Skip to main content
Top

2017 | OriginalPaper | Chapter

Mixing Coins of Different Quality: A Game-Theoretic Approach

Authors : Svetlana Abramova, Pascal Schöttle, Rainer Böhme

Published in: Financial Cryptography and Data Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Cryptocoins based on public distributed ledgers can differ in their quality due to different subjective values users assign to coins depending on the unique transaction history of each coin. We apply game theory to study how qualitative differentiation between coins will affect the behavior of users interested in improving their anonymity through mixing services. We present two stylized models of mixing with perfect and imperfect information and analyze them for three distinct quality propagation policies: poison, haircut, and seniority. In the game of perfect information, mixing coins of high quality remains feasible under certain conditions, while imperfect information eventually leads to a mixing market where only coins of the lowest quality are mixed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
Otherwise, switch players A and B.
 
2
Note that the game of perfect information under the poison regime has even more Nash equilibria. However, these are not subgame perfect.
 
Literature
1.
go back to reference Aceto, G., Pescapé, A.: Internet censorship detection: a survey. Comput. Netw. 83, 381–421 (2015)CrossRef Aceto, G., Pescapé, A.: Internet censorship detection: a survey. Comput. Netw. 83, 381–421 (2015)CrossRef
3.
go back to reference Akerlof, G.A.: The market for “Lemon”: quality uncertainty and the market mechanism. Q. J. Econ. 84(3), 161–167 (1970)CrossRef Akerlof, G.A.: The market for “Lemon”: quality uncertainty and the market mechanism. Q. J. Econ. 84(3), 161–167 (1970)CrossRef
6.
go back to reference Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213–238 (2015)CrossRef Böhme, R., Christin, N., Edelman, B., Moore, T.: Bitcoin: economics, technology, and governance. J. Econ. Perspect. 29(2), 213–238 (2015)CrossRef
7.
go back to reference Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 104–121 (2015) Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 104–121 (2015)
9.
go back to reference Chacko, G., Jurek, J., Stafford, E.: The price of immediacy. J. Financ. 63(3), 1253–1290 (2008)CrossRef Chacko, G., Jurek, J., Stafford, E.: The price of immediacy. J. Financ. 63(3), 1253–1290 (2008)CrossRef
10.
go back to reference Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–90 (1981)CrossRef
11.
go back to reference Edwards, B., Moore, T., Stelle, G., Hofmeyr, S., Forrest, S.: Beyond the blacklist: modeling malware spread and the effect of interventions. In: Proceedings of 2012 Workshop on New Security Paradigms, pp. 53–66. ACM, New York (2012) Edwards, B., Moore, T., Stelle, G., Hofmeyr, S., Forrest, S.: Beyond the blacklist: modeling malware spread and the effect of interventions. In: Proceedings of 2012 Workshop on New Security Paradigms, pp. 53–66. ACM, New York (2012)
13.
go back to reference Henry, R., Goldberg, I.: Formalizing anonymous blacklisting systems. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 81–95. IEEE Computer Society, Washington, DC (2011) Henry, R., Goldberg, I.: Formalizing anonymous blacklisting systems. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 81–95. IEEE Computer Society, Washington, DC (2011)
16.
go back to reference Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM, New York (2013) Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G.M., Savage, S.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of 2013 Conference on Internet Measurement Conference, pp. 127–140. ACM, New York (2013)
17.
go back to reference Möser, M., Böhme, R.: Join me on a market for anonymity. In: Proceedings of 15th Annual Workshop on the Economics of Information Security, Berkeley, CA, USA (2016) Möser, M., Böhme, R.: Join me on a market for anonymity. In: Proceedings of 15th Annual Workshop on the Economics of Information Security, Berkeley, CA, USA (2016)
18.
go back to reference Möser, M., Böhme, R.: Anonymous alone? Measuring bitcoin’s second-generation anonymization techniques. In: IEEE Security & Privacy on the Blockchain (IEEE S&B), Paris, France (2017) Möser, M., Böhme, R.: Anonymous alone? Measuring bitcoin’s second-generation anonymization techniques. In: IEEE Security & Privacy on the Blockchain (IEEE S&B), Paris, France (2017)
19.
go back to reference Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: APWG eCrime Researchers Summit (ECRIME), San Francisco, CA, USA, pp. 1–14 (2013) Möser, M., Böhme, R., Breuker, D.: An inquiry into money laundering tools in the bitcoin ecosystem. In: APWG eCrime Researchers Summit (ECRIME), San Francisco, CA, USA, pp. 1–14 (2013)
22.
go back to reference Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology, Technical report (2005) Pfitzmann, A., Hansen, M.: Anonymity, unlinkability, unobservability, pseudonymity, and identity management - a consolidated proposal for terminology, Technical report (2005)
23.
go back to reference Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, B.A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)CrossRef Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, B.A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197–223. Springer, New York (2013)CrossRef
26.
go back to reference Sheng, S., Wardman, B., Warner, G., Cranor, L.F., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Proceedings of 6th Conference on Email and Anti-Spam, CEAS 2009 (2009) Sheng, S., Wardman, B., Warner, G., Cranor, L.F., Hong, J., Zhang, C.: An empirical analysis of phishing blacklists. In: Proceedings of 6th Conference on Email and Anti-Spam, CEAS 2009 (2009)
28.
29.
go back to reference Tadelis, S.: Game Theory: An Introduction. Princeton University Press, Princeton (2013)MATH Tadelis, S.: Game Theory: An Introduction. Princeton University Press, Princeton (2013)MATH
32.
go back to reference Vasek, M., Weeden, M., Moore, T.: Measuring the impact of sharing abuse data with web hosting providers. In: Proceedings of 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, pp. 71–80. ACM, New York (2016) Vasek, M., Weeden, M., Moore, T.: Measuring the impact of sharing abuse data with web hosting providers. In: Proceedings of 2016 ACM on Workshop on Information Sharing and Collaborative Security, WISCS 2016, pp. 71–80. ACM, New York (2016)
Metadata
Title
Mixing Coins of Different Quality: A Game-Theoretic Approach
Authors
Svetlana Abramova
Pascal Schöttle
Rainer Böhme
Copyright Year
2017
DOI
https://doi.org/10.1007/978-3-319-70278-0_18

Premium Partner