Distributed decentralized systems built using Blockchain technology are becoming increasingly popular and widespread. This is due to their reliability and security. But their transparency and openness, the lack of centralized administrative levers that can interfere and impose their decision, are the most important and attractive. Blockchain is able to provide completely anonymous, decentralized and free (uncontrolled) storage of any digital assets: from electronic money, such as cryptocurrencies, to secure property inventories and election registers. Therefore, further intensive implementation of this technology in various applications should be expected, as Blockchain implements a reliable and secure way to store distributed data in the decentralized environment. This is achieved through the use of various cryptographic transformations. This section analyzes the promising methods and mechanisms of cryptographic transformation that can be used in a decentralized Blockchain environment to provide various security services, including confidentiality, integrity, accessibility, indisputability, both users and elements/nodes of a decentralized system, etc. The section considers and investigates algorithms and protocols of homomorphic encryption, ring signatures, protocols with zero disclosure, principles of construction of anonymous secure networks, etc.
Cryptographic Transformations in a Decentralized Blockchain Environment
Kuznetsov
;
2022-01-01
Abstract
Distributed decentralized systems built using Blockchain technology are becoming increasingly popular and widespread. This is due to their reliability and security. But their transparency and openness, the lack of centralized administrative levers that can interfere and impose their decision, are the most important and attractive. Blockchain is able to provide completely anonymous, decentralized and free (uncontrolled) storage of any digital assets: from electronic money, such as cryptocurrencies, to secure property inventories and election registers. Therefore, further intensive implementation of this technology in various applications should be expected, as Blockchain implements a reliable and secure way to store distributed data in the decentralized environment. This is achieved through the use of various cryptographic transformations. This section analyzes the promising methods and mechanisms of cryptographic transformation that can be used in a decentralized Blockchain environment to provide various security services, including confidentiality, integrity, accessibility, indisputability, both users and elements/nodes of a decentralized system, etc. The section considers and investigates algorithms and protocols of homomorphic encryption, ring signatures, protocols with zero disclosure, principles of construction of anonymous secure networks, etc.I documenti in IRIS sono protetti da copyright e tutti i diritti sono riservati, salvo diversa indicazione.