Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey

On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey

Published: 25 July 2024 Publication History

Abstract

Blockchain is a decentralized distributed ledger that combines multiple technologies, including chain data structures, P2P networks, consensus algorithms, cryptography, and smart contracts. This gives the blockchain the characteristics of decentralization, immutability, and traceability. However, blockchain stores smart contracts and transactions in blocks publicly, which poses the risk of data leakage and misuse. For example, by mining and analyzing blockchain transaction information, attackers can correlate transactions with user information, resulting in the disclosure of user privacy. Many current reviews focus on the privacy of permissionless blockchains or cryptocurrencies, requiring more in-depth investigations and detailed categorical analysis. To fill this gap, this work comprehensively reviews the latest and traditional methods related to identity, transaction, and smart contract privacy within permissioned and permissionless blockchains. Additionally, we summarize the existing problems, threats, and challenges of data management in different blockchain architectures. Last, we discuss future research directions for blockchain privacy protection technology, which can offer feasible ideas for researchers to explore further.

References

[1]
Alexey Pertsev, Roman Semenov, and Roman Storm. 2019. Tornado Cash Privacy Solution Version 1.4. Retrieved July 4, 2024 from DOI:https://crebaco.com/planner/admin/uploads/whitepapers/2982941Tornado.cash_whitepaper_v1.4.pdf
[2]
Alzubaidi (pseudonym) Ali. 2017. Hyperledger Fabric. Retrieved July 4, 2024 from https://github.com/hyperledger/fabric
[3]
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz, and Shingo Okamura. 2021. Eth2Vec: Learning contract-wide code representations for vulnerability detection on Ethereum smart contracts. In Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure(BSCI’21). ACM, New York, NY, USA, 47–59. DOI:
[4]
Lukas Aumayr, Matteo Maffei, Oğuzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, and Pedro Moreno-Sanchez. 2021. Bitcoin-compatible virtual channels. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP’21). 901–918. DOI:
[5]
Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2021. Blitz: Secure multi-hop payments without two-phase commits. In Proceedings of the 30th USENIX Security Symposium (USENIX Security’21). 4043–4060. DOI:https://www.usenix.org/conference/usenixsecurity21/presentation/aumayr
[6]
Adam Back. 2013. Bitcoins with homomorphic value (validatable but encrypted). Bitcointalk. Retrieved May 1, 2015 from https://bitcointalk.org/index.php
[7]
Massimo Bartoletti and Roberto Zunino. 2018. BitML: A calculus for Bitcoin smart contracts. In Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security(CCS’18). ACM, New York, NY, USA, 83–100. DOI:
[8]
Eli Ben Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, and Madars Virza. 2014. Zerocash: Decentralized anonymous payments from Bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy. IEEE, 459–474. DOI:
[9]
Eli Ben Sasson, Alessandro Chiesa, Michael Riabzev, Nicholas Spooner, Madars Virza, and Nicholas P. Ward. 2019. Aurora: Transparent succinct arguments for R1CS. In Advances in Cryptology—EUROCRYPT 2019, Yuval Ishai and Vincent Rijmen (Eds.). Springer International Publishing, Cham, 103–128.
[10]
F. Benhamouda, S. Halevi, and T. Halevi. 2019. Supporting private data on hyperledger fabric with secure multiparty computation. IBM Journal of Research and Development 63, 2-3 (2019), Article 3, 8 pages. DOI:
[11]
John Bethencourt, Amit Sahai, and Brent Waters. 2007. Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP’07). IEEE, 321–334. DOI:
[12]
Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security(CCS’14). ACM, New York, NY, USA, 15–29. DOI:
[13]
Alex Biryukov and Ivan Pustogarov. 2015. Bitcoin over Tor isn’t a good idea. In Proceedings of the 2015 IEEE Symposium on Security and Privacy(SP’15). IEEE, 122–134. DOI:
[14]
George Bissias, A. Pinar Ozisik, Brian N. Levine, and Marc Liberatore. 2014. Sybil-resistant mixing for Bitcoin. In Proceedings of the 13th Workshop on Privacy in the Electronic Society(WPES’14). ACM, New York, NY, USA, 149–158. DOI:
