Skip to main content

2024 | OriginalPaper | Buchkapitel

A Survey of Blockchain-Based Identity Anonymity Research

verfasst von : Fa Fu, Gaoshang Lu, Jianqiang Huang, Thomas Dreibholz

Erschienen in: Proceedings of the 13th International Conference on Computer Engineering and Networks

Verlag: Springer Nature Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the booming development of blockchain technology, blockchain-based data transactions have been applied in many fields such as finance, healthcare and logistics. It can help users to realize data transactions and management more conveniently, securely, transparently and efficiently. However, there is a certain problem of identity privacy leakage when data transactions are conducted on blockchain. Therefore, the issue of user identity privacy protection has become the core issue of data transactions on the blockchain, which is crucial to the sustainable development and wide application of the blockchain. This paper discusses the privacy protection in the process of data transactions on blockchain in terms of user identity anonymity, introduces and analyzes in detail the current research status and implementation technologies for realizing identity anonymity on blockchain, explains the threats and challenges for realizing identity anonymity, analyzes the existing problems, and gives an outlook and summary of the future research directions for realizing identity anonymity on blockchain.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Yu, X.: Blockchain privacy protection key technology research and application. Inf. Technol. 3(5), 36–50 (2020)MathSciNet Yu, X.: Blockchain privacy protection key technology research and application. Inf. Technol. 3(5), 36–50 (2020)MathSciNet
2.
Zurück zum Zitat Liu, H.O., Zhou, Y.Y., Zhou, X., et al.: A review of blockchain privacy threats and protection mechanisms research. Comput. Integrat. Manufact. Syst. 3(9), 1–25 (2023) Liu, H.O., Zhou, Y.Y., Zhou, X., et al.: A review of blockchain privacy threats and protection mechanisms research. Comput. Integrat. Manufact. Syst. 3(9), 1–25 (2023)
3.
Zurück zum Zitat Yu, P.: Blockchain-based research on privacy data protection and sharing of electronic medical records. Inf. Technol. 1(8), 25–41 (2020) Yu, P.: Blockchain-based research on privacy data protection and sharing of electronic medical records. Inf. Technol. 1(8), 25–41 (2020)
4.
Zurück zum Zitat Song, Y.C., Ning, X.Y.: Blockchain technology risk assessment and control. Financ. Account. Mon. 14(9), 124–140 (2021) Song, Y.C., Ning, X.Y.: Blockchain technology risk assessment and control. Financ. Account. Mon. 14(9), 124–140 (2021)
5.
Zurück zum Zitat Wu, Y.X.: Research on group blind signature and multi-bank electronic cash system. Inf. Technol. 11(2), 31–45 (2014) Wu, Y.X.: Research on group blind signature and multi-bank electronic cash system. Inf. Technol. 11(2), 31–45 (2014)
6.
Zurück zum Zitat Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978) Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
7.
Zurück zum Zitat Chaum, D.: Blind Signatures for Untraceable Payments. Adv. Cryptol. 15(2), 19–22 (1983) Chaum, D.: Blind Signatures for Untraceable Payments. Adv. Cryptol. 15(2), 19–22 (1983)
8.
Zurück zum Zitat Wang, Y.: Research on automatic trust negotiation protocol based on secure multi-party computation. Inf. Technol. 6(1), 49–65 (2012) Wang, Y.: Research on automatic trust negotiation protocol based on secure multi-party computation. Inf. Technol. 6(1), 49–65 (2012)
9.
Zurück zum Zitat Liu, D.: A blind signature based on combined public key cryptography. Fujian Comput. 31(2), 21–32 (2015)MathSciNet Liu, D.: A blind signature based on combined public key cryptography. Fujian Comput. 31(2), 21–32 (2015)MathSciNet
10.
Zurück zum Zitat Gong, Z.Y.: IoT privacy protection based on partial blind signature algorithm. Modern Trade Ind. 41(25), 111–123 (2020) Gong, Z.Y.: IoT privacy protection based on partial blind signature algorithm. Modern Trade Ind. 41(25), 111–123 (2020)
11.
Zurück zum Zitat He, B.: A study of forward-secure proxy blind signature scheme. Inf. Technol. 3(2), 23–39 (2014) He, B.: A study of forward-secure proxy blind signature scheme. Inf. Technol. 3(2), 23–39 (2014)
