Corpus ID: 8636806

The Ring of Gyges : Using Smart Contracts for Crime

@inproceedings{Juels2015TheRO,
  title={The Ring of Gyges : Using Smart Contracts for Crime},
  author={Ari Juels},
  year={2015}
}
Thanks to their anonymity (pseudonymity) and lack of trusted intermediaries, cryptocurrencies such as Bitcoin have created or stimulated growth in many businesses and communities. Unfortunately, some are criminal, e.g., money laundering, marketplaces for illicit goods, and ransomware. Next-generation cryptocurrencies such as Ethereum will include rich scripting languages in support of smart contracts, programs that autonomously intermediate transactions. We illuminate the extent to which these… Expand
The future of cryptocurrencies: Bitcoin and beyond
TLDR
On 15 September, Bitcoin officially came of age in academia with the launch of Ledger, the first journal dedicated to cryptocurrency research, which fascinates academics and entrepreneurs alike is the innovation at Bitcoin’s core, the block chain. Expand
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
TLDR
Hawk is a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view, and is the first to formalize the blockchain model of cryptography. Expand
Off-chain protocols for cryptocurrencies
TLDR
This work shows how to construct threshold signatures that are compatible with Bitcoin, and uses this primitive to build off-chain protocols for privacy-preserving access control and escrow services, and presents Arbitrum, a private and scalable smart contract system which enables running arbitrary smart contracts for which the code is executed off- chain and disputes are resolved on-chain. Expand
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
TLDR
This work formalizes the escrow problem and presents a suite of schemes with improved security and privacy properties that are compatible with Bitcoin and similar blockchain-based cryptocurrencies. Expand
Multi-party Fair Exchange Protocol with Smart Contract on Bitcoin
TLDR
A decentralized protocol for star topology based on the bitcoin that can guarantee fairness, resist double spending and sybil attack, and can be extended to apply to any topology. Expand
On Trees, Chains and Fast Transactions in the Blockchain
A fundamental open problem in the area of blockchain protocols is whether the Bitcoin protocol is the only solution for building a secure transaction ledger. A recently proposed and widely consideredExpand
Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systems
TLDR
A case study of privacy attitudes among collaborating actors in Monero, a cryptocurrency community that emphasises privacy and decentralisation alongside a set of values sometimes described as anti-establishment, crypto-anarchist, and/or cypherpunk, adopts a boundary object perspective to make sense of disagreements between collaborating social worlds. Expand
On Trees, Chains and Fast Transactions in the Blockchain
TLDR
This work studies from a provable security point of view the GHOST protocol, touted as offering superior performance compared to Bitcoin (potentially offering block production speed up by a factor of more than 40) without a security loss. Expand
Cheat Proof Escrow System for Blockchain
Unlike the normal transactions in blockchain, transactions made for property exchange are different because buyer or seller do not want to reveal any information to anyone and also, they are notExpand
How to Use SNARKs in Universally Composable Protocols
TLDR
Several constructions to transform SNARKs into UCsecure NIZKs are shown, along with benchmarks and an end-to-end application example showing that the added overhead is tolerable. Expand
...
1
2
3
...

References

SHOWING 1-10 OF 74 REFERENCES
Cryptovirology: extortion-based security threats and countermeasures
TLDR
The idea of Cryptovirology is presented, which employs a twist on cryptography, showing that it can be used offensively to mount extortion based attacks that cause loss of access to information, loss of confidentiality, and information leakage, tasks which cryptography typically prevents. Expand
On Tamper-Resistance from a Theoretical Viewpoint
TLDR
The theoretical model of trusted agent is proposed to formalize the notion of programmable secure hardware and shows that protocols not using tamper-proof devices are not deniable if malicious verifiers can use trusted agents. Expand
An inquiry into money laundering tools in the Bitcoin ecosystem
TLDR
A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system. Expand
Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
TLDR
Hawk is a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view, and is the first to formalize the blockchain model of cryptography. Expand
On blind signatures and perfect crimes
TLDR
A problematic aspect of blind signatures is discussed, showing that this perfect solution to protect the identity and privacy of a user can potentially lead to perfect crime. Expand
How Did Dread Pirate Roberts Acquire and Protect his Bitcoin Wealth?
TLDR
The publicly available record is used to trace the evolution of Ross William Ulbricht's holdings in order to find how he acquired and how he tried to hide them from the authorities, and show that all his Silk Road commissions were not seized by the FBI. Expand
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
TLDR
This work introduces the first electronic cash systems which incorporate trustee-based tracing but otherwise provably protect user anonymity, and expands on the provably anonymous electronic cash svstems of TB931 and lFY921. Expand
Zerocash: Decentralized Anonymous Payments from Bitcoin
TLDR
This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin. Expand
Secure Multiparty Computations on Bitcoin
TLDR
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions. Expand
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
TLDR
Zerocoin is proposed, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions and uses standard cryptographic assumptions and does not introduce new trusted parties or otherwise change the security model of Bitcoin. Expand
...
1
2
3
4
5
...