MoneroResearch.info |
Resource type: Journal Article BibTeX citation key: Egger2022 View all bibliographic details |
Categories: Monero-focused Creators: Egger, Lai, Ronge, Woo, Yin Collection: Proceedings on Privacy Enhancing Technologies |
Views: 18/3681
|
Attachments popets-2022-0085.pdf [6/950] | URLs https://petsymposi ... pets-2022-0085.pdf, https://eprint.iacr.org/2022/132 |
Abstract |
In a ring-signature-based anonymous cryptocurrency, signers of a transaction are hidden among a set of potential signers, called a ring, whose size is much smaller than the number of all users. The ring-membership relations specified by the sets of transactions thus induce bipartite transaction graphs, whose distribution is in turn induced by the ring sampler underlying the cryptocurrency. Since efficient graph analysis could be performed on transaction graphs to potentially deanonymise signers, it is crucial to understand the resistance of (the transaction graphs induced by) a ring sampler against graph analysis. Of particular interest is the class of partitioning ring samplers. Although previous works showed that they provide almost optimal local anonymity, their resistance against global, e.g. graph-based, attacks were unclear. In this work, we analyse transaction graphs induced by partitioning ring samplers. Specifically, we show (partly analytically and partly empirically) that, somewhat surprisingly, by setting the ring size to be at least logarithmic in the number of users, a graph-analysing adversary is no better than the one that performs random guessing in deanonymisation up to constant factor of 2. |