• Corpus ID: 35386114

Improving the Anonymity of the IOTA Cryptocurrency

@inproceedings{Tennant2017ImprovingTA,
  title={Improving the Anonymity of the IOTA Cryptocurrency},
  author={Laurence Tennant},
  year={2017}
}
  • L. Tennant
  • Published 2017
  • Computer Science, Mathematics
IOTA differentiates itself from other cryptocurrencies by being based on a non-blockchain data structure with a highly scalable approach to transaction confirmation. In addition, it exclusively uses post-quantum cryptography. However, as with most cryptocurrencies, IOTA’s ledger is currently completely transparent. Constructing an acceptable privacy solution within these parameters is a considerable challenge. The report begins with a brief introduction to IOTA, followed by a general overview… 

Figures from this paper

Privacy-Preserving Solutions for Blockchain: Review and Challenges
TLDR
The survey covers privacy techniques in public and permissionless blockchains, e.g. Bitcoin and Ethereum, as well as privacy-preserving research proposals and solutions in permissioned and private blockchains.
The Internet of Money between Anonymity and Publicity: Legal Challenges of Distributed Ledger Technologies in the Crypto Financial Landscape
TLDR
This research project aims to explore legal challenges posed in the IoM landscape by the double-edged nature of DLTs as both transparency and privacy-oriented, and to identify effective legislative and regulatory measures to ensure crypto accountability from an AML/CFT standpoint.
E-IOTA: an efficient and fast metamorphism for IOTA
TLDR
E-IOTA is proposed to solve the fairness problem and at the same time, guarantee the unpredictability of the tangle, and real scenario simulation shows that E-Iota offers better performance efficiency compared to G-IOTS and even original IOTA.
An Analysis of Cryptocurrency Governance
TLDR
It is found that despite cryptocurrency’s promise of minimizing governance, both Bitcoin and Ethereum rely heavily on trust networks, indicating that elements of non-technical governance are, in fact, crucial to their effectiveness.
Scalable and Secure Internet of Things Connectivity
TLDR
A framework that allows IoT devices to be securely connected and extended to other devices by automatically evaluating security using blockchain technology and the whitelist is proposed and applied to IoT network simulation environments and observed that the number of devices vulnerable to security was reduced by 48.5% compared with traditional IoT environments.
Blockchain and cryptocurrencies: A classification and comparison of architecture drivers
TLDR
A conceptual framework to aid software architects, developers, and decision makers to adopt the right blockchain technology, allowing to assess technologies more objectively and select the one that best fit developers' needs, ultimately cutting costs, reducing time‐to‐market and accelerating return on investment.
Anonymization Technologies of Cryptocurrency Transactions as Money Laundering Instrument
TLDR
This article formulates the problem of cryptocurrency laundering through anonymization services and offers solutions to this problem.
The Open Legal Challenges of Pursuing AML/CFT Accountability within Privacy-Enhanced IoM Ecosystems
TLDR
This research paper highlights a set of Anti-Money Laundering and Counter-Terrorist Financing challenges brought about in the Internet of Money landscape by the double-edged nature of Distributed Ledger Technologies (DLTs) as both transparency and privacy oriented.
Detecting Anomalous Cryptocurrency Transactions: an AML/CFT Application of Machine Learning-based Forensics
TLDR
It is claimed that the AML/CFT domain could benefit from novel graph analysis methods in machine learning, and the findings show that the Graph Convolutional Networks (GCN) and Graph Attention Networks (GAT) neural network types represent a promising solution for AML /CFT compliance.
SoK: Diving into DAG-based Blockchain Systems
TLDR
The security and performance of several leading systems are analyzed, followed by discussions and comparisons with concurrent (scaling blockchain) techniques, and open challenges are identified to highlight the potentiality of DAG-based solutions and indicate their promising directions for future research.
...
...

References

SHOWING 1-10 OF 41 REFERENCES
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
TLDR
It is shown how third-party web trackers can deanonymize users of cryptocurrencies, and if the user pays using a cryptocurrency, trackers typically possess enough information about the purchase to uniquely identify the transaction on the blockchain, link it to the user’s cookie, and further to the users’ real identity.
Privacy on the Blockchain: Unique Ring Signatures
  • R. Mercer
  • Computer Science, Mathematics
    ArXiv
  • 2016
TLDR
This work implements a unique ring signature (URS) scheme using secp256k1, creating the first implementation compatible with blockchain libraries in this way, so as for easy implementation as an Ethereum smart contract.
TumbleBit: An Untrusted Tumbler for Bitcoin-Compatible Anonymous Payments
TLDR
TumbleBit is presented, a new anonymous payments scheme that is fully compatible with today’s Bitcoin protocol and proves the security of TumbleBit using the ideal/real world paradigm and the random oracle model.
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
TLDR
CoinShuffle is a completely decentralized Bitcoin mixing protocol that allows users to utilize Bitcoin in a truly anonymous manner and it does not require any trusted, accountable or untrusted third party and it is perfectly compatible with the current Bitcoin system.
An inquiry into money laundering tools in the Bitcoin ecosystem
TLDR
A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.
An Analysis of Anonymity in the Bitcoin System
TLDR
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
TLDR
It is demonstrated that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal, and the scheme offers similar anonymity to traditional communication mixes against active attackers.
Stealth Address and Key Management Techniques in Blockchain Systems
TLDR
This paper overviews the historical development of Stealth Address techniques, specifies and compares all major variants proposed or used in practical systems, and shows that such techniques can be designed based on 2 distinct ECC arithmetic properties and how to combine both.
Anonymous Post-Quantum Cryptocash
TLDR
The privacy of users is protected, even though their transactions are recorded in the public ledger, by adopting the short quantum-resistant linkable ring signature scheme, which is anonymous and efficient.
Blindcoin: Blinded, Accountable Mixes for Bitcoin
TLDR
The Mixcoin protocol is modified to provide guarantees that the input/output address mapping for any user is kept hidden from the mixing server, and makes use of a blind signature scheme as well as an append-only public log.
...
...