An Analysis of Anonymity in the Bitcoin System

Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate informatio...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Reid, F., Harrigan, M.
Format: Tagungsbericht
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 1326
container_issue
container_start_page 1318
container_title
container_volume
creator Reid, F.
Harrigan, M.
description Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.
doi_str_mv 10.1109/PASSAT/SocialCom.2011.79
format Conference Proceeding
fullrecord <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_6113303</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>6113303</ieee_id><sourcerecordid>6113303</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-8bfe481a2df84c726d700da857cb2a3b0fcaed6bc2ce4ce2feeac059122b61f3</originalsourceid><addsrcrecordid>eNotzMtKxDAUxvGICMrYJ3CTF2jnnKTNZVmLNxhQaPdDmp5gpBeZdNO3t6ir7_dt_oxxhAIR7PGjbtu6O7aLj25slqkQgFhoe8Uyqw1oZauy0kZe_37crdFKNLcsS-kLANAqrQTcsaKeeT27cUsx8SXsXuZtiuvG48zXT-KPcfXL7nZLK0337Ca4MVH2vwfWPT91zWt-en95a-pT7gXAmps-UGnQiSGY0muhBg0wOFNp3wsnewje0aB6LzyVnkQgch4qi0L0CoM8sIe_bCSi8_clTu6ynRWilCDlD3RpSDY</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>An Analysis of Anonymity in the Bitcoin System</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Reid, F. ; Harrigan, M.</creator><creatorcontrib>Reid, F. ; Harrigan, M.</creatorcontrib><description>Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.</description><identifier>ISBN: 9781457719318</identifier><identifier>ISBN: 1457719312</identifier><identifier>EISBN: 9780769545783</identifier><identifier>EISBN: 0769545785</identifier><identifier>DOI: 10.1109/PASSAT/SocialCom.2011.79</identifier><language>eng</language><publisher>IEEE</publisher><subject>Anonymity ; Bitcoin ; Context ; Educational institutions ; History ; IP networks ; Joining processes ; Network Analysis ; Peer to peer computing ; Public key</subject><ispartof>2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011, p.1318-1326</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-8bfe481a2df84c726d700da857cb2a3b0fcaed6bc2ce4ce2feeac059122b61f3</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/6113303$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,780,784,789,790,2058,27925,54920</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/6113303$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Reid, F.</creatorcontrib><creatorcontrib>Harrigan, M.</creatorcontrib><title>An Analysis of Anonymity in the Bitcoin System</title><title>2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing</title><addtitle>passat-socialcom</addtitle><description>Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.</description><subject>Anonymity</subject><subject>Bitcoin</subject><subject>Context</subject><subject>Educational institutions</subject><subject>History</subject><subject>IP networks</subject><subject>Joining processes</subject><subject>Network Analysis</subject><subject>Peer to peer computing</subject><subject>Public key</subject><isbn>9781457719318</isbn><isbn>1457719312</isbn><isbn>9780769545783</isbn><isbn>0769545785</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2011</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNotzMtKxDAUxvGICMrYJ3CTF2jnnKTNZVmLNxhQaPdDmp5gpBeZdNO3t6ir7_dt_oxxhAIR7PGjbtu6O7aLj25slqkQgFhoe8Uyqw1oZauy0kZe_37crdFKNLcsS-kLANAqrQTcsaKeeT27cUsx8SXsXuZtiuvG48zXT-KPcfXL7nZLK0337Ca4MVH2vwfWPT91zWt-en95a-pT7gXAmps-UGnQiSGY0muhBg0wOFNp3wsnewje0aB6LzyVnkQgch4qi0L0CoM8sIe_bCSi8_clTu6ynRWilCDlD3RpSDY</recordid><startdate>201110</startdate><enddate>201110</enddate><creator>Reid, F.</creator><creator>Harrigan, M.</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201110</creationdate><title>An Analysis of Anonymity in the Bitcoin System</title><author>Reid, F. ; Harrigan, M.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-8bfe481a2df84c726d700da857cb2a3b0fcaed6bc2ce4ce2feeac059122b61f3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2011</creationdate><topic>Anonymity</topic><topic>Bitcoin</topic><topic>Context</topic><topic>Educational institutions</topic><topic>History</topic><topic>IP networks</topic><topic>Joining processes</topic><topic>Network Analysis</topic><topic>Peer to peer computing</topic><topic>Public key</topic><toplevel>online_resources</toplevel><creatorcontrib>Reid, F.</creatorcontrib><creatorcontrib>Harrigan, M.</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Reid, F.</au><au>Harrigan, M.</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>An Analysis of Anonymity in the Bitcoin System</atitle><btitle>2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing</btitle><stitle>passat-socialcom</stitle><date>2011-10</date><risdate>2011</risdate><spage>1318</spage><epage>1326</epage><pages>1318-1326</pages><isbn>9781457719318</isbn><isbn>1457719312</isbn><eisbn>9780769545783</eisbn><eisbn>0769545785</eisbn><abstract>Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.</abstract><pub>IEEE</pub><doi>10.1109/PASSAT/SocialCom.2011.79</doi><tpages>9</tpages></addata></record>
fulltext fulltext_linktorsrc
identifier ISBN: 9781457719318
ispartof 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing, 2011, p.1318-1326
issn
language eng
recordid cdi_ieee_primary_6113303
source IEEE Electronic Library (IEL) Conference Proceedings
subjects Anonymity
Bitcoin
Context
Educational institutions
History
IP networks
Joining processes
Network Analysis
Peer to peer computing
Public key
title An Analysis of Anonymity in the Bitcoin System
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-26T13%3A03%3A59IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=An%20Analysis%20of%20Anonymity%20in%20the%20Bitcoin%20System&rft.btitle=2011%20IEEE%20Third%20International%20Conference%20on%20Privacy,%20Security,%20Risk%20and%20Trust%20and%202011%20IEEE%20Third%20International%20Conference%20on%20Social%20Computing&rft.au=Reid,%20F.&rft.date=2011-10&rft.spage=1318&rft.epage=1326&rft.pages=1318-1326&rft.isbn=9781457719318&rft.isbn_list=1457719312&rft_id=info:doi/10.1109/PASSAT/SocialCom.2011.79&rft_dat=%3Cieee_6IE%3E6113303%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9780769545783&rft.eisbn_list=0769545785&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=6113303&rfr_iscdi=true