Requirements Category
Encryption

Using robust encryption algorithms is essential for securing sensitive data in blockchain systems, whether stored on-chain or off-chain. For instance, integrating the Twofish encryption algorithm with blockchain technology has been proposed to secure medical data stored in cloud environments, enhancing security performance while reducing execution time (arxiv.org). Additionally, combining Advanced Encryption Standard (AES) encryption with Ethereum smart contracts and cloud storage has been explored to detect data security issues, thereby enhancing data integrity and security in cloud environments (repository.uwl.ac.uk). Moreover, a hybrid key-generation approach called Identity and Attribute-Based Honey Encryption (IABHE), combined with Deep Spiking Neural Networks (DSNN), has been proposed for secure data sharing in multi-party blockchain-based systems, incorporating various security functionalities to ensure data protection (mdpi.com). Furthermore, the Multi-Authority Approach to Transaction Systems for Interoperating Applications (MARTSIA) employs Multi-Authority Attribute-Based Encryption (MA-ABE) to enable read-access control over shared data at the level of message parts in public blockchains, allowing user-defined policies to determine data accessibility and enhancing data confidentiality (arxiv.org). These studies highlight the importance of selecting appropriate encryption algorithms and integrating them effectively within blockchain architectures to protect sensitive information.

https://arxiv.org/abs/2309.11770

https://repository.uwl.ac.uk/id/eprint/10616/1/Blockchain%20Security%20Encryption%20to%20Preserve%20Data..pdf