Blockchain from the Cryptographic Perspective of Privacy and Anonymisation for Sustainability

Year : 2024 | Volume :11 | Issue : 03 | Page : –
By

Sharique Jamal,

Sherin Zafar,

  1. Student, Department of Computer Science Engineering, Jamia Hamdard University, (SEST), New Delhi, India
  2. Assistant Professor, Department of Computer Science Engineering, Jamia Hamdard University, New Delhi, India

Abstract

This paper delves into the fascinating intersection of cryptography and blockchain technology. It explores the implementation of blockchain in cryptography, highlighting how cryptographic algorithms improve the security of blockchain systems. This paper looks at various issues such as why cryptographic methods in use with blockchain networks guarantee data security, confidentiality, and credibility. It also examines the relationship between consensus algorithms and cryptography, shedding light on how these elements work together to maintain the trust and reliability of blockchain systems. Furthermore, this paper explores the role of smart contracts in enhancing security within blockchain networks. It discusses how smart contracts can leverage cryptographic techniques to mitigate risks and vulnerabilities associated with transactions and data storage on the blockchain. In addition to examining the implementation of cryptography in blockchain technology, this paper conducts a comprehensive literature review. Analysing existing research and studies on this subject matter aims to provide valuable insights into current advancements, challenges, and potential future directions for improving the security of blockchains through cryptographic algorithms. All in all, this study addresses important issues regarding risk management and improves overall blockchain security, making it a useful tool for scholars, practitioners, and enthusiasts interested in comprehending the complex relationship between cryptography and blockchain technology. Sustainability considerations are gaining significance in the rapidly advancing field of blockchain cryptography. Maintaining the security and environmental consciousness of the blockchain ecosystem requires balancing energy efficiency and cryptographic strength.

Keywords: Blockchain, Cryptography Algorithm, Blockchain Security, Preferences, Risk & Security, Smart Contracts

[This article belongs to Journal of Artificial Intelligence Research & Advances (joaira)]

How to cite this article:
Sharique Jamal, Sherin Zafar. Blockchain from the Cryptographic Perspective of Privacy and Anonymisation for Sustainability. Journal of Artificial Intelligence Research & Advances. 2024; 11(03):-.
How to cite this URL:
Sharique Jamal, Sherin Zafar. Blockchain from the Cryptographic Perspective of Privacy and Anonymisation for Sustainability. Journal of Artificial Intelligence Research & Advances. 2024; 11(03):-. Available from: https://journals.stmjournals.com/joaira/article=2024/view=177240

References

  1. Sharma, N., Prabhjot, & Kaur, H. (2017) ‘A Review of Information Security using Cryptography Technique’, International Journal of Advanced Research in Computer Science, 8(Special Issue), pp. 323-326.
  2. Preneel, B. (2010). Understanding Cryptography: A Textbook for Students and Practitioners. Springer.
  3. Katz, J. and Lindell, Y., 2008. Introduction to Modern Cryptography. London: Taylor & Francis Group, LLC.
  4. Khalifa, O. O., Islam, M. R., Khan, S., & Shebani, M. S. (2004). Communications cryptography. In RF and Microwave Conference, 2004. RFM 2004. Proceedings. Selangor.
  5. Jirwan, N., Singh, A., & Vijay, S. (2013). Review and Analysis of Cryptography Techniques. International Journal of Scientific & Engineering Research, 3(4), 1-6.
  6. Tayal, S., Gupta, N., Gupta, P., Goyal, D., & Goyal, M. (2017). A Review paper on Network Security and Cryptography. Advances in Computational Sciences and Technology, 10(5), 763-770.
  7. Gupta, A., & Walia, N. K. (2014). Cryptography Algorithms: A Review. International Journal of Engineering Development and Research, 2(2), 1667-1672.
  8. Massey, J. L. (1986). Cryptography—A selective survey. Digital Communications, 85, 3-25.
  9. Piper, F., & Murphy, S. (2002). Cryptography: A Very Short Introduction. Oxford University Press.
  10. Dooley, J. F. (2013). A Brief History of Cryptology and Cryptographic Algorithms. New York: Springer.
  11. Gennaro, R. (2006). IEEE Security & Privacy, 4(2), 64-67.
  12. Goldreich, O. (2004). Foundations of Cryptography: Basic Tools. Cambridge University Press.
  13. Aumasson, J. P. (2018). SERIOUS CRYPTOGRAPHY: A Practical Introduction to Modern Encryption. No Starch Press, Inc.
  14. Fernandez-Carames, T.M. and Fraga-Lamas, P., 2020. Towards post-quantum blockchain: A review on blockchain cryptography resistant to quantum computing attacks. IEEE access, 8, pp.21091-21116.
  15. Ferdous, M.S., Chowdhury, M.J.M. and Hoque, M.A., 2021. A survey of consensus algorithms in public blockchain systems for crypto-currencies. Journal of Network and Computer Applications, 182, p.103035.
  16. Alharby, M., & van Moorsel, A. (2019) . “Blockchain-Based Smart Contracts: A Systematic Mapping Study.” *Computers & Security*, 88, 101992.
  17. Zhang, K., Wang, X., & Cheng, X. (2020) . “Security and Privacy on Blockchain.” *ACM Computing Surveys (CSUR)*, 52(4), 1-34.
  18. Yaga, D., Mell, P., Roby, N., & Scarfone, K. (2019) . “Blockchain Technology Overview.” *National Institute of Standards and Technology*.

Regular Issue Subscription Review Article
Volume 11
Issue 03
Received 18/05/2024
Accepted 20/09/2024
Published 07/10/2024

Check Our other Platform for Workshops in the field of AI, Biotechnology & Nanotechnology.
Check Out Platform for Webinars in the field of AI, Biotech. & Nanotech.