Privacy-Preserving Blockchain Technologies
Abstract
:1. Introduction
- A brief review of each technology that provides the means to improve data security and privacy;
- A brief analysis regarding each technology based on the specified technical questions;
- A ranking for the technologies considering their technical analyses.
2. Background
2.1. Blockchain Principles
2.2. Trusted Execution Environments
2.3. Multi-Party Computation
2.4. Zero-Knowledge Proof
3. Review Methodology
- TQ1—What is the communication with the blockchain nodes? Does it support HTTPS or another secure communication method?
- TQ2—Is it secure? Does it allow/require confidential computing (i.e., trusted processing and storage), MPC, or ZKP? What are the limitations of the programs running in the confidential environment?
- TQ3—Does it have access control mechanisms? What are they?
- TQ4—Does it scale? What is the approximate throughput (requests per day)?
- TQ5—What is the cost? How are payments made? (It is relevant to know what the payment is for the resources consumed.)
- TQ6—Does it support communication with other blockchain technologies? How difficult is the communication?
- TQ7—Is the platform well-supported and well-funded, and does it appear to be successful?
4. Privacy-Based Blockchains
4.1. Secret Network
4.2. Oasis Network
- Flexible—easy to modify system parameters;
- Extensible—easy to add new components like confidential computing techniques;
- Scalable—throughput should increase with the number of nodes;
- Secure—the system should enforce security policies and provide confidential computing;
- Fault-isolated—the system should be fault-tolerant in terms of security and performance.
4.3. Phala
- Confidentiality—only authorized queries to the contract are answered;
- Code Integrity—verification on the blockchain of an output produced by a specific smart contract;
- State Consistency—verification of execution at a specific chain state;
- Availability—no single point of failure (gatekeepers and miners);
- Interoperability—contracts can interoperate with other contracts and blockchains.
- Genesis Node, which bootstraps the network and is destroyed after launch;
- Gatekeepers, which manage the secrets and ensure availability and security of the network;
- Miners, which execute the confidential contracts.
- The user/developer publishes the contract to the blockchain;
- Gatekeepers generate a symmetric contract key;
- Gatekeepers save the encrypted key to the blockchain;
- The user/developer finds an available miner to load the contract;
- The miner pRuntime connects to a gatekeeper through a secure connection and asks for the contract key;
- The miner uses the received key to encrypt the contract state and saves it to the blockchain.
4.4. Integritee
- Confidential decentralized state transition functions for private transactions, private smart contracts, off-chain confidential personal data records (GDPR), decentralized identity with selective disclosure, and subscription-based content delivery networks;
- Scalability by providing a second layer to substrate-based blockchains for off-chain smart contracts and payment hubs;
- Trusted chain bridges;
- Trusted oracles.
- The Substratee node (archived);
- Integritee Node (Substratee node with TEE registry validating remote attestation);
- Integritee Worker (Integritee off-chain worker and sidechain “validateer”).
- Subscriptions managed on-chain, and an Integritee worker holds the content-encryption key (CEK—RSA-AES) to IPFS and registers the content on-chain;
- Consumers request content from the Integritee worker over a TLS channel (e.g., HTTPS or WSS), and the worker authenticates the consumers and looks at subscription status on-chain;
- Fetches the trusted content from IPFS;
- Decrypts the content;
- Sends the content to the consumer over the previous TLS channel.
4.5. Ternoa
- Create a capsule with an NFT;
- Encrypt the capsule content with a GPG key;
- Generate shares from the GPG key using the Shamir secret sharing method;
- Send the shares to master nodes with Intel SGX;
- Define the time protocol for the capsule and send it to the Ternoa chain.
4.6. NuCypher
4.7. Lit Protocol
- Encrypting and locking static content among images, videos, and music behind an on-chain condition such as ownership of an NFT;
- Decrypting static content that was locked behind an on-chain condition;
- Authorizing network signatures that provide access to dynamic content (for example, a server or network resource) behind an on-chain condition;
- Requesting a network-signed JWT (JSON web token authentication) that provisions access and authorization to dynamic content behind an on-chain condition.
