An Analysis of Anonymity in the Bitcoin System

@article{Reid2011AnAO,
  title={An Analysis of Anonymity in the Bitcoin System},
  author={Fergal Reid and Martin Harrigan},
  journal={2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing},
  year={2011},
  pages={1318-1326}
}
  • F. Reid, Martin Harrigan
  • Published 22 July 2011
  • Computer Science, Mathematics
  • 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
Anonymity in Bit coin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as… 

Figures from this paper

A Bayesian approach to identify Bitcoin users
TLDR
A mathematical model using a probabilistic approach to link Bitcoin addresses and transactions to the originator IP address is developed and carried out experiments by installing more than a hundred modified Bitcoin clients distributed in the network to observe as many messages as possible.
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
TLDR
A new coin mixing scheme is presented to ensure that the relationship between input and output addresses of any users is invisible for the mixing server, and makes use of a ring signature algorithm to ensure it can't distinguish specific transaction from all these addresses.
Anonymity of Bitcoin Transactions An Analysis of Mixing Services
TLDR
This paper evaluates three special bitcoin mixing services – Bitcoin Fog, BitLaundry, and the Send Shared functionality of Blockchain.info – by analyzing the transaction graph and is able to find a direct relation between the input and output transactions in the graph of Bit laundry.
New attacks on Bitcoin
TLDR
This document will study two attacks : the fast payment double spending attack and how using a lightweight Bitcoin client can endanger the privacy of its users and experiment and analyze how these attacks work by setting up a simulation of Bitcoin transactions.
Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin
TLDR
This work presents an unlinkable coin mixing scheme that allows users to mix their bitcoins without trusting a third party and security and privacy of the mixing scheme are ensured through the standard ring signature and ECDSA unforgeability.
Attacks on Bitcoin
TLDR
This document will study two attacks : the fast payment double spending attack and how using a lightweight Bitcoin client can endanger the privacy of its users and experiment and analyze how these attacks work by setting up a simulation of Bitcoin transactions.
SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem
  • M. Ibrahim
  • Computer Science, Mathematics
    Int. J. Netw. Secur.
  • 2017
TLDR
This paper proposes SecureCoin as an efficient protocol for anonymous and unlinkable Bitcoin transactions that covers these vulnerabilities in a robust and secure way and in full compatibility with the standard Bitcoin ecosystem.
CoinParty: Secure Multi-Party Mixing of Bitcoins
TLDR
By the application of threshold signatures to Bitcoin mixing, CoinParty achieves anonymity by orders of magnitude higher than related work as it is quantified by analyzing transactions in the actual Bitcoin blockchain and is first among related approaches to provide plausible deniability.
Authenticated Key Exchange over Bitcoin
TLDR
The idea is to leverage the Bitcoin's append-only ledger as an additional layer of authentication between previously confirmed transactions, which naturally leads to a new category of AKE protocols that bootstrap trust entirely from the block chain.
...
...

References

SHOWING 1-10 OF 40 REFERENCES
Bitcoin: A Peer-to-Peer Electronic Cash System
TLDR
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
Link Privacy in Social Networks
TLDR
Any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.
Collaborative attack on Internet users' anonymity
TLDR
It is illustrated that it is possible to compromise the anonymity of many Internet users when eavesdropping on a relatively small number of nodes, even when the most central ones are protected from eavesdropping.
De-anonymizing Social Networks
TLDR
A framework for analyzing privacy and anonymity in social networks is presented and a new re-identification algorithm targeting anonymized social-network graphs is developed, showing that a third of the users who can be verified to have accounts on both Twitter and Flickr can be re-identified in the anonymous Twitter graph.
Bitcoin: An Innovative Alternative Digital Currency
TLDR
This paper examines a few relevant legal issues, such as the recent conviction of the Liberty Dollar creator, the Stamp Payments Act, and the federal securities acts.
Hashcash - A Denial of Service Counter-Measure
TLDR
This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.
KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing
TLDR
A general economic framework for avoiding freeloaders in peer-to-peer systems that is resistant to malicious attempts by the resource provider, consumer, and a fraction of the members of the bank set.
Robust De-anonymization of Large Sparse Datasets
TLDR
This work applies the de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service, and demonstrates that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber's record in the dataset.
Emerging Issues in Responsible Vulnerability Disclosure
TLDR
This paper examines the impact of an early discovery, which can be encouraged with proper incentive mechanisms, on the release time of the patch, the grace period, and the social welfare, and explores the several policy implications of the results and their relationship with current disclosure practices.
Information revelation and privacy in online social networks
TLDR
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
...
...