SoK of Used Cryptography in Blockchain

被引:65
|
作者
Raikwar, Mayank [1 ]
Gligoroski, Danilo [1 ]
Kralevska, Katina [1 ]
机构
[1] Norwegian Univ Sci & Technol NTNU, Dept Informat Secur & Commun Technol, N-7491 Trondheim, Norway
关键词
Blockchain; cryptography; hash function; proof-of-work; consensus; signature; encryption; zero-knowledge proofs; access control; accumulator; ACCESS-CONTROL; PROOF; SECURE; ENCRYPTION; INTERNET;
D O I
10.1109/ACCESS.2019.2946983
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The underlying fundaments of blockchain are cryptography and cryptographic concepts that provide reliable and secure decentralized solutions. Although many recent papers study the use-cases of blockchain in different industrial areas, such as finance, health care, legal relations, IoT, information security, and consensus building systems, only few studies scrutinize the cryptographic concepts used in blockchain. To the best of our knowledge, there is no Systematization of Knowledge (SoK) that gives a complete picture of the existing cryptographic concepts which have been deployed or have the potential to be deployed in blockchain. In this paper, we thoroughly review and systematize all cryptographic concepts which are already used in blockchain. Additionally, we give a list of cryptographic concepts which have not yet been applied but have big potentials to improve the current blockchain solutions. We also include possible instantiations of these cryptographic concepts in the blockchain domain. Last but not least, we explicitly postulate 21 challenging problems that cryptographers interested in blockchain can work on.
引用
收藏
页码:148550 / 148575
页数:26
相关论文
共 50 条
  • [31] Security aspects of the authentication used in quantum cryptography
    Cederlof, Jorgen
    Larsson, Jan-Ake
    FOUNDATIONS OF PROBABILITY AND PHYSICS - 4, 2007, 889 : 162 - +
  • [32] Security aspects of the authentication used in quantum cryptography
    Cederlof, Jorgen
    Larsson, Jan-Ake
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (04) : 1735 - 1741
  • [33] IoT Security Challenges: Cloud and Blockchain, Postquantum Cryptography, and Evolutionary Techniques
    Balogh, Stefan
    Gallo, Ondrej
    Ploszek, Roderik
    Spacek, Peter
    Zajac, Pavol
    ELECTRONICS, 2021, 10 (21)
  • [34] Secure gene profile data processing using lightweight cryptography and blockchain
    Mahajan, Hemant
    Reddy, K. T. V.
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (03): : 2785 - 2803
  • [35] A Survey of Blockchain Security Technologies Based on Attribute-based Cryptography
    Chen L.
    Xiang F.
    Sun Z.-X.
    Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2021, 49 (01): : 192 - 200
  • [36] Secured and decentralized system for e-voting with hybrid cryptography and Blockchain
    Vivek, M.
    Anusuya, K., V
    IETE JOURNAL OF RESEARCH, 2024, 70 (11) : 8278 - 8290
  • [37] Blockchain-based cryptography model to preserve privacy for smart contracts
    Priyanka
    Keswani, Bright
    Hussain, Rashid
    JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2021, 24 (08): : 2279 - 2289
  • [38] Securing IoT devices: A novel approach using blockchain and quantum cryptography
    Dhar, Shalini
    Khare, Ashish
    Dwivedi, Ashutosh Dhar
    Singh, Rajani
    INTERNET OF THINGS, 2024, 25
  • [39] Review on Cryptography and Network Security Zero Knowledge Technique in Blockchain Technology
    Chandran, Anjana S.
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (02)
  • [40] Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
    Kosba, Ahmed
    Miller, Andrew
    Shi, Elaine
    Wen, Zikai
    Papamanthou, Charalampos
    2016 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2016, : 839 - 858