MoneroResearch.info

MoneroResearch.info hosts a collection of research papers relevant to improving Monero, powered by the WIKINDX open source software.

Anyone can browse the papers. To create new entries, edit existing one, and add annotations, you must be a registered user. To register as a user, message Rucknium on Matrix at Rucknium:monero.social . At this time there is no guarantee of stability or security of this website.

Search word(s):

Hint
 Include attachments

Recent additions or edits (WIKINDX Master Bibliography)

Sharma, P. K., Gosain, D., & Diaz, C. 2022. On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies. arXiv.
Added by: Rucknium 2022-12-02 16:39
Grunspan, C., & Perez-Marco, R. 2022. Ping-pong swaps. arXiv.
Added by: Rucknium 2022-12-02 16:36
Yi, X., Wu, D., Jiang, L., Fang, Y., Zhang, K., & Zhang, W. 2022, An empirical study of blockchain system vulnerabilities: Modules, types, and patterns. Paper presented at Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.
Added by: Rucknium 2022-12-02 16:31
Hoenisch, P., Mazumdar, S., Moreno-Sánchez, P., & Ruj, S. 2022. Lightswap: An atomic swap does not require timeouts at both blockchains. [Cryptology ePrint Archive, Paper 2022/1650].
Last edited by: Rucknium 2022-12-02 16:12
Zhaolu, T., Wan, Z., & Wang, H. 2022. Division of regulatory power: Collaborative regulation for privacy-preserving blockchains. [Cryptology ePrint Archive, Paper 2022/1634].
Added by: Rucknium 2022-12-02 16:10
Liao, Y.-C., Tso, R., Liu, Z.-Y., & Tseng, Y.-F. 2022, Blockchain-based confidential payment system with controllable regulation. Paper presented at Information Security Practice and Experience.
Added by: Rucknium 2022-12-02 16:05
Teng, D., Yao, Y., Wang, Y., Zhou, L., & Huang, C. 2022, An sm2-based traceable ring signature scheme for smart grid privacy protection. Paper presented at Wireless Algorithms, Systems, and Applications.
Added by: Rucknium 2022-12-02 16:03
Thyagarajan, S. A., Malavolta, G., Schmid, F., & Schröder, D. 2022, Verifiable timed linkable ring signatures for scalable payments for monero. Paper presented at Computer Security -- ESORICS 2022.
Added by: Rucknium 2022-12-02 15:59
Fanti, G., Venkatakrishnan, S. B., Bakshi, S., Denby, B., Bhargava, S., & Miller, A., et al. (2018). Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc. ACM Meas. Anal. Comput. Syst. 2(2).
Added by: Rucknium 2022-10-22 20:53
Hou, C., Zhou, M., Ji, Y., Daian, P., Tram`er, F., & Fanti, G., et al. 2021, SquirRL: Automating attack analysis on blockchain incentive mechanisms with deep reinforcement learning. Paper presented at Proceedings 2021 Network and Distributed System Security Symposium.
Added by: Rucknium 2022-10-22 20:50
Tang, W., Wang, W., Fanti, G., & Oh, S. (2020). Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst. 4(2).
Last edited by: Rucknium 2022-10-22 20:37
Klinec, D., & Matyas, V. 2020, Privacy-friendly monero transaction signing on a hardware wallet. Paper presented at ICT Systems Security and Privacy Protection.
Added by: Rucknium 2022-10-22 19:45
Meier, J. (2022). Diophantine satisfiability arguments for private blockchains. Unpublished masters thesis, ETH Zurich, Zurich.
Added by: Rucknium 2022-10-22 19:40
Rinberg, R., & Agarwal, N. 2022. Privacy when everyone is watching: An sok on anonymity on the blockchain. [Cryptology ePrint Archive, Paper 2022/985].
Added by: Rucknium 2022-10-22 17:21
Järvinen, S. (2022). Tax evasion with untraceable cryptocurrencies in OECD countries as a target of regulation. Unpublished masters thesis, Aalto University. School of Business.
Added by: Rucknium 2022-10-22 17:17
