scispace - formally typeset
Journal ArticleDOI

A survey on privacy protection in blockchain system

TLDR
The privacy threats in blockchain are analyzed and existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy preservation, are discussed to preserve privacy when blockchain is used.
About
This article is published in Journal of Network and Computer Applications.The article was published on 2019-01-15. It has received 531 citations till now. The article focuses on the topics: Blockchain & Identity management.

read more

Citations
More filters
Journal ArticleDOI

The rise of blockchain technology in agriculture and food supply chains

TL;DR: The findings indicate that blockchain is a promising technology towards a transparent supply chain of food, with many ongoing initiatives in various food products and food-related issues, but many barriers and challenges still exist, which hinder its wider popularity among farmers and systems.
Journal ArticleDOI

Blockchain technology in supply chain operations: Applications, challenges and research opportunities

TL;DR: Several industrial sectors such as shipping, manufacturing, automotive, aviation, finance, technology, energy, healthcare, agriculture and food, e-commerce, and education among others are examined that can be successfully revamped with blockchain based technologies through enhanced visibility and business process management.
Journal ArticleDOI

Blockchain for Industry 4.0: A Comprehensive Review

TL;DR: This paper explored the current state-of-the-art solutions in the blockchain technology for the smart applications, illustrated the reference architecture used for the blockchain applicability in various Industry 4.0-based applications, and provided a comparison of existing blockchain-based security solutions using various parameters to provide deep insights to the readers about its applicability.
Journal ArticleDOI

Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions

TL;DR: The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed.
Journal ArticleDOI

Blockchain technology in agri-food value chain management: A synthesis of applications, challenges and future research directions

TL;DR: The findings suggest that blockchain technology together with advanced information and communication technology and internet of things have been adopted for the improvement of agri-food value chain management in four main aspects: traceability, information security, manufacturing and sustainable water management.
References
More filters
Book ChapterDOI

Public-key cryptosystems based on composite degree residuosity classes

TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI

Untraceable electronic mail, return addresses, and digital pseudonyms

TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Proceedings ArticleDOI

Practical Byzantine fault tolerance

TL;DR: A new replication algorithm that is able to tolerate Byzantine faults that works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude.

Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms.

TL;DR: In this article, a technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication -in spite of an unsecured underlying telecommunication system.

Ethereum: A Secure Decentralised Generalised Transaction Ledger

Gavin Wood
TL;DR: Ethereum as mentioned in this paper is a transactional singleton machine with shared state, which can be seen as a simple application on a decentralised, but singleton, compute resource, and it provides a plurality of resources, each with a distinct state and operating code but able to interact through a message-passing framework with others.
Related Papers (5)
Trending Questions (1)
What are the practical limitations and trade-offs in achieving both scalability and privacy within blockchain solutions for data protection?

The provided paper does not specifically discuss the practical limitations and trade-offs in achieving both scalability and privacy within blockchain solutions for data protection.