SoK: Assumptions Underlying Cryptocurrency Deanonymizations
نویسندگان
چکیده
In recent years, cryptocurrencies have increasingly been used in cybercrime and become the key means of payment darknet marketplaces, partly due to their alleged anonymity. Furthermore, research attacking anonymity even those that claim offer by design is growing being applied law enforcement agencies fight against cybercrime. Their investigative measures require a certain degree suspicion it unclear whether findings resulting from attacks on cryptocurrencies’ can indeed establish required suspicion. The reason for this these are based upon uncertain assumptions which often not properly addressed corresponding papers. To close gap, we extract papers Bitcoin, Monero Zcash, major markets also received most attention researchers. We develop taxonomy capture different nature order help investigators better assess specific could be established. found user behaviour general unreliable thus any them might allow intense such as pre-trial detention. hope raise awareness problem so future there will fewer unlawful investigations human rights violations.
منابع مشابه
Underlying assumptions of developmental models.
These 10 obvious propositions make a model of the specification of form, intended to expose underlying assumptions of developmental biology for examination and future experimentation. (I) The control of development is by means of local interactions, rather than global control mechanisms. (II) A macromolecule near a specific site will bind by mass action. (III) Starting with a precursor cell, al...
متن کاملAssumptions Underlying Agile Software Development Processes
Agile processes focus on facilitating early and fast production of working code, and are based on software development process models that support iterative, incremental development of software. Although agile methods have existed for a number of years now, answers to questions concerning the suitability of agile processes to particular software development environments are still often based on...
متن کاملUnderlying Assumptions and Designated Verifier Signatures
In this paper, we define an underlying computational problem and its decisional problem. As an application of their problems, we propose an efficient designated verifier signature (DVS) scheme without random oracles (related to symmetric pairings). We formally redefine the (Strong) Privacy of Signature’s Identity, and prove our DVS scheme satisfying security based on the difficulty of the probl...
متن کاملAnalysis of Underlying Assumptions in NIST DRBGs
In [1], four different DRBGs are recommended for cryptographic purpose. Each generator is based on some underlying cryptographic concept. The article examines each of the concept to determine what are the necessary and sufficient conditions for the DRBG to be secured in its generation process. In addition, the effects of failure of typical cryptographic requirements of each underlying concept a...
متن کاملAssumptions underlying the Erasmatron interactive storytelling engine
The Erasmatron engine presents an unconventional aproach to the problems of interactive storytelling design. The underlying cause of its peculiarity is the set of unconventional assumptions from which it was built: 1. While architecturally valid stories can be created by algorithm, humanly interesting stories can be created only by artists. 2. The battle between character-based stories and plot...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2022
ISSN: ['2299-0984']
DOI: https://doi.org/10.56553/popets-2022-0091