skip to main content
research-article
Free Access

A fistful of Bitcoins: characterizing payments among men with no names

Published:23 March 2016Publication History
Skip Abstract Section

Abstract

Bitcoin is a purely online virtual currency, unbacked by either physical commodities or sovereign obligation; instead, it relies on a combination of cryptographic protection and a peer-to-peer protocol for witnessing settlements. Consequently, Bitcoin has the unintuitive property that while the ownership of money is implicitly anonymous, its flow is globally visible. In this paper we explore this unique characteristic further, using heuristic clustering to group Bitcoin wallets based on evidence of shared authority, and then using re-identification attacks (i.e., empirical purchasing of goods and services) to classify the operators of those clusters. From this analysis, we consider the challenges for those seeking to use Bitcoin for criminal or fraudulent purposes at scale.

References

  1. Androulaki, E., Karame, G., Roeschlin, M., Scherer, T., Capkun, S. Evaluating user privacy in Bitcoin. In Proceedings of Financial Cryptography 2013 (2013).Google ScholarGoogle ScholarCross RefCross Ref
  2. CBC News. Revenue Canada says BitCoins aren't tax exempt, Apr. 2013. www.cbc.ca/news/canada/story/2013/04/26/business-bitcoin-tax.html.Google ScholarGoogle Scholar
  3. Eha, B.P. Get ready for a Bitcoin debit card. CNNMoney, Apr. 2012. money.cnn.com/2012/08/22/technology/startups/bitcoin-debit-card/index.html.Google ScholarGoogle Scholar
  4. European Central Bank. Virtual Currency Schemes. ECB Report, Oct. 2012. www.ecb.europa.eu/pub/pdf/other/virtualcurrencyschemes201210en.pdf.Google ScholarGoogle Scholar
  5. Federal Bureau of Investigation. (U) Bitcoin virtual currency unique features present distinct challenges for deterring illicit activity. Intelligence assessment, cyber intelligence and criminal intelligence section, Apr. 2012. cryptome.org/2012/05/fbi-bitcoin.pdf.Google ScholarGoogle Scholar
  6. FinCEN. Application of FinCEN's regulations to persons administering, exchanging, or using virtual currencies, Mar. 2013. www.fincen.gov/statutes_regs/guidance/pdf/FIN-2013-G001.pdf.Google ScholarGoogle Scholar
  7. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system, 2008. bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  8. Peck, M. Bitcoin-central is now the World's First Bitcoin Bank…kind of. IEEE Spectrum: Tech talk, Dec. 2012. spectrum.ieee.org/tech-talk/telecom/internet/bitcoincentral-is-now-the-worlds-first-bitcoin-bankkind.Google ScholarGoogle Scholar
  9. Reid, F., Harrigan, M. An analysis of anonymity in the Bitcoin system. In Security and Privacy in Social Networks. Y. Altshuler, Y. Elovici, A.B. Cremers, N. Aharony, and A. Pentland, eds. Springer, New York, 2013, 197--223.Google ScholarGoogle ScholarCross RefCross Ref
  10. Ron, D., Shamir, A. Quantitative analysis of the full Bitcoin transaction graph. In Proceedings of Financial Cryptography 2013 (2013).Google ScholarGoogle ScholarCross RefCross Ref
  11. Securities and Exchange Commission. SEC charges Texas man With running Bitcoin-denominated Ponzi scheme, July 2013. www.sec.gov/News/PressRelease/Detail/PressRelease/1370539730583.Google ScholarGoogle Scholar
  12. znort987. blockparser. github.com/znort987/blockparser.Google ScholarGoogle Scholar

Index Terms

  1. A fistful of Bitcoins: characterizing payments among men with no names

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in

            Full Access

            • Published in

              cover image Communications of the ACM
              Communications of the ACM  Volume 59, Issue 4
              April 2016
              87 pages
              ISSN:0001-0782
              EISSN:1557-7317
              DOI:10.1145/2907055
              • Editor:
              • Moshe Y. Vardi
              Issue’s Table of Contents

              Copyright © 2016 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 23 March 2016

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article
              • Research
              • Refereed

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            HTML Format

            View this article in HTML Format .

            View HTML Format