799 research outputs found
A privacy-preserving, decentralized and functional Bitcoin e-voting protocol
Bitcoin, as a decentralized digital currency, has caused extensive research
interest. There are many studies based on related protocols on Bitcoin,
Bitcoin-based voting protocols also received attention in related literature.
In this paper, we propose a Bitcoin-based decentralized privacy-preserving
voting mechanism. It is assumed that there are n voters and m candidates. The
candidate who obtains t ballots can get x Bitcoins from each voter, namely nx
Bitcoins in total. We use a shuffling mechanism to protect voter's voting
privacy, at the same time, decentralized threshold signatures were used to
guarantee security and assign voting rights. The protocol can achieve
correctness, decentralization and privacy-preservings. By contrast with other
schemes, our protocol has a smaller number of transactions and can achieve a
more functional voting method.Comment: 5 pages;3 figures;Smartworld 201
The Evolution of Embedding Metadata in Blockchain Transactions
The use of blockchains is growing every day, and their utility has greatly
expanded from sending and receiving crypto-coins to smart-contracts and
decentralized autonomous organizations. Modern blockchains underpin a variety
of applications: from designing a global identity to improving satellite
connectivity. In our research we look at the ability of blockchains to store
metadata in an increasing volume of transactions and with evolving focus of
utilization. We further show that basic approaches to improving blockchain
privacy also rely on embedding metadata. This paper identifies and classifies
real-life blockchain transactions embedding metadata of a number of major
protocols running essentially over the bitcoin blockchain. The empirical
analysis here presents the evolution of metadata utilization in the recent
years, and the discussion suggests steps towards preventing criminal use.
Metadata are relevant to any blockchain, and our analysis considers primarily
bitcoin as a case study. The paper concludes that simultaneously with both
expanding legitimate utilization of embedded metadata and expanding blockchain
functionality, the applied research on improving anonymity and security must
also attempt to protect against blockchain abuse.Comment: 9 pages, 6 figures, 1 table, 2018 International Joint Conference on
Neural Network
- …