4.8. Summary
5. Technical Analysis
5.1. What Is the Communication with the Blockchain Nodes? Does It Support HTTPS or Another Secure Communication Method?
5.1.1. Secret Network
5.1.2. Oasis Network
5.1.3. Phala Network
5.1.4. Integritee
5.1.5. Ternoa
5.1.6. NuCypher
5.1.7. Lit Protocol
5.2. Is It Secure? Does It Allow/Require Confidential Computing, MPC, or ZKP? What Are the Limitations of the Programs Running in the Confidential Environment?
5.2.1. Secret Network
5.2.2. Oasis Network
5.2.3. Phala Network
5.2.4. Integritee
5.2.5. Ternoa
5.2.6. NuCypher
5.2.7. Lit Protocol
5.3. Does It Have Access Control Mechanisms? What Are They?
5.3.1. Secret Network
5.3.2. Oasis Network
5.3.3. Phala Network
5.3.4. Integritee
5.3.5. Ternoa
5.3.6. NuCypher
5.3.7. Lit Protocol
5.4. Does It Scale? What Is the Approximate Throughput?
5.4.1. Secret Network
5.4.2. Oasis Network
5.4.3. Phala Network
5.4.4. Integritee
5.4.5. Ternoa
5.4.6. NuCypher
5.4.7. Lit Protocol
5.5. What Is the Cost? How Are Payments Made?
5.5.1. Secret Network
5.5.2. Oasis Network
5.5.3. Phala Network
5.5.4. Integritee
5.5.5. Ternoa
5.5.6. NuCypher
5.5.7. Lit Protocol
5.6. Does It Support Communication with Other Blockchain Web Technologies? How Difficult Is the Communication?
5.6.1. Secret Network
5.6.2. Oasis Network
5.6.3. Phala Network
5.6.4. Integritee
5.6.5. Ternoa
5.6.6. NuCypher
5.6.7. Lit Protocol
5.7. Is the Platform Well-Supported and Well-Funded? Does It Appear to Be Successful?
5.7.1. Secret Network
5.7.2. Oasis Network
5.7.3. Phala Network
5.7.4. Integritee
5.7.5. Ternoa
5.7.6. NuCypher
5.7.7. Lit Protocol
5.8. Summary
6. Conclusions
Author Contributions
Funding
Conflicts of Interest
References
- Aste, T.; Tasca, P.; Di Matteo, T. Blockchain Technologies: The Foreseeable Impact on Society and Industry. Computer 2017, 50, 18–28. [Google Scholar] [CrossRef] [Green Version]
- Zhang, R.; Xue, R.; Liu, L. Security and Privacy on Blockchain. ACM Comput. Surv. 2019, 52, 1–34. [Google Scholar] [CrossRef] [Green Version]
- Taylor, P.J.; Dargahi, T.; Dehghantanha, A.; Parizi, R.M.; Choo, K.K.R. A systematic literature review of blockchain cyber security. Digit. Commun. Netw. 2020, 6, 147–156. [Google Scholar] [CrossRef]
- Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev. 2008, 21260. [Google Scholar]
- Casino, F.; Dasaklis, T.K.; Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telemat. Inform. 2019, 36, 55–81. [Google Scholar] [CrossRef]
- Fatima, N.; Agarwal, P.; Sohail, S.S. Security and Privacy Issues of Blockchain Technology in Health Care—A Review. In ICT Analysis and Applications; Fong, S., Dey, N., Joshi, A., Eds.; Springer: Singapore, 2022; pp. 193–201. [Google Scholar]
- Chander, B. Deep Dive Into Blockchain Technology: Characteristics, Security and Privacy Issues, Challenges, and Future Research Directions. In Smart City Infrastructure; John Wiley & Sons, Ltd.: Hoboken, NJ, USA, 2022; Chapter 1; pp. 1–32. [Google Scholar] [CrossRef]
- Alzoubi, Y.I.; Al-Ahmad, A.; Kahtan, H. Blockchain technology as a Fog computing security and privacy solution: An overview. Comput. Commun. 2022, 182, 129–152. [Google Scholar] [CrossRef]
- Qahtan, S.; Sharif, K.Y.; Zaidan, A.A.; Alsattar, H.A.; Albahri, O.S.; Zaidan, B.B.; Zulzalil, H.; Osman, M.H.; Alamoodi, A.H.; Mohammed, R.T. Novel Multi Security and Privacy Benchmarking Framework for Blockchain-Based IoT Healthcare Industry 4.0 Systems. IEEE Trans. Ind. Inform. 2022, 18, 6415–6423. [Google Scholar] [CrossRef]
