Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660379
|View full text |Cite
|
Sign up to set email alerts
|

Deanonymisation of Clients in Bitcoin P2P Network

Abstract: Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability.We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
332
0
1

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 413 publications
(334 citation statements)
references
References 8 publications
1
332
0
1
Order By: Relevance
“…Tools such as BitCluster 15 , Chainalysis 16 and Elliptic 17 analyse the blockchain to group Bitcoin transactions together that are seemingly related and find the origins of payments. Biryukov, Khovratovich and Pustogarov (2014) have shown how to deanonymise a significant fraction of Bitcoin users and in this way linking user's pseudonyms to their IP addresses. Reid and Harrigan (2013) suggest that a user directory can be partly built by associating Bitcoin users and their public keys with offline information.…”
Section: Financial Services Bitcoin and Mixing Servicesmentioning
confidence: 99%
“…Tools such as BitCluster 15 , Chainalysis 16 and Elliptic 17 analyse the blockchain to group Bitcoin transactions together that are seemingly related and find the origins of payments. Biryukov, Khovratovich and Pustogarov (2014) have shown how to deanonymise a significant fraction of Bitcoin users and in this way linking user's pseudonyms to their IP addresses. Reid and Harrigan (2013) suggest that a user directory can be partly built by associating Bitcoin users and their public keys with offline information.…”
Section: Financial Services Bitcoin and Mixing Servicesmentioning
confidence: 99%
“…Thus, recent works [63,75,77,81] have proposed simple heuristics to thwart anonymity in Bitcoin. In a somewhat different direction, other recent works [47,61] show the possibility of identifying ownership relationships between Bitcoin wallets and IP addresses. As Bitcoin heuristics do not fit transaction networks, our novel heuristics are focused and have special interest for transaction networks such as Ripple, including the integration of several available cryptocurrencies.…”
Section: Related Workmentioning
confidence: 99%
“…For example, in the case of the Bitcoin network, a series of works [47,58,61] sulting from these techniques since if a Bitcoin wallet is deanonymized, the complete cluster (including Ripple and other cryptocurrency wallets) is deanonymized. Ripple transactions are collected by Ripple validator servers.…”
Section: De-anonymization Using a Ripple Servermentioning
confidence: 99%
“…This allows to trace money flows and avoid doublespending; but on the downside if a pseudonym is ever deanonymized (e.g. [21]), all actions from the person would be revealed. A number of decentralized systems, ranging from mix-nets [36,45], to DC-nets [37], to Tor [57], provide some degree of anonymity.…”
Section: How Does Decentralization Support Privacy?mentioning
confidence: 99%