15 Hits in 1.7 sec

Non-interactive Zero-knowledge for Blockchain: A Survey

Juha Partala, Tri Hong Nguyen, Susanna Pirttikangas
2020 IEEE Access  
However, the transaction amount is only partially hidden and attacks have been identified against CryptoNote-style blockchains [53] . 4) Monero is a cryptocurrency originally based on CryptoNote and its  ...  We have also provided references to the practical evaluations of the methods whenever such evaluations have been available.  ...  His research interests include distributed systems, blockchain technology, and information security. Dr.  ... 
doi:10.1109/access.2020.3046025 fatcat:crl77kezmbfydhtvvv6i3lrzdi

Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure [article]

Christopher Natoli, Jiangshan Yu, Vincent Gramoli, Paulo Esteves-Verissimo
2019 arXiv   pre-print
We propose an evaluation framework with insight into system models, desired properties and analysis criteria, using the decoupled components as criteria.  ...  This added considerable complexity to the current blockchain ecosystems, amplified by the absence of detail in many accompanying blockchain whitepapers.  ...  However, attacks on the privacy of CryptoNote-style blockchains have been identified.  ... 
arXiv:1908.08316v1 fatcat:aca6xwvfmrb2le35z77wqjv5sq

Security and Privacy on Blockchain [article]

Rui Zhang, Rui Xue, Ling Liu
2019 arXiv   pre-print
Although blockchain has received growing interests in both academia and industry in the recent years, the security and privacy of blockchains continue to be at the center of the debate when deploying blockchain  ...  This paper presents a comprehensive overview of the security and privacy of blockchain.  ...  Thus, ring signature is applicable to public blockchain. One of typical applications of ring signature is CryptoNote [80] .  ... 
arXiv:1903.07602v2 fatcat:tyoyeyyvv5ggde3eqopytdqly4

On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance

Sotirios Brotsis, Konstantinos Limniotis, Gueltoum Bendiab, Nicholas Kolokotronis, Stavros Shiaeles
2021 Computer Networks  
privacy related mechanisms are being supported, to varying degrees, by all platforms investigated; however, each of the them tackles specific only privacy aspects, thus rendering the overall privacy evaluation  ...  The analysis carried out identified that the defences currently provided by blockchain platforms are not sufficient to thwart all the prominent attacks against blockchains, with blockchain 1.0 and 2.0  ...  privacy (as in the case of the Cryptonote technology [177] ).  ... 
doi:10.1016/j.comnet.2021.108005 fatcat:35tosxqpxjawzilnxoco5u2b5q

ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers

Hyunjun Kim, Kyungho Kim, Hyeokdong Kwon, Hwajeong Seo
2020 Mathematics  
Evaluation In this section, we evaluate the proposed method on the microcontroller. We firstly introduce the experiment environment and results in detail.  ...  In Section 4 the evaluation of PoW method is given. Section 5 concludes the paper.  ... 
doi:10.3390/math8081343 fatcat:h2nrvtaohnbkjl5uds35crevli

Privacy on the Blockchain: Unique Ring Signatures [article]

Rebekah Mercer
2016 arXiv   pre-print
We concentrate in particular on implementing privacy on the blockchain, introducing a unique ring signature scheme that works with existing blockchain systems.  ...  We review the privacy and security properties offered by the scheme we have constructed, and compare its efficiency with other commonly suggested approaches to privacy on the blockchain.  ...  Acknowledgements Thank you to Dr Nicolas Courtois, for introducing me to blockchains and applied cryptography.  ... 
arXiv:1612.01188v2 fatcat:75ln3xybabbwhccxsdzekxlfwa

Blockchain and Privacy Protection in the Case of the European General Data Protection Regulation (GDPR): A Delphi Study

Simon Schwerin
2018 The Journal of British Blockchain Association  
The aim of this work is to clarify whether blockchains can comply with the new regulation on the one hand and to identify how blockchain could support its compliance, on the other hand.  ...  In addition, a framework is proposed to support the assessment of privacy and related risks of blockchains.  ...  This research aims to add new knowledge to the understanding of blockchain and privacy, specifically with regards to a strict data protection regulation like the GDPR.  ... 
doi:10.31585/jbba-1-1-(4)2018 fatcat:iyfwcdnbgvbc3l2j5cblnmvxna

An Offline Delegatable Cryptocurrency System [article]

Rujia Li and Qin Wang and Xinrui Zhang and Qi Wang and David Galindo and Yang Xiang
2021 arXiv   pre-print
A formal model and analysis, prototype implementation, and further evaluation demonstrate that our scheme is provably secure and practically feasible.  ...  In DelegaCoin, an owner can delegate his coins through offline-transactions without interacting with the blockchain network.  ...  CryptoNote-style schemes [10] , instead, enhance the privacy by adopting ringsignatures. However, slow confirmation of transactions retards their wide adoption from developers and users.  ... 
arXiv:2103.12905v1 fatcat:7pqkzsgjpfburpwb2xxz5rc4re

