Access the full text.
Sign up today, get DeepDyve free for 14 days.
M. Apostolaki, Aviv Zohar, L. Vanbever (2016)
Hijacking Bitcoin: Large-scale Network Attacks on CryptocurrenciesArXiv, abs/1605.07524
Kai Zhu, Zhen Chen, Lei Ying (2014)
Locating Contagion Sources in Networks with Partial TimestampsArXiv, abs/1412.4141
Roger Dingledine, Nick Mathewson, P. Syverson (2004)
Tor: The Second-Generation Onion Router
Z. Galil (1986)
Efficient algorithms for finding maximum matching in graphsACM Comput. Surv., 18
Andrew Miller, J. Litton, Andrew Pachulski, Neal Gupta, Dave Levin, N. Spring, Bobby Bhattacharjee (2015)
Discovering Bitcoin ’ s Public Topology and Influential Nodes
Tim Ruffing, Pedro Moreno-Sánchez, Aniket Kate (2014)
CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin
A. Lokhov, M. Mézard, H. Ohta, L. Zdeborová (2013)
Inferring the origin of an epidemy with dynamic message-passing algorithmPhysical review. E, Statistical, nonlinear, and soft matter physics, 90 1
D. Sprott (1978)
Urn Models and Their Application—An Approach to Modern Discrete Probability TheoryTechnometrics, 20
(2015)
Spy vs
D. Plohmann, E. Gerhards-Padilla (2012)
Case study of the Miner Botnet2012 4th International Conference on Cyber Conflict (CYCON 2012)
Ian Miers, Christina Garman, M. Green, A. Rubin (2013)
Zerocoin: Anonymous Distributed E-Cash from Bitcoin2013 IEEE Symposium on Security and Privacy
(2013)
CoinJoin: Bitcoin privacy for the real world
Kai Zhu, Lei Ying (2013)
A robust information source estimator with sparse observationsComputational Social Networks, 1
S. N, M. E, G. O, G. E, Y. A (2013)
A Fistful of Bitcoins Characterizing Payments Among Men with No Names
Joseph Bonneau, Arvind Narayanan, Andrew Miller, Jeremy Clark, Joshua Kroll, E. Felten (2014)
Mixcoin: Anonymity for Bitcoin with Accountable MixesIACR Cryptol. ePrint Arch., 2014
Micha Ober, S. Katzenbeisser, K. Hamacher (2013)
Structure and Anonymity of the Bitcoin Transaction GraphFuture Internet, 5
M. Mitzenmacher (2001)
The Power of Two Choices in Randomized Load BalancingIEEE Trans. Parallel Distributed Syst., 12
13-th IEEE International Conference on Peer-to-Peer Computing Information Propagation in the Bitcoin Network
D. Wolinsky, Henry Corrigan-Gibbs, B. Ford, Aaron Johnson
Usenix Association 10th Usenix Symposium on Operating Systems Design and Implementation (osdi '12) 179 Dissent in Numbers: Making Strong Anonymity Scale
Bitcoin core integration/staging tree. https://github.com/bitcoin/bitcoin
Fergal Reid, Martin Harrigan (2011)
An Analysis of Anonymity in the Bitcoin System2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
V. Fioriti, M. Chinnici (2012)
Predicting the sources of an outbreak with a spectral techniqueArXiv, abs/1211.2333
Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, C. Tan (2014)
Rumor source detection with multiple observations: fundamental limits and algorithms
Joohwan Kim, R. Srikant (2012)
Peer-to-peer streaming over dynamic random Hamilton cycles2012 Information Theory and Applications Workshop
M. Bayati, D. Shah, Mayank Sharma (2005)
Max-Product for Maximum Weight Matching: Convergence, Correctness, and LP DualityIEEE Transactions on Information Theory, 54
Henry Corrigan-Gibbs, B. Ford (2010)
Dissent: accountable anonymous group messagingArXiv, abs/1004.3057
P. Koshy (2013)
CoinSeer: A Telescope Into Bitcoin
(2005)
Maximum Weight Matching via Max-Product Belief Propagation
F. Sebastiani (2001)
Machine learning in automated text categorizationArXiv, cs.IR/0110053
E. Heilman, Leen Alshenibr, Foteini Baldimtsi, Alessandra Scafuro, S. Goldberg (2017)
TumbleBit: An Untrusted Bitcoin-Compatible Anonymous Payment Hub
(2013)
New underground service offers access to thousands of malware-infected hosts
A. Biryukov, I. Pustogarov (2014)
Bitcoin over Tor isn't a Good Idea2015 IEEE Symposium on Security and Privacy
S. Nakamoto (2008)
Bitcoin: A Peer-to-Peer Electronic Cash System
Pedro Pinto, Patrick Thiran, M. Vetterli (2012)
Locating the Source of Diffusion in Large-Scale NetworksPhysical review letters, 109 6
Eran Makover, J. McGowan (2006)
Regular trees in random regular graphsarXiv: Combinatorics
(2017)
