SlideShare a Scribd company logo
Improving Privacy in Blockchain using
Homomorphic Encryption
Razi Rais | https://razibinrais.com
Who am I?
www.linkedin.com/in/razirais
Agenda
 Understand Privacy & Role of Homomorphic Encryption (HE)
 Blockchain & Zero-Knowledge Proofs (zk-SNARKS)
 Tools & Technologies
 Demos (Healthcare & identity)
Privacy
http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm
• Freedom from intrusion - being left alone
• Control of information about oneself
• Freedom from surveillance (from being followed,
tracked, watched, and eavesdropped upon)
Privacy | Encryption to Protect Data
Razi X?DE&7
Plaintext Encrypted
Privacy | Encryption Challenge
At Rest In Motion In Memory
X?DE&7 X?DE&7 Razi
e.g – BitLocker e.g - TLS ?
Privacy | Encryption Solution
At Rest In Motion
X?DE&7 X?DE&7 X?DE&7
e.g – BitLocker e.g - TLS Homomorphic
Encryption
In Memory
Homomorphic Encryption (HE) - 101
Allows you to perform operations on encrypted data
Addition & Multiplication
Quantum Resistant*
Slow – Requires lot of compute power
Homomorphic Encryption - Applications
HomomorphicEncryption.org
http://homomorphicencryption.org/white_papers/applications
_homomorphic_encryption_white_paper.pdf
Scenario | Healthcare
What's wrong with sending/sharing your blood results with the
3rd party (e.g. Research institutes, Law enforcement etc.)
Unnecessary exposure of data
Once results are shared they cannot be un-shared
Data breaches (you also don’t control data lifecycle)
Your DNA + PII = Ultimate Identity that can be tracked and use
with AI!
Scenario | Healthcare
Use Case
You want to participate in a healthcare research program that needs your
Glucose and Cholesterol levels
Problem
How to share data without revealing the actual values?
Scenario | Healthcare
Solution
1. Encrypt glucose and cholesterol levels on the client device (using
private key)
2. Send glucose and cholesterol levels (still encrypted) to the server
3. Processing is done by the server on encrypted values (using HE
and client’s public key)
4. Results are send back in encrypted format to the client
5. Client decrypt the values (using private key)
DEMO | Healthcare
Improve Privacy using HE
https://github.com/razi-rais/homomorphic-encryption
SDKs |Offchain
Microsoft | Simple Encrypted Arithmetic Library (SEAL)
https://www.microsoft.com/en-us/research/project/simple-encrypted-arithmetic-library
n1analytics
https://github.com/n1analytics/python-paillier
TFHE | Fast Fully Homomorphic Encryption Library over the Torus
https://github.com/tfhe/tfhe
More ..
Blockchain & Privacy Issues
Data on the blockchain is immutable
(write once– ready many)
PII (Personal Identifiable Information)
in plaintext should never be stored on blockchain
Solution?
Blockchain & Privacy
Store data off the chain (Database, IPFS etc.)
Step 1 - Encrypt Data (PII)
Step 2 - Hash Data
Step 3 – Store Hash on the chain
Blockchain & Privacy
Why not just store the encrypted data on the chain?
because..
Storage is expensive on the chain
Secret key exposure/hack will reveal encrypted data
Data storage is immutable
(so no turning back if data is exposed)
Scenario: Identity
What's wrong with the current Identity system?
It reveals too much information to 3rd party!
Lets take a closer look…
Scenario: Identity
Scenario
You need to proof that you are over 21 years
of age
Scenario: Identity
As usual you showed your ID to the 3rd party
(3rd party is some one who you don’t trust with PII.
E.g. receptionist, security guard etc. )
Scenario: Identity
What information was needed?
DOB
Picture
What information was revealed?
Address,
Sex
Height
Eye Color
Etc.
Scenario: Identity
One Possible Solution
Step 1 – DMV issues you proof that you are over 21 and
create smart contract for 3rd party to verify it.
Step 2 – You send a signed transaction to smart contract
with encrypted input (only you and DMV knows private
values)
Step 3 – Smart contract verify your proof and either rejects
or accepts it.
Step 4 – Third party uses result of smart contract (step#3)
to verify if your are over 21 or not.
Zero-knowledge Proof
Benefits
Minimal/No data discourse
Blockchain is used to verify (and record results) but data
always stays encrypted
One time proof can be used for more sensitive
transactions*
High Level Definition
It’s a method by which one party (the prover
“Razi”) can prove to another party
(the verifier ”Security Guard”) that he knows a
value x (DOB, attested by the DMV), without
conveying any information apart from the fact
that he knows the value x.
zk-SNARKs
Zk-SNARK  Zero-Knowledge Succinct Non-Interactive Argument of Knowledge
Zero-knowledge  Allows prover to prove to the verifier that a statement is true
without revealing any information beyond the validity of the statement itself
Succinct  Proof is short and easy to verify
Non-interactive  Proof does not require back-and-forth interaction between the
prover and the verifier
Argument of knowledge Proof attests not just that the statement is true, but also that
the prover knows why its true
zk-SNARKs – How it works
2. key generator ( lambda , program/circuit )  proving
key (pk) , verification key (vk)
1. program/circuit has public input (x) and
private input (witness or w)
3. prover ( pk , x , w )  proof
4. verifier( vk , x , proof)  { true | false }
Program written to work with
ZoKrates
DEMO | Identity
Using zk-SNARKs to proof age
https://github.com/razi-rais/blockchain-workshop/tree/master/zk-
SNARKs
Resources
Raziel: Private and Verifiable Smart Contracts on Blockchains
https://eprint.iacr.org/2017/878.pdf
Homomorphic Encryption Standard
https://projects.csail.mit.edu/HEWorkshop/HomomorphicEncryptionStandar
d2018.pdf
A Primer on Zero Knowledge Protocols
http://www.cs.ox.ac.uk/people/gerardo.simari/personal/publications/zkp-
simari2002.pdf

