CHAPTER 3

Blockchain and Its Applications

Introduction

These days if you want to communicate online, then you have to reveal and share your identity and other related details. Therefore, the very common practice these days is leaving evidences or sharing personal data with centralized third parties like government organizations or private enterprises.1 However, this can result in misuse of sensitive personal data of the users, thereby causing privacy issues and challenges. Therefore, it is very much pertinent to consider the role of cryptographic techniques that promote the fortification of sensitive information. This information can be structural, functional, or individual in nature, which is either in transmission or stored. In a decentralized ...

Get Marketing in the Digital World now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.