[15]
Sam Blackshear, Evan Cheng, David L. Dill, Victor Gao, Ben Maurer, Todd Nowacki, Alistair Pott, Shaz Qadeer, Dario Russi Rain, Stephane Sezer, Tim Zakian, and Runtian Zhou. 2019. Move: A Language with Programmable Resources. Libra Association
[16]
Dan Boneh, Xavier Boyen, and Hovav Shacham. 2004. Short group signatures. In Proceedings of the Annual International Cryptology Conference. 41–55.
[17]
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua A. Kroll, and Edward W. Felten. 2014. Mixcoin: Anonymity for Bitcoin with accountable mixes. In Financial Cryptography and Data Security, Nicolas Christin and Reihaneh Safavi-Naini (Eds.). Springer, Berlin, Germany, 486–504.
[18]
Benedikt Bünz, Shashank Agrawal, Mahdi Zamani, and Dan Boneh. 2020. Zether: Towards privacy in a smart contract world. In Financial Cryptography and Data Security, Joseph Bonneau and Nadia Heninger (Eds.). Springer International Publishing, Cham, 423–443.
[19]
Benedikt Bünz, Jonathan Bootle, Dan Boneh, Andrew Poelstra, Pieter Wuille, and Greg Maxwell. 2018. Bulletproofs: Short proofs for confidential transactions and more. In Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP’18). IEEE, 315–334. DOI:
[20]
Jiahong Cai, Wei Liang, Xiong Li, Kuanching Li, Zhenwen Gui, and Muhammad Khurram Khan. 2023. GTxChain: A secure IoT smart blockchain architecture based on graph neural network. IEEE Internet of Things Journal 10, 24 (2023), 21502–21514. DOI:
[21]
Jan Camenisch and Els Van Herreweghen. 2002. Design and implementation of the idemix anonymous credential system. In Proceedings of the 9th ACM Conference on Computer and Communications Security(CCS’02). ACM, New York, NY, USA, 21–30. DOI:
[22]
Miguel Castro and Barbara Liskov. 1999. Practical byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI’99). 173–186.
[23]
David Cerdeira, Nuno Santos, Pedro Fonseca, and Sandro Pinto. 2020. SoK: Understanding the prevailing security vulnerabilities in TrustZone-assisted TEE systems. In Proceedings of the 2020 IEEE Symposium on Security and Privacy (SP’20). 1416–1432. DOI:
[24]
Dajiang Chen, Zeyu Liao, Ruidong Chen, Hao Wang, Chong Yu, Kuan Zhang, Ning Zhang, and Xuemin Shen. 2024. Privacy-preserving anomaly detection of encrypted smart contract for blockchain-based data trading. IEEE Transactions on Dependable and Secure Computing. Early Access, January 15, 2024. DOI:
[25]
Weili Chen, Tuo Zhang, Zhiguang Chen, Zibin Zheng, and Yutong Lu. 2020. Traveling the token world: A graph analysis of Ethereum ERC20 token ecosystem. In Proceedings of the Web Conference 2020(WWW’20). ACM, New York, NY, USA, 1411–1421. DOI:
[26]
Yourong Chen, Hao Chen, Yang Zhang, Meng Han, Madhuri Siddula, and Zhipeng Cai. 2022. A survey on blockchain systems: Attacks, defenses, and privacy preservation. High-Confidence Computing 2, 2 (2022), 100048. DOI:
[27]
Jieren Cheng, Luyi Xie, Xiangyan Tang, Naixue Xiong, and Boyi Liu. 2021. A survey of security threats and defense on blockchain. Multimedia Tools and Applications 80, 20 (2021), 30623–30652. DOI:
[28]
Raymond Cheng, Fan Zhang, Jernej Kos, Warren He, Nicholas Hynes, Noah Johnson, Ari Juels, Andrew Miller, and Dawn Song. 2019. Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contracts. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy (EuroS&P’19). IEEE, 185–200. DOI:
[29]
Shlomi Dolev and Ziyu Wang. 2020. SodsMPC: FSM based anonymous and private quantum-safe smart contracts. In Proceedings of the 2020 IEEE 19th International Symposium on Network Computing and Applications (NCA’20). IEEE, 1–10. DOI:
[30]
Maya Dotan, Saar Tochner, Aviv Zohar, and Yossi Gilad. 2022. Twilight: A differentially private payment channel network. In Proceedings of the 31st USENIX Security Symposium (USENIX Security’22). 555–570. https://www.usenix.org/conference/usenixsecurity22/presentation/dotan
[31]
Huayi Duan, Yifeng Zheng, Yuefeng Du, Anxin Zhou, Cong Wang, and Man Ho Au. 2019. Aggregating crowd wisdom via blockchain: A private, correct, and robust realization. In Proceedings of the 2019 IEEE International Conference on Pervasive Computing and Communications (PerCom’19). IEEE, 1–10. DOI:
[32]
Evan Duffield and Daniel Diaz. 2015. Dash: A privacy-centric crypto-currency. https://github.com/dashpay/dash/wiki/Whitepaper
[33]
Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2019. Perun: Virtual payment hubs over cryptocurrencies. In Proceedings of the 2019 IEEE Symposium on Security and Privacy (SP’19). IEEE, 106–123. DOI:
[34]
Christoph Egger, Pedro Moreno-Sanchez, and Matteo Maffei. 2019. Atomic multi-channel updates with constant collateral in Bitcoin-compatible payment-channel networks. In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security(CCS’19). ACM, New York, NY, USA, 801–815. DOI:
[35]
Muhammed F. Esgin, Raymond K. Zhao, Ron Steinfeld, Joseph K. Liu, and Dongxi Liu. 2019. MatRiCT: Efficient, scalable and post-quantum blockchain confidential transactions protocol(CCS’19). ACM, New York, NY, USA, 567–584. DOI:
[36]
Qi Feng, Debiao He, Sherali Zeadally, Muhammad Khurram Khan, and Neeraj Kumar. 2019. A survey on privacy protection in blockchain system. Journal of Network and Computer Applications 126 (2019), 45–58. DOI:
[37]
Georg Fuchsbauer, Michele Orrù, and Yannick Seurin. 2019. Aggregate cash systems: A cryptographic investigation of Mimblewimble. In Advances in Cryptology—EUROCRYPT 2019, Yuval Ishai and Vincent Rijmen (Eds.). Springer International Publishing, Cham, 657–689.
[38]
Zhonghui Ge, Jiayuan Gu, Chenke Wang, Yu Long, Xian Xu, and Dawu Gu. 2023. Accio: Variable-amount, optimized-unlinkable and NIZK-free off-chain payments via hubs. In Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security(CCS’23). ACM, New York, NY, USA, 1541–1555. DOI:
[39]
Daniel Genkin, Dimitrios Papadopoulos, and Charalampos Papamanthou. 2018. Privacy in decentralized cryptocurrencies. Communications of the ACM 61, 6 (2018), 78–88.
[40]
Matthew Green and Ian Miers. 2017. Bolt: Anonymous payment channels for decentralized currencies(CCS’17). ACM, New York, NY, USA, 473–489. DOI:
[41]
Dezhi Han, Yujie Zhu, Dun Li, Wei Liang, Alireza Souri, and Kuan-Ching Li. 2022. A blockchain-based auditable access control system for private data in service-centric IoT environments. IEEE Transactions on Industrial Informatics 18, 5 (2022), 3530–3540. DOI:
[42]
Heiko Hees. 2016. Raiden network: Off-chain state network for fast DApps. In Devcon Two. Ethereum Foundation.
[43]
Ethan Heilman, Leen AlShenibr, Foteini Baldimtsi, Alessandra Scafuro, and Sharon Goldberg. 2017. TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub. Retrieved July 4, 2024 from DOI:https://open.bu.edu/handle/2144/29224
[44]
Ethan Heilman, Foteini Baldimtsi, and Sharon Goldberg. 2016. Blindly signed contracts: Anonymous on-blockchain and off-blockchain Bitcoin transactions. In Proceedings of the International Conference on Financial Cryptography and Data Security. 43–60.
[45]
Bin Hu, Zongyang Zhang, Jianwei Liu, Yizhong Liu, Jiayuan Yin, Rongxing Lu, and Xiaodong Lin. 2021. A comprehensive survey on smart contract construction and execution: Paradigms, tools, and systems. Patterns 2, 2 (2021), 100179. DOI:
[46]
Kexin Hu and Zhenfeng Zhang. 2018. Fast lottery-based micropayments for decentralized currencies. In Information Security and Privacy, Willy Susilo and Guomin Yang (Eds.). Springer International Publishing, Cham, 669–686.
[47]
Tianyuan Hu, Zecheng Li, and Bixin Li. 2021. Contractual security and privacy security of smart contract: A system mapping study. Chinese Journal of Computers 44, 12 (2021), 2485–2514.
[48]
Ivy. 2017. Ivy Language Home Page. Retrieved July 4, 2024 from DOI:https://docs.ivylang.org/bitcoin/
[49]
J. Dharani, K. Sundarakantham, Kunwar Singh, and S. Mercy Shalinie. 2022. A privacy-preserving framework for endorsement process in hyperledger fabric. Computers & Security 116 (2022), 102637. DOI:
[50]
Bin Jia, Xiaosong Zhang, Jiewen Liu, Yang Zhang, Ke Huang, and Yongquan Liang. 2022. Blockchain-enabled federated learning data protection aggregation scheme with differential privacy and homomorphic encryption in IIoT. IEEE Transactions on Industrial Informatics 18, 6 (2022), 4049–4058. DOI:
[51]
Harry Kalodner, Steven Goldfeder, Xiaoqi Chen, S. Matthew Weinberg, and Edward W. Felten. 2018. Arbitrum: Scalable, private smart contracts. In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). 1353–1370. DOI:https://www.usenix.org/conference/usenixsecurity18/presentation/kalodner
[52]
Hui Kang, Ting Dai, Nerla Jean-Louis, Shu Tao, and Xiaohui Gu. 2019. FabZK: Supporting privacy-preserving, auditable smart contracts in Hyperledger Fabric. In Proceedings of the 2019 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN’19). IEEE, 543–555. DOI:
