Identity Chain
- URL: http://arxiv.org/abs/2407.10187v1
- Date: Sun, 14 Jul 2024 13:14:16 GMT
- Title: Identity Chain
- Authors: Mahdi Darabi, AmirReza Fathi,
- Abstract summary: IdentityChain is a novel framework that integrates privacy and accountability principles.
The goal is to maintain privacy while ensuring compliance with existing regulations.
Privacy and accountability together wouldn't be possible unless advancements in cryptography.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: The first generation of cryptocurrencies introduced revolutionary concepts, yet faced challenges in privacy and regulatory compliance. While subsequent cryptocurrencies aimed to address privacy concerns (like Zcash and Monero), they often conflicted with regulatory frameworks, hindering broader adoption. In response, inspired by recent researches about privacy and accountability and incentive techniques in Blockchain, we propose IdentityChain as a novel framework that integrates privacy and accountability principles, leading to a robust system equipped with adaptable rules. IdentityChain is a KYC (Know Your Customer) service on top of a public Blockchain (e.g., Ethereum, Ton, Polygon). The goal is to maintain privacy while ensuring compliance with existing regulations. Privacy is one of the key characteristics of IdentityChain, it's crucial for preventing conflicts of interests further discussed how. Accountability is also one of the main characteristics of IdentityChain and prevents from misbehave of users. Privacy and accountability together wouldn't be possible unless advancements in cryptography.
Related papers
- Differential Privacy Overview and Fundamental Techniques [63.0409690498569]
This chapter is meant to be part of the book "Differential Privacy in Artificial Intelligence: From Theory to Practice"
It starts by illustrating various attempts to protect data privacy, emphasizing where and why they failed.
It then defines the key actors, tasks, and scopes that make up the domain of privacy-preserving data analysis.
arXiv Detail & Related papers (2024-11-07T13:52:11Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - SeDe: Balancing Blockchain Privacy and Regulatory Compliance by Selective De-Anonymization [0.3749861135832073]
We propose a framework that balances privacy-preserving features by establishing a regulatory and compliant framework called Selective De-Anonymization (SeDe)
Our technique achieves this without leaving de-anonymization decisions or control in the hands of a single entity but distributing it among multiple entities while holding them accountable for their respective actions.
arXiv Detail & Related papers (2023-11-14T13:49:13Z) - Pisces: Private and Compliable Cryptocurrency Exchange [7.907585289497186]
We propose a cryptocurrency exchange that restores user anonymity for the first time.
Since the platform knows highly sensitive user private information such as passport number, bank information etc, linking all (on-chain) transactions raises a serious privacy concern.
We also ensure that the user cannot double spend, and the user has to properly report accumulated profit for tax purposes, even in the private setting.
arXiv Detail & Related papers (2023-09-04T15:33:46Z) - PTTS: Zero-Knowledge Proof-based Private Token Transfer System on Ethereum Blockchain and its Network Flow Based Balance Range Privacy Attack Analysis [0.0]
We propose a Private Token Transfer System (PTTS) for the public blockchain.
For the proposed framework, zero-knowledge based protocol has been designed using Zokrates and integrated into our private token smart contract.
In the second part of the paper, we provide security and privacy analysis including the replay attack and the balance range privacy attack.
arXiv Detail & Related papers (2023-08-29T09:13:31Z) - The Design Principle of Blockchain: An Initiative for the SoK of SoKs [0.0]
Decentralized AI can empower to be more trustworthy by creating a decentralized trust of privacy, security, and audibility.
However, systematic studies on the design principle of AI as a trust engine for an integrated society of Cyber-Physical-System are still absent.
arXiv Detail & Related papers (2023-01-01T21:57:25Z) - Summarizing and Analyzing the Privacy-Preserving Techniques in Bitcoin and other Cryptocurrencies [0.6138671548064355]
We present some well-known attacks and analysis techniques that have compromised the privacy of Bitcoin and many other similar.
We also analyze and study different privacy-preserving algorithms and the problems these algorithms manage to solve.
arXiv Detail & Related papers (2021-09-16T00:24:19Z) - Second layer data governance for permissioned blockchains: the privacy
management challenge [58.720142291102135]
In pandemic situations, such as the COVID-19 and Ebola outbreak, the action related to sharing health data is crucial to avoid the massive infection and decrease the number of deaths.
In this sense, permissioned blockchain technology emerges to empower users to get their rights providing data ownership, transparency, and security through an immutable, unified, and distributed database ruled by smart contracts.
arXiv Detail & Related papers (2020-10-22T13:19:38Z) - Blockchain-based Privacy Preservation for 5G-enabled Drone
Communications [47.852641639155664]
5G-enabled drones have potential applications in a variety of both military and civilian settings.
There are security and privacy considerations underpinning 5G-enabled drone communications.
We will review existing blockchain-based solutions after introducing the architecture for 5G-enabled drone communications and blockchain.
arXiv Detail & Related papers (2020-09-07T15:27:52Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.