Privacy and Confidentiality in Blockchains

dev
Updated on

Ahead of a Hyperledger Architecture Working Group meeting on Privacy and Confidentiality at Oracle HQ. We contributed reprised research into the Connections between Memory Safety and Privacy/Confidentiality. Making well informed choices can reduce the surface attack area. Allowing for clear focus on adversarial consensus models.

  1. (Adaptive Byzantine adversary) the adversary can actively and adaptively control up to k nodes (cumulatively) on the network.
  2. (Selective Byzantine adversary) the adversary can selectively corrupt k nodes at the beginning of the protocol. All other nodes are assumed to be honest.
  3. (Adaptive crash fault tolerance) the adversary may cause up to k nodes to crash or misbehave, but may not induce Byzantine faults.
  4. (Honest but curious) the adversary will look at any exposed data, but will not attempt to crash or compromise any nodes

CliveB