Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Save more on your purchases!
Savings automatically calculated. No voucher code required
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Mastering Blockchain - Fourth Edition

You're reading from  Mastering Blockchain - Fourth Edition

Product type Book
Published in Mar 2023
Publisher Packt
ISBN-13 9781803241067
Pages 818 pages
Edition 4th Edition
Languages
Concepts
Author (1):
Imran Bashir Imran Bashir
Profile icon Imran Bashir

Table of Contents (24) Chapters

Preface 1. Blockchain 101 2. Decentralization 3. Symmetric Cryptography 4. Asymmetric Cryptography 5. Consensus Algorithms 6. Bitcoin Architecture 7. Bitcoin in Practice 8. Smart Contracts 9. Ethereum Architecture 10. Ethereum in Practice 11. Tools, Languages, and Frameworks for Ethereum Developers 12. Web3 Development Using Ethereum 13. The Merge and Beyond 14. Hyperledger 15. Tokenization 16. Enterprise Blockchain 17. Scalability 18. Blockchain Privacy 19. Blockchain Security 20. Decentralized Identity 21. Decentralized Finance 22. Blockchain Applications and What’s Next 23. Index

Cryptographic constructs and blockchain technology

Now, we'll present some advanced topics in cryptography that not only are important on their own but are also relevant to blockchain technology due to their various applications in this space.

Homomorphic encryption

Usually, public key cryptosystems, such as RSA, are multiplicative homomorphic or additive homomorphic, such as the Paillier cryptosystem, and are called partially homomorphic systems. Additive Partially Homomorphic Encryptions (PHEs) are suitable for e-voting and banking applications.

Until recently, there has been no system that supported both operations, but in 2009, a fully homomorphic system was discovered by Craig Gentry. As these schemes enable the processing of encrypted data without the need for decryption, they have many different potential applications, especially in scenarios where maintaining privacy is required, but data is also mandated to be processed by potentially untrusted parties, for example, cloud...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}