Academic literature on the topic 'Anonymity of transactions in blockchain'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Anonymity of transactions in blockchain.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Anonymity of transactions in blockchain"
AlTawy, Riham, and Guang Gong. "Mesh: A Supply Chain Solution with Locally Private Blockchain Transactions." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 149–69. http://dx.doi.org/10.2478/popets-2019-0041.
Full textAl-Qerem, Ahmad. "Using raft as consensus algorithm for blockchain application of roaming services for mobile network." International Journal Artificial Intelligent and Informatics 3, no. 1 (April 1, 2022): 42–52. http://dx.doi.org/10.33292/ijarlit.v3i1.46.
Full textDavid, Shibin, Jaspher W. Kathrine, K. Martin Sagayam, and Krit Salahddine. "Augmenting integrity and scalability in mobile payment applications using blockchain." E3S Web of Conferences 297 (2021): 01063. http://dx.doi.org/10.1051/e3sconf/202129701063.
Full textRecabarren, Ruben, and Bogdan Carbunar. "Toward Uncensorable, Anonymous and Private Access Over Satoshi Blockchains." Proceedings on Privacy Enhancing Technologies 2022, no. 1 (November 20, 2021): 207–26. http://dx.doi.org/10.2478/popets-2022-0011.
Full textHuang, Shanyun, Wenyin Zhang, Xiaomei Yu, Jiuru Wang, Wanshui Song, and Bei Li. "Covert Communication Scheme Based on Bitcoin Transaction Mechanism." Security and Communication Networks 2021 (December 10, 2021): 1–17. http://dx.doi.org/10.1155/2021/3025774.
Full textAn, Qi, Yanhui Zhang, Chong Guo, Ximing Liu, Junjia Huang, Wenzhan Zhang, Shijun Zhang, Chao Zhan, and Yuxiang Cai. "Anonymous Traceability Protocol Based on Group Signature for Blockchain." Security and Communication Networks 2022 (March 23, 2022): 1–10. http://dx.doi.org/10.1155/2022/4559119.
Full textMuftic, Sead. "BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger." Ledger 1 (December 21, 2016): 19–37. http://dx.doi.org/10.5195/ledger.2016.27.
Full textSon, Ye-Byoul, Jong-Hyuk Im, Hee-Yong Kwon, Seong-Yun Jeon, and Mun-Kyu Lee. "Privacy-Preserving Peer-to-Peer Energy Trading in Blockchain-Enabled Smart Grids Using Functional Encryption." Energies 13, no. 6 (March 12, 2020): 1321. http://dx.doi.org/10.3390/en13061321.
Full textDubina, V. V., and R. V. Oliynykov. "Methods and means of deanonymization of transactions in blockchain." Radiotekhnika, no. 207 (December 24, 2021): 52–58. http://dx.doi.org/10.30837/rt.2021.4.207.04.
Full textNyamtiga, Sicato, Rathore, Sung, and Park. "Blockchain-Based Secure Storage Management with Edge Computing for IoT." Electronics 8, no. 8 (July 25, 2019): 828. http://dx.doi.org/10.3390/electronics8080828.
Full textDissertations / Theses on the topic "Anonymity of transactions in blockchain"
Бещук, Андрій Андрійович. "Аналіз загроз при повторному використанні налаштування у протоколі GRO-16." Bachelor's thesis, КПІ ім. Ігоря Сікорського, 2020. https://ela.kpi.ua/handle/123456789/34490.
Full textQualification work consists of: 63 pages, 1 picture, 0 tables, 15 sources. Goal of this work is analysis of vulnerabilities zero knowledge proof protocols zk-SNARK type GRO-16 and conditions, in which those vulnerabilities are critical. The object of this research is process of protection personal data while performing transactions in the blockchain. The subject of this research is attacks on personal data protection protocol in blockchain subject to reuse setup. The SETUP stage of zero knowledge proof protocols zk-SNARK type was considered step by step and setup constricting algorithms were developed. Vulnerabilities of generation setup parallelization were analyzed and five types of attack on protocol GRO-16 were developed. They are based on the human factor and the conspiracy of several participants. Also, strategies have been developed to protect against the attacks described in this work, both algorithmic and using third-party devices.
