Cryptocurrency Address Clustering and Labeling
- URL: http://arxiv.org/abs/2003.13399v1
- Date: Mon, 30 Mar 2020 12:34:11 GMT
- Title: Cryptocurrency Address Clustering and Labeling
- Authors: Mengjiao Wang, Hikaru Ichijo and Bob Xiao
- Abstract summary: Anonymity is one of the most important qualities of blockchain technology.
In general, the real identity behind cryptocurrency addresses is not known.
Some addresses can be clustered according to their ownership by analyzing behavioral patterns.
- Score: 2.475112368179548
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Anonymity is one of the most important qualities of blockchain technology.
For example, one can simply create a bitcoin address to send and receive funds
without providing KYC to any authority. In general, the real identity behind
cryptocurrency addresses is not known, however, some addresses can be clustered
according to their ownership by analyzing behavioral patterns, allowing those
with known attribution to be assigned labels. These labels may be further used
for legal and compliance purposes to assist in law enforcement investigations.
In this document, we discuss our methodology behind assigning attribution
labels to cryptocurrency addresses.
Related papers
- The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - IT Strategic alignment in the decentralized finance (DeFi): CBDC and digital currencies [49.1574468325115]
Decentralized finance (DeFi) is a disruptive-based financial infrastructure.
This paper seeks to answer two main questions 1) What are the common IT elements in the DeFi?
And 2) How the elements to the IT strategic alignment in DeFi?
arXiv Detail & Related papers (2024-05-17T10:19:20Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - Interplay between Cryptocurrency Transactions and Online Financial
Forums [41.94295877935867]
This study focuses on the study of the interplay between these cryptocurrency forums and fluctuations in cryptocurrency values.
It shows that the activity of Bitcointalk forum keeps a direct relationship with the trend in the values of BTC.
The experiment highlights that forum data can explain specific events in the financial field.
arXiv Detail & Related papers (2023-11-27T16:25:28Z) - Demystifying Bitcoin Address Behavior via Graph Neural Networks [20.002509270755443]
BAClassifier is a tool that can automatically classify bitcoin addresses based on their behaviors.
We construct and release a large-scale annotated dataset that consists of over 2 million real-world bitcoin addresses.
arXiv Detail & Related papers (2022-11-26T14:55:50Z) - Towards Measuring the Traceability of Cryptocurrencies [0.5371337604556311]
We put forward a formal framework to measure the (un)traceability and anonymity of cryptocurrencies.
Our work provides the first practical, efficient, and probabilistic measure to assess the traceability of cryptocurrencies.
We implement and extensively evaluate our proposed traceability measure on several cryptocurrency transaction graphs.
arXiv Detail & Related papers (2022-11-08T14:08:39Z) - Towards Malicious address identification in Bitcoin [3.646526715728388]
We generate the temporal and non-temporal feature set and train the Machine Learning (ML) algorithm over different temporal granularities to validate methods.
A comparative analysis of results show that the behavior of addresses in and Bitcoin is similar with respect to in-degree, out-degree and inter-event time.
We identify 3 suspects that showed malicious behavior across different temporal granularities.
arXiv Detail & Related papers (2021-12-22T08:11:58Z) - Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase [2.94824047753242]
In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
arXiv Detail & Related papers (2021-12-21T07:32:22Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Collaborative Deanonymization [0.0]
We propose protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner.
We illustrate how the protocols could apply to Monero rings and CoinJoin transactions in Bitcoin.
arXiv Detail & Related papers (2020-05-07T15:03:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.