scholarly journals DMC: Decentralized Mixer with Channel for Transaction Privacy Protection on Ethereum

2021 ◽  
Author(s):  
Su Liu ◽  
Jian Wang

Ethereum is a public blockchain platform with smart contract. However, it has transaction privacy issues due to the openness of the underlying ledger. Decentralized mixing schemes are presented to hide transaction relationship and transferred amount, but suffer from high transaction cost and long transaction latency. To overcome the two challenges, we propose the idea of batch accounting, adopting batch processing at the time of accounting. For further realization, we introduce payment channel technology into decentralized mixer. Since intermediate transactions between two parties do not need network consensus, our scheme can reduce both transaction cost and transaction latency. Moreover, we provide informal definitions and proofs of our scheme's security. Finally, our scheme is implemented based on zk-SNARKs and Ganache, and experimental results show that the higher number of transactions in batch, the better our scheme performs.

Electronics ◽  
2021 ◽  
Vol 10 (18) ◽  
pp. 2264
Author(s):  
Ching-Han Chen ◽  
Chao-Tsu Liu

With the increase in the number of surveillance cameras being deployed globally, an important topic is person re-identification (Re-ID), which identifies the same person from multiple different angles and different directions across multiple cameras. However, because of the privacy issues involved in the identification of individuals, Re-ID systems cannot send the image data to cloud, and these data must be processed on edge servers. However, there has been a significant increase in computing resources owing to the processing of artificial intelligence (AI) algorithms through edge computing (EC). Consequently, the traditional AI internet of things (AIoT) architecture is no longer sufficient. In this study, we designed a Re-ID system at the AIoT EC gateway, which utilizes a microservice to perform Re-ID calculations on EC and balances efficiency with privacy protection. Experimental results indicate that this architecture can provide sufficient Re-ID computing resources to allow the system to scale up or down flexibly to support different scenarios and demand loads.


2021 ◽  
Vol 11 (9) ◽  
pp. 4011
Author(s):  
Dan Wang ◽  
Jindong Zhao ◽  
Chunxiao Mu

In the field of modern bidding, electronic bidding leads a new trend of development, convenience and efficiency and other significant advantages effectively promote the reform and innovation of China’s bidding field. Nowadays, most systems require a strong and trusted third party to guarantee the integrity and security of the system. However, with the development of blockchain technology and the rise of privacy protection, researchers has begun to emphasize the core concept of decentralization. This paper introduces a decentralized electronic bidding system based on blockchain and smart contract. The system uses blockchain to replace the traditional database and uses chaincode to process business logic. In data interaction, encryption techniques such as zero-knowledge proof based on graph isomorphism are used to improve privacy protection, which improves the anonymity of participants, the privacy of data transmission, and the traceability and verifiable of data. Compared with other electronic bidding systems, this system is more secure and efficient, and has the nature of anonymous operation, which fully protects the privacy information in the bidding process.


2021 ◽  
Vol 560 ◽  
pp. 183-201
Author(s):  
Lei Zhang ◽  
Desheng Liu ◽  
Meina Chen ◽  
Hongyan Li ◽  
Chao Wang ◽  
...  

2021 ◽  
Vol 13 (1) ◽  
pp. 20-39
Author(s):  
Ahmed Aloui ◽  
Okba Kazar

In mobile business (m-business), a client sends its exact locations to service providers. This data may involve sensitive and private personal information. As a result, misuse of location information by the third party location servers creating privacy issues for clients. This paper provides an overview of the privacy protection techniques currently applied by location-based mobile business. The authors first identify different system architectures and different protection goals. Second, this article provides an overview of the basic principles and mechanisms that exist to protect these privacy goals. In a third step, the authors provide existing privacy protection measures.


Author(s):  
Moutaz Abojeib ◽  
Farrukh Habib

Blockchain and smart contracts are forming new systems to record and manage businesses with less need for intermediaries. The new systems are expected to offer high level of governance with lower cost as compared to the traditional technologies. While there is a continuous effort to apply this innovative technology in several businesses, Islamic finance in general—and Islamic social finance in particular—are facing few challenges that could be solved by such innovations. Islamic social finance institutions such as waqf are facing some challenges in enhancing its governance structure to ensure Shariah compliance as well as economic efficiency. This chapter explains how blockchain and smart contract technologies can help these institutions for better governance, lower transaction cost, more transparency, and higher trust, hence enhancing the business flexibility and market accessibility. It also presents some related cases that are currently under development as an evidence for the practicality of these technologies in the Islamic social finance arena.