[53]
George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn. 2018. An empirical analysis of anonymity in Zcash. In Proceedings of the 27th USENIX Security Symposium (USENIX Security’18). 463–477. DOI:https://www.usenix.org/conference/usenixsecurity18/presentation/kappos
[54]
Thomas Kerber, Aggelos Kiayias, and Markulf Kohlweiss. 2021. KACHINA—Foundations of private smart contracts. In Proceedings of the 2021 IEEE 34th Computer Security Foundations Symposium (CSF’21). IEEE, 1–16. DOI:
[55]
Ahmed Kosba, Andrew Miller, Elaine Shi, Zikai Wen, and Charalampos Papamanthou. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 2016 IEEE Symposium on Security and Privacy (SP’16). IEEE, 839–858. DOI:
[56]
Amrit Kumar, Clément Fischer, Shruti Tople, and Prateek Saxena. 2017. A traceability analysis of Monero’s blockchain. In Computer Security—ESORICS 2017, Simon N. Foley, Dieter Gollmann, and Einar Snekkenes (Eds.). Springer International Publishing, Cham, 153–173.
[57]
Chao Li, Balaji Palanisamy, and Runhua Xu. 2019. Scalable and privacy-preserving design of on/off-chain smart contracts. In Proceedings of the 2019 IEEE 35th International Conference on Data Engineering Workshops (ICDEW’19). IEEE, 7–12. DOI:
[58]
Yuzheng Li, Chuan Chen, Nan Liu, Huawei Huang, Zibin Zheng, and Qiang Yan. 2021. A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35, 1 (2021), 234–241. DOI:
[59]
Wei Liang, Yuhui Li, Jianlong Xu, Zheng Qin, Dafang Zhang, and Kuan-Ching Li. 2024. QoS prediction and adversarial attack protection for distributed services under DLaaS. IEEE Transactions on Computers 73, 3 (2024), 669–682. DOI:
[60]
Wei Liang, Lijun Xiao, Ke Zhang, Mingdong Tang, Dacheng He, and Kuan-Ching Li. 2022. Data fusion approach for collaborative anomaly intrusion detection in blockchain-based systems. IEEE Internet of Things Journal 9, 16 (2022), 14741–14751. DOI:
[61]
Wei Liang, Siqi Xie, Kuan-Ching Li, Xiong Li, Xiaoyan Kui, and Albert Y. Zomaya. 2024. MC-DSC: A dynamic secure resource configuration scheme based on medical consortium blockchain. IEEE Transactions on Information Forensics and Security 19 (2024), 3525–3538. DOI:
[62]
Wei Liang, Yang Yang, Ce Yang, Yonghua Hu, Songyou Xie, Kuan-Ching Li, and Jiannong Cao. 2022. PDPChain: A consortium blockchain-based privacy protection scheme for personal data. IEEE Transactions on Reliability. Published Online, August 5, 2022. DOI:
[63]
Chao Liu, Han Liu, Zhao Cao, Zhong Chen, Bangdao Chen, and Bill Roscoe. 2018. ReGuard: Finding reentrancy bugs in smart contracts. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceedings(ICSE’18). ACM, New York, NY, USA, 65–68. DOI:
[64]
Jingwei Liu, Xiaolu Li, Lin Ye, Hongli Zhang, Xiaojiang Du, and Mohsen Guizani. 2018. BPDS: A blockchain based privacy-preserving data sharing for electronic medical records. In Proceedings of the 2018 IEEE Global Communications Conference (GLOBECOM’18). IEEE, 1–6. DOI:
[65]
Joseph K. Liu, Victor K. Wei, and Duncan S. Wong. 2004. Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract). In Information Security and Privacy. Lecture Notes in Computer Science, Vol. 3108. Springer, 325–335.
[66]
Yaqin Liu, Wei Liang, Kun Xie, Songyou Xie, Kuanching Li, and Weizhi Meng. 2023. LightPay: A lightweight and secure off-chain multi-path payment scheme based on adapter signatures. IEEE Transactions on Services Computing. Early Access, November 17, 2023. DOI:
[67]
Yi Liu, Xingtong Liu, Chaojing Tang, Jian Wang, and Lei Zhang. 2018. Unlinkable coin mixing scheme for transaction privacy enhancement of Bitcoin. IEEE Access 6 (2018), 23261–23270. DOI:
[68]
Zhenguang Liu, Peng Qian, Xiaoyang Wang, Yuan Zhuang, Lin Qiu, and Xun Wang. 2023. Combining graph neural networks with expert knowledge for smart contract vulnerability detection. IEEE Transactions on Knowledge and Data Engineering 35, 2 (2023), 1296–1310. DOI:
[69]
Imran Makhdoom, Ian Zhou, Mehran Abolhasan, Justin Lipman, and Wei Ni. 2020. PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities. Computers & Security 88 (2020), 101653. DOI:
[70]
Gregory Maxwell. 2013. CoinJoin: Bitcoin privacy for the real world. Bitcoin Forum. Retrieved July 4, 2024 from https://bitcointalk.org/index.php?topic=279249.0
[71]
