2018
DOI: 10.1016/j.future.2016.05.018
|View full text |Cite
|
Sign up to set email alerts
|

Secure and anonymous decentralized Bitcoin mixing

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
64
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
6
4

Relationship

0
10

Authors

Journals

citations
Cited by 97 publications
(66 citation statements)
references
References 13 publications
0
64
0
Order By: Relevance
“…• Sybil attack: Under this attack, an adversary creates many fake identities. By performing many interactions in the network, the adversary can gain a large influence within Replay attack [39], [10] Impersonation attack [13], [39], [10] Sybil attack [40] False data injection attack [21] Tampering attack [41] Overlay attack [41] Modification attack [39], [10] Man-in-the-middle attack [39], [10] Quantum attack [43] Hiding Blocks attack [40] Whitewashing [40] DDoS/DoS attack [36], [37], [38], [39] Refusal to Sign attack [40] Double-spending attack [41], [22] Collusion attack [42] the community, i.e, increasing/decreasing the reputation of some agents. TrustChain [40] addresses this issue by creating an immutable chain of temporally ordered interactions for each agent.…”
Section: A Identity-based Attacksmentioning
confidence: 99%
“…• Sybil attack: Under this attack, an adversary creates many fake identities. By performing many interactions in the network, the adversary can gain a large influence within Replay attack [39], [10] Impersonation attack [13], [39], [10] Sybil attack [40] False data injection attack [21] Tampering attack [41] Overlay attack [41] Modification attack [39], [10] Man-in-the-middle attack [39], [10] Quantum attack [43] Hiding Blocks attack [40] Whitewashing [40] DDoS/DoS attack [36], [37], [38], [39] Refusal to Sign attack [40] Double-spending attack [41], [22] Collusion attack [42] the community, i.e, increasing/decreasing the reputation of some agents. TrustChain [40] addresses this issue by creating an immutable chain of temporally ordered interactions for each agent.…”
Section: A Identity-based Attacksmentioning
confidence: 99%
“…The block data are searched in the database using the index method. Although the block does not contain the hash value of the next block, it is added as a practice (Figure 1) [12].…”
Section: Blockchainmentioning
confidence: 99%
“…Some mixers enable internal linkability by involved parties [86] or linkability by the mixers [21], which are also potential threats. Unlinkability for all parties can be achieved by multi-party computation [151], blinding signatures [137], or layered encryption [118]. Ring signatures [113] provide unlinkability to users in a signing group [98], [138], enabling only verification of correctness of a signature, without revealing an identity of a signer.…”
Section: A Transaction Protectionmentioning
confidence: 99%