To see the other types of publications on this topic, follow the link: Privacy and transaction security.

Journal articles on the topic 'Privacy and transaction security'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Privacy and transaction security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Peng, Sheng, Linkai Zhu, Shanwen Hu, Zhiming Cai, and Wenjian Liu. "Enhancing Global Blockchain Privacy via a Digital Mutual Trust Mechanism." Mathematics 12, no. 10 (2024): 1481. http://dx.doi.org/10.3390/math12101481.

Full text
Abstract:
Blockchain technology, initially developed as a decentralized and transparent mechanism for recording transactions, faces significant privacy challenges due to its inherent transparency, exposing sensitive transaction data to all network participants. This study proposes a blockchain privacy protection algorithm that employs a digital mutual trust mechanism integrated with advanced cryptographic techniques to enhance privacy and security in blockchain transactions. The contribution includes the development of a new dynamic Byzantine consensus algorithm within the Practical Byzantine Fault Tolerance framework, incorporating an authorization mechanism from the reputation model and a proof consensus algorithm for robust digital mutual trust. Additionally, the refinement of homomorphic cryptography using the approximate greatest common divisor technique optimizes the encryption process to support complex operations securely. The integration of a smart contract system facilitates automatic and private transaction execution across the blockchain network. Experimental evidence demonstrates the superior performance of the algorithm in handling privacy requests and transaction receipts with reduced delays and increased accuracy, marking a significant improvement over existing methods.
APA, Harvard, Vancouver, ISO, and other styles
2

Wang, Guiyou, Chao Li, Bingrong Dai, and Shaohua Zhang. "Privacy-Protection Method for Blockchain Transactions Based on Lightweight Homomorphic Encryption." Information 15, no. 8 (2024): 438. http://dx.doi.org/10.3390/info15080438.

Full text
Abstract:
This study proposes an privacy-protection method for blockchain transactions based on lightweight homomorphic encryption, aiming to ensure the security of transaction data and user privacy, and improve transaction efficiency. We have built a blockchain infrastructure and, based on its structural characteristics, adopted zero-knowledge proof technology to verify the legitimacy of data, ensuring the authenticity and accuracy of transactions from the application end to the smart-contract end. On this basis, the Paillier algorithm is used for key generation, encryption, and decryption, and intelligent protection of blockchain transaction privacy is achieved through a secondary encryption mechanism. The experimental results show that this method performs well in privacy and security protection, with a data leakage probability as low as 2.8%, and can effectively defend against replay attacks and forged-transaction attacks. The degree of confusion remains above 0.9, with small fluctuations and short running time under different key lengths and moderate CPU usage, achieving lightweight homomorphic encryption. This not only ensures the security and privacy of transaction data in blockchain networks, but also reduces computational complexity and resource consumption, better adapting to the high-concurrency and low-latency characteristics of blockchain networks, thereby ensuring the efficiency and real-time performance of transactions.
APA, Harvard, Vancouver, ISO, and other styles
3

Chaubey, Suraj, Abhishek Ram, Deepak Gupta, Abdul Raheman, and Vivek Pandey. "Business Mapping in Context of Web 3.0 using Blockchain Technology." International Journal for Research in Applied Science and Engineering Technology 11, no. 4 (2023): 1189–96. http://dx.doi.org/10.22214/ijraset.2023.50277.

Full text
Abstract:
Abstract: The foundation of e-commerce is based on conducting transactions and transferring goods online without the need for physical travel. However, cyber threats can pose a risk when it comes to transferring transactional data. Our primary goal is to develop a system that can protect against such mishaps during the process of transmitting transactional data. Additionally, we aim to implement an automated system that ensures error-free transactions. To achieve these objectives, we will leverage the latest technologies such as blockchain and smart contracts. Blockchain technology provides a decentralized and immutable digital ledger that can securely store and transfer data across a network. E-commerce can use blockchain technology to process transactions safely, securely, and rapidly. By using blockchain technology, we can enable peer-to-peer transaction systems and data encryption, ensuring the safe transfer of sensitive financial information. Moreover, we can use blockchain technology to transfer transactional data securely. A smart contract is a specialized program that functions as an agreement and runs on the Ethereum blockchain. Smart contracts provide transactional security, and when combined with blockchain technology, they can transform e-commerce. By utilizing blockchain technology to ensure data security and user privacy and smart contracts to maintain the transaction protocol, our proposed system aims to offer a solution for transactional data privacy and transparency. In conclusion, our system will provide a secure and transparent platform for conducting e-commerce transactions. With the use of blockchain technology and smart contracts, we can create a system that ensures safe transfer of data and error-free transactions.
APA, Harvard, Vancouver, ISO, and other styles
4

Ogungbemi, Olumide Samuel. "The Role of Zero-Knowledge Proofs in Blockchain-Based Property Transactions to Ensure Data Privacy and Compliance with UK Regulations." Journal of Engineering Research and Reports 27, no. 3 (2025): 414–35. https://doi.org/10.9734/jerr/2025/v27i31443.

Full text
Abstract:
Property transactions in the UK are increasingly adopting blockchain technology to enhance efficiency, transparency, and security. However, the inherent transparency of blockchain raises significant data privacy risks and regulatory compliance challenges, particularly under the UK General Data Protection Regulation (UK GDPR). This study examines the role of Zero-Knowledge Proofs (ZKPs) in addressing these concerns by enabling transaction validation while preserving confidentiality. Using entropy measures, k-anonymity analysis, and logistic regression, this research quantitatively assesses the privacy risks, effectiveness of ZKPs, and regulatory acceptance in blockchain-based property transactions. The findings reveal that 65.5% of transactions remain highly or moderately identifiable, posing privacy vulnerabilities under UK data protection laws. ZKP-enabled transactions significantly enhance confidentiality, achieving a 92.5% transaction privacy score, compared to 48.3% for non-ZKP transactions. However, these privacy gains come at a 67.8% increase in transaction costs, highlighting a critical trade-off between security and efficiency. Regulatory approval rates for ZKP-based blockchain platforms stand at 72.5%, suggesting a strong potential for compliance advantages. While ZKPs improve privacy and regulatory alignment, challenges remain in terms of computational overhead, transaction costs, and adoption barriers. To facilitate large-scale implementation, this study recommends optimizing zk-Rollups for efficiency, developing clear policy frameworks, and enhancing collaboration between regulators, industry stakeholders, and blockchain developers. These steps are essential to ensuring a balance between privacy, scalability, and compliance, paving the way for secure and legally sound blockchain-based property transactions in the UK.
APA, Harvard, Vancouver, ISO, and other styles
5

Wiranti, Ririn, Angraini Angraini, Mona Fronita, Siti Monalisa, and Medyantiwi Rahmawita Munzir. "THE INFLUENCE OF STUDENST PERCEPTION OF DATA SECURITY AND PRIVACY ON TRANSACTION TRUST IN THE TOKOPEDIA APPLICATION." JURTEKSI (Jurnal Teknologi dan Sistem Informasi) 10, no. 3 (2024): 591–98. http://dx.doi.org/10.33330/jurteksi.v10i3.3179.

Full text
Abstract:
Abstract: The current development of technology has successfully met various societal needs, one of which is the buying and selling activities. This development has led people to engage in online transactions, where buyers do not necessarily have to meet sellers in person. Tokopedia is one of the most popular e-commerce platforms used in Indonesia. Security issues arose when in 2020 Tokopedia experienced a breach, with data from around 91 million accounts being compromised by hackers. Consequently, Tokopedia needed to establish a Data Protection and Privacy Office (DPPO) to protect and safeguard user data privacy.This research addresses how perceptions of security and privacy can influence users' trust in transacting on Tokopedia. Using multiple linear regression analysis, the study evaluates the relationship between perceptions of data security and privacy with trust in transacting on Tokopedia. Based on the calculations of the multiple linear regression model using previously collected respondent data, it was found that perceptions of data security do not directly affect trust in transactions. However, perceptions of privacy are considered to have a significant influence and can increase trust in transactions among students in Pekanbaru. Keywords: data security; e-commerce; tokopedia; transaction trust; user perceptions Abstrak: Perkembangan teknologi saat ini telah sukses mencapai berbagai kebutuhan masayarakat salah satunya kegiatan jual beli, perkembangan ini membawa manusia untuk dapat melakukan jual beli secara online dimana tidak mengharuskan pembeli bertemu penjual secara langsung. Tokopedia menjadi salah satu platform e-commerce yang sangat popular digunkanan diindonesia. Masalah keamaan terjadi dimana pada tahun 2020 tokopedia mengalami peretasan dengan sekitar 91 juta akun berhasil diperoleh datanya oleh peretas, sehingga Tokopedia perlu membentuk data protection and privacy office (DPPO) guna melindungi dan menjaga privasi data pengguna Tokopedia.terkait hal tersebut penelitian ini mengangkat bagaimana persepsi keamanan dan privasi dapat mempengaruhi kepercayaan pengguna dalam bertransaksi ditokopedia. Dengan menggunakan metode regresi linear berganda, evaluasi dilakukan untuk menjelaskan hubungan antara persepi keamanan data dan privasi terhadap kepercayaan bertransaksi ditokopedia. Berdasarkan perhitungan model regresi linear berganda menggunakan data responden yang telah dilakukan sebelumnya didapat persepsi keamanan data terhadap kepercayaan bertransaksi tidak berpengaruh secara langsung. Namun pada persepsi privasi terhadap kepercayaan bertransaksi dinilai sangat berpengaruh dan dapat meningkatkan kepercayaan bertransaksi di kalangan mahasiswa di pekanbaru. Kata kunci: e-commerce; keamanan data; kepercayaan transaksi; persepsi pengguna; tokopedia
APA, Harvard, Vancouver, ISO, and other styles
6

Wei, Zeming, Jiawen Fang, Zhicheng Hong, et al. "Privacy Protection Method for Blockchain Transactions Based on the Stealth Address and the Note Mechanism." Applied Sciences 14, no. 4 (2024): 1642. http://dx.doi.org/10.3390/app14041642.