Lawal, Yusuf Lanre. "Anomaly Detection in Ethereum Transactions Using Network Science Analytics." University of Cincinnati / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=ucin159585057190135.
Full textBattaglia, Bruno. "Simulation of Bitcoin Transactions to Identify Money Laundering Activities." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2021. http://amslaurea.unibo.it/24249/.
Full textTimander, Terese. "Using Blockchain Technology to Improve Security of Financial Transactions - a Design Proposal." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272995.
Full textBlockchainteknik är ett relativt nytt forskningsområde, omgivet av ett stort intresse tack vare de möjligheter tekniken för med sig i termer av ökad säkerhet. Det här arbetet kommer betrakta blockchainteknik såsom det appliceras inom den finansiella industrin. Mer specifikt så resulterar det här projektet i konstruktionen av ett beslutsstödssystem. Detta beslutsstödssystem kommer vara en produkt, likt en miniräknare, vilken banker och andra finansiella institutioner kommer kunna använda sig av om de beslutat implementera blockchainteknik. Således kommer detta projekt resultera i en färdig produkt, detta innefattar dock även att en analys kommer presenteras gällande vilka algoritmer och protokoll som är bäst lämpade för ett dylikt beslutsstödssystem. Ä ven en kommentar gällande de juridiska förutsättningarna kommer inkluderas. Slutligen presenteras resultaten som fås vid användande av den färdiga produkten, liksom en analys av systemets kvalitet och användbarhet.
Löf, Marcus. "Decentralized Transactions in a Centralized Environment : A Blockchain Study Within the Transport Industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-210042.
Full textBlockchainteknologin utgör ett område där mycket forskning utförs. Teknologin revolutionerade världen genom kryptovalutan Bitcoin, och sedan dess har nya applikationer av teknologin växt fram. En av applikationerna är att representera verkliga tillgångar som digitala tillgångar på en blockchain, så kallad smart-property. I denna uppsats används smart-property för att lösa kreditvärdighetsproblem som finns inom transportindustrin. En implementation för att påvisa konceptets ändamålsenlighet utförs där smart-property används genom colored coins på Bitcoins blockchain. För att kunna bedöma användbarheten hos lösningen, föreslås även två alternativa lösningar för jämförelse. Krav för en lösning på problemet specificeras i uppsatsen och lösningarna evalueras mot dessa. Alltså undersöker och jämför denna uppsats lösningarnas förmåga att lösa kreditvärdighetsproblemet som motiverar denna uppsats. Aspekterna för evaluering utgörs av: konfidentialitet, integritet, tillgänglighet, konsistens, oförändlighet, responstid, kundnytta, pålitlighet och miljöpåverkan. Slutsatsen som dras är att en lösning baserad på smart-property är adekvat för problemet. Lösningen har dock brister, främst vad gäller konfidentialitet, som däremot inte påverkar problemdomänen.
Johansson, Tom, and Viktor Charpentier. "Blockchain database; technical background and a reconnaissance on an implementation within the banking industry." Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-211075.
Full textDalmasso, Loïc. "De la vulnérabilité des nœuds capteurs à la certification des transactions sur le réseau, une approche de la sécurisation de l’Internet des Objets." Thesis, Montpellier, 2020. http://www.theses.fr/2020MONTS069.
Full textThe Internet of Things (IoT) is a global infrastructure, aiming to connect any systems of various kinds, to generate new services. While this hyperconnectivity offers many opportunities in many areas (e.g. health, industry, energy, etc.), its deployment represents a major challenge in terms of security and privacy. The use of cryptography becomes essential, particularly to ensure the confidentiality of data. Nevertheless, classical algorithms such as AES are not designed to be embedded in systems with limited resources, such as connected devices. To address this issue, the scientific community is moving towards so-called "lightweight" cryptography. Despite this term, to what extent is it relevant and in line with the resources of the connected objects ? What level of security can it achieve ?Through common metrics, the objective of the first axis of this thesis is to determine the gains of lightweight cryptography compared to the classical one, in terms of size, performance and robustness against side channel analysis, recognized as a major attack vector. This evaluation focuses on the AES- 128 standard and its close lightweight derivatives PRESENT-80/128 and more recent GIFT-64- 128/GIFT-128-128, whose bit-level oriented structure favours hardware implementation. In terms of performances, GIFT-64-128 is positioned as the best alternative, with a reduction in size by almost a factor of 10, for a 58% gain in efficiency over AES-128. In terms of resistance against side channel analysis, CPA in this thesis, lightweight cryptography is once again proving its worth, with PRESENT-128 achieving an increased robustness by a factor of 3 compared to AES-128.Although indispensable, confidentiality alone is not enough to create a secure environment. Facing the emergence of cyber attacks, an IoT ecosystem has to integrate security mechanisms to deal with various threats. In addition, its network topology is becoming conducive to decentralization for efficiency reasons. Without central organization, how can the reliability and security of a highly heterogeneous environment be ensured ?The second part of this thesis proposes a trust protocol, specifically designed for IoT. Inspired by the blockchain concept, several optimizations have been implemented, allowing to reduce the use of resources to a minimum. In an approach centered on network gateways, the results show a reduction in storage space by a factor of 3 000 compared to Bitcoin, as well as a latency divided by 18, for a consumption lower than that of a smartphone charger. Finally, an extension of the protocol is proposed to be embedded in objects. The model focuses on the trust assessment in a close environment, that means on entities where direct communication is possible. With less than 400 bytes, the protocol is capable of evaluating the trust of about ten objects, and up to thirty with only 1 KB
Larsson, Kihlgren Tobias, and Björn Sterner. "New Kids On The Block chain : En kartläggning om svenska bankers syn på blockkedjeteknologin och dess potentiella användningsområden." Thesis, Linköpings universitet, Företagsekonomi, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-151038.
Full textBackground: The interest for the first cryptocurrency in the world made the world caught the attention of the technology behind Bitcoin: Blockchain. Blockchain can be described as a decentralized database with no central part controlling its network. Instead, all transactions are registered and verified by the members of the network. This enables digital information to be distributed but not copied in a trustworthy way. The technology therefore has the possibility to create trust between parties that normally does not trust each other and is for that reason considered to have the potential to make many industries, including the banking industry more effective. Amongst a number of financial players that investigate the possible opportunities the technology have for improving their products and services, the optimism is high. Purpose: The purpose of this study is to research which potential fields of application Swedish banks sees for Blockchain and how the technology could be used by the banking industry. The study also intend to analyze the effects the usage of the technology would have on transactions within the Swedish banking industry. Completion: A qualitative research method characterize the study. The empirical data has been collected through a selected sample focused on individuals with knowledge and experience within the field. Conclusion: The study identifies KYC, Smart Contracts and Transactions as potential fields of application for the Swedish banking industry. In particular, KYC was highlighted as an area where the Blockchain technology could help improve managing the personal information of the customer. The study also points out trade finance and interbank-transactions as attractive areas of possible use for the technology. Furthermore, the result of the study shows that the technology should not be seen as a threat against banks role as an intermediary but a technology that enables the banks services to become more efficient. The technology is to be seen as an Emerging technology with high uncertainty today and where the potential impact lays in the future. The biggest threats against an implementation of the technology are that the technology still is in an experimental phase and the shortage of common standards and rules between banks and across countries.
Drozda, Tomáš. "Forenzní analýza sítě Bitcoin." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2016. http://www.nusl.cz/ntk/nusl-255465.
Full textLeung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.
