學術產出-Theses

Article View/Open

Publication Export

Google ScholarTM

政大圖書館

Citation Infomation

題名 新技術與個資保護的衝突與調適 —以區塊鏈技術為中心
The Conflict and Adjustment between New Technology and Personal Data Protection: A focus on Blockchain Technology
作者 楊岱瑾
Yang, Tai-Chin
貢獻者 宋皇志
Sung, Huang-Chih
楊岱瑾
Yang, Tai-Chin
關鍵詞 區塊鏈
個人資料保護法
去識別化
被遺忘權
GDPR
Blockchain
Personal Data Protection Act
The right to be forgotten
De-Identification
General Data Protection Regulation(GDPR)
日期 2022
上傳時間 1-Jul-2022 16:32:57 (UTC+8)
摘要 隨著資訊技術提升與巨量資料普及,數位足跡與各種多元資料被紀錄留存的方式增加,併與生物辨識技術、人工智慧等技術輔助,各種型態之資料與個人身分的連結性逐漸增強,個人資料保護之重要性日益提升。
本文旨在以區塊鏈技術為中心,探討新技術與個資保護的衝突與可能風險管理措施,隨著區塊鏈的應用日益普及,應用場景與態樣日趨多元,其去中心化、高度透明之特性有助於資料的紀錄、公開驗證、以及辨識真偽,在數位數據的留存下儼然成為一種新興信任方式,然而此種新型去中心化之技術態樣與個人資料保護以中心化做為思考準繩存有相互抗衡之疑慮,如去識別化之再識別風險、被遺忘權等議題。
針對區塊鏈技術與個人資料保護之矛盾,各國相繼提出可能可行之解釋以及技術方法,故本文以可行之資料去識別技術、提升鏈上資料安全性技術以及鏈上資料刪除的可能作法三構面進行技術方法分析整理,試圖解構資料在區塊鏈上依序可能遇到的問題,並整理相應解決辦法,最後試圖整理出有別於先前研究多建議採用之脫鏈儲存方式,以分別就區塊鏈架構端以及監理端給與參考策略,以期區塊鏈技術及個人資料保護兩者在發展上能夠同步並茂。
With the advancement of information technology and the widespread of big data, the ways in which digital footprints and various kinds of data are recorded and retained have increased, and with the assistance of biometric technology, artificial intelligence, etc. the connection between various types of data and personal identity has gradually increased. And the importance of personal information protection is increasing day by day.
This study focuses on blockchain technology to discuss the conflict between new technologies and personal information protection and possible risk management measures. The characteristics of decentralized and a high degree of transparency are helpful for data recording, public verification, and identification of authenticity. With the retention of digital data, it has become a new way of trust. However, there are some paradoxes since this new type of technology is decentralized while the regulation of personal data protection are focus on centralized issue. Such as the risk of re-identification and the right to be forgotten.
In response to the contradiction between blockchain technology and personal information protection, various countries have successively proposed possible explanations and technical methods. Therefore, this article uses feasible de-identification technologies, technologies to improve the security of data on the blockchain, and possible methods for data deletion on the blockchain. Analyzed and sorted out technical methods, tried to deconstruct the problems that data may encounter in sequence on the blockchain, and sorted out corresponding solutions, and tried to sort out the methods that are different from previous studies which focus on off-chain storage. In the end, tried to provide reference strategies to the blockchain architecture side and the supervision side, in order to synchronize the development of blockchain technology and personal data protection.
參考文獻 一、中文期刊論文
1. 王紹睿. (2018). 淺談人工智慧系統的隱私資訊安全保護機制. 科儀新知, (215), 74-84.
2. 刘炜, 彭宇飞, 田钊, 盛朝阳, 李阳, & 佘维. (2021). 基于区块链的医疗信息隐私保护研究综述. 郑州大学学报 (理学版), 53(2), 1-18.
3. 宋皇志. (2018). 巨量資料交易之法律風險與管理意涵-以個人資料再識別化為中心. 管理評論, 37(4), 37-51.
4. 李思壯, & 黃彥男. (2019). 數位時代之數位隱私保護. 國土及公共治理季刊, 7(4), 30-39.
5. 袁勇, & 王飞跃. (2020). 可编辑区块链: 模型, 技术与方法. 自动化学报, 46(5), 831-846.
6. 郭戎晉. (2021). 論區塊鏈技術與歐盟一般資料保護規則之衝突. 臺大法學論叢, 50(1), 69-152.