Full text
Abstract:
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of being exposed. Therefore, this paper proposes the blockchain transaction privacy protection method based on the stealth address and the note mechanism to address the privacy leakage risk in blockchain public environments. Firstly, the proposed method generates a random seed known only to the parties involved based on the Diffie–Hellman key exchange protocol, ensuring the privacy of transactions. Then, it utilizes the Note Commitments table to maintain the binding relationship between the stealth address and the corresponding note, enabling efficient transfer and verification of note ownership. The uniqueness of the stealth address is utilized as an invalidation identifier for notes in the Nullifier table, ensuring efficient verification of the correctness of note invalidation identifiers. Additionally, this method employs Pedersen commitment and Bulletproofs range proof to generate proof of the legality of transaction amounts, enabling the concealment of transaction amounts and facilitating private transactions between the parties involved. Finally, this paper presents a detailed performance analysis, implementation, and testing of the method. From the results, it can be concluded that the method proposed can effectively prevent fraudulent behavior by various transaction participants and ensure the security, privacy, and integrity of the transaction. Critical processes consume only milliseconds, and the related commitments and proofs are also minimal, which is crucial for controlling transaction costs. At the same time, this method achieves a completely decentralized privacy transaction solution.
APA, Harvard, Vancouver, ISO, and other styles
7

Samay Deepak Ashar. "Next-generation AI solutions for transaction security in digital finance." International Journal of Science and Research Archive 14, no. 1 (2025): 930–38. https://doi.org/10.30574/ijsra.2025.14.1.0105.

Full text
Abstract:
Cybersecurity threats in financial transactions have intensified with the growing adoption of digital financial platforms, necessitating advanced, scalable solutions. This study evaluates the effectiveness of LightGBM, Attention-Based Neural Networks, and CatBoost models in enhancing the security of financial systems. LightGBM was employed to detect fraud by uncovering complex patterns in transactional data, utilizing both numerical and categorical features. Attention mechanisms were incorporated to improve model accuracy by prioritizing relevant features for fraud detection. Sequential transaction data was analyzed using CatBoost, a gradient boosting algorithm optimized for categorical features, which performed well in identifying fraudulent patterns in imbalanced datasets. The dependent variables measured were Detection Accuracy (DA), False Positive Rate (FPR), and Privacy Preservation Index (PPI). Results showed that LightGBM achieved the highest DA (92%) in detecting complex fraud patterns, while CatBoost excelled in handling sequential transaction data with an FPR of 2%. Attention mechanisms demonstrated a PPI of 96%, ensuring compliance with privacy regulations like GDPR. Analysis of variance indicated significant improvements across all variables (p-value ≤ 0.05). The integrated use of LightGBM, Attention Mechanisms, and CatBoost provides a comprehensive approach to addressing evolving financial cybersecurity threats, offering a scalable, privacy-compliant solution that outperforms traditional methods.
APA, Harvard, Vancouver, ISO, and other styles
8

Julian, Anitha, Gerardine Immaculate Mary, S. Selvi, Mayur Rele, and Muthukumaran Vaithianathan. "Blockchain based solutions for privacy-preserving authentication and authorization in networks." Journal of Discrete Mathematical Sciences and Cryptography 27, no. 2-B (2024): 797–808. http://dx.doi.org/10.47974/jdmsc-1956.

Full text
Abstract:
Securing sensitive user information and maintaining privacy during authentication and authorization processes is crucial in today’s interconnected digital world. This study investigates new approaches to tackle these obstacles by combining blockchain technology with Trusted Execution Environment (TEE). The proposed system introduces a new method that combines the advantages of both technologies to create a strong and privacy-focused framework for network security. The study assesses the effectiveness of the suggested system based on key parameters, focusing specifically on Transaction Throughput (TPS) and Latency. The combination of blockchain and TEE aims to improve privacy protection and security protocols, providing a dependable solution for privacy-focused authentication and authorization in network settings. The experiments confirmed the efficacy of the proposed model. The Transaction Throughput (TPS) reached 296 transactions per second, demonstrating the system’s scalability and capacity to manage a large number of transactions. The Latency was measured at 54 milliseconds, indicating a fast and responsive authentication and authorization process. The research enhances the development of privacy-preserving solutions by emphasizing the importance of the blockchain and TEE collaboration. The proposed model surpasses performance expectations set by traditional methods, positioning itself as a significant advancement in network security. The results highlight the system’s ability to significantly improve privacy protection in digital transactions and set the stage for advancements in secure, efficient, and privacy-focused authentication and authorization systems. between the quantity demand and the price.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Jing, Tao Li, and Min Huang. "The privacy protection of the internet of vehicles resource transaction details based on blockchain." PLOS ONE 20, no. 1 (2025): e0312854. https://doi.org/10.1371/journal.pone.0312854.

Full text
Abstract:
The rapid development of Internet of Things technology has promoted the popularization of Internet of Vehicles, and its safety and reliability have become the focus of intelligent transportation system research. Vehicle-road collaboration relies on the collaborative computing and storage resources of the vehicle on-board unit (OBU), which are usually limited. When the vehicle in the edge area needs to do computing tasks such as intelligent driving, but its own computing resources are insufficient. Therefore, it needs other computing resources from idle vehicles and road side unit (RSU). This resource sharing can get additional computing resources to complete the task, and can be more convenient to complete the computing task quickly. Most current studies consider this type of resource sharing as a vehicle-to-vehicle (V2V) network transaction, aiming to stimulate the enthusiasm of vehicle sharing and optimize the utilization of computing resources in edge areas. However, the traditional blockchain transaction mode exposes serious privacy disclosure risks in vehicle networking resource transactions, including the openness and transparency of user identity, transaction details, and transaction addresses, which poses great challenges to data security. Therefore, this study innovatively proposed a blockchain-based privacy protection scheme for vehicle networking resource transaction details. By introducing committed value protection, zero-knowledge proof technology and constructing temporary transaction addressed mechanism. The scheme realized the comprehensive privacy protection of transaction funds, transaction details and transaction addresses, which could effectively avoid the disclosure of users’ sensitive information. Compared with the existing methods, the proposed scheme not only greatly enhanced the privacy protection capability, but also ensured the efficiency and security of transaction verification through zero-knowledge proof, avoiding the direct exposure of private keys. Meanwhile, the experimental verification demonstrates that the scheme not only enhances the level of privacy protection but also does not augment the supplementary processing burden. Furthermore, it is evident that the scheme meets the rigorous requirements for real-time resource transactions in the Internet of Vehicles.
APA, Harvard, Vancouver, ISO, and other styles
10

Jiang, Wenbao, Jin Ding, and Haibao Zhang. "Supervised Blockchain Anonymous Transaction Model Based on Certificateless Signcryption." Applied Sciences 15, no. 7 (2025): 3723. https://doi.org/10.3390/app15073723.

Full text
Abstract:
In response to the issues of high transaction transparency and regulatory difficulties in blockchain account-model transactions, this paper presents a supervised blockchain anonymous transaction model based on certificateless signcryption aimed at ensuring secure blockchain transactions while minimizing both computational and communication overhead. During the transaction process, this approach utilizes certificateless public key signcryption without bilinear pairs to generate anonymous user identities, achieving strong anonymity of user identities and confidentiality of transaction amounts. It employs the Paillier homomorphic encryption algorithm to update transaction amounts and uses the FO commitment-based zero-knowledge proof scheme to validate transaction legality. Additionally, adopting a publicly verifiable secret threshold sharing scheme for hierarchical regulatory authority reduces the security risk of a single regulator storing the regulatory key. This model not only meets the privacy and timely update requirements of account-based blockchain transactions but also effectively regulates abnormal transactions. Rigorous security analysis and proofs demonstrate that this model possesses excellent anonymity, traceability, forward security, and backward security. When compared to similar schemes, the computational cost is reduced by at least 33.18%, effectively fulfilling the requirements for security.
APA, Harvard, Vancouver, ISO, and other styles
11

Ronith, Pingili, Erukulla Naresh, and Nagraj Rahul. "Zero-Knowledge Proofs and Privacy-Preserving Blockchain Protocols: Enhancing Security in Digital Financial Transactions." Global Journal of Engineering and Technology [GJET] 4, no. 2 (2025): 22–24. https://doi.org/10.5281/zenodo.14964668.

Full text
Abstract:
<em>This section summarizes the paper&rsquo;s objective, methodology, key findings, and conclusions. Focus on how zero-knowledge proofs (ZKPs) can be integrated into blockchain systems to enhance security and privacy, particularly in financial transactions. Explain the significance of this technology in mitigating challenges like data privacy, transaction security, and scalability.</em>
APA, Harvard, Vancouver, ISO, and other styles
12

Zhu, Jialin, Wenlong Feng, Wang Zhong, Mengxing Huang, and Siling Feng. "Research on Privacy Protection of Technology Service Transactions Based on Blockchain and Zero-Knowledge Proof." Wireless Communications and Mobile Computing 2023 (February 16, 2023): 1–7. http://dx.doi.org/10.1155/2023/6196872.

