Skip to main content

2013 | OriginalPaper | Buchkapitel

An Analysis of Anonymity in the Bitcoin System

verfasst von : Fergal Reid, Martin Harrigan

Erschienen in: Security and Privacy in Social Networks

Verlag: Springer New York

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified only by public-keys. An attacker wishing to de-anonymize users will attempt to construct the one-to-many mapping between users and public-keys, and associate information external to the system with the users. Bitcoin tries to prevent this attack by storing the mapping of a user to his or her public-keys on that user’s node only and by allowing each user to generate as many public-keys as required. In this chapter we consider the topological structure of two networks derived from Bitcoin’s public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system, and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately US$500,000.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
2
 
6
The transactions and public-keys used in our examples exist in our dataset. The unique identifier for the transaction t 1 is 09441d3c52fa0018365fcd2949925182f6307322138773d52c201f5cc2 bb5976. You can query the details of a transaction or public-key by examining Bitcoin’s block-chain using, for example, the Bitcoin Block Explorer (http://​www.​blockexplorer.​com).
 
7
eBhR3oHFD5wkE4oGtrLdbdi2PvK3ijMC
 
8
c4d41d0f5d2aff14d449daa550c7d9b0eaaf35d81ee5e6e77f8948b14d62378
 
9
smBSUoRGmbH13vif1Nu17S63Tnmg7h9n
 
10
c034fb964257ecbf4eb953e2362e165dea9c1d008032bc9ece5cebbc7cd4697
 
11
f16ece066f6e4cf92d9a72eb1359d8401602a23990990cb84498cdbb93026402
 
16
1KPTdMb6p7H3YCwsyFqrEmKGmsHqe1Q3jg
 
18
15iUDqk6nLmav3B1xUHPQivDpfMruVsu9f
 
19
J18yk7D353z3gRVcdbS7PV5Q8h5w6oWWG
 
22
MUpbAY7rjWxvLtUwLkARViqSdzypMgVW413tst9ukW294Q7f6zRJr3VmLq6zp1C68EK1DcQvXMD87MaYcFZqHzDZyH3sAv8R5hMZe1AEW9ToWWwKoLFYSsLkPqDyHeS2feDVsVZ1EWASKF9DLU CgEFqfgrNaHzp3q4oEgjTsF
 
