
Int J Performability Eng ›› 2026, Vol. 22 ›› Issue (1): 10-18.doi: 10.23940/ijpe.26.01.p2.1018
Previous Articles Next Articles
Ramya Rajamanickama,*, Renu Mishraa, and Saumya Chaturvedib
Submitted on
;
Revised on
;
Accepted on
Contact:
*E-mail address: ramya.rajamanickam@nic.in
Ramya Rajamanickam, Renu Mishra, and Saumya Chaturvedi. Establishing a Privacy Index: Assessing Blockchain Privacy and Security in Decentralized Systems [J]. Int J Performability Eng, 2026, 22(1): 10-18.
Add to citation manager EndNote|Reference Manager|ProCite|BibTeX|RefWorks
| [1] Jia W., Xie T., andWang B., 2024. A privacy-preserving scheme with multi-level regulation compliance for blockchain. [2] Korff D.,2023. The indian digital personal data protection act, 2023, viewed from a european perspective. [3] Hassan S.K., andIbrahim M.A., 2024. Enhancement of security and privacy of smart contracts in blockchain. [4] Liu Y., Wang C., andMa Y., 2024. DL4SC: a novel deep learning-based vulnerability detection framework for smart contracts. [5] Gustina Zainal M.A., Cosio Borda R.F., Abd Algani Y.M., Yakkala B., Sanjith S., Muda I., Kalaichelvi T., andMahendran M., 2022. A decentralized autonomous personal data management system in banking sector. [6] Zhang Z., Li W., Liu H., andLiu J., 2020. A refined analysis of zcash anonymity. [7] Faonio A., Fiore D., andRusso L., 2024. Real-world universal zkSNARKs are non-malleable. InProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, pp. 3138-3151. [8] Hossain M.B., Rahayu M., Ali M.A., Huda S., Kodera Y., andNogami Y., 2024. A blockchain-based approach with zk-snarks for secure email applications. [9] Wu S., Yu Z., Wang D., Zhou Y., Wu L., Wang H., andYuan X., 2023. Defiranger: detecting defi price manipulation attacks. [10] Pillai B., Hóu Z., Biswas K., Bui V., andMuthukkumarasamy V., 2022. Blockchain interoperability: performance and security trade-offs. InProceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, pp. 1196-1201. [11] Naya-Plasencia, M., and Schrottenloher, A., 2020, May. Optimal merging in quantum k-xor and k-sum algorithms. In Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cham: Springer International Publishing, pp. 311-340. [12] Goldfeder S., Kalodner H., Reisman D., andNarayanan A., 2017. When the cookie meets the blockchain: privacy risks of web payments via cryptocurrencies. [13] Buterin V., Illum J., Nadler M., Schär F., andSoleimani A., 2024. Blockchain privacy and regulatory compliance: towards a practical equilibrium. [14] Qiu Y., Liu Y., Li X., andChen J., 2020. A novel location privacy-preserving approach based on blockchain. [15] Chhabra A., Saha R., andKumar G., 2024. PRIBANI: a privacy-ensured framework for blockchain transactions with information retrieval. [16] Han M., Li L., Xie Y., Wang J., Duan Z., Li J., andYan M., 2018. Cognitive approach for location privacy protection. [17] He M., Zeng G., Zhang J., Zhang L., Chen Y., andYiu S., 2018. A new privacy-preserving searching model on blockchain. InInternational Conference on Information Security and Cryptology, pp. 248-266. [18] Kapsoulis N., Psychas A., Litke A., andVarvarigou T., 2024. Blockchain privacy: fundamental aspects and challenges for the future internet data sharing. [19] Wang G., Zhang S., Yu T., andNing Y., 2021. A systematic overview of blockchain research. [20] Yan G.,2023. Blockchain based data security mechanism for vehicular networks. In2023 6th International Conference on Electronics Technology (ICET), pp. 658-663. |
| [1] | Gagandeep Singh Kahlon, Rajeev Kumar Bedi, and S K Gupta. A Comparative Review on Blockchain and Anonymization Based Techniques for Security in Cloud Computing [J]. Int J Performability Eng, 2025, 21(9): 473-484. |
| [2] | Ramya Rajamanickam, Renu Mishra, and Saumya Chaturvedi. A Hybrid Cryptographic Framework for Privacy-Preserving and Securing Blockchain Transactions [J]. Int J Performability Eng, 2025, 21(6): 308-315. |
| [3] | Megha Jain and Dhiraj Pandey. HRCM: An Approach using Blockchain Technology in Healthcare-Record Chain Management [J]. Int J Performability Eng, 2025, 21(1): 56-64. |
| [4] | Jain Megha and Pandey Dhiraj. Blockchain-Driven Methods for Fake Product Identification [J]. Int J Performability Eng, 2024, 20(10): 631-639. |
| [5] | Divya Singhal, Laxmi Ahuja, and Ashish Seth. An Insight into Combating Security Attacks for Smart Grid [J]. Int J Performability Eng, 2022, 18(7): 512-520. |
| [6] | Hongjing Deng, Xuan Zhang, Jiahao Jiang, Jie Wang, and Hexiang Huang. Privacy Protection of Personal Education Information on Blockchain [J]. Int J Performability Eng, 2022, 18(5): 317-328. |
| [7] | Zhihong Liang, Na Du, Yuxiang Huang, Kai Liu, and Zhichang Guo. Performance Improvement Scheme of Blockchain Consensus for Supply Chain [J]. Int J Performability Eng, 2022, 18(3): 158-166. |
| [8] | Guoqiang Gong, Cedric Lessoy, Chuan Lu, and Ke Lv. Differential Privacy Spatial Decomposition via Flattening Kd-Tree [J]. Int J Performability Eng, 2020, 16(7): 1058-1066. |
| [9] | Zengyu Cai, Zuodong Wu, Jianwei Zhang, and Wenqian Wang. A BD Group Key Negotiation Protocol based on Clustering Technology [J]. Int J Performability Eng, 2020, 16(6): 875-882. |
| [10] | Guoqiang Gong, Xin Cao, Ye Jin, Xiaobo Ding, and Ke Lv. K-Community Anonymity Approach for Social Network Data [J]. Int J Performability Eng, 2020, 16(10): 1665-1673. |
| [11] | Guoqiang Zhou, Xiulian Tang, and Shui Qin. Adaptive Grid Decomposition Algorithm based on Standard Deviation Circle Radius [J]. Int J Performability Eng, 2019, 15(8): 2145-2152. |
| [12] | Ge Jiao, Sheng Zhou, Lang Li, and Yi Zou. Hybrid Chaotic Encryption Algorithm for Securing DICOM Systems [J]. Int J Performability Eng, 2019, 15(5): 1436-1444. |
| [13] | Liang Zhihong, Huang Yuxiang, Cao Zechun, Liu Tiancheng, and Wang Yuehua. Creativity in Trusted Data: Research on Application of Blockchain in Supply Chain [J]. Int J Performability Eng, 2019, 15(2): 526-535. |
| [14] | Yifeng Yin, Tingjun Zhang, Chaofei Hu, and Yong Gan. Smart Contract Receipt based on Virtual Iterative Function [J]. Int J Performability Eng, 2019, 15(11): 3016-3023. |
| [15] | Meijuan Wang, Song Huang, Changyou Zheng, and Hui Li. XML Privacy Preserving Model based on Dynamic Context [J]. Int J Performability Eng, 2018, 14(12): 3206-3219. |
|