More Related Content

PDF
Brief Introduction to Blockchain Security
PPTX
Webinar: Enterprise Blockchain Radically Simplified with Truffle and Kaleido
PDF
Hashgraph as Code
PPTX
Smart Contract Testing
PDF
Challenges of Blockchain Technology for the Enterprise
PDF
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
PDF
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
PDF
IDC - Blockchain Threat Model
Brief Introduction to Blockchain Security
Webinar: Enterprise Blockchain Radically Simplified with Truffle and Kaleido
Hashgraph as Code
Smart Contract Testing
Challenges of Blockchain Technology for the Enterprise
Hashgraph vs Blockchain | Hedera Hashgraph Tutorial | Hashgraph Technology | ...
Blockchain Interview Questions and Answers | Blockchain Technology | Blockcha...
IDC - Blockchain Threat Model

What's hot (20)

PDF
Security Model of Blockchain
PDF
[JSDC 2021] Blockchain 101 for Frontend Engs
PDF
Alternative Consensus & Enterprise Blockchain
PDF
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
PDF
Security in the blockchain
PDF
Hyperledger whitepaper
PDF
Blockchain for Graduates | Technical Explanation
PDF
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
PPTX
Blockchain workshop 101
PDF
OSCON 2018 Getting Started with Hyperledger Indy
PPTX
Testing in the blockchain
PDF
Next-generation enterprise Ethereum managed services
PDF
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
PPTX
The Blockchain and the Future of Cybersecurity
PDF
Building a dApp on Tezos
PDF
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
PDF
Blockchin architecture & use cases -part-2
PDF
Privacy-preserving techniques using zero knowledge proof in public Ethereum
PPTX
Federated and legal identities in industrial and financial applications
PPTX
The future of data security and blockchain
Security Model of Blockchain
[JSDC 2021] Blockchain 101 for Frontend Engs
Alternative Consensus & Enterprise Blockchain
Blockchain for AI: Review and Open. Research Challenges K. SALAH, M. H. REHMA...
Security in the blockchain
Hyperledger whitepaper
Blockchain for Graduates | Technical Explanation
Outsmarting Smart Contracts - an essential walkthrough a blockchain security ...
Blockchain workshop 101
OSCON 2018 Getting Started with Hyperledger Indy
Testing in the blockchain
Next-generation enterprise Ethereum managed services
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
The Blockchain and the Future of Cybersecurity
Building a dApp on Tezos
DEFCON28_2020_EthereumSecurity_PreventingDDoS_VDF
Blockchin architecture & use cases -part-2
Privacy-preserving techniques using zero knowledge proof in public Ethereum
Federated and legal identities in industrial and financial applications
The future of data security and blockchain
Ad

Similar to Improving privacy in blockchain using homomorphic encryption (20)

