Anonymity in the Bitcoin Peer-to-Peer Network Shaileshh Bojja - - PowerPoint PPT Presentation

anonymity in the bitcoin peer to peer network
SMART_READER_LITE
LIVE PREVIEW

Anonymity in the Bitcoin Peer-to-Peer Network Shaileshh Bojja - - PowerPoint PPT Presentation

Anonymity in the Bitcoin Peer-to-Peer Network Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath Untraceable Bitcoin https://www.youtube.com/watch?v=k8LqlMzEe-I This is false. Blockchain sd93fjj2 Bitcoin Primer


slide-1
SLIDE 1

Anonymity in the Bitcoin Peer-to-Peer Network

Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath

slide-2
SLIDE 2

“Untraceable Bitcoin”

https://www.youtube.com/watch?v=k8LqlMzEe-­‑I

slide-3
SLIDE 3

This is false.

slide-4
SLIDE 4

Bitcoin Primer

Alice Bob kA kB

Transaction kA sends kcoin to kB

kcoin

Blockchain sd93fjj2 pckrn29 …

  • ur transaction
slide-5
SLIDE 5

How can users be deanonymized?

Blockchain

Meiklejohn et al., 2013

What about the peer-to-peer network?

slide-6
SLIDE 6

Attacks on the Network Layer

Eavesdropper

Biryukov et al., 2014 Koshy et al., 2014

Alice

slide-7
SLIDE 7

Our Work

Analysis Redesign

Under submission, 2017 Under submission, 2017

Pr(detection)

Dandelion

1) Anonymity Phase 2) Spreading Phase

slide-8
SLIDE 8

Analysis

How bad is the problem?

slide-9
SLIDE 9

Flooding Protocols

Trickle (pre-2015) Diffusion (post-2015) (3) (2) (1) (4) exp ¡ (𝜇) exp ¡ (𝜇) exp ¡ (𝜇) exp ¡ (𝜇)

slide-10
SLIDE 10

Does diffusion solve the problem?

slide-11
SLIDE 11

Theorem: The maximum-likelihood probabilities of detection for diffusion and trickle are asymptotically identical in d.

Results: d-Regular Trees

slide-12
SLIDE 12

Results: Trees

Number of Corrupt Connections Probability of Detection Diffusion Trickle

slide-13
SLIDE 13

Results: Bitcoin Graph

5 10 15 20 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1

Trickle, Theoretical lower bound Trickle, Simulated Trickle, Theoretical lower bound (d=2) Diffusion, Theoretical Diffusion, Simulation

Number of Corrupt Connections Probability of Detection Diffusion Trickle

slide-14
SLIDE 14

Diffusion does not have (significantly) better anonymity properties than trickle.

slide-15
SLIDE 15

Redesign

Can we design a better network?

slide-16
SLIDE 16

Adversarial Model

fraction p

  • f spies

learn the graph over time honest- but-curious

  • bserve all

metadata

slide-17
SLIDE 17

Metric for Anonymity

Recall (Probability of Detection) Precision

slide-18
SLIDE 18

Goal:

Design a distributed flooding protocol that minimizes the maximum precision and recall achievable by a computationally-unbounded adversary.

slide-19
SLIDE 19

p 1 p2 p 1

Fundamental Limits

Max ¡recall ≥ 𝑞 Max ¡precision ≥ 𝑞6

Precision Recall

1 1

slide-20
SLIDE 20

Proposed Algorithm: Dandelion

1) Anonymity Phase 2) Spreading Phase

slide-21
SLIDE 21

How is Dandelion different from Tor?

3) No encryption required. 1) Messages propagate over the same cycle graph 2) Cycle graph changes dynamically.

slide-22
SLIDE 22

Performance: Achievable Region

Flooding Diffusion Dandelion

Precision Recall

1 1 p p2

slide-23
SLIDE 23

Practical Issues

Constructing a Hamiltonian cycle

Base Case k=1 rounds of Degree-Checking

Degree

Base Case k=1 Rounds

slide-24
SLIDE 24

Comparison with Alternative Solutions

Connect through Tor I2P Integration (e.g. Monero)

Tor

slide-25
SLIDE 25

Next Steps

Byzantine nodes Other adversarial models Practical demonstration

  • f viability
slide-26
SLIDE 26

Take-Home Messages

1) Bitcoin P2P anonymity = L. 2) Moving from trickle to diffusion did not help. 3) Dandelion may be a lightweight solution for certain classes of adversaries.