48 Hits in 2.4 sec

On How Zero-Knowledge Proof Blockchain Mixers Improve, and Worsen User Privacy [article]

Zhipeng Wang, Stefanos Chaliasos, Kaihua Qin, Liyi Zhou, Lifeng Gao, Pascal Berrang, Ben Livshits, Arthur Gervais
2022 arXiv   pre-print
However, contrary to the claims of related work, we find that AM does not always contribute to improving the quality of an anonymity set size of a mixer, because AM tends to attract privacy-ignorant users  ...  We propose five heuristics that, in combination, can increase the probability that an adversary links a withdrawer to the correct depositor on average by 51.94 (108.63 mixer, respectively.  ...  While privacy-preserving blockchains [33] , [42] , [27] successfully protect their users' privacy, retrofitting a blockchain with privacy has proven challenging and remains an active research area  ... 
arXiv:2201.09035v1 fatcat:dvagoy7s2zbmdm2qzspkhyty5m

Characterizing key agents in the cryptocurrency economy through blockchain transaction analysis

Xiao Fan Liu, Huan-Huan Ren, Si-Hao Liu, Xian-Jian Jiang
2021 EPJ Data Science  
The results showed that cryptocurrency exchanges and online wallets have signature behavior patterns and hence can be accurately distinguished from other agents.  ...  That is, they cannot be associated with any real "off-chain" identify of actual users. Nonetheless, identifying the economic roles of the addresses from their past behaviors is still feasible.  ...  Airdrop services, preserving a certain extent of particular transactional features, can be identified with >80% probability.  ... 
doi:10.1140/epjds/s13688-021-00276-9 fatcat:7n2r5w2cwzbelll7gq624u6foe

Staying Secure and Unprepared: Understanding and Mitigating the Security Risks of Apple ZeroConf

Xiaolong Bai, Luyi Xing, Nan Zhang, XiaoFeng Wang, Xiaojing Liao, Tongxin Li, Shi-Min Hu
2016 2016 IEEE Symposium on Security and Privacy (SP)  
Our research shows that the new protection fits well with the existing ZeroConf systems such as AirDrop.  ...  , turn out to be completely vulnerable to an impersonation or Man-in-the-Middle (MitM) attack, even though attempts have been made to protect them against such threats.  ...  right recipient of data.  ... 
doi:10.1109/sp.2016.45 dblp:conf/sp/BaiXZWLLH16 fatcat:auo4nmixmze3zavajrfrvtjcum

Privacy, Discovery, and Authentication for the Internet of Things [article]

David J. Wu and Ankur Taly and Asim Shankar and Dan Boneh
2017 arXiv   pre-print
Finally, we discuss some privacy limitations of the Apple AirDrop protocol (a peer-to-peer file sharing mechanism) and show how to improve the privacy of Apple AirDrop using our private mutual authentication  ...  We integrate our protocols into an existing open-source distributed applications framework, and provide benchmarks on multiple hardware platforms: Intel Edisons, Raspberry Pis, smartphones, laptops, and  ...  We thank Felix Günther for pointing out an error in an earlier version of our private discovery protocol.  ... 
arXiv:1604.06959v3 fatcat:45marxb3xzekflyu35yx2b3uay

Analysis of Address Linkability in Tornado Cash on Ethereum [chapter]

Yujia Tang, Chang Xu, Can Zhang, Yan Wu, Liehuang Zhu
2022 Communications in Computer and Information Science  
However, some inappropriate transaction behaviors in Tornado Cash mixing mechanism lead to the risk of privacy leakage.  ...  AbstractTornado Cash, the most popular non-custodial coin mixer on Ethereum, is widely used to protect the privacy of addresses.  ...  With the increasing attention to privacy protection, more and more users are trying to hide the association between their own addresses using privacy preservation mechanisms such as coin mixing [3, [8  ... 
doi:10.1007/978-981-16-9229-1_3 fatcat:l7654lh4fvh4jjc2q2e3dyhymq

Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-Resistance in Proof of Personhood Protocols

Divya Siddarth, Sergey Ivliev, Santiago Siri, Paula Berman
2020 Frontiers in Blockchain  
In doing so, these projects illustrate that the best technologies do not abstract away subjectivity but instead embrace it as a necessity and strength.  ...  Lacking protocols in place to account for subjectivity, these systems do not form new sources of legitimacy that can address the central question concerning identity authentication: "Who verifies the verifier  ...  party) and being privacy-preserving (one can acquire and utilize an identifier without revealing personally-identifying information in the process).  ... 
doi:10.3389/fbloc.2020.590171 fatcat:e72zwsczqjbdfldfqgh7odlwfm

A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems [article]

Loic Lesavre, Priam Varin, Peter Mell, Michael Davidson, James Shook
2019 arXiv   pre-print
We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.  ...  Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking.  ...  Separately, architectures that put less data on-chain may in general be more privacy preserving, but it depends on the exact architecture being used and how that data is being stored (e.g., unencrypted  ... 
arXiv:1908.00929v1 fatcat:kjio3c33dng55cwz7aszvarr5q

Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [article]

Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins
2020 arXiv   pre-print
It applies an account-based model, which is inferior to Bitcoin's unspent transaction output model from a privacy perspective.  ...  In our privacy analysis of Ethereum's account-based model, we describe several patterns that characterize only a limited set of users and successfully apply these quasi-identifiers in address deanonymization  ...  Let F denote the event that a fingerprint of an address remains unchanged.  ... 
arXiv:2005.14051v2 fatcat:ui7g3ilqhjdohbwgyjmtzqdaw4

