Nothing Special   »   [go: up one dir, main page]

skip to main content
review-article
Public Access

Privacy in decentralized cryptocurrencies

Published: 23 May 2018 Publication History

Abstract

When it comes to anonymizing cryptocurrencies, one size most definitely does not fit all.

References

[1]
Androulaki, E., Karame, G., Roeschlin, M., Scherer, T. and Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of FC 2013, 34--51.
[2]
Ben-Sasson, E., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E. and Virza, M. Zerocash: Decentralized anonymous payments from Bitcoin. In Proceedings of IEEE SP 2014, 459--474.
[3]
Biryukov, A. and Khovratovich, D. Equihash: Asymmetric proof-of-work based on the Generalized Birthday Problem. In Proceedings of NDSS 2016.
[4]
Biryukov, A. and Khovratovich, D. and Pustogarov, I. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of ACM CCS 2014, 15--29.
[5]
Biryukov, A. and Pustogarov, I. Bitcoin over Tor isn't a Good Idea. In Proceedings of IEEE SP, 2015, 122--134.
[6]
Bissias, G.D., Ozisik, A.P., Levine, B.N. and Liberatore, M. Sybil-resistant mixing for Bitcoin. In Proceedings of WPES, 2014, 149--158.
[7]
Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A. and Felten, E.W. SoK: Research perspectives and challenges for Bitcoin and cryptocurrencies. In Proceedings of IEEE SP, 2015, 104--121.
[8]
Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J.A. and Felten, E.W. Mixcoin: Anonymity for Bitcoin with accountable mixes. In Proceedings of FC, 2014, 486--504.
[9]
Camenisch, J. and Lysyanskaya, A. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Proceedings of CRYPTO, 2002, 61--76.
[10]
Canetti, R. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of FOCS, 2001, 136--145.
[11]
Chaum, D. Blind signatures for untraceable payments. In Proceedings of CRYPTO '82, 199-203.
[12]
Fujisaki, E. and Suzuki, K. Traceable ring signature. In Proceedings of PKC, 2007, 181--200.
[13]
Gennaro, R., Gentry, C., Parno, B. and Raykova, M. Quadratic span programs and succinct NIZKs without PCPs. In Proceedings of EUROCRYPT, 2013, 626--645.
[14]
Gentry, C. and Wichs, D. Separating succinct non-interactive arguments from all falsifiable assumptions. In Proceedings of STOC, 2011, 99--108.
[15]
Green, M.D. and Miers, I. Bolt: Anonymous payment channels for decentralized currencies. IACR Cryptology ePrint Archive, 2016, 701.
[16]
Heilman, E., Baldimtsi, F., Alshenibr, L., Scafuro, A. and Goldberg, S. TumbleBit: An untrusted tumbler for Bitcoin-compatible anonymous payments. In Proceedings of NDSS, 2017.
[17]
Hileman, G. and Rauchs, M. Global cryptocurrency benchmarking study. Cambridge Centre for Alternative Finance Global Cryptocurrency Benchmarking Study, 2017.
[18]
Juels A., Kosba, A. E., and Shi, E. The ring of Gyges: Investigating the future of criminal smart contracts. In Proceedings of ACM CCS, 2016, 283--295.
[19]
Kosba, A.E., Miller, A., Shi, E, Wen, Z., and Papamanthou, C. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of IEEE SP, 2016, 839--858.
[20]
Maxwell, G. CoinJoin: Bitcoin privacy for the real world. bitcointalk.org, Aug. 2013.
[21]
Maxwell, G. CoinSwap: Transaction graph disjoint trustless trading. bitcointalk.org, Oct. 2013.
[22]
Meiklejohn, S. and Orlandi, C. Privacy-enhancing overlays in Bitcoin. In Proceedings of FC Workshops, BITCOIN, WAHC, and Wearable, 2015, 127--141.
[23]
Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., and Savage, S. A fistful of Bitcoins: Characterizing payments among men with no names. In Proceedings of IMC, 2013, 127--140.
[24]
Merkle, R.C. A certified digital signature. In Proceedings of CRYPTO '89, 218--238.
[25]
Miers, I., Garman, C., Green, M., and Rubin, A.D. Zerocoin: Anonymous distributed e-cash from Bitcoin. In Proceedings of IEEE SP, 2013, 397--411.
[26]
Moreno-Sanchez, P., Kate, A., Maffei, M., and Pecina, K. Privacy preserving payments in credit networks: Enabling trust with privacy in online marketplaces. In Proceedings of NDSS, 2015.
[27]
Möser, M. An Inquiry into Money Laundering Tools in the Bitcoin Ecosystem. In IEEE 2013 eCrime Researchers Summit.
[28]
Nakamoto, S. Bitcoin: A Peer-to-Peer Electronic Cash System, 2008; http://bitcoin.org/bitcoin.pdf.
[29]
Noether, S., Mackenzie, A., and the Monero Research Lab. Ring confidential transactions. Ledger 1 (2016) 1--18.
[30]
Reid, F. and Harrigan, M. An analysis of anonymity in the Bitcoin system. In Proceedings of IEEE PASSAT and SocialCom, 2011, 1318--1326.
[31]
Ron, D. and Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. In Proceedings of FC 2013, 6--24.
[32]
Ruffing, T. and Moreno-Sanchez, P. Mixing confidential transactions: Comprehensive transaction privacy for bitcoin. IACR Cryptology ePrint Archive, 2017, 238.
[33]
Ruffing, T., Moreno-Sanchez, P., and Kate, A. CoinShuffle: Practical decentralized coin mixing for Bitcoin. In Proceedings of ESORICS, 2014.
[34]
Ruffing, T., Moreno-Sanchez, P., and Kate, A. P2P mixing and unlinkable Bitcoin transactions. In Proceedings of NDSS, 2017.
[35]
Sahai, A. Non-malleable non-interactive zero knowledge and adaptive chosen ciphertext security. In Proceedings of FOCS '99, 543--553.
[36]
Sweeney, L. k-Anonymity: A model for protecting privacy. Intern. J. Uncertainty, Fuzziness and Knowledge-Based Systems 10, 5 (2002), 557--570.
[37]
Valenta, L. and Rowan, B. Blindcoin: Blinded, accountable mixes for Bitcoin. In Proceedings of the 2015 FC International Workshops, BITCOIN, WAHC, and Wearable, 112--126.
[38]
van Saberhagen, N. CryptoNote v 2.0; https://cryptonote.org/whitepaper.pdf.
[39]
Ziegeldorf, J. H., Grossmann, F., Henze, M., Inden, N., and Wehrle, K. CoinParty: Secure multi-party mixing of Bitcoins. CODASPY (2015), 75--86.