- Jayabalan, J.; Jeyanthi, N. Scalable blockchain model using off-chain IPFS storage for healthcare data security and privacy. J. Parallel Distrib. Comput. 2022, 164, 152–167. [Google Scholar] [CrossRef]
- Gimenez-Aguilar, M.; de Fuentes, J.M.; Gonzalez-Manzano, L.; Arroyo, D. Achieving cybersecurity in blockchain-based systems: A survey. Future Gener. Comput. Syst. 2021, 124, 91–118. [Google Scholar] [CrossRef]
- Cao, Z.; Zhao, L. A Design of Key Distribution Mechanism in Decentralized Digital Rights Management Based on Blockchain and Zero-Knowledge Proof. In Proceedings of the 2021 The 3rd International Conference on Blockchain Technology, New York, NY, USA, 1 June 2021; ICBCT ’21. pp. 53–59. [Google Scholar] [CrossRef]
- Christidis, K.; Devetsikiotis, M. Blockchains and Smart Contracts for the Internet of Things. IEEE Access 2016, 4, 2292–2303. [Google Scholar] [CrossRef]
- Issa, W.; Moustafa, N.; Turnbull, B.; Sohrabi, N.; Tari, Z. Blockchain-Based Federated Learning for Securing Internet of Things: A Comprehensive Survey. ACM Comput. Surv. 2023, 55, 1–43. [Google Scholar] [CrossRef]
- Grover, J. Security of Vehicular Ad Hoc Networks using blockchain: A comprehensive review. Veh. Commun. 2022, 34, 100458. [Google Scholar] [CrossRef]
- Gawusu, S.; Zhang, X.; Ahmed, A.; Jamatutu, S.A.; Miensah, E.D.; Amadu, A.A.; Osei, F.A.J. Renewable energy sources from the perspective of blockchain integration: From theory to application. Sustain. Energy Technol. Assess. 2022, 52, 102108. [Google Scholar] [CrossRef]
- Pournader, M.; Shi, Y.; Seuring, S.; Koh, S.L. Blockchain applications in supply chains, transport and logistics: A systematic review of the literature. Int. J. Prod. Res. 2020, 58, 2063–2081. [Google Scholar] [CrossRef]
- Saeed, H.; Malik, H.; Bashir, U.; Ahmad, A.; Riaz, S.; Ilyas, M.; Bukhari, W.A.; Khan, M.I.A. Blockchain technology in healthcare: A systematic review. PLoS ONE 2022, 17, e0266462. [Google Scholar] [CrossRef]
- Abou Jaoude, J.; George Saade, R. Blockchain Applications – Usage in Different Domains. IEEE Access 2019, 7, 45360–45381. [Google Scholar] [CrossRef]
- Lashkari, B.; Musilek, P. A Comprehensive Review of Blockchain Consensus Mechanisms. IEEE Access 2021, 9, 43620–43652. [Google Scholar] [CrossRef]
- Mingxiao, D.; Xiaofeng, M.; Zhe, Z.; Xiangwei, W.; Qijun, C. A review on consensus algorithm of blockchain. In Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Banff, AB, Canada, 5–8 October 2017; pp. 2567–2572. [Google Scholar] [CrossRef]
- Nijsse, J.; Litchfield, A. A Taxonomy of Blockchain Consensus Methods. Cryptography 2020, 4, 32. [Google Scholar] [CrossRef]
- Pilkington, M. Blockchain technology: Principles and applications. In Research Handbook on Digital Transformations; Edward Elgar Publishing: Cheltenham, UK, 2016. [Google Scholar]
- Castro, M.; Liskov, B. Practical Byzantine Fault Tolerance and Proactive Recovery. ACM Trans. Comput. Syst. 2002, 20, 398–461. [Google Scholar] [CrossRef]
- Zheng, Z.; Xie, S.; Dai, H.N.; Chen, X.; Wang, H. Blockchain challenges and opportunities: A survey. Int. J. Web Grid Serv. 2018, 14, 352–375. [Google Scholar] [CrossRef]
- Zhang, J.; Zhong, S.; Wang, T.; Chao, H.C.; Wang, J. Blockchain-based systems and applications: A survey. J. Internet Technol. 2020, 21, 1–14. [Google Scholar]
