Privacy and Confidentiality in Blockchains
dev
Updated on
Share:
Ahead of a Hyperledger Architecture Working Group meeting on Privacy and Confidentiality at Oracle HQ. We contributed reprised research into the Connections between Memory Safety and Privacy/Confidentiality. Making well informed choices can reduce the surface attack area. Allowing for clear focus on adversarial consensus models.
- (Adaptive Byzantine adversary) the adversary can actively and adaptively control up to k nodes (cumulatively) on the network.
- (Selective Byzantine adversary) the adversary can selectively corrupt k nodes at the beginning of the protocol. All other nodes are assumed to be honest.
- (Adaptive crash fault tolerance) the adversary may cause up to k nodes to crash or misbehave, but may not induce Byzantine faults.
- (Honest but curious) the adversary will look at any exposed data, but will not attempt to crash or compromise any nodes
CliveB