TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
@inproceedings{Heilman2017TumbleBitAU, title={TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub}, author={Ethan Heilman and Leen Alshenibr and Foteini Baldimtsi and Alessandra Scafuro and Sharon Goldberg}, booktitle={NDSS}, year={2017} }
This paper presents TumbleBit, a new unidirectional unlinkable payment hub that is fully compatible with today’s Bitcoin protocol. TumbleBit allows parties to make fast, anonymous, off-blockchain payments through an untrusted intermediary called the Tumbler. TumbleBit’s anonymity properties are similar to classic Chaumian eCash: no one, not even the Tumbler, can link a payment from its payer to its payee. Every payment made via TumbleBit is backed by bitcoins, and comes with a guarantee that…
192 Citations
Transferable Anonymous Payments via TumbleBit in Permissioned Blockchains
- Computer Science, MathematicsDLT@ITASEC
- 2019
This work modifications the first step of the TumbleBit protocol by making the tumbler node sending a P2SH transaction on the blockchain claiming that any user can redeem 1 Bitcoin by providing a SHA-2 preimage of a value chosen by the Tumbler.
Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin
- Computer Science, MathematicsIEEE Access
- 2018
This work presents an unlinkable coin mixing scheme that allows users to mix their bitcoins without trusting a third party and security and privacy of the mixing scheme are ensured through the standard ring signature and ECDSA unforgeability.
Möbius: Trustless Tumbling for Transaction Privacy
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2017
Möbius achieves strong notions of anonymity, as even malicious senders cannot identify which pseudonyms belong to the recipients to whom they sent money, and is able to resist denial-of-service attacks.
Astrape: Anonymous Payment Channels with Boring Cryptography
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2022
Astrape is presented, a novel PCN construction that achieves strong security and anonymity guarantees with simple, black-box cryptography, given a blockchain with flexible scripting.
Nirvana: Instant and Anonymous Payment-Guarantees
- Computer Science
- 2022
A novel randomness-reusable threshold encryption that mitigates double-spending by revealing the identities of malicious users and ensuring customer anonymity within the system while only relying on efficient Groth-Sahai proof systems is introduced.
A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
- Computer Science, Mathematics2021 IEEE Symposium on Security and Privacy (SP)
- 2021
In theory, it is demonstrated for the first time that it is possible to design a secure and privacy-preserving PCH while requiring only digital signatures and timelock functionality from the underlying scripting language, which makes this PCH backwards compatible with virtually all cryptocurrencies available today.
Mixing Confidential Transactions: Comprehensive Transaction Privacy for Bitcoin
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 2017
ValueShuffle is designed, the first coin mixing protocol compatible with Confidential Transactions, a proposed enhancement to the Bitcoin protocol to hide payment values in the blockchain, and makes it possible to mix funds of different value as well as to mix and spend funds in the same transaction, which overcomes the two main limitations of previous coin mixing protocols.
A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2018
This survey presents guidelines for designing an anonymity/privacy improvement and discusses future research directions, and examines the studies in the literature/Web in two major categories: analyses of anonymity and privacy in Bitcoin and extensions and alternatives to Bitcoin, which improve anonymity and Privacy.
Bitcoin Privacy - A Survey on Mixing Techniques
- Computer ScienceIACR Cryptol. ePrint Arch.
- 2021
This survey focuses on comparing and evaluating mixing techniques in the Bitcoin blockchain, present their limitations, and highlight the new challenges.
TumbleBit++: A Comprehensive Privacy Protocol Providing Anonymity and Amount-Invisibility
- Computer Science, MathematicsProvSec
- 2019
Since the advent of bitcoin, the privacy of bitcoin has become a hot issue, but due to the publicity of blockchain, the confidentiality of transaction amounts has not been provided.
References
SHOWING 1-10 OF 71 REFERENCES
Zerocash: Decentralized Anonymous Payments from Bitcoin
- Computer Science2014 IEEE Symposium on Security and Privacy
- 2014
This paper formulate and construct decentralized anonymous payment schemes (DAP schemes) and builds Zero cash, a practical instantiation of the DAP scheme construction that is orders of magnitude more efficient than the less-anonymous Zero coin and competitive with plain Bit coin.
CoinParty: Secure Multi-Party Mixing of Bitcoins
- Computer Science, MathematicsCODASPY
- 2015
By the application of threshold signatures to Bitcoin mixing, CoinParty achieves anonymity by orders of magnitude higher than related work as it is quantified by analyzing transactions in the actual Bitcoin blockchain and is first among related approaches to provide plausible deniability.
Blindly Signed Contracts: Anonymous On-Blockchain and Off-Blockchain Bitcoin Transactions
- Computer Science, MathematicsFinancial Cryptography Workshops
- 2016
Although Bitcoin is often perceived to be an anonymous currency, research has shown that a user’s Bitcoin transactions can be linked to compromise the user’s anonymity. We present solutions to the…
Bolt: Anonymous Payment Channels for Decentralized Currencies
- Computer ScienceCCS
- 2017
This work introduces techniques for constructing anonymous payment channels, including a technique that allows payments via untrusted intermediaries, and builds a concrete implementation of the scheme and shows that it can be deployed via a soft fork to existing anonymous currencies such as ZCash.
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
- Computer Science, MathematicsESORICS
- 2014
CoinShuffle is a completely decentralized Bitcoin mixing protocol that allows users to utilize Bitcoin in a truly anonymous manner and it does not require any trusted, accountable or untrusted third party and it is perfectly compatible with the current Bitcoin system.
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
- Computer Science, Mathematics2013 IEEE Symposium on Security and Privacy
- 2013
Zerocoin is proposed, a cryptographic extension to Bitcoin that augments the protocol to allow for fully anonymous currency transactions and uses standard cryptographic assumptions and does not introduce new trusted parties or otherwise change the security model of Bitcoin.
Efficient Zero-Knowledge Contingent Payments in Cryptocurrencies Without Scripts
- Computer Science, MathematicsESORICS
- 2016
Although smart contracts are believed to have a huge potential, for the moment they are not widely used in practice, because most of Bitcoin miners allow only to post standard transactions on the blockchain, it is currently very hard to create non-trivial smart contracts in Bitcoin.
Secure Multiparty Computations on Bitcoin
- Computer Science, Mathematics2014 IEEE Symposium on Security and Privacy
- 2014
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.
Mixcoin: Anonymity for Bitcoin with Accountable Mixes
- Computer ScienceFinancial Cryptography
- 2014
It is demonstrated that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal, and the scheme offers similar anonymity to traditional communication mixes against active attackers.
Sybil-Resistant Mixing for Bitcoin
- Computer ScienceWPES
- 2014
Xim is proposed, a two-party mixing protocol that is compatible with Bitcoin and related virtual currencies, and is the first decentralized protocol to simultaneously address Sybil attackers, denial-of-service attacks, and timing-based inference attacks.