Survey of Confidentiality and Privacy Preserving Technologies for Blockchains Danny Yang, Jack Gavigan, Zooko Wilcox-O’Hearn, R3 Research
November 14, 2016
1 Introduction 2 1.1 Confidentiality and Privacy versus Security 3 1.2 Underlying Technologies 4 1.3 Confidentiality and Privacy of Bitcoin and Ethereum Transactions 8
2 Comparison of key technologies and implementations 10 2.1 Efficiency & Scalability Implications 11 2.2 Restricting Read Access to the Blockchain 11 2.3 Storing Sensitive Information “Off-chain” 11 2.4 One-time Use Payment Addresses 12 2.5 Stealth Addresses 13 2.6 Mixing 14 2.7 Sidechains & State Channels 16 2.8 Pedersen Commitments with Range Proofs 17 2.9 Ring Signatures 19 2.10 Zero-Knowledge Proofs 22
3 Confidentiality and Privacy of Smart Contracts 25 3.1 Hawk 25 3.2 Enigma 26
4 Conclusion 27
5 Appendix 28 5.1 Quantum Computing 28 5.2 Introduction to RSA 28 5.3 Digital Signature Example 31 5.4 Demonstrating RSA’s Multiplicative Homomorphism 32