Subhra Mazumdar and Sushmita Ruj. 2023. CryptoMaze: Privacy-preserving splitting of off-chain payments. IEEE Transactions on Dependable and Secure Computing 20, 2 (2023), 1060–1073. DOI:
[72]
Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous distributed E-cash from Bitcoin. In Proceedings of the 2013 IEEE Symposium on Security and Privacy (SP’13). IEEE, 397–411. DOI:
[73]
Andrew Miller, Malte Moser, Kevin Lee, and Arvind Narayanan. 2017. An Empirical Analysis of Linkability in the Monero Blockchain. Retrieved July 4, 2024 from DOI:https://allquantor.at/blockchainbib/pdf/miller2017empirical.pdf
[74]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 2008 (2008), 21260.
[75]
Neha Narula, Willy Vasquez, and Madars Virza. 2018. zkLedger: Privacy-preserving auditing for distributed ledgers. In Proceedings of the 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI’18). 65–80. DOI:https://www.usenix.org/conference/nsdi18/presentation/narula
[76]
Wangze Ni, Peng Cheng, and Lei Chen. 2022. Mixing transactions with arbitrary values on blockchains. In Proceedings of the 2022 IEEE 38th International Conference on Data Engineering (ICDE’22). IEEE, 2602–2614. DOI:
[77]
Shen Noether. 2015. Ring Signature Confidential Transactions for Monero. Report 2015/1098. Cryptology ePrint Archive. DOI:https://eprint.iacr.org/2015/1098
[78]
Shen Noether, Adam Mackenzie, and the Monero Research Lab. 2016. Ring confidential transactions. Ledger 1 (Dec.2016), 1–18. DOI:
[79]
F. Origo. 2019. Privacy Preserving Platform for Decentralized Applications. Retrieved July 4, 2024 from DOI:https://origo.network/whitepaper/
[80]
Pascal Paillier. 1999. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology—EUROCRYPT’99, Jacques Stern (Ed.). Springer, Berlin, Germany, 223–238.
[81]
Amirmohammad Pasdar, Young Choon Lee, and Zhongli Dong. 2023. Connect API with blockchain: A survey on blockchain oracle implementation. ACM Computing Surveys 55, 10 (Feb. 2023), Article 208, 39 pages. DOI:
[82]
Torben Pryds Pedersen. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology—CRYPTO’91, Joan Feigenbaum (Ed.). Springer, Berlin, Germany, 129–140.
[83]
Li Peng, Wei Feng, Zheng Yan, Yafeng Li, Xiaokang Zhou, and Shohei Shimizu. 2021. Privacy preservation in permissionless blockchain: A survey. Digital Communications and Networks 7, 3 (2021), 295–307. DOI:
[84]
Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable off-chain instant payments. Unpublished.
[85]
Yuanhang Qi, M. Shamim Hossain, Jiangtian Nie, and Xuandi Li. 2021. Privacy-preserving blockchain-based federated learning for traffic flow prediction. Future Generation Computer Systems 117 (2021), 328–337. DOI:
[86]
Xianrui Qin, Shimin Pan, Arash Mirzaei, Zhimei Sui, Oğuzhan Ersoy, Amin Sakzad, Muhammed F. Esgin, Joseph K. Liu, Jiangshan Yu, and Tsz Hon Yuen. 2023. BlindHub: Bitcoin-compatible privacy-preserving payment channel hubs supporting variable amounts. In Proceedings of the 2023 IEEE Symposium on Security and Privacy (SP’23). 2462–2480. DOI:
[87]
Han Qiu, Xiao Wu, Shuyi Zhang, Victor C. M. Leung, and Wei Cai. 2019. ChainIDE: A cloud-based integrated development environment for cross-blockchain smart contracts. In Proceedings of the 2019 IEEE International Conference on Cloud Computing Technology and Science (CloudCom’19). IEEE, 317–319. DOI:
[88]
Xidi Qu, Shengling Wang, Qin Hu, and Xiuzhen Cheng. 2021. Proof of federated learning: A novel energy-recycling consensus algorithm. IEEE Transactions on Parallel and Distributed Systems 32, 8 (2021), 2074–2085. DOI:
[89]
Gunasekaran Raja, Yelisetty Manaswini, Gaayathri Devi Vivekanandan, Harish Sampath, Kapal Dev, and Ali Kashif Bashir. 2020. AI-powered blockchain—A decentralized secure multiparty computation protocol for IoV. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’20). IEEE, 865–870. DOI:
[90]
M. G. Reed, P. F. Syverson, and D. M. Goldschlag. 1998. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications 16, 4 (1998), 482–494. DOI:
[91]
Qian Ren, Yue Li, Yingjun Wu, Yuchen Wu, Hong Lei, Lei Wang, and Bangdao Chen. 2024. DeCloak: Enable secure and cheap multi-party transactions on legacy blockchains by a minimally trusted TEE network. IEEE Transactions on Information Forensics and Security 19 (2024), 88–103. DOI:
[92]
rnab-r3 (pseudonym). 2017. Corda. Retrieved July 4, 2024 from https://github.com/corda/corda
