Noam et al., 2022 - Google Patents
Realizing privacy aspects in blockchain networksNoam et al., 2022
- Document ID
- 12568363179644980964
- Author
- Noam O
- Rottenstreich O
- Publication year
- Publication venue
- Annals of Telecommunications
External Links
Snippet
The right to personal privacy is known as a fundamental human right allowing people to restrict access to their personal information. The decentralized nature of blockchain networks, often involving the publicity of ledger information, can come into conflict with this …
- 238000000034 method 0 abstract description 21
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
- G06F21/6263—Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Allen et al. | Design choices for central bank digital currency: Policy and technical considerations | |
Alketbi et al. | Blockchain for government services—Use cases, security benefits and challenges | |
Brands | Rethinking public key infrastructures and digital certificates: building in privacy | |
Zhou et al. | Leveraging zero knowledge proofs for blockchain-based identity sharing: A survey of advancements, challenges and opportunities | |
Ahmed et al. | Blockchain-based identity management system and self-sovereign identity ecosystem: A comprehensive survey | |
RU2747947C2 (en) | Systems and methods of personal identification and verification | |
Chatzigiannis et al. | SoK: Auditability and accountability in distributed payment systems | |
Bergquist | Blockchain technology and smart contracts: privacy-preserving tools | |
Perez et al. | Modified sha256 for securing online transactions based on blockchain mechanism | |
Shen et al. | Blockchain: empowering secure data sharing | |
Ghafourian et al. | Combining blockchain and biometrics: A survey on technical aspects and a first legal analysis | |
Ahmed et al. | A self-sovereign identity architecture based on blockchain and the utilization of customer’s banking cards: The case of bank scam calls prevention | |
Wu et al. | The survey on the development of secure multi-party computing in the blockchain | |
US20240104521A1 (en) | System and method for compliance-enabled digitally represented assets | |
Chhabra et al. | Navigating the maze: exploring blockchain privacy and its information retrieval | |
Adewole et al. | Application of cryptocurrencies using Blockchain for e-commerce online payment | |
Noam et al. | Realizing privacy aspects in blockchain networks | |
Rial | Privacy-preserving e-commerce protocols | |
Shakiba et al. | ESIV: an end-to-end secure internet voting system | |
Arnold et al. | Zero-knowledge proofs do not solve the privacy-trust problem of attribute-based credentials: What if alice is evil? | |
Abid et al. | A privacy-preserving traceability system for self-sovereign identity-based inter-organizational business processes | |
Lu et al. | BEvote: Bitcoin‐Enabled E‐Voting Scheme with Anonymity and Robustness | |
Mohammadi et al. | A secure E-tendering system | |
Fumy et al. | Handbook of EID Security: Concepts, Practical Experiences, Technologies | |
Mahmood et al. | A Survey On Privacy And Policy Aspects Of Blockchain Technology |