Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)

Exploring Blockchain Privacy: Threats and Optimization Solutions

Authors
Weihang Feng1, *
1School of Software Engineering, Tongji University, Shanghai, 201804, China
*Corresponding author. Email: 2251093@tongji.edu.cn
Corresponding Author
Weihang Feng
Available Online 16 October 2024.
DOI
10.2991/978-94-6463-540-9_29How to use a DOI?
Keywords
Blockchain; Identity privacy; Network privacy; Encryption technology
Abstract

As information technology advances rapidly, blockchain has risen as a transformative decentralized cryptographic system, celebrated for its robust security features and immutability. This paper offers a succinct overview of the various blockchain types, articulating their structures and functions. It further identifies and explores the significant privacy and security risks associated with blockchain technology from three specific angles: data structure, identity privacy, and network privacy. The discussion extends to four principal technological strategies—decentralization, cryptographic techniques, obfuscation methods, and privacy protocols—implemented to bolster privacy within blockchain systems. This analysis methodically examines the algorithms and technologies currently utilized for privacy preservation in blockchain research, with the aim of identifying current trends and anticipating future developments. By thoroughly evaluating these strategies, the paper aims to deliver an exhaustive understanding of contemporary blockchain privacy protection techniques. This investigation not only highlights the effectiveness of existing methods but also paves the way for the advancement of more sophisticated privacy protection technologies, contributing to the ongoing evolution and maturation of blockchain technology.

Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Download article (PDF)

Volume Title
Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)
Series
Advances in Computer Science Research
Publication Date
16 October 2024
ISBN
978-94-6463-540-9
ISSN
2352-538X
DOI
10.2991/978-94-6463-540-9_29How to use a DOI?
Copyright
© 2024 The Author(s)
Open Access
Open Access This chapter is licensed under the terms of the Creative Commons Attribution-NonCommercial 4.0 International License (http://creativecommons.org/licenses/by-nc/4.0/), which permits any noncommercial use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.

Cite this article

TY  - CONF
AU  - Weihang Feng
PY  - 2024
DA  - 2024/10/16
TI  - Exploring Blockchain Privacy: Threats and Optimization Solutions
BT  - Proceedings of the 2024 2nd International Conference on Image, Algorithms and Artificial Intelligence (ICIAAI 2024)
PB  - Atlantis Press
SP  - 277
EP  - 291
SN  - 2352-538X
UR  - https://doi.org/10.2991/978-94-6463-540-9_29
DO  - 10.2991/978-94-6463-540-9_29
ID  - Feng2024
ER  -