[93]
Pingcheng Ruan, Yaron Kanza, Beng Chin Ooi, and Divesh Srivastava. 2022. LedgerView: Access-control views on hyperledger fabric. In Proceedings of the 2022 International Conference on Management of Data(SIGMOD’22). ACM, New York, NY, USA, 2218–2231. DOI:
[94]
Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2014. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In Computer Security—ESORICS 2014, Mirosław Kutyłowski and Jaideep Vaidya (Eds.). Springer International Publishing, Cham, 345–364.
[95]
Mark Russinovich, Edward Ashton, Christine Avanessians, Miguel Castro, Amaury Chamayou, Sylvan Clebsch, Manuel Costa, Cédric Fournet, Matthew Kerner, Sid Krishna, Julien Maffre, Thomas Moscibroda, Kartik Nayak, Olga Ohrimenko, Felix Schuster, Roy Schuster, Alex Shamis, Olga Vrousgou, and Christoph M. Wintersteiger. 2019. CCF: A Framework for Building Confidential Verifiable Replicated Services. Technical Report. Microsoft.
[96]
Umair Sarfraz, Masoom Alam, Sherali Zeadally, and Abid Khan. 2019. Privacy aware IOTA ledger: Decentralized mixing and unlinkable IOTA transactions. Computer Networks 148 (2019), 361–372. DOI:
[97]
István András Seres, Dániel A. Nagy, Chris Buckland, and Péter Burcsi. 2019. MixEth: Efficient, trustless coin mixing service for Ethereum. Cryptology ePrint Archive. Retrieved July 4, 2024 from https://eprint.iacr.org/2019/341
[98]
Wei Shao, Chunfu Jia, Yunkai Xu, Kefan Qiu, Yan Gao, and Yituo He. 2020. AttriChain: Decentralized traceable anonymous identities in privacy-preserving permissioned blockchain. Computers & Security 99 (2020), 102069. DOI:
[99]
Janno Siim. 2017. Proof-of-stake. In Proceedings of the Research Seminar in Cryptography.
[100]
Parminder Singh, Mehedi Masud, M. Shamim Hossain, and Avinash Kaur. 2021. Blockchain and homomorphic encryption-based privacy-preserving data aggregation model in smart grid. Computers & Electrical Engineering 93 (2021), 107209. DOI:
[101]
Samuel Steffen, Benjamin Bichsel, Roger Baumgartner, and Martin Vechev. 2022. ZeeStar: Private smart contracts by homomorphic encryption and zero-knowledge proofs. In Proceedings of the 2022 IEEE Symposium on Security and Privacy (SP’22). IEEE, 179–197. DOI:
[102]
Samuel Steffen, Benjamin Bichsel, Mario Gersbach, Noa Melchior, Petar Tsankov, and Martin Vechev. 2019. zkay: Specifying and enforcing data privacy in smart contracts. InProceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (CCS’19). ACM, New York, NY, USA, 1759–1776. DOI:
[103]
Xiaowen Sun, Tan Yang, and Bo Hu. 2022. LSTM-TC: Bitcoin coin mixing detection method with a high recall. Applied Intelligence 52, 1 (2022), 780–793. DOI:
[104]
Xiaoqiang Sun, F. Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng. 2021. A survey on zero-knowledge proof in blockchain. IEEE Network 35, 4 (2021), 198–205. DOI:
[105]
Liang Tan, Keping Yu, Na Shi, Caixia Yang, Wei Wei, and Huimin Lu. 2022. Towards secure and privacy-preserving data sharing for COVID-19 medical records: A blockchain-empowered approach. IEEE Transactions on Network Science and Engineering 9, 1 (2022), 271–281. DOI:
[106]
Yu Tong, Weiming Tan, Jingzhi Guo, Bingqing Shen, Peng Qin, and Shuaihe Zhuo. 2022. Smart contract generation assisted by AI-based word segmentation. Applied Sciences 12, 9 (2022), 4773. DOI:
[107]
Florian Tramèr, Dan Boneh, and Kenneth G. Paterson. 2020. Remote side-channel attacks on anonymous transactions. In Proceedings of the 29th USENIX Conference on Security Symposium (SEC’20). Article 154, 18 pages.
[109]
Luke Valenta and Brendan Rowan. 2015. Blindcoin: Blinded, accountable mixes for Bitcoin. In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer, Berlin, Germany, 112–126.
[110]
Jo Van Bulck, Marina Minkin, Ofir Weisse, Daniel Genkin, Baris Kasikci, Frank Piessens, Mark Silberstein, Thomas F. Wenisch, Yuval Yarom, and Raoul Strackx. 2018. Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution. In Proceedings of the 27th USENIX Conference on Security Symposium(SEC’18). 991–1008.
[111]
Nicolas Van Saberhagen. 2013. CryptoNote v 2.0. https://c3.coinlore.com/pdf/bytecoin-bcn-white-paper.pdf
[112]
Zhiguo Wan, Yan Zhou, and Kui Ren. 2023. zk-AuthFeed: Protecting data feed to smart contracts with authenticated zero knowledge proof. IEEE Transactions on Dependable and Secure Computing 20, 2 (2023), 1335–1347. DOI:
