Anonymity Properties of the Bitcoin P2P Network
نویسندگان
چکیده
Bitcoin is a popular alternative to fiat money, widely used for its perceived anonymity properties. However, recent attacks on Bitcoin’s peer-to-peer (P2P) network demonstrated that its gossip-based flooding protocols, which are used to ensure global network consistency, may enable user deanonymization— the linkage of a user’s IP address with her pseudonym in the Bitcoin network. In 2015, the Bitcoin community responded to these attacks by changing the network’s flooding mechanism to a different protocol, known as diffusion. However, no systematic justification was provided for the change, and it is unclear if diffusion actually improves the system’s anonymity. In this paper, we model the Bitcoin networking stack and analyze its anonymity properties, both preand post-2015. In doing so, we consider new adversarial models and spreading mechanisms that have not been previously studied in the source-finding literature. We theoretically prove that Bitcoin’s networking protocols (both preand post-2015) offer poor anonymity properties on networks with a regular-tree topology. We validate this claim in simulation on a 2015 snapshot of the real Bitcoin P2P network topology.
منابع مشابه
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
Over the last 4 years, Bitcoin, a decentralized P2P cryptocurrency, has gained widespread attention. The ability to create pseudoanonymous financial transactions using bitcoins has made the currency attractive to users who value their privacy. Although previous work has analyzed the degree of anonymity Bitcoin offers using clustering and flow analysis, none have demonstrated the ability to map ...
متن کاملUnsupervised Approaches to Detecting Anomalous Behavior in the Bitcoin Transaction Network
Bitcoin is an electronic crypto-currency created in 2008 by Satoshi Nakamoto (pseudonym). At the time the original bitcoin client was written, the idea of a purely peer-to-peer (P2P) digital currency which did not require a trusted-thirdparty to confirm transactions / prevent double spending was unique. In the bitcoin network, all transactions are public, effectively rendering double-spending i...
متن کاملP2P Mixing and Unlinkable P2P Transactions Scalable Strong Anonymity without External Routers
Starting with Dining Cryptographers networks (DC-net), several peer-to-peer (P2P) anonymous communication protocols have been proposed. Despite their strong anonymity guarantees none of those has been employed in practice so far: Most fail to simultaneously handle the crucial problems of slot collisions and malicious peers, while the remaining ones handle those with a significant increased late...
متن کاملP2P Mixing and Unlinkable Bitcoin Transactions
Starting with Dining Cryptographers networks (DC-net), several peer-to-peer (P2P) anonymous communication protocols have been proposed. Despite their strong anonymity guarantees none of those has been employed in practice so far: Most fail to simultaneously handle the crucial problems of slot collisions and malicious peers, while the remaining ones handle those with a significant increased late...
متن کاملCS 224W Project Report Network Analysis of Weighted Signed Bitcoin Networks
Bitcoin has become an increasingly popular cryptocurrency because of the anonymity it offers. Any transaction between two bitcoin users is stored in a public ledger (called blockchain). While there has been analysis of various Bitcoin networks [RS12, FKP14, OKH13], most of the papers consider only unsigned Bitcoin networks and only do basic analysis of the transaction graph, such as amount of b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1703.08761 شماره
صفحات -
تاریخ انتشار 2017