Full text
Abstract:
In view of the problem that the transaction privacy in the current blockchain technology service is easy to be leaked, a bulletproof alliance chain technology service transaction privacy protection mechanism is proposed. Firstly, this paper uses digital certificates as access mechanisms and stores them on the chain to ensure that the identity of technical service transactions is trusted. Secondly, the transaction data of the technical service user is hidden in the Pedersen commitment, and the Bulletproof is used to build the scope proof. Enable the verifier to conduct confidential verification of the legitimacy of the transaction without obtaining the sensitive information of the transaction, so as to ensure that the user’s transaction privacy is not disclosed. Finally, the security and privacy of the proposed privacy protection scheme are analyzed, and the comparison with other zero-knowledge proof schemes shows that the scheme has the advantages of strong privacy, scalability, and low storage cost.
APA, Harvard, Vancouver, ISO, and other styles
13

Zhou, Wei, De Zhang, Guangjie Han, Wenyin Zhu, and Xupeng Wang. "A Blockchain-Based Privacy-Preserving and Fair Data Transaction Model in IoT." Applied Sciences 13, no. 22 (2023): 12389. http://dx.doi.org/10.3390/app132212389.

Full text
Abstract:
The rapid development of the Internet of Things (IoT) has resulted in vast amounts of widely distributed data. Sharing these data can spur innovative advancements and enhance service quality. However, conventional data-sharing methods often involve third-party intermediaries, posing risks of single-point failures and privacy leaks. Moreover, these traditional sharing methods lack a secure transaction model to compensate for data sharing, which makes ensuring fair payment between data consumers and providers challenging. Blockchain, as a decentralized, secure, and trustworthy distributed ledger, offers a novel solution for data sharing. Nevertheless, since all nodes on the blockchain can access on-chain data, data privacy is inadequately protected, and traditional privacy-preserving methods like anonymization and generalization are ineffective against attackers with background knowledge. To address these issues, this paper proposes a decentralized, privacy-preserving, and fair data transaction model based on blockchain technology. We designed an adaptive local differential privacy algorithm, MDLDP, to protect the privacy of transaction data. Concurrently, verifiable encrypted signatures are employed to address the issue of fair payment during the data transaction process. This model proposes a committee structure to replace the individual arbitrator commonly seen in traditional verifiable encrypted signatures, thereby reducing potential collusion between dishonest traders and the arbitrator. The arbitration committee leverages threshold signature techniques to manage arbitration private keys. A full arbitration private key can only be collaboratively constructed by any arbitrary t members, ensuring the key’s security. Theoretical analyses and experimental results reveal that, in comparison to existing approaches, our model delivers enhanced transactional security. Moreover, while guaranteeing data availability, MDLDP affords elevated privacy protection.
APA, Harvard, Vancouver, ISO, and other styles
14

Mi, Bo, Bingqing Wu, Darong Huang, Yang Liu, Lu Chen, and Shaohua Wan. "Privacy-Oriented Transaction for Public Blockchain via Secret Sharing." Security and Communication Networks 2022 (November 19, 2022): 1–19. http://dx.doi.org/10.1155/2022/9946088.

Full text
Abstract:
Immutability and traceability are the main reasons for the popularity of blockchain. Nevertheless, its transparency also makes the transactions visible to all participants, which seriously violates the privacy of some dealers. In order to transfer accounts over blockchain, all verifiers should be empowered with the ability to confirm the transactions, leading to the conflict between extensive consensus and individual privacy. Orienting to privacy issues of UTXO (Unspent Transaction Output), this paper exploited the unconditional security of Shamir’s secret sharing to construct a logic-physical map for public chain, which enabled noninteractive transaction verification without privacy infringement. A comprehensive analysis indicated that the proposed scheme is secure under UC (Universal Composability) framework with practical computation and communication overheads.
APA, Harvard, Vancouver, ISO, and other styles
15

Song, Yu, Ao Xiong, Xuesong Qiu, et al. "A Blockchain-Based Method for Optimizing the Routing of High-Frequency Carbon-Trading Payment Channels." Electronics 12, no. 12 (2023): 2586. http://dx.doi.org/10.3390/electronics12122586.

Full text
Abstract:
Carbon trading is an effective way to achieve carbon neutrality. It is a market mechanism aimed at reducing global greenhouse gas emissions and carbon dioxide emissions. Blockchain technology can be applied to the carbon-trading scenario using characteristics that guarantee the security, decentralization, data immutability, and data traceability of the carbon-trading process. It would be difficult to implement carbon trading on blockchains for all enterprises and individuals, as the current performance of blockchains does not meet the requirements. There has been extensive research conducted on blockchain performance optimization, and the off-chain payment channel is one of the more mature solutions. This approach involves the transfer of transactions to off-chain transactions, thus avoiding high transaction fees. Existing research has addressed the problem of routing security and efficiency, with less emphasis on factors such as routing transaction costs, node reputation, and routing path considerations. This paper researches the optimization of payment routing in Payment Channel Networks (PCNs) and proposes the Multi-Factor Routing Payment Scheme (MFPS), which integrates factors such as the node reputation, transaction fee cost, and distance to select the route for payment transactions. In order to improve the success ratio of routing transactions, the transaction-splitting algorithm is proposed. To ensure the security and privacy of the transaction process, the Asymmetric Time-Lock Contract (ATLC) protocol is proposed. The results of extensive experimental simulations show that the MFPS proposed in this paper outperforms the ShortestPath, Cheapest, and SplitDistance algorithms. It achieves an approximately 13.8%∼49% improvement in the transaction success ratio and reduces the average transaction processing cost. The security and privacy measures can defend against wormhole and double-flower attacks and exhibit better performance in terms of computational verification and message overhead.
APA, Harvard, Vancouver, ISO, and other styles
16

Xie, Yi-Yang, Xiu-Bo Chen, and Yi-Xian Yang. "A New Lattice-Based Blind Ring Signature for Completely Anonymous Blockchain Transaction Systems." Security and Communication Networks 2022 (September 1, 2022): 1–12. http://dx.doi.org/10.1155/2022/4052029.

Full text
Abstract:
Blockchain technology has been widely applied in numerous industries with its decentralization, verifiability, distributivity, and immutability. However, the identity privacy security of blockchain users is facing serious threats because of the openness of traditional blockchain transaction information. Moreover, numerous traditional cryptographic algorithms used by blockchain transaction networks are difficult to attack quantum computing. In this paper, we propose a new lattice-based blind ring signature scheme in allusion to completely anonymous blockchain transaction systems. There into, the blind ring signature can implement the complete anonymity of user identity privacy in blockchain transactions. Meanwhile, lattice cryptography can availably resist quantum computing attacks. Firstly, the proposed signature scheme has strong computational security based on the small integer solution (SIS) problem and a high sampling success rate by utilizing the techniques of rejection sampling from bimodal Gaussian distribution. Secondly, the proposed signature scheme can satisfy the correctness and security under the random oracle model, including anonymity, blindness, and one-more unforgeability. Thirdly, we construct a blockchain transaction system based on the proposed blind ring signature algorithm, which realizes the completely anonymous and antiquantum computing security of the blockchain users’ identity privacy. Finally, the performance evaluation results show that our proposed blind ring signature scheme has lower latency, smaller key size, and signature size than other similar schemes.
APA, Harvard, Vancouver, ISO, and other styles
17

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 2, no. 1 (2016): 1–14. https://doi.org/10.5281/zenodo.14282101.

Full text
Abstract:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction information, such as finance, healthcare, and e-commerce.In response to this problem, a novel blockchain-based transaction operation data sharing scheme, named BBTDSS, is proposed for the Identity and access management system. This scheme is designed to leverage blockchain technology for secure data sharing while implementing a crop quantum homomorphic encryption algorithm to ensure that transaction data remains private during processing and sharing. Blockchain's decentralized and immutable characteristics provide a robust framework for transparent data management, enabling multiple participants to access shared data without the need for a trusted central authority. However, the challenge of protecting sensitive transaction information is addressed by integrating homomorphic encryption, which allows computations to be performed on encrypted data without decrypting it. This ensures that the privacy of individual transaction details is maintained, even while enabling the secure sharing and processing of data across different parties.The introduction of crop quantum homomorphic encryption further enhances the security and scalability of the system by harnessing the power of quantum computing principles to perform more efficient and secure encryption operations. This approach significantly reduces the computational burden typically associated with traditional encryption methods, making the system more efficient and practical for real-time transaction processing.In essence, the BBTDSS scheme provides a solution to the ongoing challenge of data privacy and secure sharing by combining the strengths of blockchain and advanced encryption techniques. It ensures that transaction operation data can be shared securely among authorized parties, while safeguarding sensitive information from unauthorized access, thus paving the way for more transparent, efficient, and privacy-preserving transaction systems in various domains.
APA, Harvard, Vancouver, ISO, and other styles
18

Ranga, Premsai. "Block Chain Based Identity and Access Management: A New Paradigm for Cybersecurity." INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH AND CREATIVE TECHNOLOGY 8, no. 1 (2022): 1–14. https://doi.org/10.5281/zenodo.14513534.

Full text
Abstract:
The rapid growth of transaction operation data has introduced significant challenges related to balancing the need for data sharing and ensuring privacy protection. As transactions increasingly become more complex and data-driven, the sharing of this data across various stakeholders, while maintaining confidentiality and integrity, has become a critical concern. The contradiction between the transparent and immutable nature of transaction data in distributed systems and the need for stringent privacy measures presents a unique problem for industries dealing with sensitive transaction information, such as finance, healthcare, and e-commerce.In response to this problem, a novel blockchain-based transaction operation data sharing scheme, named BBTDSS, is proposed for the Identity and access management system. This scheme is designed to leverage blockchain technology for secure data sharing while implementing a crop quantum homomorphic encryption algorithm to ensure that transaction data remains private during processing and sharing. Blockchain's decentralized and immutable characteristics provide a robust framework for transparent data management, enabling multiple participants to access shared data without the need for a trusted central authority. However, the challenge of protecting sensitive transaction information is addressed by integrating homomorphic encryption, which allows computations to be performed on encrypted data without decrypting it. This ensures that the privacy of individual transaction details is maintained, even while enabling the secure sharing and processing of data across different parties.The introduction of crop quantum homomorphic encryption further enhances the security and scalability of the system by harnessing the power of quantum computing principles to perform more efficient and secure encryption operations. This approach significantly reduces the computational burden typically associated with traditional encryption methods, making the system more efficient and practical for real-time transaction processing.In essence, the BBTDSS scheme provides a solution to the ongoing challenge of data privacy and secure sharing by combining the strengths of blockchain and advanced encryption techniques. It ensures that transaction operation data can be shared securely among authorized parties, while safeguarding sensitive information from unauthorized access, thus paving the way for more transparent, efficient, and privacy-preserving transaction systems in various domains.
APA, Harvard, Vancouver, ISO, and other styles
19

Yao, Shuang, and Dawei Zhang. "A blockchain-based privacy-preserving transaction scheme with public verification and reliable audit." Electronic Research Archive 31, no. 2 (2022): 729–53. http://dx.doi.org/10.3934/era.2023036.

Full text
Abstract:
&lt;abstract&gt;&lt;p&gt;With the continuous development of Internet of Things, finance, big data and many other fields, blockchain has been widely used in these areas for transactions, data sharing, product traceability and so on. Numerous assets have appeared in the blockchain, and there are some levels of conflicts among privacy protection of these assets, transaction transparency and auditability in blockchain; so how to provide privacy preserving, make public verifications and audit the encrypted assets are challenging problems. In this paper, we propose a privacy-preserving transaction scheme with public verification and reliable audit in blockchain. First, we provide privacy preserving of transaction contents based on homomorphic encryption. It is flexible, as we decouple user identity and transaction contents. Then, we propose and design a multiplicative zero-knowledge proof with formal security analysis. Furthermore, several verification rules are defined by us in the scheme, such as balance verification and multiplicative verification based on the proposed multiplicative zero-knowledge proof. Our scheme enables reliable and offline auditing for each transaction, and we aggregate the zero-knowledge proofs to save the ledger space. Finally, we make a security analysis of our proposal in terms of transaction confidentiality, public verification and audit reliability, and we give a performance analysis of the proposed scheme.&lt;/p&gt;&lt;/abstract&gt;
APA, Harvard, Vancouver, ISO, and other styles
20

Li, Yufeng, Yuling Chen, Tao Li, and Xiaojun Ren. "A Regulatable Data Privacy Protection Scheme for Energy Transactions Based on Consortium Blockchain." Security and Communication Networks 2021 (December 7, 2021): 1–11. http://dx.doi.org/10.1155/2021/4840253.

Full text
Abstract:
In the blockchain-based energy transaction scenario, the decentralization and transparency of the ledger will cause the users’ transaction details to be disclosed to all participants. Attackers can use data mining algorithms to obtain and analyze users’ private data, which will lead to the disclosure of transaction information. Simultaneously, it is also necessary for regulatory authorities to implement effective supervision of private data. Therefore, we propose a supervisable energy transaction data privacy protection scheme, which aims to trade off the supervision of energy transaction data by the supervisory authority and the privacy protection of transaction data. First, the concealment of the transaction amount is realized by Pedersen commitment and Bulletproof range proof. Next, the combination of ElGamal encryption and zero-knowledge proof technology ensures the authenticity of audit tickets, which allows regulators to achieve reliable supervision of the transaction privacy data without opening the commitment. Finally, the multibase decomposition method is used to improve the decryption efficiency of the supervisor. Experiments and security analysis show that the scheme can well satisfy transaction privacy and auditability.
APA, Harvard, Vancouver, ISO, and other styles
21

Sanjaya, Bora, and Sri Ekowati. "PENGARUH PRIVASI, KEAMANAN DAN KEPERCAYAAN TERHADAP NIAT BERTRANSAKSI ONLINE DI SITUS SHOPEE (Studi Kasus Pada Masyarakat Jl. Hibrida RT. 07 Kota Bengkulu)." (JEMS) Jurnal Entrepreneur dan Manajemen Sains 3, no. 2 (2022): 155–66. http://dx.doi.org/10.36085/jems.v3i2.2847.

Full text
Abstract:
This study aims to determine the effect of privacy, security and trust on the intention to transact online on the Shopee site in Bengkulu City. This type of research is a type of quantitative descriptive research, the object of this research is the consumer on the Shopee site which is located in Bengkulu City. The sampling method used a non-probabilty technique, namely accidental sampling. The number of respondents in this study were 120 people. Methods of data collection using a questionnaire. The data analysis technique uses Multiple Linear Regression Analysis Test, and Hypothesis Testing, namely t-test and f-test.The results of this study can be concluded that the Privacy variable has a positive effect on Consumer Online Transaction Intentions, Security has a positive effect on Consumer Online Transaction Intentions, Trust has a positive effect on Consumer Online Transaction Intentions, and Privacy, Security and Trust together have a positive and significant effect on Consumer Online Transaction Intention. Keywords : Privacy, Security, Trust and Online Transaction IntentionÂ
APA, Harvard, Vancouver, ISO, and other styles
22

Anikievich, Aleksandr. "Proposals for the implementation of a platform for conducting international settlements in digital currencies of central banks." Scientific Research and Development. Economics of the Firm 13, no. 3 (2024): 40–45. http://dx.doi.org/10.12737/2306-627x-2024-13-3-40-45.

Full text
Abstract:
The BRICS countries intend to create a common payment platform for conducting transactions in digital currencies at the international level – the BRICS Bridge project. The article provides a framework for the development of international CBDC transaction platform that would address the problem of high transaction costs and excessive transaction time for international settlements, which are currently one of the main issues in the traditional economy. Processes and governance structure of the platform are described in the work. Research has shown that CBDC settlements on a distributed ledger technology (DLT)-based platform can reduce information fragmentation and increase information flow for regulatory bodies. However, the use of DLT in international settlements is associated with numerous technical and legal risks, including privacy and data security risks, financial monitoring complications, contradictions between national and international legislation, and bank disintermediation risks. To mitigate these risks, a scheme for conducting international digital transactions based on DLT, combining national and international legislation, and ensuring data privacy and security is proposed.
APA, Harvard, Vancouver, ISO, and other styles
23

Song, Zilong, Xiaohong Zhang, and Miaomiao Liang. "Reliable Reputation Review and Secure Energy Transaction of Microgrid Community Based on Hybrid Blockchain." Wireless Communications and Mobile Computing 2021 (June 21, 2021): 1–17. http://dx.doi.org/10.1155/2021/9916735.

Full text
Abstract:
A growing number of prosumers have entered the local power market in response to an increase in the number of residential users who can afford to install distributed energy resources. The traditional microgrid trading platform has many problems, such as low transaction efficiency, the high cost of market maintenance, opaque transactions, and the difficulty of ensuring user privacy, which are not conducive to encouraging users to participate in local electricity trading. A blockchain-based mechanism of microgrid transactions can solve these problems, but the common single-blockchain framework cannot manage user identity. This study thus proposes a mechanism for secure microgrid transactions based on the hybrid blockchain. A hybrid framework consisting of private blockchain and consortium blockchain is first proposed to complete market transactions. The private blockchain stores the identifying information of users and a review of their transactions, while the consortium blockchain is responsible for storing transaction information. The block digest of the private blockchain is stored in the consortium blockchain to prevent information on the private blockchain from being tampered with by the central node. A reputation evaluation algorithm based on user behavior is then developed to evaluate user reputation, which affects the results of the access audit on the private blockchain. The higher a user’s reputation score is, the more benefits he/she can obtain in the transaction process. Finally, an identity-based proxy signcryption algorithm is proposed to help the intelligent management device with limited computing power obtain signcryption information in the transaction process to protect the transaction information. A system analysis showed that the secure transaction mechanism of the microgrid based on the hybrid blockchain boasts many security features, such as privacy, transparency, and imtamperability. The proposed reputation evaluation algorithm can objectively reflect all users’ behaviors through their reputation scores, and the identity-based proxy signcryption algorithm is practical.
APA, Harvard, Vancouver, ISO, and other styles
24

Setiawan, Hendra, and Neza Novitasari. "EASE TRANSACTIONS AND PRIVACY SECURITY ON THE DECISION TO REUSE QRIS AS A TOOL OF PAYMENT THROUGH USER EXPERIENCE IN MADIUN CITY." Jurnal Ilmiah Bisnis dan Ekonomi Asia 18, no. 2 (2024): 204–12. http://dx.doi.org/10.32815/jibeka.v18i2.2081.

Full text
Abstract:
This research aims to analyze the use of e-wallets by involving 384 sample respondents. Quantitative methods were used in this research with purposive sampling techniques. Analysis uses Structural Equation Model (SEM) via SmartPLS software version 4.0.0. The research results show that ease of transactions and partial privacy security have a positive and significant influence on user experience. Furthermore, user experience has a strong, positive, and significant influence on reuse decisions. In addition, ease of transaction and privacy security also have a positive and significant influence on reuse decisions through user experience as an intervening variable. This research provides important insight into the factors that influence the decision to reuse the QRIS Mobile Banking feature in Madiun City, as well as observing the importance of user experience in mediating the relationship between ease of transaction and privacy security with the decision to reuse e-wallets.
APA, Harvard, Vancouver, ISO, and other styles
25

K, MR VIJAY. "CASHLESS SOCIETY MANAGING PRIVACY AND SECURITY IN TECHNOLOGICAL AGE." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 05 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem34634.

Full text
Abstract:
A cashless society is an economic state which handles financial transactions not in the form of traditional mediums of currency, such as cash or coins, but by transferring digital data (usually by electronic means, such as credit cards and mobile data) between participating parties. Participants of a cashless society must Figure out a way to protect their transaction data, acknowledging the risks of organizations collecting mass amounts of said data, which result in a reduction of personal privacy. Balancing individual privacy with data security is vital in the information age, especially considering the increasing risk of data breaches and exploitation. In order to increase privacy in a cashless society, a few courses of action can be combined to produce a lasting and desirable result for users: A new kind of banking service that assigns randomized numbers to credit cards, the use of blockchain to monitor all transactions from individuals, and a campaign to educate and inform key stakeholders about security and privacy risks to provide the necessary tools and background knowledge to safeguard their own information before interaction with a foreign entity or other third parties i.e. cyber security departments, IT technicians, etc. Blockchain and card number randomization are both susceptible to zero-day errors, bugs, and varied levels of social acceptance. This preliminary research draws on a systems analysis of cashless systems to identify and analyze a set of social and technical solutions to support a robust cashless system that protects users’ privacy and maintains the security of the system. The information found and analyzed will be beneficial by exposing weak points in current methods of data integrity and security. Learning about current and future methods of managing privacy and data security in the technological age would be helpful in creating preventative counter measures. Key Words: Cashless economy, e-banking, card swipe, digital money, plastic money, transparency and digital transaction.
APA, Harvard, Vancouver, ISO, and other styles
26

Khan, Mohammad Monirujjaman, Nesat Tasneem RoJa, Faris A. Almalki, and Maha Aljohani. "Revolutionizing E-Commerce Using Blockchain Technology and Implementing Smart Contract." Security and Communication Networks 2022 (May 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/2213336.

Full text
Abstract:
The days of storing data manually are behind us. We are opting for the online form of data storage and transfer. The new era of data digitization comes with its own perks and detriments. Cybersecurity is still a crucial concern today. As more data transfer occurs through an online medium, the risks of a breach and cyberattacks are inevitable. The whole foundation of e-commerce is based on the online transfer of goods and transactions without the need to travel. Transferring transactional data and transactions in e-commerce are prone to cyber threats. Our research’s major objective is to develop a system that protects against such mishaps, especially during the transfer of transactional data, and also implement an automated system that ensures these transactions occur without any errors. To implement this, we are taking advantage of new emerging technologies called blockchain and smart contract. Blockchain allows a decentralized, immutable digital ledger to safely store and transfer data across the network. Blockchain technology is used in e-commerce to transfer transactions in a safe, secure, and faster way. Blockchain enables a peer-to-peer transaction system and data encryption that enables the safe transfer of transactional data. Blockchain is used to transfer transactional data. A smart contract is a special program that enables, verifies, and enforces the terms of a contract digitally. It provides transactional security as the contact is in place. The blockchain, coupled with smart contracts, will revolutionize the future of e-commerce. We have combined blockchain technology to ensure data security and user privacy with smart contracts to ensure that the protocol for the transaction is maintained. The results are presented by building and implementing the proposed system that provides the solution for transactional data privacy.
APA, Harvard, Vancouver, ISO, and other styles
27

Al-Sarayrah, Najah, Nidal Turab, and Abdelrahman Hussien. "A randomized blockchain consensus algorithm for enhancing security in health insurance." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1304. http://dx.doi.org/10.11591/ijeecs.v34.i2.pp1304-1314.

Full text
Abstract:
Health insurance fraud is a significant problem affecting insurance providers and policyholders. To address the rising problem of fraudulent activities in the health insurance sector, this paper proposes a pioneering blockchain-based system aimed at increasing transparency and security. Utilizing a hybrid Blockchain architecture, the system incorporates a consensus algorithm influenced by practical byzantine fault tolerance (PBFT) and proof of activity (PoA) to ensure reliability and efficiency in distributing mining power. Developed using Python, extensive testing confirms the system's performance and security metrics. Results show that a block size containing one transaction is 1.63 KB, with 1.2 KB for data and 0.43 KB for identification and hashing. Operational tests demonstrate that a single participant can upload 850 transactions to the transaction pool, with validation completed in just 7.49 seconds. Block appending time for these transactions is a swift 10 seconds. Notably, the system exhibits resilience against data tampering, detecting unauthorized changes within 881.3 milliseconds across 10,000 blocks and identifying irregularities in the transaction pool within 8.78 seconds. Additionally, to enhance data privacy, patient information is accessible only through a unique QR code, providing an extra layer of security; this research represents a significant advancement in combatting fraud and safeguarding data privacy.
APA, Harvard, Vancouver, ISO, and other styles
28

Al-Sarayrah, Najah, Nidal Turab, and Abdelrahman Hussien. "A randomized blockchain consensus algorithm for enhancing security in health insurance." Indonesian Journal of Electrical Engineering and Computer Science 34, no. 2 (2024): 1304–14. https://doi.org/10.11591/ijeecs.v34.i2.pp1304-1314.

Full text
Abstract:
Health insurance fraud is a significant problem affecting insurance providers and policyholders. To address the rising problem of fraudulent activities in the health insurance sector, this paper proposes a pioneering blockchain-based system aimed at increasing transparency and security. Utilizing a hybrid Blockchain architecture, the system incorporates a consensus algorithm influenced by practical byzantine fault tolerance (PBFT) and proof of activity (PoA) to ensure reliability and efficiency in distributing mining power. Developed using Python, extensive testing confirms the system's performance and security metrics. Results show that a block size containing one transaction is 1.63 KB, with 1.2 KB for data and 0.43 KB for identification and hashing. Operational tests demonstrate that a single participant can upload 850 transactions to the transaction pool, with validation completed in just 7.49 seconds. Block appending time for these transactions is a swift 10 seconds. Notably, the system exhibits resilience against data tampering, detecting unauthorized changes within 881.3 milliseconds across 10,000 blocks and identifying irregularities in the transaction pool within 8.78 seconds. Additionally, to enhance data privacy, patient information is accessible only through a unique QR code, providing an extra layer of security; this research represents a significant advancement in combatting fraud and safeguarding data privacy.
APA, Harvard, Vancouver, ISO, and other styles
29

Xia, Xiufeng, Tingting Hou, Xiangyu Liu, Chuanyu Zong, and Shengsheng Mu. "Protecting Check-In Data Privacy in Blockchain Transactions with Preserving High Trajectory Pattern Utility." Wireless Communications and Mobile Computing 2022 (March 15, 2022): 1–13. http://dx.doi.org/10.1155/2022/9358531.

Full text
Abstract:
Because the blockchain is secure and untamperable, it has been widely used in many industries, such as the financial industry, digital tokens, and e-commerce logistics. The remarkable security feature of the blockchain is that the blockchain verifies the transaction initiated on each block through the node, and its process is broadcast throughout the whole network to let everyone know. On the one hand, this ensures the security of every transaction, but on the other hand, it is easy to cause privacy disclosure problems for transaction users. Therefore, under the premise of ensuring the security of the blockchain, it has become a hot issue to protect the sensitive information of transaction users. A check-in privacy protection (CPP) algorithm based on check-in location generalization is proposed in this paper, which can be applied to blockchain transactions to solve the privacy leakage problem of transaction users’ sensitive information. CPP algorithm not only protects the privacy of check-in data but also keeps the high utility of trajectory pattern data. Firstly, location types are recommended in the sensitive check-in location generalization based on the user’s trajectory pattern by using Markov chain technology. Secondly, to make sure that the generalized locations can be scattered as much as possible to prevent the attacker from deducing back, a heuristic rule is designed to select the generalized location based on the recommended location types, and at the same time, the similarity between the anonymous trajectory and the original trajectory is maintained. In addition, a generalized location search strategy is designed to improve the efficiency of the algorithm. Based on the real spatial-temporal check-in data, the results of the experiment indicate that our algorithm can effectively protect the privacy of sensitive check-in while ensuring the high utility of trajectory pattern data.
APA, Harvard, Vancouver, ISO, and other styles
30

Lan, Fei, Junjia Yang, Hao Feng, et al. "Research on ZKP Algorithm of Data Asset Security and Privacy Protection Based on Blockchain Technology." International Journal of e-Collaboration 20, no. 1 (2024): 1–20. http://dx.doi.org/10.4018/ijec.349211.

Full text
Abstract:
Zero Knowledge Proof (ZKP) is a very effective method of preserving privacy as it hides the most confidential information throughout the transaction. In this paper, we present a security and privacy-preserving approach for blockchain that relies on account and multi-data asset models using the Zero Knowledge Proof (ZKP) mechanism. We provide options for transferring data assets and detecting duplicate expenditures, and we also develop transaction structures, anonymised addresses and anonymised metadata for the data assets. To create and validate the ZKP, we use the zk-SNARKs algorithm and specify validation criteria for masked transactions, and finally conduct experimental tests to validate it. Creating better algorithms for ZKP will be the focus of our future efforts.
APA, Harvard, Vancouver, ISO, and other styles
31

Princess Eloho Odio, Richard Okon, Mary Oyenike Adeyanju, Chikezie Paul-Mikki Ewim, and Obianuju Clement Onwuzulike. "Blockchain and Cybersecurity: A dual approach to securing financial transactions in Fintech." Gulf Journal of Advance Business Research 3, no. 2 (2025): 380–409. https://doi.org/10.51594/gjabr.v3i2.89.

Full text
Abstract:
The rapid growth of the fintech industry has led to an increased reliance on digital financial transactions, which simultaneously presents significant cybersecurity risks. This abstract explores the potential of combining blockchain technology with advanced cybersecurity protocols to create a dual-layered approach to securing financial transactions and protecting customer data in fintech applications. Blockchain, with its decentralized and immutable nature, offers inherent security benefits, making it an ideal foundation for enhancing the integrity of financial transactions. Each transaction recorded on a blockchain is cryptographically secured, ensuring that data cannot be altered retroactively, thus preventing fraud and unauthorized access. However, while blockchain technology provides a robust mechanism for securing transaction data, it is not immune to all forms of cyber threats, particularly those targeting the endpoints or vulnerabilities in smart contracts. Advanced cybersecurity protocols, such as encryption, multi-factor authentication, and intrusion detection systems, complement blockchain’s capabilities by safeguarding the broader fintech ecosystem. These protocols can be used to secure access points, ensure data privacy, and enhance the detection of malicious activities that might bypass blockchain’s security features. The integration of blockchain with cybersecurity measures creates a multi-layered defense system that not only protects transaction integrity but also mitigates risks associated with data breaches, phishing attacks, and insider threats. For example, encryption techniques can ensure that sensitive customer data remains confidential, while blockchain ensures the immutability of transaction records. Furthermore, smart contract security protocols can prevent vulnerabilities in decentralized finance (DeFi) applications from being exploited by malicious actors. By combining these two technologies, fintech companies can significantly enhance the security of financial transactions, improve customer trust, and ensure compliance with regulatory standards. This dual approach strengthens the resilience of fintech platforms against evolving cyber threats and enhances the overall security posture of the industry. Keywords: Blockchain, Cybersecurity, Fintech, Financial Transactions, Data Integrity, Encryption, Smart Contracts, Decentralized Finance, Multi-Layered Security, Fraud Prevention.
APA, Harvard, Vancouver, ISO, and other styles
32

Hu, Jianwen, Yuling Chen, Xiaojun Ren, Yixian Yang, Xiaobin Qian, and Xiaomei Yu. "Blockchain-Enhanced Fair and Efficient Energy Trading in Industrial Internet of Things." Mobile Information Systems 2021 (November 17, 2021): 1–13. http://dx.doi.org/10.1155/2021/7397926.

Full text
Abstract:
As the technical support of the industrial Internet of Things, blockchain technology has been widely used in energy trading, data transactions, and Internet of Vehicles. However, most of the existing energy trading models only address the transaction security and transaction privacy issues that arise in the energy trading process, ignoring the fairness of resource allocation and transaction equity in the trading process. In order to tackle those problems, an energy trading scheme called HO-TRAD is proposed in this paper to improve the efficiency of model trading while ensuring the fairness of energy trading. We propose a new trading strategy in the HO-TRAD energy trading scheme that guarantees fairness in the allocation of trading resources by introducing an entity’s active reputation value. Use smart contracts to achieve transparency and ensure fairness in the transaction process. Based on the identity verification foundation of the consortium chain, the scheme enhances the existing PBFT consensus algorithm and improves the efficiency of model transactions. The experimental simulation indicates that the scheme requires less transaction time and has higher transaction fairness and security.
APA, Harvard, Vancouver, ISO, and other styles
33

Et. al., Santosh Kumar Sharma,. "A Framework Of Big Data As Service Platform For Access Control & Privacy Protection Using Blockchain Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 11 (2021): 476–85. http://dx.doi.org/10.17762/turcomat.v12i11.5910.

Full text
Abstract:
Big Data As A Service Is Used In Today’s Scenario To Handle And Process The Big Amount Of Data Which Are Generated From Different Source Every Day. Since Data Is Stored On The Cloud Platform, The System Could Suffer A Failure And Give Attackers The Opportunity To Launch Various Categories Of Attacks.Manyresearcheshave Been Done In This Domain To Provide Security And Protection To The Data On Cloud. The Blockchain Technology Is A Secure, Distributed And Privacy-Preserving Decentralized Ledger Where The Transactions Are Flexible, Secure,Verifiable And Permanent Way.Here, The Transaction Data Is Encrypted Andkept In A Wrapped Block (I.E., Record) Which Are Spreadthrough The N/W In A Provable And Unabashedmode Across The Entire Network To Enhance Information Security And Data Privacy. In This Paperwe Have Proposed A Framework For An Access Control With Privacy Protection In Bdaas Based On Blockchain Technology. Here Blockchain Technology Is Used Only For Storing The Transaction Log Information Whenever Any Kind Of Event Log Occurred In System.
APA, Harvard, Vancouver, ISO, and other styles
34

Zhang, Shuhui, Ruiyao Zhou, Lianhai Wang, Shujiang Xu, and Wei Shao. "Cross-Chain Asset Transaction Method Based on Ring Signature for Identity Privacy Protection." Electronics 12, no. 24 (2023): 5010. http://dx.doi.org/10.3390/electronics12245010.

Full text
Abstract:
In recent years, the rapid development of blockchain technology has facilitated the transfer of value and asset exchange between different blockchains. However, achieving interoperability among various blockchains necessitates the exploration of cross-chain technology. While cross-chain technology enables asset flow between different blockchains, it also introduces the risk of identity privacy leakage, thus posing a significant threat to user security. To tackle this issue, this article proposes a cross-chain privacy protection scheme that leverages ring signature and relay chain technology. Specifically, this scheme utilizes RCROSS contracts based on ring signatures to handle cross-chain transactions, thereby ensuring the privacy of both parties involved in the transaction. This cross-chain solution demonstrates practicality and efficiency in facilitating cross-chain asset trading. Furthermore, it effectively combats reuse attacks and man-in-the-middle attacks at the application layer while also providing resistance against denial-of-service attacks at the network layer. To validate the proposed cross-chain solution, we conducted tests by constructing a specific cross-chain scenario and by focusing on the natural gas consumption values generated by the RCROSS contract function used in the application chain. The findings indicate that our proposed solution is highly practical in safeguarding the identity privacy of transaction participants. This article’s framework guarantees reliability, security, and efficiency in cross-chain asset transactions. By incorporating ring-based signatures and relay chain technology, users can confidently protect their identity privacy, thus ensuring secure and smooth cross-chain transactions.
APA, Harvard, Vancouver, ISO, and other styles
35

Lambongang, James Mado. "Investigating Challenges of Mobile Money usage in the Central Business District of the Kumasi Metropolitan Assembly, Adum- Ghana." TEXILA INTERNATIONAL JOURNAL OF MANAGEMENT 9, no. 1 (2023): 42–57. http://dx.doi.org/10.21522/tijmg.2015.09.01.art004.

Full text
Abstract:
A descriptive cross-sectional design approach was deployed using a structured questionnaire underpinning the research objective to collect data from mobile money users and non-users within the Business District Centre of the Kumasi Metropolitan Assembly, Adum. The purposive random selection technique was used to choose a sample size of 59. This study seeks to investigate the challenges encountered by patrons of mobile money and examine their behaviour and attitudes towards the usage of mobile money transactions. The study identified seven (7) challenges, namely, financial, security, privacy, performance, time, convenience, and psychological, with performance, security, and privacy challenges being the most prevalent. The low transaction limits due to inadequate constant liquidity flow (cash and e-float) by agents affect consumers who wish to transact more than being offered; unwarranted delays experienced by customers and merchants due to incomplete payment process are some of the causative challenges of mobile money transaction; and invasion of privacy and defamation are among major. Fraudsters use the fear and anxiety of customers’ personal details in the hands of a third party, especially when the mobile money accounts are linked to clients’ bank accounts. The effect of inconvenience and delays in transactions are pointers to a duplicated transaction. It is recommended that service charges be lowered to their minimum rates, ensure a reliable mobile money system for consumers through system upgrades, and service providers ensure that personal details remain private to avoid consumer-driven fraud by inadvertently making pin codes known to third parties. Keywords: Global System for Mobile Communications Association (GSMA), Mobile Money, Theory of Reasoned Action (TRA), Technology Acceptance Model (TAM), Theory of Planned Behavior (TPB) and the Diffusion of Innovation Theory.
APA, Harvard, Vancouver, ISO, and other styles
36

Ekaningsih, Lailasari, and Irfan Rizky Hutomo. "The Role of Notaries in Consumer Protection in E-Commerce in the Era of Digitalization." Sultan Agung Notary Law Review 6, no. 1 (2024): 1. https://doi.org/10.30659/sanlar.v6i1.36598.

Full text
Abstract:
Electronic commerce relies on the trust of commercial entities that guarantee the security of data and the legitimacy of transactions carried out. The government has enacted Law Number 19 of 2016 concerning Amendments to Law Number 11 of 2008 concerning Electronic Information and Transactions, one of which is to regulate electronic transactions. The ITE Law defines electronic transactions as activities that use electronic devices such as computers, internet networks and other digital media. The basic principle of electronic transactions is trust. To foster trust, stakeholders must strive for protection, especially consumer protection. In electronic transactions, there is an imbalance between economic actors and consumers in terms of bargaining power, which can result in legal agreements that are detrimental to consumers. In addition, storing consumer data as big data on computing systems does not guarantee its security, which can easily be lost, which is commonly referred to as a violation of consumer privacy. Consumers also need to be protected through education on the legal aspects of electronic transactions related to transaction terms, transaction security, transaction legality and dispute resolution. In fact, consumer protection in the field of electronic transactions is not yet optimal because several laws and regulations still contain inconsistencies and do not cover all aspects of protection.
APA, Harvard, Vancouver, ISO, and other styles
37

Sohaib uz Zaman, Erum Parveen, and Syed Hasnain Alam. "AI to Enhance the Transactional Security in Digital Banking." Journal of Management & Social Science 2, no. 2 (2025): 1–22. https://doi.org/10.63075/2apb3z22.

Full text
Abstract:
The integration of artificial intelligence (AI) has enhanced banking operations by providing improved customer service, security, and efficiency. For data privacy and security, Banks must implement robust data security measures to gain customer trust as well as comply with regulatory requirements. Therefore, this study examined whether AI-based security systems can augment transactional safety, secure pay systems, and strengthen customer trust in digital banks. Quantitative research design and stratified random sampling technique is used for data collection. Questionnaire is filled up with digital banking customers and professionals. Descriptive statistic is used to understand the demographics of respondent, Cronbach’s alpha test for reliability e and regression analysis is applied to analyze how AI can enhance the transactional security in digital banking. The findings point out that AI techniques are most influential on transaction security and customer trust, and powered security systems play an auxiliary role in securing payment systems. The digital banking platforms are also significant mediators that make both AI techniques and powered security systems more effective. AI-based security solutions, such solutions provide extensive protection against cyber threats and improve the user experience to bring about easy and hassle-free transactions with the help of different features like AI chatbots, real-time fraud alerts, and automated dispute resolution add up to make the banking environment secure and customer-friendly. Keywords: AI techniques, transactional security, payment system security, digital banking platforms, customer trust and powered security systems.
APA, Harvard, Vancouver, ISO, and other styles
38

Yuan, Munan, Xiaofeng Li, Xiru Li, Haibo Tan, and Jinlin Xu. "Trust Hardware Based Secured Privacy Preserving Computation System for Three-Dimensional Data." Electronics 10, no. 13 (2021): 1546. http://dx.doi.org/10.3390/electronics10131546.

Full text
Abstract:
Three-dimensional (3D) data are easily collected in an unconscious way and are sensitive to lead biological characteristics exposure. Privacy and ownership have become important disputed issues for the 3D data application field. In this paper, we design a privacy-preserving computation system (SPPCS) for sensitive data protection, based on distributed storage, trusted execution environment (TEE) and blockchain technology. The SPPCS separates a storage and analysis calculation from consensus to build a hierarchical computation architecture. Based on a similarity computation of graph structures, the SPPCS finds data requirement matching lists to avoid invalid transactions. With TEE technology, the SPPCS implements a dual hybrid isolation model to restrict access to raw data and obscure the connections among transaction parties. To validate confidential performance, we implement a prototype of SPPCS with Ethereum and Intel Software Guard Extensions (SGX). The evaluation results derived from test datasets show that (1) the enhanced security and increased time consumption (490 ms in this paper) of multiple SGX nodes need to be balanced; (2) for a single SGX node to enhance data security and preserve privacy, an increased time consumption of about 260 ms is acceptable; (3) the transaction relationship cannot be inferred from records on-chain. The proposed SPPCS implements data privacy and security protection with high performance.
APA, Harvard, Vancouver, ISO, and other styles
39

Thakkar, Vidhi, and Vrushank Shah. "A Privacy-Preserving Framework Using Hyperledger Fabric for EHR Sharing Applications." International journal of electrical and computer engineering systems 14, no. 6 (2023): 667–76. http://dx.doi.org/10.32985/ijeces.14.6.6.

Full text
Abstract:
Electronic Health Records, or EHRs, include private and sensitive information of a patient. The privacy of personal healthcare data can be protected through Hyperledger Fabric, a permissioned blockchain framework. A few Hyperledger Fabric- integrated EHR solutions have emerged in recent years. However, none of them implements the privacy-preserving techniques of Hyperledger Fabric to make transactions anonymous or preserve the transaction data privacy during the consensus. Our proposed architecture is built on Hyperledger Fabric and its privacy-preserving mechanisms, such as Identity Mixer, Private Data Collections, Channels and Transient Fields to securely store and transfer patient-sensitive data while providing anonymity and unlinkability of transactions.
APA, Harvard, Vancouver, ISO, and other styles
40

Li, Yang, Mengying Jiang, Mei Yu, et al. "A Non-Transferable Trade Scheme of Green Power Based on Blockchain." Energies 17, no. 16 (2024): 4002. http://dx.doi.org/10.3390/en17164002.

Full text
Abstract:
Power consumers can obtain authoritative green environmental value certification through green electricity trading, which plays an important role in improving the production competitiveness of enterprises, especially for international product trade affairs. However, the credibility of green electricity transactions faces serious challenges in the enterprise green authentication affairs, especially the user’s identity authentication, the traceability of green electricity transactions, and the standardization of green electricity transactions. Aiming to solve the certification and traceability problem of tradable green certificates, this paper proposes an integrated green certificate trading protocol, which solves its double-trading problem and helps to improve the credibility of renewable energy use. The main contribution is providing a solution based on the consortium blockchain technology to solve the main challenges mentioned above. The main solved scheme designs a series of protocols, which includes a purchase protocol, payment protocol, and non-transferable protocol. The whole process ensures the credibility, traceability, and non-transferability of green certificate trading. Multiple verification measures are adopted to address security and privacy challenges in green certificate management. Through security analysis, the protocol effectively defends against attacks such as double payments, transaction rollback, and transaction replays while ensuring users’ privacy.
APA, Harvard, Vancouver, ISO, and other styles
41

N, Dhiwakar, Boopathy E, Indrajeeth Y, and Rahul V. "Secured and Privacy in Exam Cell Management System Using Blockchain Mechanism with Advanced Encryption Standard (AES) Algorithm." International Research Journal of Computer Science 11, no. 04 (2024): 314–19. http://dx.doi.org/10.26562/irjcs.2024.v1104.30.

Full text
Abstract:
This study proposes a novel approach to enhance the security and privacy of Exam Cell Management Systems (ECMS) by integrating blockchain technology with the Advanced Encryption Standard (AES) algorithm. Traditional systems face challenges such as data breaches and unauthorized access, necessitating innovative solutions. Our proposed system utilizes blockchain's decentralized and immutable nature to securely record and verify examination-related transactions. Each transaction is encrypted using AES before being added to the blockchain, ensuring confidentiality and tamper-proofing. The decentralized nature of blockchain enhances transparency and accountability, while AES encryption provides robust data protection. Experimental results demonstrate significant improvements in data security, privacy, and integrity compared to traditional systems. This approach offers a promising solution for educational institutions to mitigate the risks associated with data breaches and unauthorized access, thereby ensuring the integrity and trustworthiness of the examination process.
APA, Harvard, Vancouver, ISO, and other styles
42

Cheng, Qishuo, Yulu Gong, Yang Qin, Xiang Ao, and Zhenglin Li. "Secure Digital Asset Transactions: Integrating Distributed Ledger Technology with Safe AI Mechanisms." Academic Journal of Science and Technology 9, no. 3 (2024): 156–61. http://dx.doi.org/10.54097/2qhab557.

Full text
Abstract:
This paper explores the integration of distributed ledger technology (DLT) and artificial intelligence (AI) in digital asset transactions, focusing on the challenges of security, privacy protection, and smart contract reliability. Through a comprehensive analysis, it was found that DLT ensures transaction security and transparency through decentralized recording and consensus mechanisms, while AI enhances security through anomaly detection and threat analysis. In addition, the convergence of DLT and AI has significantly enhanced privacy protection by encrypting data transfers and using data desensitization techniques. In addition, AI-driven automated testing and vulnerability prediction improve the reliability and execution efficiency of smart contracts, ensuring the integrity of transactions. Overall, the integration of DLT and AI provides a solid framework for safe, efficient and reliable digital asset trading, paving the way for the further development and maturity of the digital asset market.
APA, Harvard, Vancouver, ISO, and other styles
43

Dr. S. Gandhimathi and Ms. J. Soundarya. "Credit Card Transaction Security Using Facial Recognition Technology." International Journal of Scientific Research in Computer Science, Engineering and Information Technology 11, no. 2 (2025): 2358–65. https://doi.org/10.32628/cseit23112573.

Full text
Abstract:
The most prevalent issue nowadays in the modern world is credit card fraud. This is due to the growth in internet transactions and e-commerce websites. When a credit card is stolen and used for unauthorized purposes, or when a fraudster uses the card's information for his own gain, credit card fraud happens. Because the credit card offers significant usage as a payment instrument, it is often used. As we all know, there are several opportunities for attackers or hackers to acquire sensitive data from online transactions. For both valid and invalid transactions, the information is processed and an acknowledgement is given to the bank. Facial detection and facial recognition technology employing the Haar Cascade algorithm will be used in a credit card transaction system. Attacks on several privacy concerns, such as credit cards, are the major issue that credit card users deal with. Typically, individuals experience this when their credit card is given to an unexpected party or misplaced. Therefore, we are developing a system that will lower the possibility of credit card fraud. The technology we're working on will compare the person's face in the photograph to the dataset for that user. A database will be kept for the purpose of authentication. If the photos line up, it signifies the user is real, and processing will be permitted; otherwise, the transaction will not be allowed.
APA, Harvard, Vancouver, ISO, and other styles
44

Zhang, Ruochi, Yi Li, and Li Fang. "PBTMS: A Blockchain-Based Privacy-Preserving System for Reliable and Efficient E-Commerce." Electronics 14, no. 6 (2025): 1177. https://doi.org/10.3390/electronics14061177.