When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies

Steven Goldfeder, Harry Kalodner, Dillon Reisman, Arvind Narayanan
2018 Proceedings on Privacy Enhancing Technologies  
, even if the user employs blockchain anonymity techniques such as CoinJoin.  ...  Our second attack shows that if the tracker is able to link two purchases of the same user to the blockchain in this manner, it can identify the user's cluster of addresses and transactions on the blockchain  ...  Our attacks apply to Bitcoin, Litecoin, and any other cryptocurrency with Bitcoin-style transactions.  ... 
doi:10.1515/popets-2018-0038 dblp:journals/popets/GoldfederKRN18 fatcat:qb54swayhnbazc32qecitxi3uy

SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies

Joseph Bonneau, Andrew Miller, Jeremy Clark, Arvind Narayanan, Joshua A. Kroll, Edward W. Felten
2015 2015 IEEE Symposium on Security and Privacy  
We survey anonymity issues in Bitcoin and provide an evaluation framework for analyzing a variety of privacy-enhancing proposals.  ...  CryptoNote [119] is a cryptographic mixing protocol using ring signatures which has already been used as the basis for several privacy-focused altcoins.  ...  mining capacity have been successfully mounted by Bitcoin miners. 15 If a mature futures market arises in which a miner can take a significant short position on Bitcoin's exchange rate, then Goldfinger-style  ... 
doi:10.1109/sp.2015.14 dblp:conf/sp/BonneauMCNKF15 fatcat:ziajrymw3bdd7houz56culqkoi

Anonymity in Cryptocurrency

A cryptocurrency is a decentralised digital currency that utilises blockchain technology to remove the role of a central authority.  ...  The approach is different compared to Bitcoin-style blockchain, where the odd transaction is hashed with itself to get a node.  ...  CryptoNote Blockchain CNS003 entails blockchain specification in CryptoNote. A block contains three parts, namely block header, base transaction body, and list of transaction identifiers.  ... 
doi:10.26180/5f1e7ce5191dd fatcat:n6qa7ceu4vfy7eeduaffndjffm

Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis

Alex Biryukov, Sergei Tikhomirov
2019 2019 IEEE European Symposium on Security and Privacy (EuroS&P)  
Previous work in cryptocurrency privacy mostly focused on applying data mining algorithms to the transaction graph extracted from the blockchain.  ...  We implement and evaluate our method, deanonymizing our own transactions in Bitcoin and Zcash with a high level of accuracy. We also show that our technique is applicable to Dash and Monero.  ...  Its key idea is introducing asymmetry: a message is first sent along a random path, and only then broadcast gossip-style.  ... 
doi:10.1109/eurosp.2019.00022 dblp:conf/eurosp/BiryukovT19 fatcat:sgwzdnd56zbt3dmn5rsrng7cb4

Cryptocurrencies and future financial crime

Arianna Trozze, Josh Kamps, Eray Arda Akartuna, Florian J. Hetzel, Bennett Kleinberg, Toby Davies, Shane D. Johnson
2022 Crime Science  
We evaluated the full text of 60 publications during the November 2020 update, of which 32 were ultimately included.  ...  To facilitate this, a follow-up sandpit-style activity, informed by the updated and expanded scoping review, is recommended.  ... 
doi:10.1186/s40163-021-00163-8 pmid:35013699 pmcid:PMC8730302 fatcat:3xqz447bxvf6pjfuj2yfbw5bd4

(∈, δ)-Indistinguishable Mixing for Cryptocurrencies

Mingyu Liang, Ioanna Karantaidou, Foteini Baldimtsi, S. Dov Gordon, Mayank Varia
2021 Proceedings on Privacy Enhancing Technologies  
Monero is a Cryptonote-style protocol that uses ring signatures [27, 51] to obscure the sender of a transaction within a set of potential senders, plus homomorphic commitments and range proofs to hide  ...  Proof-of-Concept Evaluation With Ring Signatures.  ... 
doi:10.2478/popets-2022-0004 fatcat:ohhw77jwzbdrfkkjvqnbfdrope

Data rights in the 21st century : exploring the boundaries of empowerment in blockchain social media settings [article]

Soyoung Park, 0000-0002-9533-9191, Austin, The University Of Texas At, Sharon Strover
The goal of this study is to broaden our horizons on this issue by investigating the potential of an incentivized blockchain-powered social networks platform to exercise our data rights.  ...  Drawing on Steemit, one of the first blockchain social networks as a site for research, this study explores how ordinary users' ownership of data as well as data privacy are implemented and practiced in  ...  This "amateur" style of posting (65 posts) reveals only positive aspects of oneself while actively managing the boundaries between personal and professional lives.  ... 
doi:10.26153/tsw/15257 fatcat:j4wp75gepfb7bocbxkp6zkxoem