Gomzin, S. (2022). How monero works. In Crypto Basics: A Nontechnical Introduction to Creating Your Own Money for Investors and Inventors (pp. 119–137). Berkeley, CA: Apress.
Added by: Rucknium 2022-10-22 16:48
Butler, S. 2021, Cyber 9/11 will not take place: A user perspective of bitcoin and cryptocurrencies from underground and dark net forums. Paper presented at Socio-Technical Aspects in Security and Trust.
Added by: Rucknium 2022-10-12 16:26
Wang, J., Cheng, J., Yuan, Y., Li, H., & Sheng, V. S. 2022, A survey on privacy protection of cross-chain. Paper presented at Advances in Artificial Intelligence and Security.
Added by: Rucknium 2022-09-10 20:13
Hinteregger, A., & Haslhofer, B. 2019, Short paper: An empirical analysis of monero cross-chain traceability. Paper presented at Financial Cryptography and Data Security.
Added by: Rucknium 2022-09-10 20:11
Taneska, M., Dobreva, J., & Dimitrova, V. (2022). Forensics investigation comparison of privacy-oriented cryptocurrencies. Security & Future, 6(1).
Last edited by: Rucknium 2022-09-10 20:04
Wang, K., Liu, M., Wang, J., Wu, M., & Zhao, F. (2022). Bbarhs: Blockchain-based anonymous ride-hailing scheme for autonomous taxi network. Security and Communication Networks, 2022, 1–13.
Added by: Rucknium 2022-09-10 19:57
Koerhuis, W., Kechadi, T., & Le-Khac, N.-A. (2020). Forensic analysis of privacy-oriented cryptocurrencies. Forensic Science International: Digital Investigation, 33, 200891.
Added by: Rucknium 2022-09-10 19:55
Sarier, N. D. (2022). Privacy preserving biometric authentication on the blockchain for smart healthcare. Pervasive and Mobile Computing, 86, 101683.
Added by: Rucknium 2022-09-10 19:55
Li, Y., Weng, J., Li, M., Wu, W., Weng, J., & Liu, J.-N., et al. (2022). Zerocross: A sidechain-based privacy-preserving cross-chain solution for monero. Journal of Parallel and Distributed Computing, 169, 301–316.
Added by: Rucknium 2022-09-10 19:54
Quesnelle, J. 2017. On the linkability of zcash transactions. arXiv.
Last edited by: Rucknium 2022-08-25 00:25
Chaum, D., & Heyst, E. V. 1991, Group signatures. Paper presented at Workshop on the Theory and Application of of Cryptographic Techniques.
Last edited by: Jack 2022-08-08 02:40
Guo, Z., Shi, L., Xu, M., & Yin, H. (2021). Mrcc: A practical covert channel over monero with provable security. IEEE Access, 9, 31816–31825.
Last edited by: Rucknium 2022-08-06 21:24
Park, S., & Sealfon, A. 2019. It wasn't me! repudiability and unclaimability of ring signatures. [Cryptology ePrint Archive, Paper 2019/135].
Last edited by: endor 2022-08-02 13:38
Egger, C., Lai, R. W. F., Ronge, V., Woo, I. K. Y., & Yin, H. H. F. (2022). On defeating graph analysis of anonymous transactions. Proceedings on Privacy Enhancing Technologies, 2022(3).
Last edited by: Rucknium 2022-07-05 17:03
Deuber, D., Ronge, V., & Rueckert, C. (2022). Sok: assumptions underlying cryptocurrency deanonymizations. Proceedings on Privacy Enhancing Technologies, 2022(3).
Last edited by: Rucknium 2022-07-05 17:01
Yu, Z., Au, M. H., Yu, J., Yang, R., Xu, Q., & Lau, W. F. 2019, New empirical traceability analysis of cryptonote-style blockchains. Paper presented at Financial Cryptography and Data Security.
Added by: Rucknium 2022-07-02 21:18
Li, J. (2022). Extending succinct zero knowledge proofs for set membership to ring signatures. Unpublished masters thesis, EECS Department, University of California, Berkeley.
Last edited by: Rucknium 2022-07-01 18:05
Budish, E. (2022). The economic limits of bitcoin and anonymous, decentralized trust on the blockchain. Unpublished manuscript.
Added by: Rucknium 2022-07-01 16:19
