Abstract

Homomorphic Encryption and Zero Knowledge Proofs are two trending concepts that are widely popular as data privacy preservation techniques in a wide variety of applications, especially in those associated with the newly evolved block chain technology which are immutable, distributed and secure. Zero knowledge proof is a cryptographic technique can provide proof that a certain statement is correct, without revealing any details about the statement, while homomorphic encryption allows to perform computations on encrypted data without decrypting it. This article explores the significance of the data privacy aspect provided by both ZKP and Homomorphic Encryption and how it can be effectively used to improvise the privacy of blockchain applications in various domains.

Highlights

  • Homomorphic Encryption and Zero Knowledge Proofs are two trending concepts that are widely popular as data privacy preservation techniques in a wide variety of applications, especially in those associated with the newly evolved block chain technology which are

  • The first among them were Non-Interactive ZKP, a modification of the existing ZKP, removing the inconvenience of successive interaction between the communicating parties [3]. In start of this millennium, range proofs[4] were introduced, which proves that a piece of information lies within a definite range, useful in wide series applications to keep the anonymity of relevant attributes like income or age[5].In the year 2012, zk-SNARK, a better version of NIZK with short proofs and fast verification time was introduced [6].Recently in 2017 Bullet proofs with very short proof size became popular mainly due to the lack of trusted setup, which was a gruelling concern with regard to security for its predecessors

  • This new version had bigger proof sizes when compared to zk-SNARK, making it less compatible for many applications

Read more

Summary

Introduction

Homomorphic Encryption and Zero Knowledge Proofs are two trending concepts that are widely popular as data privacy preservation techniques in a wide variety of applications, especially in those associated with the newly evolved block chain technology which are. Encryption and how it can be effectively used to improvise the privacy of blockchain applications in various domains. The incorporation of cryptographic techniques in blockchain had added to the security of data.

Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.