Anonymity in Blockchain Digital Currency Transactions: Protection And Confrontation

被引:0
|
作者
Shen M. [1 ]
Che Z. [2 ]
Zhu L.-H. [1 ]
Xu K. [3 ,4 ]
Gao F. [2 ]
Yu C.-C. [2 ]
Wu Y. [1 ]
机构
[1] School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing
[2] School of Computer Science and Technology, Beijing Institute of Technology, Beijing
[3] Department of Computer Science and Technology, Tsinghua University, Beijing
[4] Beijing National Research Center for Information Science and Technology, Beijing
来源
Jisuanji Xuebao/Chinese Journal of Computers | 2023年 / 46卷 / 01期
基金
中国国家自然科学基金;
关键词
Anonymity; Bitcoin; Blockchain; Cryptocurrency; Ethereum;
D O I
10.11897/SP.J.1016.2023.00125
中图分类号
学科分类号
摘要
In recent years, cryptocurrencies based on blockchain technology have emerged and attracted widespread attention from various parties. Compared with traditional payment methods, cryptocurrency has the characteristics of decentralization and supports transaction anonymity. However, anonymity also provides hidden conveniences for illegal activities, making cryptocurrency increasingly a payment medium for money laundering, extortion, and other illicit activities. Therefore, cryptocurrency anonymity protection and countermeasures technology are a hot issue for current research. The research on the anonymity of cryptocurrency transactions mainly focuses on protecting transaction anonymity and the confrontation of anonymity. In terms of transaction anonymity protection, researchers mostly use zero-knowledge proof, Tor network, and other anonymity technologies to ensure the anonymity of users in the entire transaction process from different perspectives. Regarding the confrontation of anonymity, the researchers mainly combined the transaction information disclosed in the blockchain ledger and the dissemination data in the network layer to analyze the transaction traces left by users in the transaction process from different perspectives. In this paper, we first give an in-depth analysis of transaction anonymity's connotation and summarize it into three aspects: (1) Unidentifiability. For a given transaction, the observer cannot identify the true identity of the transaction participants in the physical world. (2) Unlinkability. For a given two transactions (at most, one of which is sent by the observer), the observer cannot determine whether they are paid to the same user. Also, the observer cannot determine whether the same user-initiated them. (3) Untraceability. For a given transaction, the observer cannot trace the flow of funds between the address to which the transaction was sent and the address to which the transaction was received. Then, we group the existing anonymity protection schemes into three categories according to the different focuses: (1) Unidentifiability protection schemes represented by Tor network, which mainly prevent observers from associating transactions with real-life user identities by hiding node information; (2) Unlinkability protection schemes represented by zero-knowledge proof technology, which mainly prevent observers from associating transactions with real-life user entities by hiding transaction information in the ledger to prevent observers from associating transactions with user entities; (3) Untraceability protection schemes represented by coin mixing technology, which mainly prevent observers from tracking the flow of funds based on the links between transaction participants by severing the relationships between them. At the same time, we also summarize the anonymity analysis methods of digital currencies from three aspects: (1) Unidentifiability confrontation, the observer uses the traffic information generated at each stage of cryptocurrency transactions, combined with the IP address, geographic location, organization's identity, and other information belonging to the P2P node, to identify the real identity information target transaction. (2) Unlinkability confrontation, where the observer discovers the correlation between user addresses and transactions by observing the transaction records in the public ledger based on attributes such as transaction amount, fund flow, and transaction time. (3) Untraceability confrontation, where the observer combines the ledger data and on-chain information to track the fund flow of the transaction. Finally, the paper summarizes the cryptocurrency anonymity research institute's challenges and future development trends. © 2023, Science Press. All right reserved.
引用
收藏
页码:125 / 146
页数:21
相关论文
共 57 条
  • [1] Nakamoto S., Bitcoin: A peer-to-peer electronic cash system, (2008)
  • [2] Foley S, Karlsen J R, Putnins T J., Sex, Drugs, and Bitcoin: How much illegal activity is financed through cryptocurrencies?, The Review of Financial Studies, 32, 5, pp. 1798-1853, (2019)
  • [3] Malte M, Rainer B., Anonymous Alone? Measuring Bitcoin's second-generation anonymization techniques, Proceedings of the 2017 IEEE European Symposium on Security and Privacy Workshops, pp. 32-41, (2017)
  • [4] Reid F, Harrigan M., An analysis of anonymity in the bitcoin system, Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust, pp. 1318-1326, (2011)
  • [5] Tschorsch F, Scheuermann B., Bitcoin and beyond: a technical survey on decentralized digital currencies, IEEE Communications Surveys and Tutorials, 18, 3, pp. 2084-2123, (2016)
  • [6] Zhu Lie-Huang, Gao Feng, Shen Meng, Et al., Survey on privacy preserving techniques for blockchain technology, Journal of Computer Research and Development, 54, 10, pp. 2170-2186, (2017)
  • [7] Chen Wei-Li, Zheng Zi-Bin, Blockchain data analysis: a review of status, trends and challenges, Journal of Computer Research and Development, 55, 9, pp. 1853-1870, (2018)
  • [8] Fu Shuo, Xu Hai-Xia, Li Pei-Li, Ma Tian-Jun, A survey on anonymity of digital currency, Chinese Journal of Computers, 42, 5, pp. 1045-1062, (2019)
  • [9] Li Xu-Dong, Niu Yu-Kun, Wei Ling-Bo, Zhang Chi, Yu Neng-Hai, Overview on privacy protection in Bitcoin, Journal of Crytologic Research, 6, 2, pp. 133-149, (2019)
  • [10] Zhang Ao, Bai Xiao-Ying, Survey of research and practices on blockchain privacy protection, Journal of Software, 31, 5, pp. 1406-1434, (2020)