An Analysis of Anonymity in the Bitcoin System

@article{Reid2011AnAO,
  title={An Analysis of Anonymity in the Bitcoin System},
  author={Fergal Reid and Martin Harrigan},
  journal={ArXiv},
  year={2011},
  volume={abs/1107.4524}
}
Anonymity in Bit coin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as… 
An Analysis of Anonymity in the Bitcoin System
  • F. Reid, Martin Harrigan
  • Computer Science, Physics
    2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
TLDR
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.
A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems
TLDR
This survey presents guidelines for designing an anonymity/privacy improvement and discusses future research directions, and examines the studies in the literature/Web in two major categories: analyses of anonymity and privacy in Bitcoin and extensions and alternatives to Bitcoin, which improve anonymity and Privacy.
A Bayesian approach to identify Bitcoin users
TLDR
A mathematical model using a probabilistic approach to link Bitcoin addresses and transactions to the originator IP address is developed and carried out experiments by installing more than a hundred modified Bitcoin clients distributed in the network to observe as many messages as possible.
Enhancing Anonymity of Bitcoin Based on Ring Signature Algorithm
TLDR
A new coin mixing scheme is presented to ensure that the relationship between input and output addresses of any users is invisible for the mixing server, and makes use of a ring signature algorithm to ensure it can't distinguish specific transaction from all these addresses.
Anonymity of Bitcoin Transactions An Analysis of Mixing Services
Bitcoin, a distributed, cryptographic, digital currency, gained a lot of media attention for being an anonymous e-cash system. But as all transactions in the network are stored publicly in the
New attacks on Bitcoin
Bitcoin is a cryptographic peer-to-peer currency. It has been created in 2009 by Satoshi Nakamoto. In the Bitcoin system, there is no institution equivalent to a bank, for each user takes part in
When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
TLDR
This work investigates the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a payment method by exploiting public information leaked from online social networks, the Blockchain, and onion websites and confirms that Bitcoin addresses should always be considered exploitable, as they can be used to deanonymize users retroactively.
Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin
TLDR
This work presents an unlinkable coin mixing scheme that allows users to mix their bitcoins without trusting a third party and security and privacy of the mixing scheme are ensured through the standard ring signature and ECDSA unforgeability.
Attacks on Bitcoin
Bitcoin is a cryptographic peer-to-peer currency. It has been created in 2009 by Satoshi Nakamoto. In the Bitcoin system, there is no institution equivalent to a bank, for each user takes part in
Dandelion: Redesigning the Bitcoin Network for Anonymity
TLDR
This work redesigns the P2P network from first principles with the goal of providing strong, provable anonymity guarantees, and proposes a simple networking policy called Dandelion, which achieves nearly-optimal anonymity guarantees at minimal cost to the network's utility.
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 25 REFERENCES
An Analysis of Anonymity in the Bitcoin System
  • F. Reid, Martin Harrigan
  • Computer Science, Physics
    2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
TLDR
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.
Link Privacy in Social Networks
TLDR
Any social network that wishes to protect the link privacy of its users should take great care in choosing the lookahead of its interface, limiting it to 1 or 2, whenever possible.
Collaborative attack on Internet users' anonymity
TLDR
It is illustrated that it is possible to compromise the anonymity of many Internet users when eavesdropping on a relatively small number of nodes, even when the most central ones are protected from eavesdropping.
De-anonymizing Social Networks
TLDR
A framework for analyzing privacy and anonymity in social networks is presented and a new re-identification algorithm targeting anonymized social-network graphs is developed, showing that a third of the users who can be verified to have accounts on both Twitter and Flickr can be re-identified in the anonymous Twitter graph.
Bitcoin: An Innovative Alternative Digital Currency
Bitcoin is a digital, decentralized, partially anonymous currency, not backed by any government or other legal entity, and not redeemable for gold or other commodity. It relies on peer-to-peer
Hashcash - A Denial of Service Counter-Measure
TLDR
This paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash.
KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing
TLDR
A general economic framework for avoiding freeloaders in peer-to-peer systems that is resistant to malicious attempts by the resource provider, consumer, and a fraction of the members of the bank set.
Robust De-anonymization of Large Sparse Datasets
TLDR
This work applies the de-anonymization methodology to the Netflix Prize dataset, which contains anonymous movie ratings of 500,000 subscribers of Netflix, the world's largest online movie rental service, and demonstrates that an adversary who knows only a little bit about an individual subscriber can easily identify this subscriber's record in the dataset.
Emerging Issues in Responsible Vulnerability Disclosure
TLDR
This paper examines the impact of an early discovery, which can be encouraged with proper incentive mechanisms, on the release time of the patch, the grace period, and the social welfare, and explores the several policy implications of the results and their relationship with current disclosure practices.
Information revelation and privacy in online social networks
TLDR
This paper analyzes the online behavior of more than 4,000 Carnegie Mellon University students who have joined a popular social networking site catered to colleges and evaluates the amount of information they disclose and study their usage of the site's privacy settings.
...
1
2
3
...