Journal ArticleDOI
A survey on privacy protection in blockchain system
TLDR
The privacy threats in blockchain are analyzed and existing cryptographic defense mechanisms, i.e., anonymity and transaction privacy preservation, are discussed to preserve privacy when blockchain is used.About:
This article is published in Journal of Network and Computer Applications.The article was published on 2019-01-15. It has received 531 citations till now. The article focuses on the topics: Blockchain & Identity management.read more
Citations
More filters
Journal ArticleDOI
The rise of blockchain technology in agriculture and food supply chains
TL;DR: The findings indicate that blockchain is a promising technology towards a transparent supply chain of food, with many ongoing initiatives in various food products and food-related issues, but many barriers and challenges still exist, which hinder its wider popularity among farmers and systems.
Journal ArticleDOI
Blockchain technology in supply chain operations: Applications, challenges and research opportunities
TL;DR: Several industrial sectors such as shipping, manufacturing, automotive, aviation, finance, technology, energy, healthcare, agriculture and food, e-commerce, and education among others are examined that can be successfully revamped with blockchain based technologies through enhanced visibility and business process management.
Journal ArticleDOI
Blockchain for Industry 4.0: A Comprehensive Review
Umesh Bodkhe,Sudeep Tanwar,Karan Parekh,Pimal Khanpara,Sudhanshu Tyagi,Neeraj Kumar,Mamoun Alazab +6 more
TL;DR: This paper explored the current state-of-the-art solutions in the blockchain technology for the smart applications, illustrated the reference architecture used for the blockchain applicability in various Industry 4.0-based applications, and provided a comparison of existing blockchain-based security solutions using various parameters to provide deep insights to the readers about its applicability.
Journal ArticleDOI
Privacy preservation in blockchain based IoT systems: Integration issues, prospects, challenges, and future research directions
TL;DR: The privacy issues caused due to integration of blockchain in IoT applications by focusing over the applications of the authors' daily use are discussed, and implementation of five privacy preservation strategies in blockchain-based IoT systems named as anonymization, encryption, private contract, mixing, and differential privacy are discussed.
Journal ArticleDOI
Blockchain technology in agri-food value chain management: A synthesis of applications, challenges and future research directions
Guoqing Zhao,Shaofeng Liu,Carmen López,Haiyan Lu,Sebastian Elgueta,Huilan Chen,Biljana Mileva Boshkoska +6 more
TL;DR: The findings suggest that blockchain technology together with advanced information and communication technology and internet of things have been adopted for the improvement of agri-food value chain management in four main aspects: traceability, information security, manufacturing and sustainable water management.
References
More filters
Book ChapterDOI
Public-key cryptosystems based on composite degree residuosity classes
TL;DR: A new trapdoor mechanism is proposed and three encryption schemes are derived : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA, which are provably secure under appropriate assumptions in the standard model.
Journal ArticleDOI
Untraceable electronic mail, return addresses, and digital pseudonyms
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.
Proceedings ArticleDOI
Practical Byzantine fault tolerance
Miguel Castro,Barbara Liskov +1 more
TL;DR: A new replication algorithm that is able to tolerate Byzantine faults that works in asynchronous environments like the Internet and incorporates several important optimizations that improve the response time of previous algorithms by more than an order of magnitude.
Untraceable Electronic Mail, Return Addresses and Digital Pseudonyms.
TL;DR: In this article, a technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication -in spite of an unsecured underlying telecommunication system.
Ethereum: A Secure Decentralised Generalised Transaction Ledger
TL;DR: Ethereum as mentioned in this paper is a transactional singleton machine with shared state, which can be seen as a simple application on a decentralised, but singleton, compute resource, and it provides a plurality of resources, each with a distinct state and operating code but able to interact through a message-passing framework with others.