Anonymity in the Bitcoin Peer-to-Peer Network
Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath
Anonymity in the Bitcoin Peer-to-Peer Network Shaileshh Bojja - - PowerPoint PPT Presentation
Anonymity in the Bitcoin Peer-to-Peer Network Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath Untraceable Bitcoin https://www.youtube.com/watch?v=k8LqlMzEe-I This is false. Blockchain sd93fjj2 Bitcoin Primer
Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath
https://www.youtube.com/watch?v=k8LqlMzEe-‑I
Alice Bob kA kB
Transaction kA sends kcoin to kB
kcoin
Blockchain sd93fjj2 pckrn29 …
Blockchain
Meiklejohn et al., 2013
Biryukov et al., 2014 Koshy et al., 2014
Alice
Under submission, 2017 Under submission, 2017
1) Anonymity Phase 2) Spreading Phase
How bad is the problem?
Trickle (pre-2015) Diffusion (post-2015) (3) (2) (1) (4) exp ¡ (𝜇) exp ¡ (𝜇) exp ¡ (𝜇) exp ¡ (𝜇)
Number of Corrupt Connections Probability of Detection Diffusion Trickle
5 10 15 20 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Trickle, Theoretical lower bound Trickle, Simulated Trickle, Theoretical lower bound (d=2) Diffusion, Theoretical Diffusion, Simulation
Number of Corrupt Connections Probability of Detection Diffusion Trickle
Can we design a better network?
fraction p
learn the graph over time honest- but-curious
metadata
Recall (Probability of Detection) Precision
p 1 p2 p 1
Max ¡recall ≥ 𝑞 Max ¡precision ≥ 𝑞6
1 1
1) Anonymity Phase 2) Spreading Phase
3) No encryption required. 1) Messages propagate over the same cycle graph 2) Cycle graph changes dynamically.
Flooding Diffusion Dandelion
1 1 p p2
Base Case k=1 rounds of Degree-Checking
Base Case k=1 Rounds
Connect through Tor I2P Integration (e.g. Monero)
Byzantine nodes Other adversarial models Practical demonstration