Dandelion: Redesigning the Bitcoin Network for Anonymity
(2016)
CoinMarketCap
S. Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, G. Voelker, S. Savage (2013)
A fistful of bitcoins: characterizing payments among men with no namesProceedings of the 2013 conference on Internet measurement conference
(2016)
Confirmed Transactions Per Day
Eythan Levy, G. Louchard, Jordi Petit (2004)
A Distributed Algorithm to Find Hamiltonian Cycles in Random Graphs
D. Chaum (1988)
The dining cryptographers problem: Unconditional sender and recipient untraceabilityJournal of Cryptology, 1
Y. Azar, A. Broder, Anna Karlin, E. Upfal (1999)
Balanced AllocationsSIAM J. Comput., 29
P. Koshy, Diana Koshy, P. Mcdaniel (2014)
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
D. Shah, Tauhid Zaman (2012)
Rumor centrality: a universal source detector
(2016)
Global bitcoin nodes distribution
D. Shah, Tauhid Zaman (2009)
Rumors in a Network: Who's the Culprit?IEEE Transactions on Information Theory, 57
(2016)
Cryptocurrency market capitalizations
B. Prakash, Jilles Vreeken, C. Faloutsos (2012)
Spotting Culprits in Epidemics: How Many and Which Ones?2012 IEEE 12th International Conference on Data Mining
P. Golle, A. Juels (2004)
Dining Cryptographers Revisited
A. Biryukov, D. Khovratovich, I. Pustogarov (2014)
Deanonymisation of Clients in Bitcoin P2P NetworkProceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security
M. Garey, David Johnson, R. Tarjan (1976)
The Planar Hamiltonian Circuit Problem is NP-CompleteSIAM J. Comput., 5
M. Freedman, R. Morris (2002)
Tarzan: a peer-to-peer anonymizing network layer
M. Reiter, A. Rubin (1998)
Crowds: anonymity for Web transactionsACM Trans. Inf. Syst. Secur., 1
M. Bartlett (1956)
Deterministic and Stochastic Models for Recurrent Epidemics
Eli Ben-Sasson, A. Chiesa, Christina Garman, M. Green, Ian Miers, Eran Tromer, M. Virza (2014)
Zerocash: Decentralized Anonymous Payments from Bitcoin2014 IEEE Symposium on Security and Privacy
D. Ron, A. Shamir (2013)
Quantitative Analysis of the Full Bitcoin Transaction Graph
L. Sehgal, J. Leusen (2004)
Γ and B
with a fraction p of adversaries, then the recall of the first-spy estimator is R FS ( v ) = P ( X v ∈ ¯ S v ) ≥ p
S. Silva, R. Silva, R. Pinto, R. Salles (2013)
Botnets: A surveyComput. Networks, 57
Elli Androulaki, Ghassan Karame, Marc Roeschlin, T. Scherer, Srdjan Capkun (2013)
Evaluating User Privacy in Bitcoin
David Karger, R. Motwani, G. Ramkumar (1993)
On approximating the longest path in a graphAlgorithmica, 18
Dandelion: Redesigning the Bitcoin Network for Anonymity SHAILESHH BOJJA VENKATAKRISHNAN, GIULIA FANTI, and PRAMOD VISWANATH, University of Illinois at Urbana-Champaign Bitcoin and other cryptocurrencies have surged in popularity over the last decade. Although Bitcoin does not claim to provide anonymity for its users, it enjoys a public perception of being a privacy-preserving financial system. In reality, cryptocurrencies publish users' entire transaction histories in plaintext, albeit under a pseudonym; this is required for transaction validation. Therefore, if a user's pseudonym can be linked to their human identity, the privacy fallout can be significant. Recently, researchers have demonstrated deanonymization attacks that exploit weaknesses in the Bitcoin network's peer-to-peer (P2P) networking protocols. In particular, the P2P network currently forwards content in a structured way that allows observers to deanonymize users. In this work, we redesign the P2P network from first principles with the goal of providing strong, provable anonymity guarantees. We propose a simple networking policy called Dandelion which provides quasi-optimal, network-wide anonymity, with minimal cost to the network's utility. We also discuss practical implementation challenges and propose heuristic solutions. CCS Concepts: · Networks Network privacy and anonymity; Peer-to-peer networks; Peer-to-peer protocols; Topology analysis and generation; · Information systems Digital cash;
Proceedings of the ACM on Measurement and Analysis of Computing Systems – Association for Computing Machinery
Published: Jun 13, 2017
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.