- Platt, M.; McBurney, P. Sybil attacks on identity-augmented Proof-of-Stake. Comput. Netw. 2021, 199, 108424. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid, A.S.; Samih, M. A Tractable Probabilistic Approach to Analyze Sybil Attacks in Sharding-Based Blockchain Protocols. IEEE Trans. Emerg. Top. Comput. 2022, 11, 126–136. [Google Scholar] [CrossRef]
- Hassan, M.U.; Rehmani, M.H.; Chen, J. Anomaly Detection in Blockchain Networks: A Comprehensive Survey. IEEE Commun. Surv. Tutor. 2022, 25, 289–318. [Google Scholar] [CrossRef]
- Hafid, A.; Hafid, A.S.; Samih, M. Scaling Blockchains: A Comprehensive Survey. IEEE Access 2020, 8, 125244–125262. [Google Scholar] [CrossRef]
- Henry, R.; Herzberg, A.; Kate, A. Blockchain Access Privacy: Challenges and Directions. IEEE Secur. Priv. 2018, 16, 38–45. [Google Scholar] [CrossRef]
- Valadares, D.C.G.; Will, N.C.; Spohn, M.A.; de Souza Santos, D.F.; Perkusich, A.; Gorgônio, K.C. Confidential computing in cloud/fog-based Internet of Things scenarios. Internet Things 2022, 19, 100543. [Google Scholar] [CrossRef]
- Valadares, D.C.G.; Will, N.C.; Caminha, J.; Perkusich, M.B.; Perkusich, A.; Gorgônio, K.C. Systematic Literature Review on the Use of Trusted Execution Environments to Protect Cloud/Fog-Based Internet of Things Applications. IEEE Access 2021, 9, 80953–80969. [Google Scholar] [CrossRef]
- Byrd, D.; Polychroniadou, A. Differentially private secure multi-party computation for federated learning in financial applications. In Proceedings of the First ACM International Conference on AI in Finance, New York, NY, USA, 15–16 October 2020; pp. 1–9. [Google Scholar]
- Dong, X.; Randolph, D.A.; Weng, C.; Kho, A.N.; Rogers, J.M.; Wang, X. Developing high performance secure multi-party computation protocols in healthcare: A case study of patient risk stratification. AMIA Summits Transl. Sci. Proc. 2021, 2021, 200. [Google Scholar]
- Agahari, W.; Ofe, H.; de Reuver, M. It is not (only) about privacy: How multi-party computation redefines control, trust, and risk in data sharing. Electron. Mark. 2022, 32, 1577–1602. [Google Scholar] [CrossRef]
- Zhou, J.; Feng, Y.; Wang, Z.; Guo, D. Using secure multi-party computation to protect privacy on a permissioned blockchain. Sensors 2021, 21, 1540. [Google Scholar] [CrossRef] [PubMed]
- Cordi, C.; Frank, M.P.; Gabert, K.; Helinski, C.; Kao, R.C.; Kolesnikov, V.; Ladha, A.; Pattengale, N. Auditable, available and resilient private computation on the blockchain via MPC. In International Symposium on Cyber Security, Cryptology, and Machine Learning; Springer: Berlin/Heidelberg, Germany, 2022; pp. 281–299. [Google Scholar]
- Xiao, Y.; Zhang, N.; Lou, W.; Hou, Y.T. A survey of distributed consensus protocols for blockchain networks. IEEE Commun. Surv. Tutor. 2020, 22, 1432–1465. [Google Scholar] [CrossRef] [Green Version]
- Garg, S.; Jain, A.; Sahai, A. Leakage-resilient zero knowledge. In Proceedings of the Advances in Cryptology–CRYPTO 2011: 31st Annual Cryptology Conference, Santa Barbara, CA, USA, 14–18 August 2011; Springer: Berlin/Heidelberg, Germany, 2011. Proceedings 31. pp. 297–315. [Google Scholar]
- Yang, X.; Li, W. A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput. Secur. 2020, 99, 102050. [Google Scholar] [CrossRef]
- Barreto, P.L.; Zanon, G.H. Blind signatures from Zero-knowledge arguments. Cryptology ePrint Archive 2023. Available online: https://eprint.iacr.org/2023/067 (accessed on 10 July 2022).