7. 陳恭, & 蕭婕. (2018). 運用區塊鏈打造公共治理新局面. 國土及公共治理季刊, 6(4), 50-61.,頁57。
8. 靳世雄, 张潇丹, 葛敬国, 史洪彬, 孙毅, 李鸣, ... & 姚忠将. (2021). 区块链共识算法研究综述. Journal of Cyber Security 信息安全学报, 6(2) ,頁89、90。
9. 劉定基(2012),個人資料的定義、保護原則與個人資料保護法適用的例外—以監視錄影為例(下),《月旦法學教室》,第119期,頁41。
10. 蕭奕弘(2018),〈健保資料庫行政訴訟案:醫學研究與資料隱私間的衝突〉,《月旦醫事法報告》,第19期,頁95。

二、外文文獻
(一)英文期刊論文
1. Yang, M., Margheri, A., Hu, R., & Sassone, V. (2018). Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Computing, 5(6), 69-79.
2. Berberich, M., & Steiner, M. (2016). Blockchain technology and the GDPR-how to reconcile privacy and distributed ledgers. Eur. Data Prot. L. Rev., 2, 422.
3. Chang, H. (2018). Is distributed ledger technology built for personal data?. Journal of Data Protection & Privacy, 1(4), 410-418.
4. Cohen, J. E. (2019). Internet utopianism and the practical inevitability of law. Duke Law & Technology Review, 18(1).
5. Daoui, S., Fleinert-Jensen, T., & Lemperiere, M. (2019). GDPR, Blockchain and the French Data Protection Authority: Many Answers but Some Remaining Questions. Stan. J. Blockchain L. & Pol`y, 2, 1.
6. Dwork, C. (2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer, Berlin, Heidelberg.
7. Feistel, H. (1973). Cryptography and Computer Privacy. Scientific American, 228(5), 15–23.
8. Finck, M. (2018). Blockchain regulation and governance in Europe. Cambridge University Press.
9. Finck, M., & Pallas, F. (2020). They who must not be identified—distinguishing personal from non-personal data under the GDPR. International Data Privacy Law.
10. Finck, M. (2018). Blockchains and data protection in the European Union. Eur. Data Prot. L. Rev., 4, 17.
11. Gilbert, F. (2011). European data protection 2.0: new compliance requirements in sight-what the proposed EU data protection regulation means for us companies. Santa Clara Computer & High Tech. LJ, 28, 815.
12. Giuseppe Ateniese et al., Redactable Blockchain – or – Rewriting History in Bitcoin and Friends (Apr. 26-28, 2017), in 2017IEEEEUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), July 2017, at 111, 112-13
13. Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208.
14. Graux, H., Ausloos, J., & Valcke, P. (2012). The right to be Forgotten in the Internet Era. ICRI research paper, (11).
15. iménez-Gómez, B. S. (2019). Risks of Blockchain for Data Protection: A European Approach. Santa Clara High Tech. LJ, 36, 281.
16. international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg.
17. Krishnan, S., Balas, V. E., Golden, J., Robinson, Y. H., Balaji, S., & Kumar, R. (Eds.). (2020). Handbook of research on blockchain technology. Academic Press.
18. L. Sweeney (2002), International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 571.
19. lorian, M., Henningsen, S., Beaucamp, S., & Scheuermann, B. (2019, June). Erasing data from blockchain nodes. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 367-376). IEEE.
20. Mirchandani, A. (2018). The GDPR-blockchain paradox: exempting permissioned Blockchains from the GDPR. Fordham Intell. Prop. Media & Ent. LJ, 29, 1201.
21. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.
22. Narayanan, A., & Shmatikov, V. (2008, May). Robust de-anonymization of large sparse datasets. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (pp. 111-125). IEEE.
23. Natarajan, H., Krause, S., & Gradstein, H. (2017). Distributed ledger technology and blockchain.
24. Nikolaus Bertermann (2015). Sind IP-Adressen personenbezogene Daten? K&R, at 106
25. Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40-81.
26. Rustad, M. L., & Koenig, T. H. (2019). Towards a global data privacy standard. Fla. L. Rev., 71, 365.
27. Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual
28. Wang, S., Wang, X., & Zhang, Y. (2019). A secure cloud storage framework with access control based on blockchain. IEEE access, 7, 112713-112725.
29. Wang, Y., Liao, X., Xiao, D., & Wong, K. W. (2008). One-way hash function construction based on 2D coupled map lattices. Information Sciences, 178(5), 1391-1406.
