ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2017, Vol. 54 ›› Issue (10): 2170-2186.doi: 10.7544/issn1000-1239.2017.20170471

Special Issue: 2017应用驱动的网络空间安全研究进展

Previous Articles     Next Articles

Survey on Privacy Preserving Techniques for Blockchain Technology

Zhu Liehuang1, Gao Feng1, Shen Meng1, Li Yandong1, Zheng Baokun1,2, Mao Hongliang3, Wu Zhen3   

  1. 1(School of Computer Science, Beijing Institute of Technology, Beijing 100081); 2(China University of Political Science and Law, Beijing 102249); 3(National Computer Network Emergency Response Technical Team/Coordination Center of China(CNCERT/CC), Beijing 100029)
  • Online:2017-10-01

Abstract: Core features of the blockchain technology are “de-centralization” and “de-trusting”. As a distributed ledger technology, smart contract infrastructure platform and novel distributed computing paradigm, it can effectively build programmable currency, programmable finance and programmable society, which will have a far-reaching impact on the financial and other fields, and drive a new round of technological change and application change. While blockchain technology can improve efficiency, reduce costs and enhance data security, it is still in the face of serious privacy issues which have been widely concerned by researchers. The survey first analyzes the technical characteristics of the blockchain, defines the concept of identity privacy and transaction privacy, points out the advantages and disadvantages of blockchain technology in privacy protection and introduces the attack methods in existing researches, such as transaction tracing technology and account clustering technology. And then we introduce a variety of privacy mechanisms, including malicious nodes detection and restricting access technology for the network layer, transaction mixing technology, encryption technology and limited release technology for the transaction layer, and some defense mechanisms for blockchain applications layer. In the end, we discuss the limitations of the existing technologies and envision future directions on this topic. In addition, the regulatory approach to malicious use of blockchain technology is discussed.

Key words: blockchain, privacy-preserving, peer-to-peer networking, clustering analysis, Bitcoin

CLC Number: