skip to main content
10.1145/3647444.3652463acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicimmiConference Proceedingsconference-collections
research-article

Blockchain-Based Zero-Knowledge Proofs for Data Privacy: Explore the Application of Blockchain Technology in facilitating Privacy-Preserving Transactions through Zero-Knowledge Proofs and Analyze their Effectiveness in Protecting Sensitive Data.

Published: 13 May 2024 Publication History

Abstract

In recent years, the increasing prevalence of digital transactions and data sharing has underscored the critical importance of privacy and security in the digital realm. Blockchain technology, initially designed to support cryptocurrencies like Bitcoin, has evolved into a versatile platform with the potential to provide trust, transparency, and data immutability in a wide range of applications. Concurrently, zero-knowledge proofs have emerged as a pioneering approach to safeguarding data privacy, allowing parties to validate information without disclosing the underlying data. This review paper thoroughly investigates the convergence of blockchain technology and zero-knowledge proofs, aiming to understand how their synergy can foster privacy-preserving transactions. We examine the foundational principles of zero-knowledge proofs, their theoretical underpinnings, and practical implementation within blockchain networks. Through a comprehensive analysis, we assess the effectiveness of this amalgamation in protecting sensitive data and consider its applicability to diverse use cases. This review provides a detailed exploration of the synergistic potential of blockchain and zero-knowledge proofs in reshaping the landscape of data privacy in an increasingly interconnected world.

References

[1]
Swan, M. (2015). Blockchain: blueprint for a new economy. O'Reilly Media.
[2]
Goldwasser, S., Micali, S., & Rackoff, C. (1985). The Knowledge Complexity of Interactive Proof-Systems. SIAM Journal on Computing, 18(1), 186-208.
[3]
Tapscott, D., & Tapscott, A. (2016). Blockchain revolution: how the technology behind bitcoin is changing money, business, and the world. Penguin.
[4]
Buterin, V. (2013). Ethereum: A Next-Generation Smart Contract and Decentralized Application Platform. White Paper.
[5]
Mullan, M. (2016). Blockchain: Opportunities for health care. Deloitte Review, 19.
[6]
Mougayar, W. (2016). The Business Blockchain: Promise, Practice, and Application of the Next Internet Technology. Wiley.
[7]
Narayanan, A., Bonneau, J., Felten, E., Miller, A., & Goldfeder, S. (2016). Bitcoin and Cryptocurrency Technologies: A Comprehensive Introduction. Princeton University Press.
[8]
Mettler, M. (2016). Blockchain technology in healthcare: The revolution starts here. In 2016 IEEE-EMBS International Conference on Biomedical and Health Informatics (BHI) (pp. 101-104). IEEE.
[9]
Ekblaw, A., Azaria, A., Halamka, J. D., & Lippman, A. (2016). A case study for blockchain in healthcare: "MedRec" prototype for electronic health records and medical research data. In Proceedings of IEEE open & big data conference (Vol. 1).
[10]
Merkle, R. C. (2020). A Certified Digital Signature. Advances in Cryptology—CRYPTO’89, 369-378.
[11]
Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 459-474). IEEE.
[12]
Campanelli, M., Genovese, G., & Visconti, I. (2013). A Privacy-Enhancing Scheme for Identity Verification. In Data Privacy Management and Autonomous Spontaneus Security (pp. 53-67). Springer.
[13]
Stefanov, E., Papamanthou, C., & Shi, E. (2013). Practical dynamic proofs of retrievability. In Proceedings of the 2013 ACM SIGSAC conference on Computer & Communications Security (pp. 325-336).
[14]
Schnorr, C. P. (1991). Efficient signature generation for smart cards. Journal of Cryptology, 4(3), 161-174.
[15]
Fiat, A., & Shamir, A. (1986). How to prove yourself: Practical solutions to identification and signature problems. Advances in Cryptology—CRYPTO’86, 186-194.
[16]
Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., & Virza, M. (2014). Zerocash: Decentralized anonymous payments from bitcoin. In Security and Privacy (SP), 2014 IEEE Symposium on (pp. 459-474). IEEE.
[17]
Ateniese, G., Di Pietro, R., Mancini, L. V., & Tsudik, G. (2011). Scalable and efficient provable data possession. In SecureComm'08.
[18]
Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
[19]
Chase, M., & Meiklejohn, S. (2019). Privacy-Preserving Computation on Distributed Ledgers: A Survey. ACM Computing Surveys (CSUR), 52(1), 1-38.
[20]
Merkle, R. C. (2017). Method and apparatus for secure communication. U.S. Patent No. 4,405,829.
[21]
Verizon. (2020). 2020 Data Breach Investigations Report. Retrieved from https://enterprise.verizon.com/resources/reports/dbir/
[22]
EU GDPR. (2018). Regulation (EU) 2016/679: General Data Protection Regulation. Retrieved from https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679
[23]
CCPA. (2020). California Consumer Privacy Act (CCPA). Retrieved from https://oag.ca.gov/privacy/ccpa
[24]
Solove, D. J. (2013). Understanding Privacy. Harvard University Press.
[25]
Ohm, P. (2009). Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization. UCLA Law Review, 57(6), 1701-1777.
[26]
Hill, K. (2020). The Hidden Privacy Risks of Unlocking Data. Retrieved from https://www.nytimes.com/interactive/2020/12/18/technology/what-is-data-privacy.html
[27]
Barocas, S., Hardt, M., & Narayanan, A. (2019). Fairness and Machine Learning. Retrieved from https://fairmlbook.org/
[28]
Angwin, J., Larson, J., Mattu, S., & Kirchner, L. (2016). Machine Bias: There's Software Used Across the Country to Predict Future Criminals. And It's Biased Against Blacks. ProPublica. Retrieved from https://www.propublica.org/article/how-we-analyzed-the-compas-recidivism-algorithm
[29]
Gervais, A., Karame, G. O., Wüst, K., Glykantzis, V., Ritzdorf, H., & Capkun, S. (2016). On the Security and Performance of Proof of Work Blockchains. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security.
[30]
Deetman, S. (2016). Bitcoin's Growing Energy Problem. Joule, 1(2), 269-275.
[31]
Bitcoin Wiki. (2021). Scalability. Retrieved from https://en.bitcoin.it/wiki/Scalability
[32]
Zohar, A. (2015). Bitcoin: under the hood. Communications of the ACM, 58(9), 104-113.
[33]
FinCEN. (2019). Application of FinCEN's Regulations to Certain Business Models Involving Convertible Virtual Currencies. Retrieved from https://www.fincen.gov/sites/default/files/2019-05/FinCEN%20Guidance%20CVC%20FINAL%20508.pdf
[34]
Atzei, N., Bartoletti, M., & Cimoli, T. (2017). A survey of attacks on Ethereum smart contracts. Journal of Cryptocurrency Engineering, 7(2), 95-128.
[35]
Gipp, B., Meusch, A., & Gernand, A. (2017). Decentralized Trusted Timestamping using the Crypto Currency Bitcoin. 2017 IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS).
[36]
Zcash. (2020). Zcash Technology. Retrieved from https://electriccoin.co/technology/
[37]
Sasson, E. B., Chiesa, A., & Tromer, E. (2014). On the computational overhead of probabilistically checkable proofs. Proceedings of the Forty-sixth Annual ACM Symposium on Theory of Computing.
[38]
Micali, S. (2016). Verifiable Random Functions. In Proceedings of the Twenty-fifth Annual ACM-SIAM Symposium on Discrete Algorithms.
[39]
Maxwell, G. (2015). Proof of solvency. Retrieved from https://iwilcox.me.uk/2015/01/proof-of-solvency
[40]
Buterin, V. (2017). zk-SNARKs: Under the Hood. Retrieved from https://blog.ethereum.org/2017/01/10/zk-snarks-under-the-hood/
[41]
Noether, S., Mackenzie, S., Aron, M., Bowie, S., Kappos, G., Grass, D., & Back, A. (2016). Confidential Transactions. Retrieved from https://getmonero.org/resources/research-lab/#research-lab-publications
[42]
JPMorgan Chase. (2018). JPMorgan's Quorum® Blockchain Platform Will Utilize Zcash Technology to Add Layer of Privacy to Smart Contracts. Retrieved from https://www.jpmorganchase.com/corporate/news/stories/jpmorgan-quorum-zcash-privacy.htm
[43]
Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., & Maxwell, G. (2018). Bulletproofs: Short Proofs for Confidential Transactions and More. Proceedings of the IEEE Symposium on Security and Privacy.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIMMI '23: Proceedings of the 5th International Conference on Information Management & Machine Intelligence
November 2023
1215 pages
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 May 2024

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Blockchain
  2. Cryptography
  3. Zero-Knowledge Proofs

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIMMI 2023

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 61
    Total Downloads
  • Downloads (Last 12 months)61
  • Downloads (Last 6 weeks)10
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media