12.
Zurück zum Zitat Lei, Y.C.: Blockchain privacy protection scheme based on group signature. Inf. Technol. 5(3), 42–58 (2020) Lei, Y.C.: Blockchain privacy protection scheme based on group signature. Inf. Technol. 5(3), 42–58 (2020)
13.
Zurück zum Zitat Chaum, D., Heyst, EV.: Group signatures. In: Advances in Cryptology - EUROCRYPT ‘91, Lecture Notes in Computer Science, vol. 547, pp. 257–265 (1991) Chaum, D., Heyst, EV.: Group signatures. In: Advances in Cryptology - EUROCRYPT ‘91, Lecture Notes in Computer Science, vol. 547, pp. 257–265 (1991)
14.
Zurück zum Zitat Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Trans. Emerg. Telecommun. Technol. 8(5), 481–490 (1997)CrossRef Cramer, R., Gennaro, R., Schoenmakers, B.: A secure and optimally efficient multi-authority election scheme. Trans. Emerg. Telecommun. Technol. 8(5), 481–490 (1997)CrossRef
15.
Zurück zum Zitat Camenisch, J.: Efficient group signature schemes for large group. In: Advances in Cryptology -CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, pp. 410–424 (1997) Camenisch, J.: Efficient group signature schemes for large group. In: Advances in Cryptology -CRYPTO'97, Lecture Notes in Computer Science, vol. 1294, pp. 410–424 (1997)
16.
Zurück zum Zitat Lu, D.J., Wang, Y.: An identity-based gated proxy signature scheme. Basic Sci. 26(01), 1–14 (2010) Lu, D.J., Wang, Y.: An identity-based gated proxy signature scheme. Basic Sci. 26(01), 1–14 (2010)
17.
Zurück zum Zitat An, T.: Research and application of data security privacy protection methods in cloud environment. Inf. Technol. 5(9), 22–38 (2020) An, T.: Research and application of data security privacy protection methods in cloud environment. Inf. Technol. 5(9), 22–38 (2020)
18.
Zurück zum Zitat Boneh, D., Gentry, C., Lynn, B., et al.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003, LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)CrossRef Boneh, D., Gentry, C., Lynn, B., et al.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003, LNCS, vol. 2656, pp. 416–432. Springer, Heidelberg (2003)CrossRef
19.
Zurück zum Zitat Miers, I., Garman, C., Green, M., et al.: Zerocoin: anonymous distributed E-cash from bitcoin. In: Symposium on Security and Privacy, pp. 397–411. IEEE, San Francisco (2013) Miers, I., Garman, C., Green, M., et al.: Zerocoin: anonymous distributed E-cash from bitcoin. In: Symposium on Security and Privacy, pp. 397–411. IEEE, San Francisco (2013)
20.
Zurück zum Zitat Bonneau, J., Narayanan, A., Miller, A., et al.: Mixcoin: Anonymity for Bitcoin with accountable mixes. In: Christin, N., Safavi-Naini, R. (eds.) International Financial Cryptography Association 2014, LNCS, vol. 8437, pp. 486–504. Springer, Berlin (2014) Bonneau, J., Narayanan, A., Miller, A., et al.: Mixcoin: Anonymity for Bitcoin with accountable mixes. In: Christin, N., Safavi-Naini, R. (eds.) International Financial Cryptography Association 2014, LNCS, vol. 8437, pp. 486–504. Springer, Berlin (2014)
21.
Zurück zum Zitat Bowe, S., Chiesa, A., Green, M., et al.: ZEXE: enabling decentralized private computation. In: Symposium on Security and Privacy, pp. 947–964. IEEE, San Francisco (2020) Bowe, S., Chiesa, A., Green, M., et al.: ZEXE: enabling decentralized private computation. In: Symposium on Security and Privacy, pp. 947–964. IEEE, San Francisco (2020)
22.
Zurück zum Zitat Damgård, I., Keller, M., Larraia, E., et al.: Practical covertly secure MPC for dishonest majority – or: breaking the SPDZ limits. In: Advances in Cryptology - EUROCRYPT 2013, Lecture Notes in Computer Science, vol. 7887, pp. 463–480 (2013) Damgård, I., Keller, M., Larraia, E., et al.: Practical covertly secure MPC for dishonest majority – or: breaking the SPDZ limits. In: Advances in Cryptology - EUROCRYPT 2013, Lecture Notes in Computer Science, vol. 7887, pp. 463–480 (2013)
Metadaten
Titel
A Survey of Blockchain-Based Identity Anonymity Research
verfasst von
Fa Fu
Gaoshang Lu
Jianqiang Huang
Thomas Dreibholz
Copyright-Jahr
2024
Verlag
Springer Nature Singapore
DOI
https://doi.org/10.1007/978-981-99-9247-8_44