30. Wirth, C., & Kolain, M. (2018). Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
(二)英文報告書
1. Article 29 Data Protection Working Party (2014). Opinion 05/2014 on Anonymisation Techniques
2. Article 29 Working Party, Opinion 05/2012 on Cloud Computing (WP 196) 01037/12/EN, 12.
3. Baker McKenzie &R3 (2017). Blockchains and Laws. Are they compatible?
4. Commission Nationale de l`Informatique et des Libertés [CNIL] (2018). Blockchain and the GDPR: Solutions for a responsible use of the blockchain in the context of personal data.
5. ENISA (2019), Pseudonymisation techniques and best practices.
6. EU Blockchain Observatory & Forum (2018. BLOCKCHAIN AND THE GDPR 14
7. European Parliament (2019)., Blockchain and the General Data Protection Regulation, PE 634.445, 30
8. European Parliament, Directorate-General for Internal Policies of the Union, Snyers, A., Houben, R. (2018). Cryptocurrencies and blockchain: legal context and implications for financial crime, money laundering and tax evasion, European Parliament
9. IBM Security White paper (2018). Blockchain and GDPR -How blockchain could address five areas associated with GDPR compliance.
10. ICO (2012). Anonymisation:managing data protection risk code of practice.
11. ICO (2014). DELETING PERSONAL DATA 5.
12. Panel for the Future of Sci. & Tech. [STOA] (July, 2019). Blockchain and the General Data Protection Regulation: Can Distributed Ledgers be Squared with European Data Protection Law?
13. UK ICO(2018). Automated Decision-making and Profiling.

三、政府資料
1. 法務部102年3月12日法律字第10203501470號函。
2. 法務部民國107年8月30日法律字第10703513050號函。

四、網路資料
(一)中文網站
1. CoinMarketCap,檢自:https://coinmarketcap.com/zh-tw/
2. Github,区块链技术指南—同态加密,檢自:https://yeasy.gitbook.io/blockchain_guide/05_crypto/homoencryption
3. IBM,同態加密服務,檢自:https://www.ibm.com/tw-zh/security/services/homomorphic-encryption
4. INSIDE,【以太坊的倫敦前夕】什麼是 Layer 2?為什麼以太 2.0 來臨之前需要它?,2021年6月8日。檢自:https://www.inside.com.tw/feature/before-ethereum-london-hard-fork/23793-ethereum-layer-2
5. 王慕民,動態IP位址是不是個人資料?歐盟法院這樣看,2016年7月4日,檢自:https://www.davinci.idv.tw/news/487
6. 金融監督管理委員會,「虛擬通貨平台及交易業務事業防制洗錢及打擊資恐辦法」發布施行,2021年6月22日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202106220006&dtable=News
7. 金融監督管理委員會,金管會同意保險業運用區塊鏈技術申請試辦「保全/理賠聯盟鏈」服務,2020年3月19日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202003190002&dtable=News
8. 動區動趨,新手科普 零知識證明 (zero-knowledge proofs) 詳解,2020年4月29日。檢自:https://www.blocktempo.com/zero-knowledge-proof-zkp-chagelly-column/
9. 張靜婕,凡走過必留下IP,淺談IP位址是否係屬個資法之個人資料?2011年12月19日,檢自:https://www.davinci.idv.tw/news/43
10. 歐盟提出現行個資保護指令規範之修正草案, 資訊工業策進會科技法律研究所, 檢自:https://stli.iii.org.tw/article-detail.aspx?no=16&tp=3&i=150&d=6343
(二)外文網站
1. Acar G (9 April 2018), Four cents to deanonymize: Companies reverse hashed email addresses, available at: https://freedom-to-tinker.com/2018/04/09/four-cents-to-deanonymize-companies-reverse-hashed-email-addresses/
2. Business of apps, Binance Revenue and Usage Statistics (2022), available at: https://data.europa.eu/doi/10.2861/280969https://www.businessofapps.com/data/binance-statistics/
3. Case Study: How Walmart brought unprecedented transparency to the food supply chain with Hyperledger Fabric, available at: https://www.hyperledger.org/learn/publications/walmart-case-study
4. EDPS, The History of the General Data ProtectionRegulation, available at: https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en#
5. European Commission -Blockchain Strategy, available at: https://digital-strategy.ec.europa.eu/en/policies/blockchain-strategy