PPT
Encryption Primer por Cathy Nolan
PPT
6. cryptography
PPT
Cryptography
PDF
Blockchain and Cryptocurrency for Dummies
PDF
International Journal of Engineering Research and Development (IJERD)
DOCX
Documentation20
PDF
Pki Training V1.5
PDF
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
PDF
The Time-Consuming Task Of Preparing A Data Set For...
PPTX
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
PDF
Cryptographic Agility in Corda
PPTX
Domain 9 of CEH Cryptography.pptx
PPTX
You may be compliant...
PPTX
You may be compliant, but are you really secure?
PPT
BCS_PKI_part1.ppt
PPTX
Cryptocurrencies
PDF
Public Vs. Private Keys
PPT
Iss lecture 5
PPTX
Ethical hacking and cyber security intro
Encryption Primer por Cathy Nolan
6. cryptography
Cryptography
Blockchain and Cryptocurrency for Dummies
International Journal of Engineering Research and Development (IJERD)
Documentation20
Pki Training V1.5
How Do Zero-Knowledge Proofs Keep Blockchain Transactions Private.pdf
The Time-Consuming Task Of Preparing A Data Set For...
PACE-IT, Security+ 6.2: Cryptographic Methods (part 2)
Cryptographic Agility in Corda
Domain 9 of CEH Cryptography.pptx
You may be compliant...
You may be compliant, but are you really secure?
BCS_PKI_part1.ppt
Cryptocurrencies
Public Vs. Private Keys
Iss lecture 5
Ethical hacking and cyber security intro
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
Teaching material agriculture food technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation theory and applications.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
cuic standard and advanced reporting.pdf
PDF
Machine learning based COVID-19 study performance prediction
Advanced methodologies resolving dimensionality complications for autism neur...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MIND Revenue Release Quarter 2 2025 Press Release
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
sap open course for s4hana steps from ECC to s4
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
20250228 LYD VKU AI Blended-Learning.pptx
Teaching material agriculture food technology
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
gpt5_lecture_notes_comprehensive_20250812015547.pdf
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation theory and applications.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Assigned Numbers - 2025 - Bluetooth® Document
cuic standard and advanced reporting.pdf
Machine learning based COVID-19 study performance prediction