Full textProjektet ämnar lösa problemen med oförnekbarhet, integritet och konfidentialitet när man delar känsligt data mellan parter som behöver lita på varandra utan inblanding av betrodd tredje part. Detta diskuteras för att besvara till vilken omfattning digitala resurser kan delas säkert i ett decentraliserat system baserat på publika liggare jämfört med existerande tillitsbaserade alternativ. En undersökning av nuvarande resursdelningslösningar visar att det existerar många tillitsbaserade system men även en växande andel lösningar baserade på publika liggare. En intressant lösning som lyfts fram är Storj som använder sådan teknologi men fokuserar på resurslagring mer är delning. Projektets föreslagna lösning, kallad SecuRES, är ett kommunikationsprotokoll baserat på en publik liggare likt Bitcoin. En prototyp baserad på protokollet har tagits fram som visar att det är möjligt att dela krypterade filer med en eller flera mottagare genom ett decentraliserat nätverk baserat på publika liggare. Slutsatsen som dras är att SecuRES klarar sig utan betrodda tredje parter för att dela resurser medan vissa operationer kan göras mer användarvänliga genom externa autentiseringstjänster. Själva lösningen garanterar integritet av data och medför ytterligare fördelar såsom oförnekbarhet, konfidentialitet och hög transparens då man kan göra källkoden och protocoldokumentation fritt läsbar utan att utsätta systemet för fara. Vidare forskning behövs för att undersöka om systemet kan skalas upp för allmän användning och alltjämt bibehålla säkerhets- samt prestandakrav.
Books on the topic "Anonymity of transactions in blockchain"
Maldonado, Fatima Castiglione. Introduction to Blockchain and Ethereum: Use distributed ledgers to validate digital transactions in a decentralized and trustless manner. Packt Publishing, 2018.
Find full textParkin, Jack. Money Code Space. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197515075.001.0001.
Full textWatt, Gary. Equity & Trusts Law Directions. 7th ed. Oxford University Press, 2021. http://dx.doi.org/10.1093/he/9780198869382.001.0001.
Full textBook chapters on the topic "Anonymity of transactions in blockchain"
Sakalauskas, Eligijus, and Ausrys Kilciauskas. "Blockchain Based Cryptocurrency Transaction Data and Balance Anonymity Improvement." In Communications in Computer and Information Science, 160–68. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-88304-1_13.
Full textHellwig, Daniel, Goran Karlic, and Arnd Huchzermeier. "Privacy and Anonymity." In Build Your Own Blockchain, 99–121. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-40142-9_5.
Full textDrescher, Daniel. "Authorizing Transactions." In Blockchain Basics, 103–9. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2604-9_13.
Full textDrescher, Daniel. "Verifying and Adding Transactions." In Blockchain Basics, 153–64. Berkeley, CA: Apress, 2017. http://dx.doi.org/10.1007/978-1-4842-2604-9_18.
Full textElrom, Elad. "Bitcoin Wallets and Transactions." In The Blockchain Developer, 121–71. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4847-8_4.
Full textSummers, Akira. "Coins and transactions." In Understanding Blockchain and Cryptocurrencies, 79–97. New York: CRC Press, 2022. http://dx.doi.org/10.1201/9781003187165-6.
Full textKarkeraa, Shilpa. "Aspects of Blockchain Transactions." In Unlocking Blockchain on Azure, 81–90. Berkeley, CA: Apress, 2020. http://dx.doi.org/10.1007/978-1-4842-5043-3_3.
Full textChaurasia, Brijesh Kumar, Shekhar Verma, and Geetam Singh Tomar. "Intersection Attack on Anonymity in VANET." In Transactions on Computational Science XVII, 133–49. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-35840-1_7.
Full textButijn, Bert-Jan, Willem-Jan van den Heuvel, and Indika Kumara. "Smart Contract-Driven Business Transactions." In Essentials of Blockchain Technology, 81–98. Boca Raton : CRC Press, [2020]: Chapman and Hall/CRC, 2019. http://dx.doi.org/10.1201/9780429674457-4.
