2021
DOI: 10.1145/3466826.3466831
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Privacy Through Merge Avoidance and Mixing Services

Abstract: Cryptocurrencies typically aim at preserving the privacy of their users. Different cryptocurrencies preserve privacy at various levels, some of them requiring users to rely on strategies to raise the privacy level to their needs. Among those strategies, we focus on two of them: merge avoidance and mixing services. Such strategies may be adopted on top of virtually any blockchain-based cryptocurrency. In this paper, we show that whereas optimal merge avoidance leads to an NP-hard optimization problem, incentive… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 12 publications
(14 reference statements)
0
5
0
Order By: Relevance
“…For the same reason, mixing is more efficient as the nodes involved in the mixing service do not have to pay for the transactions. Indeed, if IOTA nodes were encouraged to participate for money, decentralised mixing services would become vulnerable to edge insertion attacks [26] where nodes can claim undue rewards. Therefore, our framework uses a decentralised mixer to remove the threat of linkage and re-identification, and without introducing the edge insertion issue.…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…For the same reason, mixing is more efficient as the nodes involved in the mixing service do not have to pay for the transactions. Indeed, if IOTA nodes were encouraged to participate for money, decentralised mixing services would become vulnerable to edge insertion attacks [26] where nodes can claim undue rewards. Therefore, our framework uses a decentralised mixer to remove the threat of linkage and re-identification, and without introducing the edge insertion issue.…”
Section: Proposed Frameworkmentioning
confidence: 99%
“…The main point is that privacy is temporary, and can be disappear if additional future events take place, or if additional countermeasures against anonymity are in place, or if additional data are collected and appropriate actions are taken by certain entities. When some academics are trying very hard to enhance anonymity [4], others are wiser showing that privacy is impossible to achieve in general [35]. We need to get the basic facts right.…”
Section: The Myth Of Crypto Anonymitymentioning
confidence: 99%
“…In particular problems at operation due to human factors cf. [52], [54] and unexpected additional events which are deliberately engineered [35]. A mix of cryptography and secure hardware devices with anti-cloning protections is nevertheless an undeniable helper at the heart of our "Chip and Pin" bank cards and today's bitcoin wallets.…”
Section: The Myth Of Crypto Anonymitymentioning
confidence: 99%
See 2 more Smart Citations