6. European Commission -European Blockchain Services Infrastructure, available at: https://digital-strategy.ec.europa.eu/en/policies/european-blockchain-services-infrastructure
7. Europol, Internet Organised Crime Threat Assessment (IOCTA)2020, IOCTA, 9, 28, 58(2020) , available at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020?fbclid=IwAR1yK3aQINAdyBRAFtpBb774ACuHhZzIGZb_th5I0hzx5N-Oh0tsLSXYOOE
8. FinCEN, First Bitcoin Mixer Penalized by FinCEN for Violating Anti-Money Laundering Laws,(2020), available at: https://www.fincen.gov/news/news-releases/first-bitcoin-mixer-penalized-fincen-violating-anti-money-laundering-laws
9. https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain
10. Hyperledger Fabric, About Hyperledger, available at: https://www.hyperledger.org/about
11. Is Data Really the New Oil in the 21st Century?, Towards Data Science, available at: https://towardsdatascience.com/is-data-really-the-new-oil-in-the-21st-century-17d014811b88
12. Justin Hectus & Kristy Sambor, Blockchain and GDPR-Frenemies?, L.J.NEWSLS., July 1, 2018, available at: https://finance.yahoo.com/news/blockchain-gdpr-frenemies-065328669.html
13. Walmart Uses Blockchain to Fix ‘Broken’ Freight Audit and Payment Process, available at: https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain
描述 碩士
國立政治大學
科技管理與智慧財產研究所
109364207
資料來源 http://thesis.lib.nccu.edu.tw/record/#G0109364207
資料類型 thesis
dc.contributor.advisor 宋皇志zh_TW
dc.contributor.advisor Sung, Huang-Chihen_US
dc.contributor.author (Authors) 楊岱瑾zh_TW
dc.contributor.author (Authors) Yang, Tai-Chinen_US
dc.creator (作者) 楊岱瑾zh_TW
dc.creator (作者) Yang, Tai-Chinen_US
dc.date (日期) 2022en_US
dc.date.accessioned 1-Jul-2022 16:32:57 (UTC+8)-
dc.date.available 1-Jul-2022 16:32:57 (UTC+8)-
dc.date.issued (上傳時間) 1-Jul-2022 16:32:57 (UTC+8)-
dc.identifier (Other Identifiers) G0109364207en_US
dc.identifier.uri (URI) http://nccur.lib.nccu.edu.tw/handle/140.119/140718-
dc.description (描述) 碩士zh_TW
dc.description (描述) 國立政治大學zh_TW
dc.description (描述) 科技管理與智慧財產研究所zh_TW
dc.description (描述) 109364207zh_TW
dc.description.abstract (摘要) 隨著資訊技術提升與巨量資料普及,數位足跡與各種多元資料被紀錄留存的方式增加,併與生物辨識技術、人工智慧等技術輔助,各種型態之資料與個人身分的連結性逐漸增強,個人資料保護之重要性日益提升。
本文旨在以區塊鏈技術為中心,探討新技術與個資保護的衝突與可能風險管理措施,隨著區塊鏈的應用日益普及,應用場景與態樣日趨多元,其去中心化、高度透明之特性有助於資料的紀錄、公開驗證、以及辨識真偽,在數位數據的留存下儼然成為一種新興信任方式,然而此種新型去中心化之技術態樣與個人資料保護以中心化做為思考準繩存有相互抗衡之疑慮,如去識別化之再識別風險、被遺忘權等議題。
針對區塊鏈技術與個人資料保護之矛盾,各國相繼提出可能可行之解釋以及技術方法,故本文以可行之資料去識別技術、提升鏈上資料安全性技術以及鏈上資料刪除的可能作法三構面進行技術方法分析整理,試圖解構資料在區塊鏈上依序可能遇到的問題,並整理相應解決辦法,最後試圖整理出有別於先前研究多建議採用之脫鏈儲存方式,以分別就區塊鏈架構端以及監理端給與參考策略,以期區塊鏈技術及個人資料保護兩者在發展上能夠同步並茂。
zh_TW
dc.description.abstract (摘要) With the advancement of information technology and the widespread of big data, the ways in which digital footprints and various kinds of data are recorded and retained have increased, and with the assistance of biometric technology, artificial intelligence, etc. the connection between various types of data and personal identity has gradually increased. And the importance of personal information protection is increasing day by day.
This study focuses on blockchain technology to discuss the conflict between new technologies and personal information protection and possible risk management measures. The characteristics of decentralized and a high degree of transparency are helpful for data recording, public verification, and identification of authenticity. With the retention of digital data, it has become a new way of trust. However, there are some paradoxes since this new type of technology is decentralized while the regulation of personal data protection are focus on centralized issue. Such as the risk of re-identification and the right to be forgotten.