Full text
Abstract:
With the development of communication infrastructure and the popularity of smart devices, e-commerce is presenting in more diverse forms and attracting the attention of more and more users. Since e-commerce transactions usually involve sensitive information of a large number of users, privacy and security have become increasingly important issues. Despite certain advantages (e.g., trading security), the privacy protection capability and efficiency of blockchain is still limited by some key factors, especially of its architecture. In this paper, we propose a blockchain-based privacy protection system named PBTMS that integrates zero-knowledge proofs, hybrid encryption, and Pedersen commitments as foundational mechanisms to ensure robust privacy protection for transaction data and user information. To achieve secure, reliable, and efficient e-commerce transactions, the PBTMS employs blockchain technology and consensus mechanisms to enable distributed storage, thereby mitigating single points of failure and addressing the risks posed by malicious nodes. Moreover, by integrating on-chain storage with off-chain computation, the system substantially reduces blockchain-related overheads, including processing time, gas consumption, and storage costs. This design establishes the PBTMS as a highly adaptable and efficient system for the evolving requirements of secure and privacy-preserving e-commerce platforms. Theoretical analysis and experimental validation demonstrate that PBTMS reduces decryption and authentication times by 79.2% and 52.6%, respectively, while cutting encrypted data size by 52.5% and overall gas consumption by 55.4%, outperforming state-of-the-art solutions. These results indicate that PBTMS is a reliable and efficient system for secure e-commerce transaction platforms and provides a novel approach to enhancing privacy protection in e-commerce.
APA, Harvard, Vancouver, ISO, and other styles
45

Engelmann, Felix, Thomas Kerber, Markulf Kohlweiss, and Mikhail Volkhov. "Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps." Proceedings on Privacy Enhancing Technologies 2022, no. 4 (2022): 507–27. http://dx.doi.org/10.56553/popets-2022-0120.

Full text
Abstract:
Privacy-oriented cryptocurrencies, like Zcash or Monero, provide fair transaction anonymity and confidentiality, but lack important features compared to fully public systems, like Ethereum. Specifically, supporting assets of multiple types and providing a mechanism to atomically exchange them, which is critical for e.g. decentralized finance (DeFi), is challenging in the private setting. By combining insights and security properties from Zcash and SwapCT (PETS 21, an atomic swap system for Monero), we present a simple zk-SNARKs based transaction scheme, called Zswap, which is carefully malleable to allow the merging of transactions, while preserving anonymity. Our protocol enables multiple assets and atomic exchanges by making use of sparse homomorphic commitments with aggregated open randomness, together with Zcash friendly simulation-extractable non-interactive zero-knowledge (NIZK) proofs. This results in a provably secure privacypreserving transaction protocol, with efficient swaps, and overall performance close to that of existing deployed private cryptocurrencies. It is similar to Zcash Sapling and benefits from existing code-bases and implementation expertise.
APA, Harvard, Vancouver, ISO, and other styles
46

Marak, Trealindora, Labianglang Sohkhlet, and Upasana Das. "BLOCKCHAIN-BASED HEALTHCARE RECORD MANAGEMENT SYSTEM." International Journal of Engineering Applied Sciences and Technology 6, no. 9 (2022): 288–95. http://dx.doi.org/10.33564/ijeast.2022.v06i09.042.

Full text
Abstract:
Blockchain is an engrossing research field area to introduce in the healthcare sector due to its security, privacy, confidentiality and decentralization. In Blockchain-based systems, data and authority can be distributed, and transparent and reliable transaction ledgers created. Privacy-enabling approaches for Blockchain have been introduced, such as private blockchains, and methods for enabling parties to act pseudonymously. We explore a set of proposed uses of Blockchain within cyber security and consider their requirements for privacy. We compare these requirements with the privacy provision of Blockchain and explore the trade-off between security and privacy, reflecting on the effect of using privacy-enabling approaches on the security advantages that Blockchain can offer. In this research, we present a framework that will help to reduce the inconsistencies that we have to risk in our everyday lives. The aim of this framework is to implement blockchain on storing healthcare records in a pre-assigned database.
APA, Harvard, Vancouver, ISO, and other styles
47

Farah, Maath Jasem, Makki Sagheer Ali, and M. Awad Abdullah. "Enhancement of digital signature algorithm in bitcoin wallet." Bulletin of Electrical Engineering and Informatics 10, no. 1 (2021): 449–57. https://doi.org/10.11591/eei.v10i1.2339.

Full text
Abstract:
Bitcoin is a peer-to-peer electronic cash system largely used for online financial transactions. It gained popularity due to its anonymity, privacy, and comparatively low transaction cost. Its wallet heavily relies on elliptic curve digital signature algorithm (ECDSA). Weaknesses in such algorithms can significantly affect the safety and the security of bitcoin wallets. In this paper, a secure key management wallet was designed based on several changes in the wallet parts. In the cold wallet, we employed an image-based passphrase to achieve a strong entropy source of master seed. The hot wallet, the proposed Key_Gen algorithm is modifying to the key generation step of the ECDSA that it is to generate a fresh key pair at each transaction. The final part ensures recovering all keys on both hot and cold wallets without daily backups in case of losing the wallet. The findings prove that the proposed cold wallet is resisting against a dictionary attack and overcoming the memorizing problem. The proposed hot wallet model acquires good anonymity and privacy for bitcoin users by eliminating transaction likability without additional cost. The execution time for signing a transaction of the proposed model is~70 millisecond, which is then important in the bitcoin domain.
APA, Harvard, Vancouver, ISO, and other styles
48

Utama, Iston Dwija, Ivan Diryana Sudirman, and Dian Kurnianingrum. "Beyond transactions: Understanding the determinants of e-satisfaction in online shopping." Journal of Asian Scientific Research 14, no. 2 (2024): 251–65. http://dx.doi.org/10.55493/5003.v14i2.5063.

Full text
Abstract:
This study aims to investigate the factors influencing e-commerce satisfaction, focusing on application design, merchandise attributes, transaction capabilities, and security and privacy. Internet penetration has massively changed the behavior of the customer, especially their buying behavior, from traditional to online through various channels such as e-commerce. The key finding from the quantitative approach with purposive sampling is the highly positive relationship between application design and e-satisfaction. The findings of the study demonstrate a moderate association between merchandise attributes and e-satisfaction, emphasizing the significance of product variety and presentation. Furthermore, the study has recognized other significant variables that lead to e-satisfaction, such as fast transaction capabilities and adequate security and privacy protections. The findings provide theoretical insights as well as practical guidelines, implying that e-commerce platforms may improve their customer satisfaction by prioritizing user-friendly, ease-of-use, and appealing application designs, broad product offers, streamlined transaction processes, and robust security and privacy. This study also provides future research recommendations and limitations.
APA, Harvard, Vancouver, ISO, and other styles
49

Cachin, Christian, and François-Xavier Wicht. "Toxic Decoys: A Path to Scaling Privacy-Preserving Cryptocurrencies." Proceedings on Privacy Enhancing Technologies 2025, no. 4 (2025): 926–43. https://doi.org/10.56553/popets-2025-0165.

Full text
Abstract:
Anonymous cryptocurrencies attracted much attention over the past decade, yet ensuring both integrity and privacy in an open system remains challenging. Their transactions preserve privacy because they do not reveal on which earlier transaction they depend, specifically which outputs of previous transactions are spent. However, achieving privacy imposes a significant storage overhead due to two current limitations. First, the set of potentially unspent outputs of transactions grows indefinitely because the design hides cryptographically which one have been consumed; and, second, additional data must be stored for each spent output to ensure integrity, that is, to prevent that it can be spent again. We introduce a privacy-preserving payment scheme that mitigates these issues by randomly partitioning unspent outputs into fixed-size bins. Once a bin has been referenced in as many transactions as its size, it is pruned from the ledger. This approach reduces storage overhead while preserving privacy. We first highlight the scalability benefits of using smaller untraceability sets instead of considering the entire set of outputs, as done in several privacy-preserving cryptocurrencies. We then formalize the security and privacy notions required for a scalable, privacy-preserving payment system and analyze how randomized partitioning plays a key role in both untraceability and scalability. To instantiate our approach, we provide a construction based on Merkle trees, which ensures efficient argument systems and easy pruning of the state. We finally show the storage benefits of our scheme and analyze its resilience against large-scale flooding attacks using empirical transaction data.
APA, Harvard, Vancouver, ISO, and other styles
50

Ni, Xue. "Research on the Legal Protection of Consumer Rights on Mobile Internet." Advanced Materials Research 926-930 (May 2014): 2622–25. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2622.

Full text
Abstract:
With the rapid development of Internet technology, network transactions are in increasing breadth and depth. Online trading market transactions as a new way to bring great economic benefits to society, but also to enter into the market for traditional legal face great challenges. Network of consumer protection in the transaction there is no protection of personal privacy, personal property, security risks, right, fair trading rights (the main form of contract) damages, rights have been infringed. In this paper, comparative research methods, introduced online trading, online trading, e-commerce and the difference between the three links to the special nature of the transaction through the network analysis and network transaction concrete manifestation of consumers 'interests to explore our network Trading in consumer protection are the main problems facing the proposed line with China's national conditions and consumer rights protection network transactions legislative proposals.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!