A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems

被引:161
作者
Khalilov, Merve Can Kus [1 ,2 ]
Levi, Albert [2 ]
机构
[1] Kuveyt Turk Participat Bank, Ctr Res & Dev, TR-41420 Cayirova, Turkey
[2] Sabanci Univ, Comp Sci & Engn Dept, Fac Engn & Nat Sci, TR-34956 Istanbul, Turkey
关键词
Anonymity and privacy; Bitcoin; blockchain; cryptocurrency; digital cash; peer-to-peer computing; SIGNATURE SCHEME; NETWORK; CHALLENGES; SECURE;
D O I
10.1109/COMST.2018.2818623
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is the most widely known distributed, peer-to-peer payment network without existence of a central authority. In Bitcoin, users do not use real names; instead, pseudonyms are used. Managing and verifying transactions and issuing of bitcoins are performed collectively by peers in the network. Since pseudonyms are used without providing any identity, it is perceived that Bitcoin provides anonymity. However, it is one of the most transparent payment networks since all transactions are publicly announced. Blockchain, which is the public ledger of Bitcoin, includes all transactions to prevent double-spending and to provide integrity. By using data in the blockchain, flow of bitcoins between transactions can be observed and activities of the users can be traced. When the implications obtained from the blockchain are combined with external data, identity and profile of a user can be revealed. This possibility has undesirable effects such as spending history of a user becomes accessible to other people, or cash flow of a merchant becomes exposed to competitors. There are several proposals as extensions or alternatives to Bitcoin, which improve anonymity and privacy. This survey presents an overview and detailed investigation of anonymity and privacy in Bitcoin-like digital cash systems. We examine the studies in the literature/Web in two major categories: 1) analyses of anonymity and privacy in Bitcoin and 2) extensions and alternatives to Bitcoin, which improve anonymity and privacy. We list and describe methods and outcomes for both categories and group studies according to these methods and outcomes. We also present relationships between outcomes of analyses and the improvement methods. We compare performances of the methods and show relationships between the proposals. Moreover, we present guidelines for designing an anonymity/privacy improvement and discuss future research directions.
引用
收藏
页码:2543 / 2585
页数:43
相关论文
共 201 条
  • [1] Andreev O, 2014, BLIND SIGNATURES BIT
  • [2] Androulaki Elli, 2014, Trust and Trustworthy Computing. 7th International Conference, TRUST 2014. Proceedings: LNCS 8564, P161, DOI 10.1007/978-3-319-08593-7_11
  • [3] Androulaki Elli, 2013, Revised Selected Papers, P34, DOI DOI 10.1007/978-3-642-39884-1
  • [4] Secure Multiparty Computations on Bitcoin
    Andrychowicz, Marcin
    Dziembowski, Stefan
    Malinowski, Daniel
    Mazurek, Lukasz
    [J]. 2014 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP 2014), 2014, : 443 - 458
  • [5] [Anonymous], 2004, P 13 C USENIX SEC S, DOI [DOI 10.5555/1251375.1251396, DOI 10.1186/1476-0711-3-21]
  • [6] [Anonymous], 2017, ABS170308761 CORR
  • [7] [Anonymous], 2013, GMAXWELL REALL ULT B
  • [8] [Anonymous], 2013, P 2013 ECRIME RES SU, DOI DOI 10.1109/ECRS.2013.6805780
  • [9] [Anonymous], 2016, BBC News,July 10
  • [10] [Anonymous], 2013, GIV BITC CLIENT I2P