An Analysis of Anonymity in the Bitcoin System
Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate informatio...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 1326 |
---|---|
container_issue | |
container_start_page | 1318 |
container_title | |
container_volume | |
creator | Reid, F. Harrigan, M. |
description | Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars. |
doi_str_mv | 10.1109/PASSAT/SocialCom.2011.79 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6113303</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6113303</ieee_id><sourcerecordid>6113303</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-8bfe481a2df84c726d700da857cb2a3b0fcaed6bc2ce4ce2feeac059122b61f3</originalsourceid><addsrcrecordid>eNotzMtKxDAUxvGICMrYJ3CTF2jnnKTNZVmLNxhQaPdDmp5gpBeZdNO3t6ir7_dt_oxxhAIR7PGjbtu6O7aLj25slqkQgFhoe8Uyqw1oZauy0kZe_37crdFKNLcsS-kLANAqrQTcsaKeeT27cUsx8SXsXuZtiuvG48zXT-KPcfXL7nZLK0337Ca4MVH2vwfWPT91zWt-en95a-pT7gXAmps-UGnQiSGY0muhBg0wOFNp3wsnewje0aB6LzyVnkQgch4qi0L0CoM8sIe_bCSi8_clTu6ynRWilCDlD3RpSDY</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Analysis of Anonymity in the Bitcoin System</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Reid, F. ; Harrigan, M.</creator><creatorcontrib>Reid, F. ; Harrigan, M.</creatorcontrib><description>Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.</description><identifier>ISBN: 9781457719318</identifier><identifier>ISBN: 1457719312</identifier><identifier>EISBN: 9780769545783</identifier><identifier>EISBN: 0769545785</identifier><identifier>DOI: 10.1109/PASSAT/SocialCom.2011.79</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymity ; Bitcoin ; Context ; Educational institutions ; History ; IP networks ; Joining processes ; Network Analysis ; Peer to peer computing ; Public key</subject><ispartof>2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011, p.1318-1326</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-8bfe481a2df84c726d700da857cb2a3b0fcaed6bc2ce4ce2feeac059122b61f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6113303$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6113303$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Reid, F.</creatorcontrib><creatorcontrib>Harrigan, M.</creatorcontrib><title>An Analysis of Anonymity in the Bitcoin System</title><title>2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing</title><addtitle>passat-socialcom</addtitle><description>Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.</description><subject>Anonymity</subject><subject>Bitcoin</subject><subject>Context</subject><subject>Educational institutions</subject><subject>History</subject><subject>IP networks</subject><subject>Joining processes</subject><subject>Network Analysis</subject><subject>Peer to peer computing</subject><subject>Public key</subject><isbn>9781457719318</isbn><isbn>1457719312</isbn><isbn>9780769545783</isbn><isbn>0769545785</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotzMtKxDAUxvGICMrYJ3CTF2jnnKTNZVmLNxhQaPdDmp5gpBeZdNO3t6ir7_dt_oxxhAIR7PGjbtu6O7aLj25slqkQgFhoe8Uyqw1oZauy0kZe_37crdFKNLcsS-kLANAqrQTcsaKeeT27cUsx8SXsXuZtiuvG48zXT-KPcfXL7nZLK0337Ca4MVH2vwfWPT91zWt-en95a-pT7gXAmps-UGnQiSGY0muhBg0wOFNp3wsnewje0aB6LzyVnkQgch4qi0L0CoM8sIe_bCSi8_clTu6ynRWilCDlD3RpSDY</recordid><startdate>201110</startdate><enddate>201110</enddate><creator>Reid, F.</creator><creator>Harrigan, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201110</creationdate><title>An Analysis of Anonymity in the Bitcoin System</title><author>Reid, F. ; Harrigan, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-8bfe481a2df84c726d700da857cb2a3b0fcaed6bc2ce4ce2feeac059122b61f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Anonymity</topic><topic>Bitcoin</topic><topic>Context</topic><topic>Educational institutions</topic><topic>History</topic><topic>IP networks</topic><topic>Joining processes</topic><topic>Network Analysis</topic><topic>Peer to peer computing</topic><topic>Public key</topic><toplevel>online_resources</toplevel><creatorcontrib>Reid, F.</creatorcontrib><creatorcontrib>Harrigan, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Reid, F.</au><au>Harrigan, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Analysis of Anonymity in the Bitcoin System</atitle><btitle>2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing</btitle><stitle>passat-socialcom</stitle><date>2011-10</date><risdate>2011</risdate><spage>1318</spage><epage>1326</epage><pages>1318-1326</pages><isbn>9781457719318</isbn><isbn>1457719312</isbn><eisbn>9780769545783</eisbn><eisbn>0769545785</eisbn><abstract>Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.</abstract><pub>IEEE</pub><doi>10.1109/PASSAT/SocialCom.2011.79</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781457719318 |
ispartof | 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011, p.1318-1326 |
issn | |
language | eng |
recordid | cdi_ieee_primary_6113303 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | Anonymity Bitcoin Context Educational institutions History IP networks Joining processes Network Analysis Peer to peer computing Public key |
title | An Analysis of Anonymity in the Bitcoin System |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T13%3A03%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Analysis%20of%20Anonymity%20in%20the%20Bitcoin%20System&rft.btitle=2011%20IEEE%20Third%20International%20Conference%20on%20Privacy,%20Security,%20Risk%20and%20Trust%20and%202011%20IEEE%20Third%20International%20Conference%20on%20Social%20Computing&rft.au=Reid,%20F.&rft.date=2011-10&rft.spage=1318&rft.epage=1326&rft.pages=1318-1326&rft.isbn=9781457719318&rft.isbn_list=1457719312&rft_id=info:doi/10.1109/PASSAT/SocialCom.2011.79&rft_dat=%3Cieee_6IE%3E6113303%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769545783&rft.eisbn_list=0769545785&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6113303&rfr_iscdi=true |