Privacy-Enhancing Overlays in Bitcoin

被引:54
|
作者
Meiklejohn, Sarah [1 ]
Orlandi, Claudio [2 ]
机构
[1] UCL, London, England
[2] Aarhus Univ, Aarhus, Denmark
关键词
D O I
10.1007/978-3-662-48051-9_10
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we explore the role of privacy-enhancing overlays in Bitcoin. To examine the effectiveness of different solutions, we first propose a formal definitional framework for virtual currencies and put forth a new notion of anonymity, taint resistance, that they can satisfy. We then approach the problem from a theoretical angle, by proposing various solutions to achieve provable taint resistance, and from a practical angle, by examining the taint resistance of the Coinjoin protocol.
引用
收藏
页码:127 / 141
页数:15
相关论文
共 50 条
  • [1] Privacy-enhancing technologies
    Senicar, V
    Klobucar, T
    Jerman-Blazic, B
    [J]. SECURITY AND PRIVACY IN ADVANCED NETWORKING TECHNOLOGIES, 2004, 193 : 213 - 227
  • [2] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    [J]. DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [3] A Privacy-Enhancing Architecture for Databases
    Wahlstrom, Kirsten
    Quirchmayr, Gerald
    [J]. JOURNAL OF RESEARCH AND PRACTICE IN INFORMATION TECHNOLOGY, 2008, 40 (03): : 151 - 162
  • [4] Inaccuracy as a privacy-enhancing tool
    Gloria González Fuster
    [J]. Ethics and Information Technology, 2010, 12 : 87 - 95
  • [5] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    [J]. IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109
  • [6] Practical Privacy-Enhancing Technologies
    Hajny, Jan
    Malina, Lukas
    Dzurenda, Petr
    [J]. 2015 38TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND SIGNAL PROCESSING (TSP), 2015, : 60 - 64
  • [7] Inaccuracy as a privacy-enhancing tool
    Fuster, Gloria Gonzalez
    [J]. ETHICS AND INFORMATION TECHNOLOGY, 2010, 12 (01) : 87 - 95
  • [8] Privacy-Enhancing Identity Management
    Hansen, Marit
    Berlich, Peter
    Camenisch, Jan
    Clauß, Sebastian
    Pfitzmann, Andreas
    Waidner, Michael
    [J]. Information Security Technical Report, 2004, 9 (01): : 35 - 44
  • [9] Critical RFID Privacy-Enhancing Technologies
    Spiekermann, Sarah
    Evdokimov, Sergei
    [J]. IEEE SECURITY & PRIVACY, 2009, 7 (02) : 56 - 62
  • [10] Security and Privacy-Enhancing Multicloud Architectures
    Bohli, Jens-Matthias
    Gruschka, Nils
    Jensen, Meiko
    Lo Iacono, Luigi
    Marnau, Ninja
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2013, 10 (04) : 212 - 224