A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
Non-interactive Zero-knowledge for Blockchain: A Survey
2020
IEEE Access
However, the transaction amount is only partially hidden and attacks have been identified against CryptoNote-style blockchains [53] . 4) Monero is a cryptocurrency originally based on CryptoNote and its ...
We have also provided references to the practical evaluations of the methods whenever such evaluations have been available. ...
His research interests include distributed systems, blockchain technology, and information security. Dr. ...
doi:10.1109/access.2020.3046025
fatcat:crl77kezmbfydhtvvv6i3lrzdi
Deconstructing Blockchains: A Comprehensive Survey on Consensus, Membership and Structure
[article]
2019
arXiv
pre-print
We propose an evaluation framework with insight into system models, desired properties and analysis criteria, using the decoupled components as criteria. ...
This added considerable complexity to the current blockchain ecosystems, amplified by the absence of detail in many accompanying blockchain whitepapers. ...
However, attacks on the privacy of CryptoNote-style blockchains have been identified. ...
arXiv:1908.08316v1
fatcat:aca6xwvfmrb2le35z77wqjv5sq
Security and Privacy on Blockchain
[article]
2019
arXiv
pre-print
Although blockchain has received growing interests in both academia and industry in the recent years, the security and privacy of blockchains continue to be at the center of the debate when deploying blockchain ...
This paper presents a comprehensive overview of the security and privacy of blockchain. ...
Thus, ring signature is applicable to public blockchain. One of typical applications of ring signature is CryptoNote [80] . ...
arXiv:1903.07602v2
fatcat:tyoyeyyvv5ggde3eqopytdqly4
On the suitability of blockchain platforms for IoT applications: Architectures, security, privacy, and performance
2021
Computer Networks
privacy related mechanisms are being supported, to varying degrees, by all platforms investigated; however, each of the them tackles specific only privacy aspects, thus rendering the overall privacy evaluation ...
The analysis carried out identified that the defences currently provided by blockchain platforms are not sufficient to thwart all the prominent attacks against blockchains, with blockchain 1.0 and 2.0 ...
privacy (as in the case of the Cryptonote technology [177] ). ...
doi:10.1016/j.comnet.2021.108005
fatcat:35tosxqpxjawzilnxoco5u2b5q
ASIC-Resistant Proof of Work Based on Power Analysis of Low-End Microcontrollers
2020
Mathematics
Evaluation In this section, we evaluate the proposed method on the microcontroller. We firstly introduce the experiment environment and results in detail. ...
In Section 4 the evaluation of PoW method is given. Section 5 concludes the paper. ...
doi:10.3390/math8081343
fatcat:h2nrvtaohnbkjl5uds35crevli
Privacy on the Blockchain: Unique Ring Signatures
[article]
2016
arXiv
pre-print
We concentrate in particular on implementing privacy on the blockchain, introducing a unique ring signature scheme that works with existing blockchain systems. ...
We review the privacy and security properties offered by the scheme we have constructed, and compare its efficiency with other commonly suggested approaches to privacy on the blockchain. ...
Acknowledgements Thank you to Dr Nicolas Courtois, for introducing me to blockchains and applied cryptography. ...
arXiv:1612.01188v2
fatcat:75ln3xybabbwhccxsdzekxlfwa
Blockchain and Privacy Protection in the Case of the European General Data Protection Regulation (GDPR): A Delphi Study
2018
The Journal of British Blockchain Association
The aim of this work is to clarify whether blockchains can comply with the new regulation on the one hand and to identify how blockchain could support its compliance, on the other hand. ...
In addition, a framework is proposed to support the assessment of privacy and related risks of blockchains. ...
This research aims to add new knowledge to the understanding of blockchain and privacy, specifically with regards to a strict data protection regulation like the GDPR. ...
doi:10.31585/jbba-1-1-(4)2018
fatcat:iyfwcdnbgvbc3l2j5cblnmvxna
An Offline Delegatable Cryptocurrency System
[article]
2021
arXiv
pre-print
A formal model and analysis, prototype implementation, and further evaluation demonstrate that our scheme is provably secure and practically feasible. ...
In DelegaCoin, an owner can delegate his coins through offline-transactions without interacting with the blockchain network. ...
