Blockchain to Protect Personal Data , 2015, 2015 IEEE Security and Privacy Workshops.

[46]  Kevin Lee,et al.  An Empirical Analysis of Linkability in the Monero Blockchain , 2017, ArXiv.

[47]  Elaine Shi,et al.  Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts , 2016, 2016 IEEE Symposium on Security and Privacy (SP).

[48]  Yael Tauman Kalai,et al.  How to Leak a Secret: Theory and Applications of Ring Signatures , 2001, Essays in Memory of Shimon Even.

[49]  Yang Gao,et al.  Truthful incentive mechanism with location privacy-preserving for mobile crowdsourcing systems , 2018, Comput. Networks.

[50]  Ronald L. Rivest,et al.  ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .

[51]  Christian Decker,et al.  A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels , 2015, SSS.

[52]  Feng Hao,et al.  Towards Bitcoin Payment Networks , 2016, ACISP.

[53]  Pedro Moreno-Sanchez,et al.  CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin , 2014, ESORICS.

[54]  Nicolas Courtois,et al.  Stealth Address and Key Management Techniques in Blockchain Systems , 2017, ICISSP.

[55]  Luke Valenta,et al.  Blindcoin: Blinded, Accountable Mixes for Bitcoin , 2015, Financial Cryptography Workshops.

[56]  Yu Hui,et al.  Full Anonymous Blockchain Based on Aggregate Signature and Confidential Transaction , 2018 .

[57]  Matthew Green,et al.  Bolt: Anonymous Payment Channels for Decentralized Currencies , 2017, CCS.

[58]  David Chaum,et al.  Group Signatures , 1991, EUROCRYPT.

[59]  Nazim Faour Transparent Voting Platform Based on Permissioned Blockchain , 2018, ArXiv.

[60]  Ethan Heilman,et al.  TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub , 2017, NDSS.

[61]  Pedro Moreno-Sanchez,et al.  ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin , 2017, Financial Cryptography Workshops.