- Kamel, M.B.; Yan, Y.; Ligeti, P.; Reich, C. Attribute Verifier for Internet of Things. In Proceedings of the 2022 32nd International Telecommunication Networks and Applications Conference (ITNAC), Wellington, New Zealand, 30 November–2 December 2022; pp. 1–3. [Google Scholar]
- Cao, L.; Wan, Z. Anonymous scheme for blockchain atomic swap based on zero-knowledge proof. In Proceedings of the 2020 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), Dalian, China, 27–29 June 2020; pp. 371–374. [Google Scholar]
- Panja, S.; Roy, B.K. A secure end-to-end verifiable e-voting system using zero knowledge based blockchain. Cryptology ePrint Archive 2018. Available online: https://eprint.iacr.org/2018/466 (accessed on 10 July 2022).
- Murtaza, M.H.; Alizai, Z.A.; Iqbal, Z. Blockchain based anonymous voting system using zkSNARKs. In Proceedings of the 2019 International Conference on Applied and Engineering Mathematics (ICAEM), Taxila, Pakistan, 27–29 August 2019; pp. 209–214. [Google Scholar]
- Sahai, S.; Singh, N.; Dayama, P. Enabling privacy and traceability in supply chains using blockchain and zero knowledge proofs. In Proceedings of the 2020 IEEE International Conference on Blockchain (Blockchain), Rhodes, Greece, 2–6 November 2020; pp. 134–143. [Google Scholar]
- Secret Network: A Privacy-Preserving Secret Contract & Decentralized Application Platform. Available online: https://bit.ly/3XU64LB (accessed on 10 July 2022).
- The Oasis Blockchain Platform. Available online: https://bit.ly/41kzwgo (accessed on 10 July 2022).
- Oasis Network Primer. Available online: https://bit.ly/3xK8RMw (accessed on 10 July 2022).
- Oasis Emerald—EVM ParaTime Is Live on Mainnet. Available online: https://bit.ly/3lNrLPS (accessed on 10 July 2022).
- A Beginner’s Guide to Oasis. Available online: https://bit.ly/3lOhwe6 (accessed on 10 July 2022).
- Introducing Parcel Beta. Available online: https://bit.ly/3RSsgU3 (accessed on 10 July 2022).
- What Is Phala Network (PHA)? Available online: https://bit.ly/3krDYt8 (accessed on 10 July 2022).
- Phala Network: A Secure Decentralized Cloud Computing Network Based on Polkadot. Available online: https://bit.ly/3lM7fz5 (accessed on 10 July 2022).
- All Systems Go for Integritee in the Coming Weeks. Available online: https://bit.ly/3DypWND (accessed on 10 July 2022).
- Integritee Book. Available online: https://bit.ly/3Iuus0G (accessed on 10 July 2022).
- Integritee Token Economics. Available online: https://bit.ly/3f15J8P (accessed on 10 July 2022).
- Integritee Network. Available online: https://bit.ly/3YOFDrM (accessed on 10 July 2022).
- Integritee Use Cases—CDN Subscriptions. Available online: https://bit.ly/3IhfVFk (accessed on 10 July 2022).
- TERNOA—White Paper. Available online: https://bit.ly/3LnJSok (accessed on 10 July 2022).
- The Ternoa blockchain. Available online: https://bit.ly/3SgaJ7R (accessed on 10 July 2022).
- Duchemin, N. Ternoa, Creating Environmentally-Friendly Augmented NFTs. Available online: https://bit.ly/3LpGoBz (accessed on 10 July 2022).
- Ternoa Capsules. Available online: https://www.ternoa.com/capsules (accessed on 10 July 2022).
- Schreyer, D. How Is Ternoa Using TEE Technology to Maximize Security? Available online: https://bit.ly/3Ueqmih (accessed on 10 July 2022).
- Eshwarla, P. Ternoa Phase 1 Roadmap: Alphanet and Mainnet. Available online: https://bit.ly/3LuXuOD (accessed on 10 July 2022).
- Gabriel, G. Introducing Ternoa. Available online: https://bit.ly/3UmcUIU (accessed on 10 July 2022).
- Gabriel, G. Ternoa Bridge. Available online: https://bit.ly/3UuR5XY (accessed on 10 July 2022).