Full textDeters, Ralph. "How to Detect and Contain Suspicious Transactions in Distributed Ledgers." In Smart Blockchain, 149–58. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-05764-0_16.
Full textConference papers on the topic "Anonymity of transactions in blockchain"
Pospiech, Piotr, Aleksander Marianski, and Michal Kedziora. "Blockchain Decentralized Voting for Verified Users with a Focus on Anonymity." In 2nd International Conference on Blockchain and Internet of Things (BIoT 2021). AIRCC Publishing Corporation, 2021. http://dx.doi.org/10.5121/csit.2021.110805.
Full textDalal, Siddhartha, Zihe Wang, and Siddhanth Sabharwal. "Identifying Ransomware Actors in the Bitcoin Network." In 2nd International Conference on Machine Learning, IOT and Blockchain (MLIOB 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111201.
Full textBergquist, Jonatan, Aron Laszka, Monika Sturm, and Abhishek Dubey. "On the design of communication and transaction anonymity in blockchain-based transactive microgrids." In Middleware '17: 18th International Middleware Conference. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3152824.3152827.
Full textZola, Francesco, Maria Eguimendia, Jan Lukas Bruse, and Raul Orduna Urrutia. "Cascading Machine Learning to Attack Bitcoin Anonymity." In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019. http://dx.doi.org/10.1109/blockchain.2019.00011.
Full textShrestha, Ajay Kumar, and Julita Vassileva. "Bitcoin Blockchain Transactions Visualization." In 2018 International Conference on Cloud Computing, Big Data and Blockchain (ICCBB). IEEE, 2018. http://dx.doi.org/10.1109/iccbb.2018.8756455.
Full textDos Santos, Saulo, Chukwuka Chukwuocha, Shahin Kamali, and Ruppa K. Thulasiram. "An Efficient Miner Strategy for Selecting Cryptocurrency Transactions." In 2019 IEEE International Conference on Blockchain (Blockchain). IEEE, 2019. http://dx.doi.org/10.1109/blockchain.2019.00024.
Full textCaprolu, Maurantonio, Matteo Pontecorvi, Matteo Signorini, Carlos Segarra, and Roberto Di Pietro. "Analysis and Patterns of Unknown Transactions in Bitcoin." In 2021 IEEE International Conference on Blockchain (Blockchain). IEEE, 2021. http://dx.doi.org/10.1109/blockchain53845.2021.00031.
Full textEck, Dylan, Adam Torek, Steven Cutchin, and Gaby G. Dagher. "Diffusion: Analysis of Many-to-Many Transactions in Bitcoin." In 2021 IEEE International Conference on Blockchain (Blockchain). IEEE, 2021. http://dx.doi.org/10.1109/blockchain53845.2021.00061.
Full textHao Wei, Suping Huang, Gaizhen Yi, and Zhenglong Xie. "An anonymity improvement scheme of Secure Electronic Transactions protocols." In 2010 3rd International Conference on Advanced Computer Theory and Engineering (ICACTE 2010). IEEE, 2010. http://dx.doi.org/10.1109/icacte.2010.5579629.
Full textLee, YongJoo, and Keon Myung Lee. "Blockchain-based RBAC for user authentication with anonymity." In RACS '19: International Conference on Research in Adaptive and Convergent Systems. New York, NY, USA: ACM, 2019. http://dx.doi.org/10.1145/3338840.3355673.
Full textReports on the topic "Anonymity of transactions in blockchain"
Allende López, Marcos, Diego López, Sergio Cerón, Antonio Leal, Adrián Pareja, Marcelo Da Silva, Alejandro Pardo, et al. Quantum-Resistance in Blockchain Networks. Inter-American Development Bank, June 2021. http://dx.doi.org/10.18235/0003313.
Full textDecentralising transactions with the Blockchain (ITA dossier no. 30en, November 2017). Vienna: self, 2018. http://dx.doi.org/10.1553/ita-doss-030en.
Full text