Collaborative Deanonymization

نویسندگان

چکیده

Privacy-seeking cryptocurrency users rely on anonymization techniques like CoinJoin and ring transactions. By using such technologies benign potentially provide anonymity to bad actors. We propose overlay protocols resolve the tension between accountability in a peer-to-peer manner. Cryptocurrencies can adopt this approach enable prosecution of publicly recognized crimes. illustrate how could apply Monero rings transactions Bitcoin.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Circuit Fingerprinting Attacks: Passive Deanonymization of Tor Hidden Services

This paper sheds light on crucial weaknesses in the design of hidden services that allow us to break the anonymity of hidden service clients and operators passively. In particular, we show that the circuits, paths established through the Tor network, used to communicate with hidden services exhibit a very different behavior compared to a general circuit. We propose two attacks, under two slight...

متن کامل

A New Approach to Deanonymization of Unreachable Bitcoin Nodes

Mounting deanonymization attacks on the unreachable Bitcoin nodes – these nodes do not accept incoming connections – residing behind the NAT is a challenging task. Such an attack was first given by Biryukov, Khovratovich and Pustogarov based on their observation that a node can be uniquely identified in a single session by their directlyconnected neighbouring nodes (ACM CCS’15). However, the BK...

متن کامل

Finding the Most Appropriate Auxiliary Data for Social Graph Deanonymization

Given only a handful of local structural features about the nodes of an anonymized social graph, how can an adversary select an auxiliary (a.k.a. non-anonymized, known) graph to help him/her deanonymize (a.k.a. re-identify) the individuals in the graph? Examples of local structural features are node’s degree, node’s clustering coe cient, edge density of the node’s neighbors, etc. The objective ...

متن کامل

DISTRIBUTED AND COLLABORATIVE FUZZY MODELING

In this study, we introduce and study a concept of distributed fuzzymodeling. Fuzzy modeling encountered so far is predominantly of a centralizednature by being focused on the use of a single data set. In contrast to this style ofmodeling, the proposed paradigm of distributed and collaborative modeling isconcerned with distributed models which are constructed in a highly collaborativefashion. I...

متن کامل

Interactional complexity development, interactional demonstrators and interaction density in collaborative and e-collaborative writing modalities

This study aimed at investigating the potential of collaborative and e-collaborative writing modalities in developing interactional complexity, utilization of interactional demonstrators and density of interaction. To this end, 66 Iranian intermediate female English as foreign language learners (EFL) were selected to participate in this study according to their scores on Oxford Placement Test (...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Lecture Notes in Computer Science

سال: 2021

ISSN: ['1611-3349', '0302-9743']

DOI: https://doi.org/10.1007/978-3-662-63958-0_3