Alupotha, J., & Boyen, X. 2022. Practical uc-secure zero-knowledge smart contracts. [Cryptology ePrint Archive, Paper 2022/670].
Last edited by: Rucknium 2022-07-01 16:11
Cao, T., Yu, J., Decouchant, J., Luo, X., & Verissimo, P. 2020, Exploring the monero peer-to-peer network. Paper presented at Financial Cryptography and Data Security.
Added by: Rucknium 2022-07-01 16:03
Yu, J., Au, M. H. A., & Esteves-Verissimo, P. 2019, June Re-thinking untraceability in the cryptonote-style blockchain. Paper presented at 2019 IEEE 32nd Computer Security Foundations Symposium (CSF).
Added by: Rucknium 2022-07-01 15:50
Li, Y., Yang, G., Susilo, W., Yu, Y., Au, M. H., & Liu, D. (2021). Traceable monero: Anonymous cryptocurrency with enhanced accountability. IEEE Transactions on Dependable and Secure Computing, 18(2), 679–691.
Added by: Rucknium 2022-06-30 22:22
Sui, Z., Liu, J. K., Yu, J., & Qin, X. (2022). Monet: A fast payment channel network for scriptless cryptocurrency monero. Cryptology ePrint Archive,
Added by: Jack 2022-06-23 04:11
Seres, I. A., Pejó, B., & Burcsi, P. 2022, May 2–6 The effect of false positives: why fuzzy message detection leads to fuzzy privacy guarantees?. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 22:38
Zhang, Y., & Xu, H. (2022). Accountable monero system with privacy protection. Security and Communication Networks, 2022, 7746341.
Added by: Rucknium 2022-05-05 22:33
Kovalchuk, L., Oliynykov, R., Bespalov, Y., & Rodinko, M. (2022). Methods of ensuring privacy in a decentralized environment. In R. Oliynykov, O. Kuznetsov, O. Lemeshko & T. Radivilova (Eds), Information Security Technologies in the Decentralized Distributed Networks (pp. 1–32). Cham: Springer International Publishing.
Added by: Rucknium 2022-05-05 22:29
Liang, M., Karantaidou, I., Baldimtsi, F., Gordon, D. S., & Varia, M. (2022). (∈, δ)-indistinguishable mixing for cryptocurrencies. Proceedings on Privacy Enhancing Technologies, 2022(1), 49–74.
Last edited by: Rucknium 2022-05-05 22:24
Xu, M., Zhang, Y., & Zhong, S. 2022. Towards fair multiparty computation in scriptless distributed ledger systems. [Cryptology ePrint Archive, Report 2022/176].
Last edited by: Rucknium 2022-05-05 22:11
Corradini, F., Mostarda, L., & Scala, E. 2022, Zeromt: Multi-transfer protocol for enabling privacy in off-chain payments. Paper presented at Advanced Information Networking and Applications.
Added by: Rucknium 2022-05-05 21:43
Gailly, N., Maller, M., & Nitulescu, A. 2022, May 2–6 Snarkpack: practical snark aggregation. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 21:04
Gong, T., Minaei, M., Sun, W., & Kate, A. 2022, May 2–6 Towards overcoming the undercutting problem. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 21:01
Zabka, P., Foerster, K.-T., Decker, C., & Schmid, S. 2022, May 2–6 A centrality analysis of the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 20:36
Biryukov, A., Naumenko, G., & Tikhomirov, S. 2022, May 2–6 Analysis and probing of parallel channels in the lightning network. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Last edited by: Rucknium 2022-05-05 20:31
Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., & Yeo, M. 2022, May 2–6 Hide & seek: privacy-preserving rebalancing on payment channel networks. Unpublished paper presented at Financial Cryptography and Data Security 2022.
Added by: Rucknium 2022-05-05 20:31
Eagen, L. Li. E. 2022. Bulletproofs++. [Cryptology ePrint Archive, Report 2022/510].
Last edited by: Rucknium 2022-05-05 14:03
WIKINDX 6.5.0 | Total resources: 128 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)