24
FKFiCYJSFqxT3zkZntHjfU47SvAzauZXN
 
25
FhYawPhWDvkZCJVBrDfQoo2qC3EuKtb94
 
26
MJZZmmSrQZ9NzeQt3hYP76oFC5dWAf2nD
 
27
dJo17jcR78Uk1Ak5wfgyXtciU62MzcEc
 
28
MAazCWMydsQB5ynYXqSGQDjNQMN3HFmEu
 
Literatur
1.
Zurück zum Zitat Altshuler Y, Aharony N, Elovici Y, Pentland A, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Int Syst 26(6):22–30CrossRef Altshuler Y, Aharony N, Elovici Y, Pentland A, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Int Syst 26(6):22–30CrossRef
2.
Zurück zum Zitat Anderson A, Cannell D, Gibbons T, Grote G, Henn J, Kennedy J, Muir M, Potter N, Whitby R (1966) An electronic cash and credit system. American Management Association, New York Anderson A, Cannell D, Gibbons T, Grote G, Henn J, Kennedy J, Muir M, Potter N, Whitby R (1966) An electronic cash and credit system. American Management Association, New York
4.
Zurück zum Zitat Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, Banff. ACM, New York, pp 181–190 Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, Banff. ACM, New York, pp 181–190
6.
Zurück zum Zitat Brockmann D, Hufnagel L, Geisel T (2006) The scaling laws of human travel. Nature 439(26):462–465CrossRef Brockmann D, Hufnagel L, Geisel T (2006) The scaling laws of human travel. Nature 439(26):462–465CrossRef
7.
Zurück zum Zitat Cavusoglu H, Cavusoglu H, Raghunathan S (2005) Emerging issues in responsible vulnerability disclosure. In: Proceedings of the 4th Annual Workshop on Economics of Information Security (WEIS’05), Cambridge Cavusoglu H, Cavusoglu H, Raghunathan S (2005) Emerging issues in responsible vulnerability disclosure. In: Proceedings of the 4th Annual Workshop on Economics of Information Security (WEIS’05), Cambridge
9.
Zurück zum Zitat Crandall D, Backstrom L, Cosley D, Suri S, Huttenlocher D, Kleinberg J (2010) Inferring social ties from geographic coincidences. Proc Natl Acad Sci U S A 107(52):22436CrossRef Crandall D, Backstrom L, Cosley D, Suri S, Huttenlocher D, Kleinberg J (2010) Inferring social ties from geographic coincidences. Proc Natl Acad Sci U S A 107(52):22436CrossRef
11.
Zurück zum Zitat Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’92), Santa Barbara. Springer, pp 139–147 Dwork C, Naor M (1992) Pricing via processing or combatting junk mail. In: Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology (CRYPTO’92), Santa Barbara. Springer, pp 139–147
13.
Zurück zum Zitat Grinberg R (2011) Bitcoin: an innovative alternative digital currency. Hastings Sci Tech Law J 4:159–208 Grinberg R (2011) Bitcoin: an innovative alternative digital currency. Hastings Sci Tech Law J 4:159–208
14.
Zurück zum Zitat Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria. ACM, New York, pp 71–80 Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, Alexandria. ACM, New York, pp 71–80
15.
Zurück zum Zitat Kaminsky D (2011) Black ops of TCP/IP presentation. Black Hat, Chaos Communication Camp Kaminsky D (2011) Black ops of TCP/IP presentation. Black Hat, Chaos Communication Camp
16.
Zurück zum Zitat Kichiji N, Nishibe M (2008) Network analyses of the circulation flow of community currency. Evol Inst Econ Rev 4(2):267–300 Kichiji N, Nishibe M (2008) Network analyses of the circulation flow of community currency. Evol Inst Econ Rev 4(2):267–300
17.
Zurück zum Zitat Korolova A, Motwani R, Nabar S, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, Napa Valley. ACM, New York, pp 289–298 Korolova A, Motwani R, Nabar S, Xu Y (2008) Link privacy in social networks. In: Proceedings of the 17th ACM Conference on Information and Knowledge Management, Napa Valley. ACM, New York, pp 289–298
18.
Zurück zum Zitat Lewis K, Kaufman J, Gonzalez M, Wimmer A, Christakis N (2008) Tastes, ties, and time: a new social network dataset using {F}acebook.com. Soc Netw 30:330–342CrossRef Lewis K, Kaufman J, Gonzalez M, Wimmer A, Christakis N (2008) Tastes, ties, and time: a new social network dataset using {F}acebook.com. Soc Netw 30:330–342CrossRef
20.
Zurück zum Zitat Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the 29th Symposium on Security and Privacy, Oakland. IEEE, pp 111–125 Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the 29th Symposium on Security and Privacy, Oakland. IEEE, pp 111–125
21.
Zurück zum Zitat Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the 30th Symposium on Security and Privacy, Oakland. IEEE, pp 173–187 Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the 30th Symposium on Security and Privacy, Oakland. IEEE, pp 173–187
22.
Zurück zum Zitat Nishibe M (2004) Chiiki Tuka No Susume (in Japanese). Hokkaido Shokoukai Rengou Nishibe M (2004) Chiiki Tuka No Susume (in Japanese). Hokkaido Shokoukai Rengou
23.
Zurück zum Zitat Puzis R, Yagil D, Elovici Y, Braha D (2009) Collaborative attack on internet users’ anonymity. Internet Res 19(1):60–77CrossRef Puzis R, Yagil D, Elovici Y, Braha D (2009) Collaborative attack on internet users’ anonymity. Internet Res 19(1):60–77CrossRef
24.
Zurück zum Zitat Saito K (2006) i-WAT: the internet WAT system – an architecture for maintaining trust and facilitating peer-to-peer barter relationships. Ph.D. thesis, Keio University Saito K (2006) i-WAT: the internet WAT system – an architecture for maintaining trust and facilitating peer-to-peer barter relationships. Ph.D. thesis, Keio University
25.
26.
Zurück zum Zitat Stalder F (2002) Failures and successes: notes on the development of electronic cash. Inf Soc 18(3):209–219MathSciNetCrossRef Stalder F (2002) Failures and successes: notes on the development of electronic cash. Inf Soc 18(3):209–219MathSciNetCrossRef
28.
Zurück zum Zitat Vishnumurthy V, Chandrakumar S, Sirer E (2003) KARMA: a secure economic framework for peer-to-peer resource sharing. In: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, California Vishnumurthy V, Chandrakumar S, Sirer E (2003) KARMA: a secure economic framework for peer-to-peer resource sharing. In: Proceedings of the 1st Workshop on Economics of Peer-to-Peer Systems, Berkeley, California
30.
Zurück zum Zitat Yang B, Garcia-Molin H (2003) PPay: micropayments for peer-to-peer systems. In: Atluri V, Liu P (eds) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS’03), Fairfax. ACM Press, New York, pp 300–310 Yang B, Garcia-Molin H (2003) PPay: micropayments for peer-to-peer systems. In: Atluri V, Liu P (eds) Proceedings of the 10th ACM Conference on Computer and Communication Security (CCS’03), Fairfax. ACM Press, New York, pp 300–310
Metadaten
Titel
An Analysis of Anonymity in the Bitcoin System
verfasst von
Fergal Reid
Martin Harrigan
Copyright-Jahr
2013
Verlag
Springer New York
DOI
https://doi.org/10.1007/978-1-4614-4139-7_10

Premium Partner