Abstract
We present on/off-Blockchain schemes for storing private data within the framework of public Blockchains that conceal its content and origin, spreading the data using information dispersal algorithm (IDA) [5] for preserving storage efficiency.
We thank the Lynne and William Frankel Center for Computer Science, the Rita Altura Trust Chair in Computer Science. This research was also partially supported by a grant from the Ministry of Science and Technology, Israel & the Japan Science and Technology Agency (JST), and the German Research Funding Organization (DFG, Grant#8767581199).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Alon, N., Kaplan, H., Krivelevich, M., Malkhi, D., Stern, J.P.: Addendum to “scalable secure storage when half the system is faulty”. Inf. Comput. 205(7), 1114–1116 (2007)
CoinDesk: How to store your bitcoin (2017)
Krawczyk, H.: Secret sharing made short. In: Stinson, D.R. (ed.) CRYPTO 1993. LNCS, vol. 773, pp. 136–146. Springer, Heidelberg (1994). https://doi.org/10.1007/3-540-48329-2_12
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Cryptography Mailing list, March 2009. https://metzdowd.com
Rabin, M.O.: Efficient dispersal of information for security, load balancing, and fault tolerance. J. ACM 36(2), 335–348 (1989)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Wuille, P.: Hierarchical deterministic wallets (2012)
Zamani, M., Movahedi, M., Raykova, M.: RapidChain: scaling blockchain via full sharding. In: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, CCS 2018, pp. 931–948. ACM, New York (2018)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Dolev, S., Poleg, Y. (2019). Beyond Replications in Blockchain. In: Dolev, S., Hendler, D., Lodha, S., Yung, M. (eds) Cyber Security Cryptography and Machine Learning. CSCML 2019. Lecture Notes in Computer Science(), vol 11527. Springer, Cham. https://doi.org/10.1007/978-3-030-20951-3_9
Download citation
DOI: https://doi.org/10.1007/978-3-030-20951-3_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-20950-6
Online ISBN: 978-3-030-20951-3
eBook Packages: Computer ScienceComputer Science (R0)