Collaborative Deanonymization
- URL: http://arxiv.org/abs/2005.03535v2
- Date: Fri, 26 Feb 2021 10:52:35 GMT
- Title: Collaborative Deanonymization
- Authors: Patrik Keller, Martin Florian, Rainer B\"ohme
- Abstract summary: We propose protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner.
We illustrate how the protocols could apply to Monero rings and CoinJoin transactions in Bitcoin.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Privacy-seeking cryptocurrency users rely on anonymization techniques like
CoinJoin and ring transactions. By using such technologies benign users
potentially provide anonymity to bad actors. We propose overlay protocols to
resolve the tension between anonymity and accountability in a peer-to-peer
manner. Cryptocurrencies can adopt this approach to enable prosecution of
publicly recognized crimes. We illustrate how the protocols could apply to
Monero rings and CoinJoin transactions in Bitcoin.
Related papers
- The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Interplay between Cryptocurrency Transactions and Online Financial
Forums [41.94295877935867]
This study focuses on the study of the interplay between these cryptocurrency forums and fluctuations in cryptocurrency values.
It shows that the activity of Bitcointalk forum keeps a direct relationship with the trend in the values of BTC.
The experiment highlights that forum data can explain specific events in the financial field.
arXiv Detail & Related papers (2023-11-27T16:25:28Z) - Heuristics for Detecting CoinJoin Transactions on the Bitcoin Blockchain [23.23031523964561]
This research delves into the intricacies of Bitcoin, a decentralized peer-to-peer network, and its associated blockchain.
To address this concern, users have adopted CoinJoin, a method that amalgamates multiple transaction intents into a single, larger transaction.
Our exhaustive analysis covers up to block 760,000, offering a comprehensive insight into CoinJoin transactions.
arXiv Detail & Related papers (2023-11-21T10:05:32Z) - SeDe: Balancing Blockchain Privacy and Regulatory Compliance by Selective De-Anonymization [0.3749861135832073]
We propose a framework that balances privacy-preserving features by establishing a regulatory and compliant framework called Selective De-Anonymization (SeDe)
Our technique achieves this without leaving de-anonymization decisions or control in the hands of a single entity but distributing it among multiple entities while holding them accountable for their respective actions.
arXiv Detail & Related papers (2023-11-14T13:49:13Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Reputation-based PoS for the Restriction of Illicit Activities on
Blockchain: Algorand Usecase [2.94824047753242]
In recent times, different machine learning-based techniques can detect such criminal elements based on blockchain transaction data.
We propose a reputation-based methodology for response to the users detected carrying out the aforementioned illicit activities.
arXiv Detail & Related papers (2021-12-21T07:32:22Z) - Summarizing and Analyzing the Privacy-Preserving Techniques in Bitcoin and other Cryptocurrencies [0.6138671548064355]
We present some well-known attacks and analysis techniques that have compromised the privacy of Bitcoin and many other similar.
We also analyze and study different privacy-preserving algorithms and the problems these algorithms manage to solve.
arXiv Detail & Related papers (2021-09-16T00:24:19Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Cryptocurrency Address Clustering and Labeling [2.475112368179548]
Anonymity is one of the most important qualities of blockchain technology.
In general, the real identity behind cryptocurrency addresses is not known.
Some addresses can be clustered according to their ownership by analyzing behavioral patterns.
arXiv Detail & Related papers (2020-03-30T12:34:11Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.