Exploring Blockchain Privacy: Threats and Optimization Solutions
- DOI
- 10.2991/978-94-6463-540-9_29How to use a DOI?
- Keywords
- Blockchain; Identity privacy; Network privacy; Encryption technology
- Abstract
As information technology advances rapidly, blockchain has risen as a transformative decentralized cryptographic system, celebrated for its robust security features and immutability. This paper offers a succinct overview of the various blockchain types, articulating their structures and functions. It further identifies and explores the significant privacy and security risks associated with blockchain technology from three specific angles: data structure, identity privacy, and network privacy. The discussion extends to four principal technological strategies—decentralization, cryptographic techniques, obfuscation methods, and privacy protocols—implemented to bolster privacy within blockchain systems. This analysis methodically examines the algorithms and technologies currently utilized for privacy preservation in blockchain research, with the aim of identifying current trends and anticipating future developments. By thoroughly evaluating these strategies, the paper aims to deliver an exhaustive understanding of contemporary blockchain privacy protection techniques. This investigation not only highlights the effectiveness of existing methods but also paves the way for the advancement of more sophisticated privacy protection technologies, contributing to the ongoing evolution and maturation of blockchain technology.
- Copyright
- © 2024 The Author(s)
- Open Access
- Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
Cite this article
TY - CONF AU - Weihang Feng PY - 2024 DA - 2024/10/16 TI - Exploring Blockchain Privacy: Threats and Optimization Solutions BT - Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024) PB - Atlantis Press SP - 277 EP - 291 SN - 2352-538X UR - https://doi.org/10.2991/978-94-6463-540-9_29 DO - 10.2991/978-94-6463-540-9_29 ID - Feng2024 ER -