In response to the contradiction between blockchain technology and personal information protection, various countries have successively proposed possible explanations and technical methods. Therefore, this article uses feasible de-identification technologies, technologies to improve the security of data on the blockchain, and possible methods for data deletion on the blockchain. Analyzed and sorted out technical methods, tried to deconstruct the problems that data may encounter in sequence on the blockchain, and sorted out corresponding solutions, and tried to sort out the methods that are different from previous studies which focus on off-chain storage. In the end, tried to provide reference strategies to the blockchain architecture side and the supervision side, in order to synchronize the development of blockchain technology and personal data protection.
en_US
dc.description.tableofcontents 第一章 緒論 1
第一節 研究動機 1
第二節 研究方法 2
第三節 研究範圍與限制 2
第四節 論文架構 3
第二章 區塊鏈技術 5
第一節 區塊鏈技術簡介 5
第一項 分散式網路 5
第二項 共識演算法協定 6
第三項 雜湊函數機制 7
第四項 公開金鑰加密技術 8
第二節 區塊鏈分類 8
第一項 公有鏈(Public Blockchain) 8
第二項 許可鏈(Permissioned Blockchain) 8
第三節 區塊鏈於個人資料保護面之應用發展概況及爭議 10
第一項 區塊鏈應用發展概況 10
第二項 區塊鏈應用於個人資料保護面之爭議 12
第三章 區塊鏈與個資保護相關規定研析 13
第一節 個人資料的定義與個人資料保護法的基本原則 13
第一項 歐盟GDPR 13
第一款 概述 13
第二款 規範主體及資料安全保障要求 14
第三款 匿名化與假名化差異 15
第四款 適用範圍 16
第二項 台灣個人資料保護法 17
第一款 概述 17
第二款 個人資料之定義與GDPR之差異 18
第二節 區塊鏈與個人資料保護規範之關聯 19
第一項 區塊鏈上之資料是否屬於個人資料 20
第二項 去識別化之相對性 21
第一款 英國 22
第二款 美國 22
第三款 我國見解 23
第三項 小結 24
第三節 個人資料保護與區塊鏈特性之悖論 24
第一項 所有鏈上資訊皆可能被認定為個人資料 24
第二項 資料控制者與資料處理者之認定困難 25
第三項 與刪除權/被遺忘權之矛盾 26
第四章 可能解決方案匯整 27
第一節 資料去識別方法分析 27
第一項 傳統元素抽換(traditional pseudonymization) 27
第二項 雜訊添加(Noise addition) 28
第一款 K匿名法(K-anonymity) 28
第二款 差分隱私(differential privacy) 30
第三項 其他雜湊方法 30
第一款 加鹽雜湊(salted hash) 30
第二款 胡椒雜湊(peppered hash) 31
第四項 同態加密(Homomorphic Encryption) 31
第二節 提升鏈上資料安全性方法分析 32
第一項 零知識證明(Zero-Knowledge Proof, ZKP) 32
第二項 隱身位址技術(Stealth addresses) 33
第三項 混幣服務器(Cryptocurrency tumbler or cryptocurrency mixing service) 33
第四項 屬性加密(Attribute-Based Encryption, ABE) 34
第三節 鏈上資料刪除的可能作法 35
第一項 刪除之定義 35
第二項 公有鏈之可能刪除機制 37
第一款 脫鏈儲存(off-chain data store) 37
第二款 可編輯區塊鏈(redactable blockchain) 37
第三款 Layer 2 網絡 38
第三項 許可鏈之可能刪除機制 39
第一款 暫時閒置機制(put information ‘beyond use’) 39
第二款 刪除私鑰 40
第三款 硬分叉技術(hard fork) 40
第四節 小結 41
第五章 研究結論與建議 43
第一項 本文結論 43
第二項 本文建議 44
第一款 給予區塊鏈架構端之建議 44
第二款 給予監理端之建議 45
參考文獻 47
zh_TW
dc.format.extent 2165479 bytes-
dc.format.mimetype application/pdf-
dc.source.uri (資料來源) http://thesis.lib.nccu.edu.tw/record/#G0109364207en_US
dc.subject (關鍵詞) 區塊鏈zh_TW
dc.subject (關鍵詞) 個人資料保護法zh_TW
dc.subject (關鍵詞) 去識別化zh_TW
dc.subject (關鍵詞) 被遺忘權zh_TW
dc.subject (關鍵詞) GDPRzh_TW
dc.subject (關鍵詞) Blockchainen_US
dc.subject (關鍵詞) Personal Data Protection Acten_US
dc.subject (關鍵詞) The right to be forgottenen_US
dc.subject (關鍵詞) De-Identificationen_US
dc.subject (關鍵詞) General Data Protection Regulation(GDPR)en_US
dc.title (題名) 新技術與個資保護的衝突與調適 —以區塊鏈技術為中心zh_TW
dc.title (題名) The Conflict and Adjustment between New Technology and Personal Data Protection: A focus on Blockchain Technologyen_US
dc.type (資料類型) thesisen_US
dc.relation.reference (參考文獻) 一、中文期刊論文
1. 王紹睿. (2018). 淺談人工智慧系統的隱私資訊安全保護機制. 科儀新知, (215), 74-84.
