MoneroResearch.info

WIKINDX Resources

Fischer Amrit Kumar, C., Tople, S., & Saxena, P. 2017, September A traceability analysis of monero’s blockchain. Paper presented at European Symposium on Research in Computer Security (ESORICS). 
Added by: Rucknium (2022-02-23 16:21)   Last edited by: Rucknium (2022-02-23 16:23)
Resource type: Proceedings Article
BibTeX citation key: FischerAmritKumar2017
View all bibliographic details
Categories: Monero-focused
Creators: Fischer Amrit Kumar, Saxena, Tople
Collection: European Symposium on Research in Computer Security (ESORICS)
Views: 45/1632
Attachments   kumar2017.pdf [15/810] URLs   https://doi.org/10 ... 78-3-319-66399-9_9
Abstract
Privacy and anonymity are important desiderata in the use of cryptocurrencies. Monero—a privacy centric cryptocurrency has rapidly gained popularity due to its unlinkability and untraceablity guarantees. It has a market capitalization of USD 290M. In this work, we quantify the efficacy of three attacks on Monero’s untraceability guarantee, which promises to make it hard to trace the origin of a received fund, by analyzing its blockchain data. To this end, we develop three attack routines and evaluate them on the Monero blockchain. Our results show that in 88% of cases, the origin of the funds can be easily determined with certainty. Moreover, we have compelling evidence that two of the attack routines also extend to Monero RingCTs—the second generation Monero that even hides the transaction amount. We further observe that over 98% of the results can in fact be obtained by a simple temporal analysis. In light of our findings, we discuss mitigations to strengthen Monero against these attacks.We shared our findings with theMonero development team and the general community. This has resulted into several discussions and proposals for fixes.
  
WIKINDX 6.5.0 | Total resources: 210 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)