Unraveling Blockchain based Crypto-currency System Supporting Oblivious Transactions: a Formalized Approach

被引:12
作者
Chen, Lin [1 ]
Xu, Lei [1 ]
Shah, Nolan [1 ]
Diallo, Nour [1 ]
Gao, Zhimin [1 ]
Lu, Yang [1 ]
Shi, Weidong [1 ]
机构
[1] Univ Houston, Houston, TX 77004 USA
来源
BCC '17: PROCEEDINGS OF THE ACM WORKSHOP ON BLOCKCHAIN, CRYPTOCURRENCIES AND CONTRACTS | 2017年
关键词
blockchain; anonymization; privacy;
D O I
10.1145/3055518.3055528
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
User privacy is an important issue in a blockchain based transaction system. Bitcoin, being one of the most widely used blockchain based transaction system, fails to provide enough protection on users' privacy. Many subsequent studies focus on establishing a system that hides the linkage between the identities (pseudonyms) of users and the transactions they carry out in order to provide a high level of anonymity. Examples include Zerocoin, Zerocash and so on. It thus becomes an interesting question whether such new transaction systems do provide enough protection on users' privacy. In this paper, we propose a novel and effective approach for de-anonymizing these transaction systems by leveraging information in the system that is not directly related, including the number of transactions made by each identity and time stamp of sending and receiving. Combining probability studies with optimization tools, we establish a model which allows us to determine, among all possible ways of linking between transactions and identities, the one that is most likely to be true. Subsequent transaction graph analysis could then be carried out, leading to the de-anonymization of the system. To solve the model, we provide exact algorithms based on mixed integer linear programming. Our research also establishes interesting relationships between the de-anonymization problem and other problems studied in the literature of theoretical computer science, e.g., the graph matching problem and scheduling problem.
引用
收藏
页码:23 / 28
页数:6
相关论文
共 21 条
[1]  
[Anonymous], SECURE INTEGRATED CI
[2]  
[Anonymous], 2016, Lecture Notes in Computer Science, DOI DOI 10.1007/978-3-319-48749-6_44
[3]  
[Anonymous], 2016, Communications of the ACM, DOI [10.1145/2504730.2504747, DOI 10.1145/2504730.2504747, DOI 10.1145/2896384, 10.1145/2896384]
[4]  
[Anonymous], SECURITY AND PRIVACY
[5]  
[Anonymous], NXT WHIT
[6]  
[Anonymous], RISKY CURRENCY ALLEG
[7]  
[Anonymous], 2020, ETHEREUM SECURE DECE
[8]  
[Anonymous], 2004, Handbook of Scheduling: Algorithms, Models, and Performance Analysis
[9]  
[Anonymous], 2014 IEEE SYMPOSIUM
[10]  
Bader DavidA., 2005, Tutorials on Emerging Methodologies and Applications in Operations Research, P5