Improving privacy in blockchain using homomorphic encryption

  • 1. Improving Privacy in Blockchain using Homomorphic Encryption Razi Rais | https://razibinrais.com
  • 3. Agenda  Understand Privacy & Role of Homomorphic Encryption (HE)  Blockchain & Zero-Knowledge Proofs (zk-SNARKS)  Tools & Technologies  Demos (Healthcare & identity)
  • 4. Privacy http://faculty.uml.edu/sgallagher/Brandeisprivacy.htm • Freedom from intrusion - being left alone • Control of information about oneself • Freedom from surveillance (from being followed, tracked, watched, and eavesdropped upon)
  • 5. Privacy | Encryption to Protect Data Razi X?DE&7 Plaintext Encrypted
  • 6. Privacy | Encryption Challenge At Rest In Motion In Memory X?DE&7 X?DE&7 Razi e.g – BitLocker e.g - TLS ?
  • 7. Privacy | Encryption Solution At Rest In Motion X?DE&7 X?DE&7 X?DE&7 e.g – BitLocker e.g - TLS Homomorphic Encryption In Memory
  • 8. Homomorphic Encryption (HE) - 101 Allows you to perform operations on encrypted data Addition & Multiplication Quantum Resistant* Slow – Requires lot of compute power
  • 9. Homomorphic Encryption - Applications HomomorphicEncryption.org http://homomorphicencryption.org/white_papers/applications _homomorphic_encryption_white_paper.pdf
  • 10. Scenario | Healthcare What's wrong with sending/sharing your blood results with the 3rd party (e.g. Research institutes, Law enforcement etc.) Unnecessary exposure of data Once results are shared they cannot be un-shared Data breaches (you also don’t control data lifecycle) Your DNA + PII = Ultimate Identity that can be tracked and use with AI!
  • 11. Scenario | Healthcare Use Case You want to participate in a healthcare research program that needs your Glucose and Cholesterol levels Problem How to share data without revealing the actual values?
  • 12. Scenario | Healthcare Solution 1. Encrypt glucose and cholesterol levels on the client device (using private key) 2. Send glucose and cholesterol levels (still encrypted) to the server 3. Processing is done by the server on encrypted values (using HE and client’s public key) 4. Results are send back in encrypted format to the client 5. Client decrypt the values (using private key)
  • 13. DEMO | Healthcare Improve Privacy using HE https://github.com/razi-rais/homomorphic-encryption
  • 14. SDKs |Offchain Microsoft | Simple Encrypted Arithmetic Library (SEAL) https://www.microsoft.com/en-us/research/project/simple-encrypted-arithmetic-library n1analytics https://github.com/n1analytics/python-paillier TFHE | Fast Fully Homomorphic Encryption Library over the Torus https://github.com/tfhe/tfhe More ..
  • 15. Blockchain & Privacy Issues Data on the blockchain is immutable (write once– ready many) PII (Personal Identifiable Information) in plaintext should never be stored on blockchain Solution?
  • 16. Blockchain & Privacy Store data off the chain (Database, IPFS etc.) Step 1 - Encrypt Data (PII) Step 2 - Hash Data Step 3 – Store Hash on the chain
  • 17. Blockchain & Privacy Why not just store the encrypted data on the chain? because.. Storage is expensive on the chain Secret key exposure/hack will reveal encrypted data Data storage is immutable (so no turning back if data is exposed)
  • 18. Scenario: Identity What's wrong with the current Identity system? It reveals too much information to 3rd party! Lets take a closer look…
  • 19. Scenario: Identity Scenario You need to proof that you are over 21 years of age
  • 20. Scenario: Identity As usual you showed your ID to the 3rd party (3rd party is some one who you don’t trust with PII. E.g. receptionist, security guard etc. )
  • 21. Scenario: Identity What information was needed? DOB Picture What information was revealed? Address, Sex Height Eye Color Etc.
  • 22. Scenario: Identity One Possible Solution Step 1 – DMV issues you proof that you are over 21 and create smart contract for 3rd party to verify it. Step 2 – You send a signed transaction to smart contract with encrypted input (only you and DMV knows private values) Step 3 – Smart contract verify your proof and either rejects or accepts it. Step 4 – Third party uses result of smart contract (step#3) to verify if your are over 21 or not.
  • 23. Zero-knowledge Proof Benefits Minimal/No data discourse Blockchain is used to verify (and record results) but data always stays encrypted One time proof can be used for more sensitive transactions* High Level Definition It’s a method by which one party (the prover “Razi”) can prove to another party (the verifier ”Security Guard”) that he knows a value x (DOB, attested by the DMV), without conveying any information apart from the fact that he knows the value x.
  • 24. zk-SNARKs Zk-SNARK  Zero-Knowledge Succinct Non-Interactive Argument of Knowledge Zero-knowledge  Allows prover to prove to the verifier that a statement is true without revealing any information beyond the validity of the statement itself Succinct  Proof is short and easy to verify Non-interactive  Proof does not require back-and-forth interaction between the prover and the verifier Argument of knowledge Proof attests not just that the statement is true, but also that the prover knows why its true
  • 25. zk-SNARKs – How it works 2. key generator ( lambda , program/circuit )  proving key (pk) , verification key (vk) 1. program/circuit has public input (x) and private input (witness or w) 3. prover ( pk , x , w )  proof 4. verifier( vk , x , proof)  { true | false } Program written to work with ZoKrates
  • 26. DEMO | Identity Using zk-SNARKs to proof age https://github.com/razi-rais/blockchain-workshop/tree/master/zk- SNARKs
  • 27. Resources Raziel: Private and Verifiable Smart Contracts on Blockchains https://eprint.iacr.org/2017/878.pdf Homomorphic Encryption Standard https://projects.csail.mit.edu/HEWorkshop/HomomorphicEncryptionStandar d2018.pdf A Primer on Zero Knowledge Protocols http://www.cs.ox.ac.uk/people/gerardo.simari/personal/publications/zkp- simari2002.pdf

Editor's Notes

  • #5: Facebook https://www.theguardian.com/technology/2018/apr/08/facebook-to-contact-the-87-million-users-affected-by-data-breach https://www.facebook.com/about/privacy Google http://privacy-violators.com/social-networking-news/us-fines-google-22-5-million-for-privacy-violations/
  • #11: https://github.com/n1analytics/python-paillier
  • #12: https://github.com/n1analytics/python-paillier
  • #13: https://github.com/n1analytics/python-paillier
  • #14: https://github.com/n1analytics/python-paillier
  • #15: https://github.com/n1analytics/python-paillier