[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Noam et al., 2022 - Google Patents

Realizing privacy aspects in blockchain networks

Noam et al., 2022

Document ID
12568363179644980964
Author
Noam O
Rottenstreich O
Publication year
Publication venue
Annals of Telecommunications

External Links

Snippet

The right to personal privacy is known as a fundamental human right allowing people to restrict access to their personal information. The decentralized nature of blockchain networks, often involving the publicity of ledger information, can come into conflict with this …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)

Similar Documents

Publication Publication Date Title
Allen et al. Design choices for central bank digital currency: Policy and technical considerations
Alketbi et al. Blockchain for government services—Use cases, security benefits and challenges
Brands Rethinking public key infrastructures and digital certificates: building in privacy
Zhou et al. Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities
Ahmed et al. Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey
RU2747947C2 (en) Systems and methods of personal identification and verification
Chatzigiannis et al. SoK: Auditability and accountability in distributed payment systems
Bergquist Blockchain technology and smart contracts: privacy-preserving tools
Perez et al. Modified sha256 for securing online transactions based on blockchain mechanism
Shen et al. Blockchain: empowering secure data sharing
Ghafourian et al. Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis
Ahmed et al. A self-sovereign identity architecture based on blockchain and the utilization of customer’s banking cards: The case of bank scam calls prevention
Wu et al. The survey on the development of secure multi-party computing in the blockchain
US20240104521A1 (en) System and method for compliance-enabled digitally represented assets
Chhabra et al. Navigating the maze: exploring blockchain privacy and its information retrieval
Adewole et al. Application of cryptocurrencies using Blockchain for e-commerce online payment
Noam et al. Realizing privacy aspects in blockchain networks
Rial Privacy-preserving e-commerce protocols
Shakiba et al. ESIV: an end-to-end secure internet voting system
Arnold et al. Zero-knowledge proofs do not solve the privacy-trust problem of attribute-based credentials: What if alice is evil?
Abid et al. A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes
Lu et al. BEvote: Bitcoin‐Enabled E‐Voting Scheme with Anonymity and Robustness
Mohammadi et al. A secure E-tendering system
Fumy et al. Handbook of EID Security: Concepts, Practical Experiences, Technologies
Mahmood et al. A Survey On Privacy And Policy Aspects Of Blockchain Technology