Anonymity of Bitcoin Transactions An Analysis of Mixing Services
@inproceedings{Mser2013AnonymityOB,
title={Anonymity of Bitcoin Transactions An Analysis of Mixing Services},
author={Malte M{\"o}ser},
year={2013}
}Bitcoin, a distributed, cryptographic, digital currency, gained a lot of media attention for being an anonymous e-cash system. But as all transactions in the network are stored publicly in the blockchain, allowing anyone to inspect and analyze them, the system does not provide real anonymity but pseudonymity. There have already been studies showing the possibility to deanonymize bitcoin users based on the transaction graph and publicly available data. Furthermore, users could be tracked by…
Figures, Tables, and Topics from this paper
62 Citations
When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
- Computer ScienceComput. Secur.
- 2020
BitIodine: Extracting Intelligence from the Bitcoin Network
- Computer ScienceFinancial Cryptography
- 2014
A modular framework, BitIodine, which parses the blockchain, clusters addresses that are likely to belong to a same user or group of users, classifies such users and labels them, and finally visualizes complex information extracted from the Bitcoin network is presented.
QATAR UNIVERSITY COLLEGE OF ENGINEERING DEANONYMIZING TOR HIDDEN SERVICE USERS THROUGH BITCOIN TRANSACTIONS ANALYSIS BY HUSAM BASIL AL JAWAHERI
- Computer Science
- 2017
The feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a method of payment is investigated and a provable link between a Tor hidden service and its user is established by simply showing a transaction between their two corresponding addresses.
Trend of centralization in Bitcoin's distributed network
- Computer Science2015 IEEE/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD)
- 2015
A centralization factor is proposed which shows how centralized is the state of Bitcoin's network in different years and shows that the pure, decentralized protocol of Bitcoin is going toward centralization in its distributed network.
A Survey on Block chain Technology beyond Bitcoin
- Computer Science
- 2022
This white paper describes BC technology and some compelling specific applications in both financial and nonfinancial sector and looks at the challenges ahead and business opportunities in this fundamental technology that is all set to revolutionize the authors' digital world.
Solidus: Confidential Distributed Ledger Transactions via PVORM
- Computer ScienceCCS
- 2017
This paper presents Solidus, a protocol for confidential transactions on public blockchains, such as those required for asset transfers with on-chain settlement, and introduces the concept of a Publicly-Verifiable Oblivious RAM Machine (PVORM) to achieve strong confidentiality of this kind.
A Study on Security and Privacy related Issues in Blockchain Based Applications
- Computer Science, Mathematics2019 6th International Conference on Computing for Sustainable Global Development (INDIACom)
- 2019
A complete survey has been presented, taking into considerations, the current state of the research areas particularly in security and privacy aspects, and some of the novel ways of mitigating the risks of blockchains have also been discussed.
Solidus : Confidential Distributed Ledger Transactions via PVORM Extended Version
- Computer Science
- 2017
This paper presents Solidus, a protocol for confidential transactions on public blockchains, such as those required for asset transfers with on-chain settlement, and introduces the concept of a Publicly-Verifiable Oblivious RAM Machine (PVORM) to achieve strong confidentiality of this kind.
Sybil-Resistant Mixing for Bitcoin
- Computer ScienceWPES
- 2014
Xim is proposed, a two-party mixing protocol that is compatible with Bitcoin and related virtual currencies, and is the first decentralized protocol to simultaneously address Sybil attackers, denial-of-service attacks, and timing-based inference attacks.
Xim: Distributed Match-and-Mix for Bitcoin
- Computer Science
- 2014
Xim is proposed: a complete decentralized mixing protocol that aims to minimize the losses of an honest participant if they interact with an adversary, and is effective in deterring denial-of-service, inference, and Sybil attacks.
References
SHOWING 1-10 OF 32 REFERENCES
An Analysis of Anonymity in the Bitcoin System
- Computer Science, MathematicsPASSAT 2011
- 2011
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
- Computer Science, Mathematics2013 IEEE Symposium on Security and Privacy
- 2013
Zerocoin is proposed, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions and uses standard cryptographic assumptions and does not introduce new trusted parties or otherwise change the security model of Bitcoin.
Structure and Anonymity of the Bitcoin Transaction Graph
- Computer ScienceFuture Internet
- 2013
Dynamical effects of which some increase anonymity while others decrease it are found, and several parameters of the Bitcoin transaction graph seem to have become stationary over the last 12–18 months.
Quantitative Analysis of the Full Bitcoin Transaction Graph
- Computer ScienceFinancial Cryptography
- 2013
This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.
Untraceable electronic mail, return addresses, and digital pseudonyms
- Computer ScienceCACM
- 1981
A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of…
Using Linkability Information to Attack Mix-Based Anonymity Services
- Computer SciencePrivacy Enhancing Technologies
- 2009
This paper model information about linkability between messages as a weighted graph and shows lower and upper bounds with regards to the usefulness of linkability information for matching messages to senders.
Evaluating User Privacy in Bitcoin
- Computer Science, MathematicsFinancial Cryptography
- 2013
This research examines the use of pseudonymity in the Bitcoin network, and the role that it plays in the development of trust and confidence in the system.
Anonymity Attacks on Mix Systems: A Formal Analysis
- Computer ScienceInformation Hiding
- 2011
The main goal of this paper is to show how anonymity attacks on mix systems can be formally represented as noisy channels in the information-theoretic sense, which provides a deeper understanding of mix systems and prepares the field for a more rigorous and accurate analysis of possible attacks.
Towards Measuring Anonymity
- Computer SciencePrivacy Enhancing Technologies
- 2002
An information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections is introduced, which is based on the probabilities an attacker, after observing the system, assigns to the different users of the system as being the originators of a message.
Attacking Unlinkability: The Importance of Context
- Computer SciencePrivacy Enhancing Technologies
- 2007
A new metric is introduced that enables one to quantify the (un)linkability of the data items and, based on this, the effect of some simple contextual hints are considered.













