2018
DOI: 10.1109/comst.2018.2818623
|View full text |Cite
|
Sign up to set email alerts
|

A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
114
0
4

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 213 publications
(130 citation statements)
references
References 96 publications
0
114
0
4
Order By: Relevance
“…Levi [31] An overview and detailed investigation of anonymity and privacy in Bitcoin-like digital cash systems.…”
Section: Khalilov Andmentioning
confidence: 99%
See 1 more Smart Citation
“…Levi [31] An overview and detailed investigation of anonymity and privacy in Bitcoin-like digital cash systems.…”
Section: Khalilov Andmentioning
confidence: 99%
“…III. Khalilov and Levi [72] have published an interesting investigation on anonymity and privacy in Bitcoin-like digital cash systems. Specifically, the study classified the methods of analyzing anonymity and privacy in Bitcoin into four categories, namely, 1) Transacting, 2) Utilizing off-network information, 3) Utilizing network, and 4) Analyzing blockchain data.…”
Section: O Bitcoinmentioning
confidence: 99%
“…Note that, several recent surveys and tutorials, which target at the privacy issues in diverse scenarios, also mention the usage of BFs explicitly [58] [59] [60] [61] [62]. In informationcentric networking, BFs enable the DoS-resistant self-routing mechanisms, name obfuscation, and access control [58].…”
Section: Privacy Preservationmentioning
confidence: 99%
“…However, cryptocurrencies based on blockchain technology are not completely anonymous, the public nature of blockchain exposes users' addresses and transaction privacy . As the number of transactions increases, attackers trace the source of funds and extract other privacy information from open transaction data by data analysis technique and transaction rules …”
Section: Introductionmentioning
confidence: 99%
“…3 As the number of transactions increases, attackers trace the source of funds and extract other privacy information from open transaction data by data analysis technique and transaction rules. 4,5 To enhance the ability of blockchain privacy protection, a mixing transaction privacy enhancement scheme is constructed. Inspired by the scheme of Chen et al, 6 we use group signature algorithm and aggregate signature algorithm to protect transaction privacy and user identity, and we also introduce a mix accountable protocol to track malicious users.…”
Section: Introductionmentioning
confidence: 99%