Author(s):  
Moutaz Abojeib ◽  
Farrukh Habib

Blockchain and smart contracts are forming new systems to record and manage businesses with less need for intermediaries. The new systems are expected to offer high level of governance with lower cost as compared to the traditional technologies. While there is a continuous effort to apply this innovative technology in several businesses, Islamic finance in general—and Islamic social finance in particular—are facing few challenges that could be solved by such innovations. Islamic social finance institutions such as waqf are facing some challenges in enhancing its governance structure to ensure Shariah compliance as well as economic efficiency. This chapter explains how blockchain and smart contract technologies can help these institutions for better governance, lower transaction cost, more transparency, and higher trust, hence enhancing the business flexibility and market accessibility. It also presents some related cases that are currently under development as an evidence for the practicality of these technologies in the Islamic social finance arena.


2016 ◽  
pp. 1-12
Author(s):  
Guillermo A. Francia III ◽  
Frances Shannon Hutchinson ◽  
Xavier Paris Francia

The proliferation of the Internet has intensified the privacy protection and identity theft crises. A December 2013 report by the U.S. Department of Justice indicates that 16.6 million persons were victims of identity theft with direct and indirect losses amounting to almost $24.7 billion in 2012 (Harrell & Langton, 2013). These startling and apparently persistent statistics have prompted the United States and other foreign governments to initiate strategic plans and to enact several regulations in order to curb the crisis. This chapter surveys recently enacted national and international laws pertaining to identity theft and privacy issues. Further, it discusses the interplay between privacy and security, the various incentives and deterrence for privacy protection, and the prospects for the simulation of the social and behavioral aspects of privacy using the agent-based modeling.


Information ◽  
2020 ◽  
Vol 11 (12) ◽  
pp. 552
Author(s):  
Xiaoyu Ma ◽  
Jiting Zhou ◽  
Xiumei Yang ◽  
Guangyuan Liu

A blockchain voting system based on the feedback mechanism and Wilson score is proposed to solve the problem of the malicious votes behavior. Firstly, the relatively accurate supporting rate and ranking for candidates are obtained using the Wilson score. Secondly, different feedback coefficients are calculated according to the above parameters. Finally, the account points are adjusted according to the feedback coefficients. The feedback mechanism is designed in the voting smart contract, and the smart contract is deployed on the blockchain to ensure the enforcement of the feedback mechanism. A fully functional smart contract is designed and briefly verified in this paper. The experiment is conducted under the K-out-of-L type of weighted voting. Experimental results show that the Wilson score can accurately modify the candidates’ supporting rates, and the feedback mechanism can effectively suppress malicious votes.


Information ◽  
2019 ◽  
Vol 10 (1) ◽  
pp. 17 ◽  
Author(s):  
Haidong Zhong ◽  
Xianyi Chen ◽  
Qinglong Tian

Recently, reversible image transformation (RIT) technology has attracted considerable attention because it is able not only to generate stego-images that look similar to target images of the same size, but also to recover the secret image losslessly. Therefore, it is very useful in image privacy protection and reversible data hiding in encrypted images. However, the amount of accessorial information, for recording the transformation parameters, is very large in the traditional RIT method, which results in an abrupt degradation of the stego-image quality. In this paper, an improved RIT method for reducing the auxiliary information is proposed. Firstly, we divide secret and target images into non-overlapping blocks, and classify these blocks into K classes by using the K-means clustering method. Secondly, we match blocks in the last (K-T)-classes using the traditional RIT method for a threshold T, in which the secret and target blocks are paired with the same compound index. Thirdly, the accessorial information (AI) produced by the matching can be represented as a secret segment, and the secret segment can be hided by patching blocks in the first T-classes. Experimental results show that the proposed strategy can reduce the AI and improve the stego-image quality effectively.


Sign in / Sign up

Export Citation Format

Share Document