Abstract
When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all.
- Androulaki, E., Karame, G., Roeschlin, M., Scherer, T. and Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of FC 2013, 34--51.Google ScholarCross Ref
- Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E. and Virza, M. Zerocash: Decentralized anonymous payments from Bitcoin. In Proceedings of IEEE SP 2014, 459--474. Google ScholarDigital Library
- Biryukov, A. and Khovratovich, D. Equihash: Asymmetric proof-of-work based on the Generalized Birthday Problem. In Proceedings of NDSS 2016.Google ScholarCross Ref
- Biryukov, A. and Khovratovich, D. and Pustogarov, I. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of ACM CCS 2014, 15--29. Google ScholarDigital Library
- Biryukov, A. and Pustogarov, I. Bitcoin over Tor isn't a Good Idea. In Proceedings of IEEE SP, 2015, 122--134. Google ScholarDigital Library
- Bissias, G.D., Ozisik, A.P., Levine, B.N. and Liberatore, M. Sybil-resistant mixing for Bitcoin. In Proceedings of WPES, 2014, 149--158. Google ScholarDigital Library
- Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A. and Felten, E.W. SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In Proceedings of IEEE SP, 2015, 104--121. Google ScholarDigital Library
- Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A. and Felten, E.W. Mixcoin: Anonymity for Bitcoin with accountable mixes. In Proceedings of FC, 2014, 486--504.Google Scholar
- Camenisch, J. and Lysyanskaya, A. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of CRYPTO, 2002, 61--76. Google ScholarDigital Library
- Canetti, R. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of FOCS, 2001, 136--145. Google ScholarDigital Library
- Chaum, D. Blind signatures for untraceable payments. In Proceedings of CRYPTO '82, 199-203.Google Scholar
- Fujisaki, E. and Suzuki, K. Traceable ring signature. In Proceedings of PKC, 2007, 181--200. Google ScholarDigital Library
- Gennaro, R., Gentry, C., Parno, B. and Raykova, M. Quadratic span programs and succinct NIZKs without PCPs. In Proceedings of EUROCRYPT, 2013, 626--645.Google Scholar
- Gentry, C. and Wichs, D. Separating succinct non-interactive arguments from all falsifiable assumptions. In Proceedings of STOC, 2011, 99--108. Google ScholarDigital Library
- Green, M.D. and Miers, I. Bolt: Anonymous payment channels for decentralized currencies. IACR Cryptology ePrint Archive, 2016, 701.Google Scholar
- Heilman, E., Baldimtsi, F., Alshenibr, L., Scafuro, A. and Goldberg, S. TumbleBit: An untrusted tumbler for Bitcoin-compatible anonymous payments. In Proceedings of NDSS, 2017.Google Scholar
- Hileman, G. and Rauchs, M. Global cryptocurrency benchmarking study. Cambridge Centre for Alternative Finance Global Cryptocurrency Benchmarking Study, 2017.Google Scholar
- Juels A., Kosba, A. E., and Shi, E. The ring of Gyges: Investigating the future of criminal smart contracts. In Proceedings of ACM CCS, 2016, 283--295. Google ScholarDigital Library
- Kosba, A.E., Miller, A., Shi, E, Wen, Z., and Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of IEEE SP, 2016, 839--858.Google Scholar
- Maxwell, G. CoinJoin: Bitcoin privacy for the real world. bitcointalk.org, Aug. 2013.Google Scholar
- Maxwell, G. CoinSwap: Transaction graph disjoint trustless trading. bitcointalk.org, Oct. 2013.Google Scholar
- Meiklejohn, S. and Orlandi, C. Privacy-enhancing overlays in Bitcoin. In Proceedings of FC Workshops, BITCOIN, WAHC, and Wearable, 2015, 127--141.Google ScholarCross Ref
- Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of IMC, 2013, 127--140. Google ScholarDigital Library
- Merkle, R.C. A certified digital signature. In Proceedings of CRYPTO '89, 218--238. Google ScholarDigital Library
- Miers, I., Garman, C., Green, M., and Rubin, A.D. Zerocoin: Anonymous distributed e-cash from Bitcoin. In Proceedings of IEEE SP, 2013, 397--411. Google ScholarDigital Library
- Moreno-Sanchez, P., Kate, A., Maffei, M., and Pecina, K. Privacy preserving payments in credit networks: Enabling trust with privacy in online marketplaces. In Proceedings of NDSS, 2015.Google ScholarCross Ref
- Möser, M. An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In IEEE 2013 eCrime Researchers Summit.Google ScholarCross Ref
- Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008; http://bitcoin.org/bitcoin.pdf.Google Scholar
- Noether, S., Mackenzie, A., and the Monero Research Lab. Ring confidential transactions. Ledger 1 (2016) 1--18.Google ScholarCross Ref
- Reid, F. and Harrigan, M. An analysis of anonymity in the Bitcoin system. In Proceedings of IEEE PASSAT and SocialCom, 2011, 1318--1326.Google Scholar
- Ron, D. and Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. In Proceedings of FC 2013, 6--24.Google ScholarCross Ref
- Ruffing, T. and Moreno-Sanchez, P. Mixing confidential transactions: Comprehensive transaction privacy for bitcoin. IACR Cryptology ePrint Archive, 2017, 238.Google Scholar
- Ruffing, T., Moreno-Sanchez, P., and Kate, A. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In Proceedings of ESORICS, 2014. Google ScholarDigital Library
- Ruffing, T., Moreno-Sanchez, P., and Kate, A. P2P mixing and unlinkable Bitcoin transactions. In Proceedings of NDSS, 2017.Google ScholarCross Ref
- Sahai, A. Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In Proceedings of FOCS '99, 543--553. Google ScholarDigital Library
- Sweeney, L. k-Anonymity: A model for protecting privacy. Intern. J. Uncertainty, Fuzziness and Knowledge-Based Systems 10, 5 (2002), 557--570. Google ScholarDigital Library
- Valenta, L. and Rowan, B. Blindcoin: Blinded, accountable mixes for Bitcoin. In Proceedings of the 2015 FC International Workshops, BITCOIN, WAHC, and Wearable, 112--126.Google Scholar
- van Saberhagen, N. CryptoNote v 2.0; https://cryptonote.org/whitepaper.pdf.Google Scholar
- Ziegeldorf, J. H., Grossmann, F., Henze, M., Inden, N., and Wehrle, K. CoinParty: Secure multi-party mixing of Bitcoins. CODASPY (2015), 75--86. Google ScholarDigital Library
Index Terms
- Privacy in decentralized cryptocurrencies
Recommendations
Toward Privacy and Regulation in Blockchain-Based Cryptocurrencies
Privacy is supreme in cryptocurrencies since most users do not want to reveal their identities or the transaction amount in financial transactions. Nevertheless, achieving privacy in blockchain-based cryptocurrencies remains challenging since blockchain ...
Understanding Privacy-Preserving Techniques in Digital Cryptocurrencies
Algorithms and Architectures for Parallel ProcessingAbstractAsset security and transaction efficiency have always been concerned, so that digital cryptocurrencies based on blockchain are increasingly favored. In the transaction, it is necessary to effectively protect private information such as identity ...
Cryptocurrencies: Transparency Versus Privacy [Cybertrust]
Reports on cryptocurrencies and examined issues and concerns of privacy and information security. Cryptocurrencies can have significant privacy costs. A motivated adversary has available a range of actions to identify the actual user associated with a ...
Comments