Wireless Communications and Mobile Computing

Emerging Technologies towards Improving Confidentiality and Privacy in Blockchain


Publishing date
01 Aug 2022
Status
Closed
Submission deadline
01 Apr 2022

Lead Editor

1Nanjing University of Finance and Economics, Nanjing, China

2University of Surrey, Guilford, UK

3Southeast University, Nanjing, China

4University of Wollongong, Wollongong, Australia

This issue is now closed for submissions.

Emerging Technologies towards Improving Confidentiality and Privacy in Blockchain

This issue is now closed for submissions.

Description

Blockchain, originally applied in bitcoin and other cryptocurrencies, is a decentralized, public, and immutable ledger which is used to record the process of transactions and digital asset by applying decentralization and cryptographic technologies. Since it provides traceability, transparency, and tradability, blockchain is a promising and revolutionary technology and has been used into various application fields (e.g., finance, e-health, IoT, etc.). Since its decentralization and trustless nature, blockchain technology has leaded to new opportunities and benefit businesses. According to ReportLiner, the global market size of blockchain is expected to grow from USD 3.0 billion in 2020 to USD 39.7 billion by 2025, at a dramatic compound annual growth rate (CAGR) of 67.3% during 2020-2025. The advent of blockchain and related technologies are changing economics.

Being different from public-key infrastructure where a public key is bound with an identity by a certificate generated by a central authority, a user generates her secret-public key pair and uses it independently without any authentication due to the decentralization feature of blockchain. Furthermore, due to the transparency feature, transaction details and address are public visible in blockchain. However, transaction details and address are sensitive in some application scenarios, such as smart contract, e-health, e-government, etc. Additionally, to protect privacy, some technologies were adopted (e.g., pseudonym) while malicious uses abused it to conduct illegal transactions without being identified (e.g., ransom). With the popularity of blockchain, security and privacy issues have been the primary concerns of blockchain users.

This Special Issue aims to bring together original research and review articles discussing new techniques and methods which can be applied to improve transactions’ confidentiality and users’ privacy in blockchain. We welcome submissions discussing how to support availability and accountability. In addition, research mentioning techniques and methods which support privacy-preserving computing and balance the relationship between privacy and accountability are also considered.

Potential topics include but are not limited to the following:

  • Access control in blockchain
  • Accumulator in blockchain
  • Anonymous credential in blockchain
  • Attribute-based encryption in blockchain
  • Consensus algorithm in blockchain
  • Group signature in blockchain
  • Homomorphic encryption in blockchain
  • Multi-signature in blockchain
  • Multiple party computation in blockchain
  • Privacy-preserving authentication in blockchain
  • Pseudonym in blockchain
  • Ring signature in blockchain
  • Zero-knowledge proof in blockchain
  • Zero-knowledge succinct non-interactive arguments of knowledge (zk-SNARKs) in blockchain
  • Unlinkability in blockchain

Articles

  • Special Issue
  • - Volume 2022
  • - Article ID 4467917
  • - Research Article

Formal Modelling of PBFT Consensus Algorithm in Event-B

Jie Li | Kai Hu | ... | Yafei Ye
  • Special Issue
  • - Volume 2022
  • - Article ID 8698009
  • - Research Article

A Consensus Algorithm Based on Risk Assessment Model for Permissioned Blockchain

Xiaohui Zhang | Mingying Xue | Xianghua Miao
  • Special Issue
  • - Volume 2022
  • - Article ID 6998046
  • - Research Article

Blockchain-Based Self-Auditing Scheme with Batch Verification for Decentralized Storage

Zhonghao Yuan | Jiaojiao Wu | ... | Jianfeng Wang
  • Special Issue
  • - Volume 2022
  • - Article ID 4618007
  • - Research Article

The Applications of Blockchain in the Covert Communication

Bangyao Du | Debiao He | ... | Qi Feng
  • Special Issue
  • - Volume 2022
  • - Article ID 7125472
  • - Research Article

RBSmix: A Regulatable Privacy-Preserving Method for Cryptocurrency

Rongyu Xiao | Guozi Sun | ... | Puhe Hao
  • Special Issue
  • - Volume 2022
  • - Article ID 6467866
  • - Research Article

An Anonymous Verifiable Random Function with Applications in Blockchain

Shuang Yao | Dawei Zhang
  • Special Issue
  • - Volume 2022
  • - Article ID 3923597
  • - Research Article

A Fine-Grained Medical Data Sharing Scheme with Ciphertext Reencryption

Jiahao Chen | Jingwei Wang | ... | Jianting Ning
  • Special Issue
  • - Volume 2022
  • - Article ID 1137130
  • - Research Article

Housing Rental Scheme Based on Redactable Blockchain

Chunli Wang | Wensheng Jia | Yuling Chen
  • Special Issue
  • - Volume 2022
  • - Article ID 1040662
  • - Research Article

Blockchain Data Privacy Protection and Sharing Scheme Based on Zero-Knowledge Proof

Tao Feng | Pu Yang | ... | Rong Ma
  • Special Issue
  • - Volume 2022
  • - Article ID 5721212
  • - Research Article

An Immunity Passport Scheme Based on the Dual-Blockchain Architecture for International Travel

Hancheng Gao | Haoyu Ji | ... | Luo Jian
Wireless Communications and Mobile Computing
Publishing Collaboration
More info
Wiley Hindawi logo
 Journal metrics
See full report
Acceptance rate11%
Submission to final decision151 days
Acceptance to publication66 days
CiteScore2.300
Journal Citation Indicator-
Impact Factor-
 Submit Check your manuscript for errors before submitting

We have begun to integrate the 200+ Hindawi journals into Wiley’s journal portfolio. You can find out more about how this benefits our journal communities on our FAQ.