Cited By

View all
  • (2024)On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive SurveyACM Computing Surveys10.1145/367616456:12(1-35)Online publication date: 29-Jun-2024
  • (2023)What determines FinTech success?—A taxonomy-based analysis of FinTech success factorsElectronic Markets10.1007/s12525-023-00626-733:1Online publication date: 19-May-2023
  • (2021)SoK: Money Laundering in CryptocurrenciesProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465774(1-10)Online publication date: 17-Aug-2021
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 61, Issue 6
June 2018
97 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/3229066
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 May 2018
Published in CACM Volume 61, Issue 6

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Review-article
  • Popular
  • Refereed

Funding Sources

  • U.S. Department of Commerce, National Institute of Standards and Technology
  • 2017-2018 Rothschild Postdoctoral Fellowship
  • NSF
  • Defense Advanced Research Project Agency (DARPA)

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)558
  • Downloads (Last 6 weeks)34
Reflects downloads up to 14 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive SurveyACM Computing Surveys10.1145/367616456:12(1-35)Online publication date: 29-Jun-2024
  • (2023)What determines FinTech success?—A taxonomy-based analysis of FinTech success factorsElectronic Markets10.1007/s12525-023-00626-733:1Online publication date: 19-May-2023
  • (2021)SoK: Money Laundering in CryptocurrenciesProceedings of the 16th International Conference on Availability, Reliability and Security10.1145/3465481.3465774(1-10)Online publication date: 17-Aug-2021
  • (2021)Identifying Darknet Vendor Wallets by Matching Feedback Reviews with Bitcoin Transactions2021 International Conference on Data Mining Workshops (ICDMW)10.1109/ICDMW53433.2021.00102(788-797)Online publication date: Dec-2021
  • (2021)An Efficient Blockchain Consensus Algorithm Based on Post-Quantum Threshold SignatureBig Data Research10.1016/j.bdr.2021.10026826:COnline publication date: 15-Nov-2021
  • (2021)An Identity-Based Blind Signature and Its Application for Privacy Preservation in BitcoinApplied Cryptography in Computer and Communications10.1007/978-3-030-80851-8_2(10-24)Online publication date: 5-Jul-2021
  • (2020)Those who control the code control the rules: How different perspectives of privacy are being written into the code of blockchain systemsJournal of Information Technology10.1177/026839622094440636:1(16-38)Online publication date: 27-Aug-2020
  • (2020)Non-Interactive Zero-Knowledge for Blockchain: A SurveyIEEE Access10.1109/ACCESS.2020.30460258(227945-227961)Online publication date: 2020
  • (2020)Transaction Privacy Preservations for Blockchain TechnologyInternational Conference on Innovative Computing and Communications10.1007/978-981-15-5148-2_34(377-393)Online publication date: 31-Jul-2020
  • (2020)Identity ProtectionDigital Transformation of Identity in the Age of Artificial Intelligence10.1007/978-981-15-2248-2_5(73-88)Online publication date: 20-Feb-2020
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Digital Edition

View this article in digital edition.

Digital Edition

Magazine Site

View this article on the magazine site (external)

Magazine Site

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media