<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	xmlns:series="https://publishpress.com/"
	>

<channel>
	<title>B2B transactions blockchain Archives - Anuj Varma, Hands-On Technology Architect, Clean Air Activist</title>
	<atom:link href="https://www.anujvarma.com/tag/b2b-transactions-blockchain/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.anujvarma.com/tag/b2b-transactions-blockchain/</link>
	<description>Production Grade Technical Solutions &#124; Data Encryption and Public Cloud Expert</description>
	<lastBuildDate>Mon, 03 Jan 2022 16:37:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.anujvarma.com/wp-content/uploads/anujtech.png</url>
	<title>B2B transactions blockchain Archives - Anuj Varma, Hands-On Technology Architect, Clean Air Activist</title>
	<link>https://www.anujvarma.com/tag/b2b-transactions-blockchain/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Smart Contracts and Sensitive Data</title>
		<link>https://www.anujvarma.com/smart-contracts-and-sensitive-data/</link>
					<comments>https://www.anujvarma.com/smart-contracts-and-sensitive-data/#respond</comments>
		
		<dc:creator><![CDATA[Anuj Varma]]></dc:creator>
		<pubDate>Mon, 03 Jan 2022 16:37:53 +0000</pubDate>
				<category><![CDATA[cryptocurrencies]]></category>
		<category><![CDATA[blockchain]]></category>
		<category><![CDATA[Solidity]]></category>
		<category><![CDATA[Smart Contracts and Sensitive Data]]></category>
		<category><![CDATA[B2B transactions blockchain]]></category>
		<guid isPermaLink="false">https://www.anujvarma.com/?p=8641</guid>

					<description><![CDATA[<p>Public Networks A public network is a network that ANYONE can join. No permission is needed (permissionless public network). An example is the ethereum main network. Permissioned Public Networks Permissions [&#8230;]</p>
<p>The post <a href="https://www.anujvarma.com/smart-contracts-and-sensitive-data/">Smart Contracts and Sensitive Data</a> appeared first on <a href="https://www.anujvarma.com">Anuj Varma, Hands-On Technology Architect, Clean Air Activist</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Public Networks</strong></p>
<p>A public network is a network that ANYONE can join. No permission is needed (permissionless public network). An example is the ethereum main network.</p>
<p><strong>Permissioned Public Networks</strong></p>
<p>Permissions (for a blockchain network) could be in the form of an access control list, or simply a requirement placed on users to enable them to join a network.</p>
<p>An example of a public, permissioned blockchain, could take the form of a public proof of stake network, in which STAKING is required in exchange for permission to participate in the network (as a validator). The bitcoin network does not require staking to act as a validator (though the lightning network does).</p>
<p><strong>The need for Privacy on Public Networks (for B2B or B2C transactions)</strong></p>
<p>In addition to any business-to-business (B2B) interactions between the companies themselves, it&#8217;s possible the network would involve some form of business-to-customer (B2C) interaction , which require privacy.</p>
<p><strong>How can Sensitive Data be protected?</strong></p>
<p>The contents of a transaction, as well as the code and data associated with a smart contract, are publicly viewable.</p>
<p>Though a smart contract&#8217;s code is compiled to bytecode, bytecode can be decompile fairly easily. As such, sensitive information should neither be hardcoded into a contract nor sent to it as part of a transaction.</p>
<p>What can be done, however, is to encrypt any sensitive data off-chain before sending it to the network. Using public-key cryptography:</p>
<ol>
<li>The sensitive data is encrypted with the recipient&#8217;s public key  (which could be published either on- or off-chain)</li>
<li>The encrypted data is sent either to a smart contract (which has a way to receive it), or in the data field of a normal transaction</li>
<li>The received data is decrypted using the recipient&#8217;s private key</li>
</ol>
<p>Using PKI, one can thus encrypt sensitive data on a public, permissionless chain.</p>
<p>The post <a href="https://www.anujvarma.com/smart-contracts-and-sensitive-data/">Smart Contracts and Sensitive Data</a> appeared first on <a href="https://www.anujvarma.com">Anuj Varma, Hands-On Technology Architect, Clean Air Activist</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.anujvarma.com/smart-contracts-and-sensitive-data/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Page Caching using Disk: Enhanced 
Content Delivery Network via N/A
Minified using Disk

Served from: www.anujvarma.com @ 2026-04-23 05:06:38 by W3 Total Cache
-->