- NuCypher Documentation. Available online: https://bit.ly/3khF0YT (accessed on 10 December 2022).
- A Deep Dive into NuCypher. Available online: https://bit.ly/3IKDjfI (accessed on 10 December 2022).
- Egorov, M.; Wilkison, M.; Nuñez, D. NuCypher KMS: Decentralized key management system. In Proceedings of the Blockchain Protocol Analysis and Security Engineering. arXiv 2017, arXiv:1707.06140. [Google Scholar]
- Egorov, M.; Nuñez, D.; Wilkison, M. NuCypher: A proxy re-encryption network to empower privacy in decentralized systems. NuCypher whitepaper 2018. [Google Scholar]
- What Is the Lit Protocol? Available online: https://bit.ly/41tJFaW (accessed on 10 December 2022).
- Lit Protocol Use Cases. Available online: https://bit.ly/3Ze8NR6 (accessed on 10 December 2022).
- Introduction to Decentralized Access Control. Available online: https://bit.ly/3YUrKIB (accessed on 10 December 2022).
- Lit Protocol SDK. Available online: https://bit.ly/3klQfzs (accessed on 10 December 2022).
- Lit Gateway. Available online: https://bit.ly/3Zf1OXN (accessed on 10 December 2022).
- Integritee Lightpaper. Available online: https://uploads-ssl.webflow.com/60c21bdfde439ba700ea5c56/612892db018a36f054100b4d_IntegriteeAGLightpaper.pdf (accessed on 20 February 2023).
Technology | Blockchain Basis | Token Name | TEE | MPC | ZKP |
---|---|---|---|---|---|
Secret | Cosmos | SCRT | ✓ | ✗ | ✗ |
Oasis | Ethereum | ROSE | ✓ | ✗ | ✗ |
Phala | Polkadot | PHA | ✓ | ✗ | ✗ |
Integritee | Polkadot | TEER | ✓ | ✗ | ✗ |
Ternoa | Polkadot | CAPS | ✓ | ✗ | ✗ |
NuCypher | Ethereum | NU | ✗ | ✗ | ✗ |
Lit Protocol | Ethereum | - | ✗ | ✗ | ✗ |
Technology | Secure Channel | TEE on Nodes | Access Control | Scalability | Costwise | Communication with Blockchains | Support and Maturity | SDKs and Tutorials | Total |
---|---|---|---|---|---|---|---|---|---|
Secret | 5 | 5 | 4 | 5 | 4 | 5 | 5 | 4 | 37 |
Oasis | 5 | 5 | 4.5 | 5 | 4 | 5 | 5 | 4 | 37.5 |
Phala | 5 | 5 | 4 | 5 | 1 | 5 | 3 | 4 | 32 |
Integritee | 5 | 5 | 5 | 5 | 1 | 5 | 2 | 3 | 31 |
Ternoa | 5 | 3 | 4 | 5 | 2.5 | 5 | 2.5 | 2 | 29 |
NuCypher | 4 | 1 | 4 | 3 | 2 | 2 | 2 | 4 | 22 |
Lit Protocol | 3 | 1 | 5 | 3 | 2 | 2 | 1 | 4 | 21 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Valadares, D.C.G.; Perkusich, A.; Martins, A.F.; Kamel, M.B.M.; Seline, C. Privacy-Preserving Blockchain Technologies. Sensors 2023, 23, 7172. https://doi.org/10.3390/s23167172
Valadares DCG, Perkusich A, Martins AF, Kamel MBM, Seline C. Privacy-Preserving Blockchain Technologies. Sensors. 2023; 23(16):7172. https://doi.org/10.3390/s23167172
Chicago/Turabian StyleValadares, Dalton Cézane Gomes, Angelo Perkusich, Aldenor Falcão Martins, Mohammed B. M. Kamel, and Chris Seline. 2023. "Privacy-Preserving Blockchain Technologies" Sensors 23, no. 16: 7172. https://doi.org/10.3390/s23167172
APA StyleValadares, D. C. G., Perkusich, A., Martins, A. F., Kamel, M. B. M., & Seline, C. (2023). Privacy-Preserving Blockchain Technologies. Sensors, 23(16), 7172. https://doi.org/10.3390/s23167172