Secure Multi-User Content Sharing for Augmented Reality Applications

Kimberly Ruth, Tadayoshi Kohno, Franziska Roesner
2019 USENIX Security Symposium  
We design an AR content sharing control module that achieves these goals and build a prototype implementation (ShareAR) for the HoloLens.  ...  While prior work on AR security and privacy has studied potential risks from AR applications, new risks will also arise among multiple human users.  ...  Although this does provide a shared-world physical intuition and social cue, it is not a robust privacy-preserving mechanism.  ... 
dblp:conf/uss/RuthKR19 fatcat:oi5zp5wzvfemdig6pjmnunmopu

Analysis of Cryptocurrency Transactions from a Network Perspective: An Overview [article]

Jiajing Wu, Jieli Liu, Yijing Zhao, Zibin Zheng
2021 arXiv   pre-print
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.  ...  In recent years, the growing need for privacy protection has also given birth to a lot of privacy preservation methodologies such as mixing services, ring signature Rivest et al. (2001) , and non-interactive  ...  Mixing services are designed to enhance the privacy of transactions and make the relationships between senders and recipients more untraceable Ruffing et al. (2014) ; Moreno-Sanchez et al. (2017) .  ... 
arXiv:2011.09318v2 fatcat:idtd636e75cotgfsgufgu6np3a

Decentralizing Information Technology: The Advent of Resource Based Systems [article]

Aggelos Kiayias
2021 arXiv   pre-print
We explore these characteristics, identify design goals and challenges and investigate some crucial game theoretic aspects of reward sharing that can be decisive for their effective operation.  ...  More recently, the Nym network [10] exem- plified the paradigm in a novel context — that of mix-nets and privacy-preserving communications.  ...  The developer mints an initial supply of such coins and disperses them over an existing population of recipients.  ... 
arXiv:2112.09941v2 fatcat:daiiimnipfe2lhjhbwcvc2rocm

A Survey on Ethereum Systems Security: Vulnerabilities, Attacks and Defenses [article]

Huashan Chen, Marcus Pendleton, Laurent Njilla, Shouhuai Xu
2019 arXiv   pre-print
., Blockchain 2.0), as represented by Ethereum, is an open and decentralized platform enabling a new paradigm of computing --- Decentralized Applications (DApps) running on top of blockchains.  ...  If the seed satisfies a certain condition (Line 10), the current key buyer wins an airdrop.  ...  and Ethereum enhancement: Kosba et al. proposed the Hawk [156] ( 33 ) framework for incorporating cryptographic mechanisms to hide transaction data, effectively allowing contract developers to build privacy-preserving  ... 
arXiv:1908.04507v1 fatcat:wxddcfw57zginckgt7oucei2nu

Applying Blockchain Technology for User Incentivization in mmWave-based Mesh Networks

Rustam Pirmagomedov, Aleksandr Ometov, Dmitri Moltchanov, Xi Lu, Roman Kovalchukov, Ekaterina Olshannikova, Sergey Andreev, Yevgeni Koucheryavy, Mischa Dohler
2020 IEEE Access  
An important challenge in such systems is related to the incentivization of users to partake in collaborative resource sharing.  ...  With system-level evaluations, we demonstrate that the utilization of mobile blockchain methods allows for a non-incremental improvement in the offloading gains.  ...  At the moment, there is no way to reach the target recipient neither through Bluetooth nor via AirDrop due to limited coverage.  ... 
doi:10.1109/access.2020.2979135 fatcat:ou4f3mwxrvbehbm7bfshl5x4ny

AME Blockchain: An Architecture Design for Closed-Loop Fluid Economy Token System [article]

Lanny Z.N. Yuan, Huaibing Jian, Peng Liu, Pengxin Zhu, ShanYang Fu
2018 arXiv   pre-print
To properly provide a cohesive, concise, yet comprehensive introduction to the AME system, we mainly focus on describing the unique definitions and features that guide the system implementation.  ...  We choose to follow differential privacy scheme to preserve privacy in the process of distributed computation without losing our effectiveness and efficiency.  ...  Privacy Preserving Given the decentralized nature of AME system, sharing and working on sensitive data in distributed settings is a challenge due to security and privacy concerns.  ... 
arXiv:1812.08017v1 fatcat:m2tgekvu2jcnnbhxssob4xgh7i

Ethereum Name Service: the Good, the Bad, and the Ugly [article]

Pengcheng Xia, Haoyu Wang, Zhou Yu, Xinyu Liu, Xiapu Luo, Guoai Xu
2021 arXiv   pre-print
Our exploration suggests that our community should invest more effort into the detection and mitigation of issues in Blockchain-based Name Services towards building an open and trustworthy name service  ...  Our findings suggest that ENS is showing gradually popularity during its four years' evolution, mainly due to its distributed and open nature that ENS domain names can be set to any kinds of records, even  ...  Note that there are still some people using subdomain names of this name. Figure 16 shows an example, where a man was taking part in an airdrop activity with his thisisme.eth names.  ... 
arXiv:2104.05185v1 fatcat:cdti3qvh6bg73opoptrkps3wnq
« Previous Showing results 1 — 15 out of 48 results