2. 刘炜, 彭宇飞, 田钊, 盛朝阳, 李阳, & 佘维. (2021). 基于区块链的医疗信息隐私保护研究综述. 郑州大学学报 (理学版), 53(2), 1-18.
3. 宋皇志. (2018). 巨量資料交易之法律風險與管理意涵-以個人資料再識別化為中心. 管理評論, 37(4), 37-51.
4. 李思壯, & 黃彥男. (2019). 數位時代之數位隱私保護. 國土及公共治理季刊, 7(4), 30-39.
5. 袁勇, & 王飞跃. (2020). 可编辑区块链: 模型, 技术与方法. 自动化学报, 46(5), 831-846.
6. 郭戎晉. (2021). 論區塊鏈技術與歐盟一般資料保護規則之衝突. 臺大法學論叢, 50(1), 69-152.
7. 陳恭, & 蕭婕. (2018). 運用區塊鏈打造公共治理新局面. 國土及公共治理季刊, 6(4), 50-61.,頁57。
8. 靳世雄, 张潇丹, 葛敬国, 史洪彬, 孙毅, 李鸣, ... & 姚忠将. (2021). 区块链共识算法研究综述. Journal of Cyber Security 信息安全学报, 6(2) ,頁89、90。
9. 劉定基(2012),個人資料的定義、保護原則與個人資料保護法適用的例外—以監視錄影為例(下),《月旦法學教室》,第119期,頁41。
10. 蕭奕弘(2018),〈健保資料庫行政訴訟案:醫學研究與資料隱私間的衝突〉,《月旦醫事法報告》,第19期,頁95。

二、外文文獻
(一)英文期刊論文
1. Yang, M., Margheri, A., Hu, R., & Sassone, V. (2018). Differentially private data sharing in a cloud federation with blockchain. IEEE Cloud Computing, 5(6), 69-79.
2. Berberich, M., & Steiner, M. (2016). Blockchain technology and the GDPR-how to reconcile privacy and distributed ledgers. Eur. Data Prot. L. Rev., 2, 422.
3. Chang, H. (2018). Is distributed ledger technology built for personal data?. Journal of Data Protection & Privacy, 1(4), 410-418.
4. Cohen, J. E. (2019). Internet utopianism and the practical inevitability of law. Duke Law & Technology Review, 18(1).
5. Daoui, S., Fleinert-Jensen, T., & Lemperiere, M. (2019). GDPR, Blockchain and the French Data Protection Authority: Many Answers but Some Remaining Questions. Stan. J. Blockchain L. & Pol`y, 2, 1.
6. Dwork, C. (2008, April). Differential privacy: A survey of results. In International conference on theory and applications of models of computation (pp. 1-19). Springer, Berlin, Heidelberg.
7. Feistel, H. (1973). Cryptography and Computer Privacy. Scientific American, 228(5), 15–23.
8. Finck, M. (2018). Blockchain regulation and governance in Europe. Cambridge University Press.
9. Finck, M., & Pallas, F. (2020). They who must not be identified—distinguishing personal from non-personal data under the GDPR. International Data Privacy Law.
10. Finck, M. (2018). Blockchains and data protection in the European Union. Eur. Data Prot. L. Rev., 4, 17.
11. Gilbert, F. (2011). European data protection 2.0: new compliance requirements in sight-what the proposed EU data protection regulation means for us companies. Santa Clara Computer & High Tech. LJ, 28, 815.
12. Giuseppe Ateniese et al., Redactable Blockchain – or – Rewriting History in Bitcoin and Friends (Apr. 26-28, 2017), in 2017IEEEEUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY (EUROS&P), July 2017, at 111, 112-13
13. Goldwasser, S., Micali, S., & Rackoff, C. (1989). The knowledge complexity of interactive proof systems. SIAM Journal on computing, 18(1), 186-208.