CryptoNote-style schemes [10] , instead, enhance the privacy by adopting ringsignatures. However, slow confirmation of transactions retards their wide adoption from developers and users. ...
arXiv:2103.12905v1
fatcat:7pqkzsgjpfburpwb2xxz5rc4re
When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies
2018
Proceedings on Privacy Enhancing Technologies
, even if the user employs blockchain anonymity techniques such as CoinJoin. ...
Our second attack shows that if the tracker is able to link two purchases of the same user to the blockchain in this manner, it can identify the user's cluster of addresses and transactions on the blockchain ...
Our attacks apply to Bitcoin, Litecoin, and any other cryptocurrency with Bitcoin-style transactions. ...
doi:10.1515/popets-2018-0038
dblp:journals/popets/GoldfederKRN18
fatcat:qb54swayhnbazc32qecitxi3uy
SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
2015
2015 IEEE Symposium on Security and Privacy
We survey anonymity issues in Bitcoin and provide an evaluation framework for analyzing a variety of privacy-enhancing proposals. ...
CryptoNote [119] is a cryptographic mixing protocol using ring signatures which has already been used as the basis for several privacy-focused altcoins. ...
mining capacity have been successfully mounted by Bitcoin miners. 15 If a mature futures market arises in which a miner can take a significant short position on Bitcoin's exchange rate, then Goldfinger-style ...
doi:10.1109/sp.2015.14
dblp:conf/sp/BonneauMCNKF15
fatcat:ziajrymw3bdd7houz56culqkoi
Anonymity in Cryptocurrency
2020
A cryptocurrency is a decentralised digital currency that utilises blockchain technology to remove the role of a central authority. ...
The approach is different compared to Bitcoin-style blockchain, where the odd transaction is hashed with itself to get a node. ...
CryptoNote Blockchain CNS003 entails blockchain specification in CryptoNote. A block contains three parts, namely block header, base transaction body, and list of transaction identifiers. ...
doi:10.26180/5f1e7ce5191dd
fatcat:n6qa7ceu4vfy7eeduaffndjffm
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis
2019
2019 IEEE European Symposium on Security and Privacy (EuroS&P)
Previous work in cryptocurrency privacy mostly focused on applying data mining algorithms to the transaction graph extracted from the blockchain. ...
We implement and evaluate our method, deanonymizing our own transactions in Bitcoin and Zcash with a high level of accuracy. We also show that our technique is applicable to Dash and Monero. ...
Its key idea is introducing asymmetry: a message is first sent along a random path, and only then broadcast gossip-style. ...
doi:10.1109/eurosp.2019.00022
dblp:conf/eurosp/BiryukovT19
fatcat:sgwzdnd56zbt3dmn5rsrng7cb4
Cryptocurrencies and future financial crime
2022
Crime Science
We evaluated the full text of 60 publications during the November 2020 update, of which 32 were ultimately included. ...
To facilitate this, a follow-up sandpit-style activity, informed by the updated and expanded scoping review, is recommended. ...
doi:10.1186/s40163-021-00163-8
pmid:35013699
pmcid:PMC8730302
fatcat:3xqz447bxvf6pjfuj2yfbw5bd4
(∈, δ)-Indistinguishable Mixing for Cryptocurrencies
2021
Proceedings on Privacy Enhancing Technologies
Monero is a Cryptonote-style protocol that uses ring signatures [27, 51] to obscure the sender of a transaction within a set of potential senders, plus homomorphic commitments and range proofs to hide ...
Proof-of-Concept Evaluation With Ring Signatures. ...
doi:10.2478/popets-2022-0004
fatcat:ohhw77jwzbdrfkkjvqnbfdrope
Data rights in the 21st century : exploring the boundaries of empowerment in blockchain social media settings
[article]
2021
The goal of this study is to broaden our horizons on this issue by investigating the potential of an incentivized blockchain-powered social networks platform to exercise our data rights. ...
Drawing on Steemit, one of the first blockchain social networks as a site for research, this study explores how ordinary users' ownership of data as well as data privacy are implemented and practiced in ...
This "amateur" style of posting (65 posts) reveals only positive aspects of oneself while actively managing the boundaries between personal and professional lives. ...
doi:10.26153/tsw/15257
fatcat:j4wp75gepfb7bocbxkp6zkxoem