BLOCKCHAIN TECHNOLOGY AND PERSONAL PRIVACY ISSUES
Authors: Iryna Dmytrieva, Oleksandr Oksiiuk
Affiliation: Taras Shevchenko University of Kyiv, Faculty of Information Technology, Taras Shevchenko University of Kyiv, Faculty of Information Technology
Keywords: privacy, blockchain technology, data security, zk-SNARK, online threats
ABSTRACT. Blockchain technology has gone from prominence in a narrow circle of enthusiasts to mass insanity and frustration. The time has come to take a look at the trends in the development of technology and soberly assess the capabilities of the blockchain after the hype has stopped. Now blockchain finds application in areas such as financial transactions, user identification, or the creation of cybersecurity technologies. Despite the fact that blockchain technology is reliable and supportive, the privacy issues and challenges of this technology cannot be left out.
Nakamoto, S. (2008). Bitcoin: A Peer-to-Peer Electronic Cash System.
G. Zyskind, O. Nathan et al., Decentralizing privacy: Using blockchain to protect personal data, in Security and Privacy Workshops (SPW), 2015 IEEE, IEEE, 2015, 180–184.
O. J. Onyigwang, Y. Shestak and A. Oksiuk, "Information protection of data processing center against cyber attacks," 2016 IEEE First International Conference on Data Stream Mining & Processing (DSMP), Lviv, 2016, pp. 397-400. doi: 10.1109/DSMP.2016.7583586
Jens Groth. “Short pairing-based non-interactive zero-knowledge arguments”. In: International Conference on the Theory and Application of Cryptology and Information Security. Springer. 2010, pp. 321–340
Eli Ben-Sasson, Alessandro Chiesa, Eran Tromer, Madars Virza. Succinct Non-Interactive Zero Knowledge for a von Neumann Architecture. Cryptology ePrint Archive, Report 2013/879
Rosario Gennaro, Craig Gentry, Bryan Parno, and Mariana Raykova. Quadratic Span Programs and Succinct NIZKs without PCPs. Cryptology ePrint Archive, Report 2012/215
Jens Groth, Markulf Kohlweiss, Mary Maller, Sarah Meiklejohn, and Ian Miers. Updatable and Universal Common Reference Strings with Applications to zk-SNARKs. Cryptology ePrint Archive, Report 2018/280.
Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev. Scalable, transparent, and post-quantum secure computational integrity. Cryptology ePrint Archive, Report 2018/046
Mary Maller, Sean Bowe, Markulf Kohlweiss, and Sarah Meiklejohn. Sonic: Zero- Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings. Cryptology ePrint Archive, Report 2019/099
O. Oksiiuk, L. Tereikovska and I. Tereikovskiy, "Adaptation of the neural network model to the identification of the cyberattacks type "denial of service"," 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications and Computer Engineering (TCSET), Lviv-Slavske, 2018, pp. 502-505