14. Graux, H., Ausloos, J., & Valcke, P. (2012). The right to be Forgotten in the Internet Era. ICRI research paper, (11).
15. iménez-Gómez, B. S. (2019). Risks of Blockchain for Data Protection: A European Approach. Santa Clara High Tech. LJ, 36, 281.
16. international conference on the theory and applications of cryptographic techniques (pp. 457-473). Springer, Berlin, Heidelberg.
17. Krishnan, S., Balas, V. E., Golden, J., Robinson, Y. H., Balaji, S., & Kumar, R. (Eds.). (2020). Handbook of research on blockchain technology. Academic Press.
18. L. Sweeney (2002), International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (5), 571.
19. lorian, M., Henningsen, S., Beaucamp, S., & Scheuermann, B. (2019, June). Erasing data from blockchain nodes. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW) (pp. 367-376). IEEE.
20. Mirchandani, A. (2018). The GDPR-blockchain paradox: exempting permissioned Blockchains from the GDPR. Fordham Intell. Prop. Media & Ent. LJ, 29, 1201.
21. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review, 21260.
22. Narayanan, A., & Shmatikov, V. (2008, May). Robust de-anonymization of large sparse datasets. In Security and Privacy, 2008. SP 2008. IEEE Symposium on (pp. 111-125). IEEE.
23. Natarajan, H., Krause, S., & Gradstein, H. (2017). Distributed ledger technology and blockchain.
24. Nikolaus Bertermann (2015). Sind IP-Adressen personenbezogene Daten? K&R, at 106
25. Purtova, N. (2018). The law of everything. Broad concept of personal data and future of EU data protection law. Law, Innovation and Technology, 10(1), 40-81.
26. Rustad, M. L., & Koenig, T. H. (2019). Towards a global data privacy standard. Fla. L. Rev., 71, 365.
27. Sahai, A., & Waters, B. (2005, May). Fuzzy identity-based encryption. In Annual
28. Wang, S., Wang, X., & Zhang, Y. (2019). A secure cloud storage framework with access control based on blockchain. IEEE access, 7, 112713-112725.
29. Wang, Y., Liao, X., Xiao, D., & Wong, K. W. (2008). One-way hash function construction based on 2D coupled map lattices. Information Sciences, 178(5), 1391-1406.
30. Wirth, C., & Kolain, M. (2018). Privacy by blockchain design: a blockchain-enabled GDPR-compliant approach for handling personal data. In Proceedings of 1st ERCIM Blockchain Workshop 2018. European Society for Socially Embedded Technologies (EUSSET)
(二)英文報告書
1. Article 29 Data Protection Working Party (2014). Opinion 05/2014 on Anonymisation Techniques
2. Article 29 Working Party, Opinion 05/2012 on Cloud Computing (WP 196) 01037/12/EN, 12.
3. Baker McKenzie &R3 (2017). Blockchains and Laws. Are they compatible?
4. Commission Nationale de l`Informatique et des Libertés [CNIL] (2018). Blockchain and the GDPR: Solutions for a responsible use of the blockchain in the context of personal data.
5. ENISA (2019), Pseudonymisation techniques and best practices.
6. EU Blockchain Observatory & Forum (2018. BLOCKCHAIN AND THE GDPR 14
7. European Parliament (2019)., Blockchain and the General Data Protection Regulation, PE 634.445, 30
8. European Parliament, Directorate-General for Internal Policies of the Union, Snyers, A., Houben, R. (2018). Cryptocurrencies and blockchain: legal context and implications for financial crime, money laundering and tax evasion, European Parliament
9. IBM Security White paper (2018). Blockchain and GDPR -How blockchain could address five areas associated with GDPR compliance.
10. ICO (2012). Anonymisation:managing data protection risk code of practice.
11. ICO (2014). DELETING PERSONAL DATA 5.
12. Panel for the Future of Sci. & Tech. [STOA] (July, 2019). Blockchain and the General Data Protection Regulation: Can Distributed Ledgers be Squared with European Data Protection Law?