[113]
Dan Wang, Jindong Zhao, and Yingjie Wang. 2020. A survey on privacy protection of blockchain: The technology and application. IEEE Access 8 (2020), 108766–108781. DOI:
[114]
Qin Wang, Bo Qin, Jiankun Hu, and Fu Xiao. 2020. Preserving transaction privacy in Bitcoin. Future Generation Computer Systems 107 (2020), 793–804. DOI:
[115]
Lei Wu, Yufeng Hu, Yajin Zhou, Haoyu Wang, Xiapu Luo, Zhi Wang, Fan Zhang, and Kui Ren. 2021. Towards understanding and demystifying Bitcoin mixing services. In Proceedings of the Web Conference 2021(WWW’21). ACM, New York, NY, USA, 33–44. DOI:
[116]
Xiao Wu, Han Qiu, Shuyi Zhang, Gerard Memmi, Keke Gai, and Wei Cai. 2020. ChainIDE 2.0: Facilitating smart contract development for consortium blockchain. In Proceedings of the IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS’20). IEEE, 388–393. DOI:
[117]
Zhiying Wu, Jieli Liu, Jiajing Wu, Zibin Zheng, and Ting Chen. 2023. TRacer: Scalable graph-based transaction tracing for account-based blockchain trading systems. IEEE Transactions on Information Forensics and Security 18 (2023), 2609–2621. DOI:
[118]
Songyou Xie, Lijun Xiao, Dezhi Han, Kun Xie, Xiong Li, and Wei Liang. 2023. HCVC: A high-capacity off-chain virtual channel scheme based on bidirectional locking mechanism. IEEE Transactions on Network Science and Engineering. Early Access, November 17, 2023. DOI:
[119]
Bai (pseudonym) XingQiang. 2018. FISCO BCOS. Retrieved July 4, 2024 from https://github.com/FISCO-BCOS/FISCO-BCOS
[120]
Alex Luoyuan Xiong, Binyi Chen, Zhenfei Zhang, Benedikt Bünz, Ben Fisch, Fernando Krell, and Philippe Camacho. 2023. VeriZexe: Decentralized private computation with universal setup. In Proceedings of the 32nd USENIX Security Symposium (USENIX Security’23). 4445–4462. DOI:https://www.usenix.org/conference/usenixsecurity23/presentation/xiong
[121]
Cheng Xu, Ce Zhang, Jianliang Xu, and Jian Pei. 2021. SlimChain: Scaling blockchain transactions through off-chain storage and parallel processing. Proceedings of the VLDB Endowment 14, 11 (July 2021), 2314–2326. DOI:
[122]
Yang Xu, Md. Zakirul Alam Bhuiyan, Tian Wang, Xiaokang Zhou, and Amit Kumar Singh. 2023. C-FDRL: Context-aware privacy-preserving offloading through federated deep reinforcement learning in cloud-enabled IoT. IEEE Transactions on Industrial Informatics 19, 2 (2023), 1155–1164. DOI:
[123]
Zihuan Xu and Lei Chen. 2021. DIV: Resolving the dynamic issues of zero-knowledge set membership proof in the blockchain. In Proceedings of the 2021 International Conference on Management of Data(SIGMOD’21). ACM, New York, NY, USA, 2036–2048. DOI:
[124]
Ying Yan, Changzheng Wei, Xuepeng Guo, Xuming Lu, Xiaofu Zheng, Qi Liu, Chenhui Zhou, Xuyang Song, Boran Zhao, Hui Zhang, and Guofei Jiang. 2020. Confidentiality support over financial grade consortium blockchain. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data(SIGMOD’20). ACM, New York, NY, USA, 2227–2240. DOI:
[125]
Fan Yang, Wei Zhou, QingQing Wu, Rui Long, Neal N. Xiong, and Meiqi Zhou. 2019. Delegated proof of stake with downgrade: A secure and efficient blockchain consensus algorithm with downgrade mechanism. IEEE Access 7 (2019), 118541–118555. DOI:
[126]
Cheng Zhang, Yang Xu, Haroon Elahi, Deyu Zhang, Yunlin Tan, Junxian Chen, and Yaoxue Zhang. 2023. A blockchain-based model migration approach for secure and sustainable federated learning in IoT systems. IEEE Internet of Things Journal 10, 8 (2023), 6574–6585. DOI:
[127]
Fan Zhang, Ethan Cecchetti, Kyle Croman, Ari Juels, and Elaine Shi. 2016. Town Crier: An authenticated data feed for smart contracts. In Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security(CCS’16). ACM, New York, NY, USA, 270–282. DOI:
[128]
Rui Zhang, Rui Xue, and Ling Liu. 2019. Security and privacy on blockchain. ACM Computing Surveys 52, 3 (July 2019), Article 51, 34 pages. DOI:
[129]
Sisi Zhou, Kuanching Li, Yuxiang Chen, Ce Yang, Wei Liang, and Albert Y. Zomaya. 2024. TrustBCFL: Mitigating data bias in IoT through blockchain-enabled federated learning. IEEE Internet of Things Journal. Early Access, April 4, 2024. DOI:
[130]
Jan Henrik Ziegeldorf, Fred Grossmann, Martin Henze, Nicolas Inden, and Klaus Wehrle. 2015. CoinParty: Secure multi-party mixing of Bitcoins(CODASPY’15). ACM, New York, NY, USA, 75–86. DOI:

Cited By

View all
  • (2025)Blockchain-Based Knowledge Sharing and CollaborationBlockchain Technology Applications in Knowledge Management10.4018/979-8-3693-3956-5.ch003(71-114)Online publication date: 3-Jan-2025
  • (2025)MASS: A Multiattribute Sketch Secure Data Sharing Scheme for IoT Wearable Medical Devices Based on BlockchainIEEE Internet of Things Journal10.1109/JIOT.2024.346873312:2(1990-2001)Online publication date: 15-Jan-2025
  • (2025)Multimodal knowledge graph construction for intelligent question answering systems: integrating text, image, and audio dataAustralian Journal of Electrical and Electronics Engineering10.1080/1448837X.2024.2448376(1-10)Online publication date: 5-Jan-2025
  • Show More Cited By

Index Terms

  1. On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Computing Surveys
      ACM Computing Surveys  Volume 56, Issue 12
      December 2024
      966 pages
      EISSN:1557-7341
      DOI:10.1145/3613718
      Issue’s Table of Contents

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 July 2024
      Online AM: 29 June 2024
      Accepted: 23 June 2024
      Revised: 19 April 2024
      Received: 18 August 2022
      Published in CSUR Volume 56, Issue 12

      Check for updates

      Author Tags

      1. Blockchain privacy protection
      2. transaction privacy
      3. identity privacy
      4. smart contract privacy

      Qualifiers

      • Survey

      Funding Sources

      • National Key Research and Development Program of China
      • National Natural Science Foundation of China

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)1,363
      • Downloads (Last 6 weeks)287
      Reflects downloads up to 13 Jan 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2025)Blockchain-Based Knowledge Sharing and CollaborationBlockchain Technology Applications in Knowledge Management10.4018/979-8-3693-3956-5.ch003(71-114)Online publication date: 3-Jan-2025
      • (2025)MASS: A Multiattribute Sketch Secure Data Sharing Scheme for IoT Wearable Medical Devices Based on BlockchainIEEE Internet of Things Journal10.1109/JIOT.2024.346873312:2(1990-2001)Online publication date: 15-Jan-2025
      • (2025)Multimodal knowledge graph construction for intelligent question answering systems: integrating text, image, and audio dataAustralian Journal of Electrical and Electronics Engineering10.1080/1448837X.2024.2448376(1-10)Online publication date: 5-Jan-2025
      • (2025)EDBLSD-IIoT: a comprehensive hybrid architecture for enhanced data security, reduced latency, and optimized energy in industrial IoT networksThe Journal of Supercomputing10.1007/s11227-024-06872-681:2Online publication date: 3-Jan-2025
      • (2024)Introduction to Machine Learning Models for Web Engineering ConceptsGenerative AI for Web Engineering Models10.4018/979-8-3693-3703-5.ch013(269-284)Online publication date: 27-Sep-2024
      • (2024)A Distributed Ledger-Assisted Robust and Trusted Service Protocol for VANETsIEEE Internet of Things Journal10.1109/JIOT.2024.345130311:24(40559-40571)Online publication date: 15-Dec-2024

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      Full Text

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media