Education, Science, Technology, Innovation and Life
Open Access
Sign In

A survey of privacy protection in distributed systems based on blockchain

Download as PDF

DOI: 10.23977/jeis.2023.080504 | Downloads: 12 | Views: 224


Zhuohong Zhang 1


1 Guangdong University of Science and Technology, Guangzhou, 510000, China

Corresponding Author

Zhuohong Zhang


In recent years, with the development of blockchain technology, the sharp increase in the amount of data and the improvement of user needs, various kinds of security problems occur frequently, and the application research on the privacy protection of blockchain in distributed systems is more and more extensive. This paper summarizes three types of distributed system privacy protection research methods based on blockchain, including privacy protection research based on lattice cryptography algorithm, privacy protection research based on homomorphic encryption algorithm and privacy protection research based on state secret algorithm.


Blockchain; Distributed system; Cell cipher algorithm; Homomorphic encryption algorithm; State secret algorithm


Zhuohong Zhang, A survey of privacy protection in distributed systems based on blockchain. Journal of Electronics and Information Science (2023) Vol. 8: 26-30. DOI:


[1] Zheng Z, Xie S, Dai H N, et al. Blockchain challenges and opportunities:A survey[J]. International Journal of Web and Grid Services, 2018, 14(4):352-375. 
[2] Feng Q, He D, Zeadally S, et al. A survey on provacy protection in blockchain system[J]. Journal of Network and Computer Applications, 2019, 126:45-58. 
[3] Shor P W. Polynomial-time algotithms for prime factorzation and discrete logarithms on a quantum computer [J]. SIAM review, 1999, 41(2):303-332. 
[4] Li Zhaoyang. Research on Privacy protection method of distributed system based on Blockchain [D]. Beijing University of Posts and Telecommunications, 2021. DOI:10. 26969/d. cnki. gbydu. 2021. 000213. 
[5] Zyskind G, Nathan O. Decentralizing Privacy:Using blockchain to protect personal data [C]. 2015 IEEE Security and Privacy Workshops. IEEE, 2015:180-184. 
[6] Wang Zhaohui, Zhang Zhenfeng. Overview of SM2 Elliptic Curve public key cryptography [J]. Information Security Research, 2016, 2(11):972-982. 
[7] Cao Sui. Research on Distributed Privacy Data protection Technology based on blockchain [D]. Guangdong University of Technology, 2022, DOI:10. 270-29/d. cnki. ggdgu. 2022. 000400. 
[8] Wang Y X, Luo F J, Dong Z Y, et al. Distributed mater data aggregation framework based on blockchain and homomorphic encrytion[J]. IET Cyber-phys Syst, 2019, 4:30-37. 
[9] Siguang Chen, Li Yang, Chuanxin Zhao, et al. Double-blockchain assisted secure and anonymous data aggregation for fog-enabled smart grid[J]. Engineering, 2022, 8(1):159-169. 
[10] Shi Xinyao, Wang Jingyu, Liu Lixin. Distributed data aggregation scheme for privacy protection in Internet of Things environment [J/OL]. Miniature microcomputer system: 1-9 [2023-10-14]. http://kns. cnki. net/kcms/ detail/21. 1106. tp. 20230605. 1702. 014.html

Downloads: 5472
Visits: 235996

Sponsors, Associates, and Links

All published work is licensed under a Creative Commons Attribution 4.0 International License.

Copyright © 2016 - 2031 Clausius Scientific Press Inc. All Rights Reserved.