13. UK ICO(2018). Automated Decision-making and Profiling.

三、政府資料
1. 法務部102年3月12日法律字第10203501470號函。
2. 法務部民國107年8月30日法律字第10703513050號函。

四、網路資料
(一)中文網站
1. CoinMarketCap,檢自:https://coinmarketcap.com/zh-tw/
2. Github,区块链技术指南—同态加密,檢自:https://yeasy.gitbook.io/blockchain_guide/05_crypto/homoencryption
3. IBM,同態加密服務,檢自:https://www.ibm.com/tw-zh/security/services/homomorphic-encryption
4. INSIDE,【以太坊的倫敦前夕】什麼是 Layer 2?為什麼以太 2.0 來臨之前需要它?,2021年6月8日。檢自:https://www.inside.com.tw/feature/before-ethereum-london-hard-fork/23793-ethereum-layer-2
5. 王慕民,動態IP位址是不是個人資料?歐盟法院這樣看,2016年7月4日,檢自:https://www.davinci.idv.tw/news/487
6. 金融監督管理委員會,「虛擬通貨平台及交易業務事業防制洗錢及打擊資恐辦法」發布施行,2021年6月22日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202106220006&dtable=News
7. 金融監督管理委員會,金管會同意保險業運用區塊鏈技術申請試辦「保全/理賠聯盟鏈」服務,2020年3月19日。檢自:https://www.fsc.gov.tw/ch/home.jsp?id=96&parentpath=0,2&mcustomize=news_view.jsp&dataserno=202003190002&dtable=News
8. 動區動趨,新手科普 零知識證明 (zero-knowledge proofs) 詳解,2020年4月29日。檢自:https://www.blocktempo.com/zero-knowledge-proof-zkp-chagelly-column/
9. 張靜婕,凡走過必留下IP,淺談IP位址是否係屬個資法之個人資料?2011年12月19日,檢自:https://www.davinci.idv.tw/news/43
10. 歐盟提出現行個資保護指令規範之修正草案, 資訊工業策進會科技法律研究所, 檢自:https://stli.iii.org.tw/article-detail.aspx?no=16&tp=3&i=150&d=6343
(二)外文網站
1. Acar G (9 April 2018), Four cents to deanonymize: Companies reverse hashed email addresses, available at: https://freedom-to-tinker.com/2018/04/09/four-cents-to-deanonymize-companies-reverse-hashed-email-addresses/
2. Business of apps, Binance Revenue and Usage Statistics (2022), available at: https://data.europa.eu/doi/10.2861/280969https://www.businessofapps.com/data/binance-statistics/
3. Case Study: How Walmart brought unprecedented transparency to the food supply chain with Hyperledger Fabric, available at: https://www.hyperledger.org/learn/publications/walmart-case-study
4. EDPS, The History of the General Data ProtectionRegulation, available at: https://edps.europa.eu/data-protection/data-protection/legislation/history-general-data-protection-regulation_en#
5. European Commission -Blockchain Strategy, available at: https://digital-strategy.ec.europa.eu/en/policies/blockchain-strategy
6. European Commission -European Blockchain Services Infrastructure, available at: https://digital-strategy.ec.europa.eu/en/policies/european-blockchain-services-infrastructure
7. Europol, Internet Organised Crime Threat Assessment (IOCTA)2020, IOCTA, 9, 28, 58(2020) , available at: https://www.europol.europa.eu/activities-services/main-reports/internet-organised-crime-threat-assessment-iocta-2020?fbclid=IwAR1yK3aQINAdyBRAFtpBb774ACuHhZzIGZb_th5I0hzx5N-Oh0tsLSXYOOE
8. FinCEN, First Bitcoin Mixer Penalized by FinCEN for Violating Anti-Money Laundering Laws,(2020), available at: https://www.fincen.gov/news/news-releases/first-bitcoin-mixer-penalized-fincen-violating-anti-money-laundering-laws
9. https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain
10. Hyperledger Fabric, About Hyperledger, available at: https://www.hyperledger.org/about
11. Is Data Really the New Oil in the 21st Century?, Towards Data Science, available at: https://towardsdatascience.com/is-data-really-the-new-oil-in-the-21st-century-17d014811b88
12. Justin Hectus & Kristy Sambor, Blockchain and GDPR-Frenemies?, L.J.NEWSLS., July 1, 2018, available at: https://finance.yahoo.com/news/blockchain-gdpr-frenemies-065328669.html
13. Walmart Uses Blockchain to Fix ‘Broken’ Freight Audit and Payment Process, available at: https://www.supplychainbrain.com/articles/32130-walmart-canada-fixing-a-broken-freight-audit-andpayment-process-with-blockchain
zh_TW
dc.identifier.doi (DOI) 10.6814/NCCU202200666en_US