MoneroResearch.info

WIKINDX Resources

Otávio Chervinski, J., Kreutz, D., & Yu, J. 2021, Analysis of transaction flooding attacks against monero. Paper presented at 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). 
Added by: Rucknium (2/25/22, 6:01 PM)   Last edited by: Rucknium (2/25/22, 6:01 PM)
Resource type: Proceedings Article
DOI: 10.1109/ICBC51069.2021.9461084
BibTeX citation key: 2021a
View all bibliographic details
Categories: Monero-focused
Creators: Kreutz, Otávio Chervinski, Yu
Collection: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)
Views: 59/511
Attachments   URLs   https://ieeexplore ... t/document/9461084
Abstract
Monero was one of the first cryptocurrencies to address the problem of providing privacy-preserving digital asset trading. Currently, it has a market capitalization of over 2.5 billion US dollars and is among the 15 most valuable cryptocurrencies. This digital currency aims to protect users' identities and hide transaction information by using obfuscation mechanisms such as stealth addresses and ring signatures. However, in spite of the efforts to protect Monero's users' privacy, researchers have found ways to identify true payment keys within a ring signature in the past, making attacks against transaction privacy feasible. Since then, the system has received updates and adopted improved measures to provide privacy. This work presents an analysis on how an attacker can take advantage of the system's current settings to conduct both a high-profile transaction flooding attack and a stealthier version. Our results show that after flooding the network for 12 months, the attacker can identify the true spend of 46.24% of newly created transaction inputs by conducting the strongest attack and 14.47% by using the low-profile strategy.
  
WIKINDX 6.5.0 | Total resources: 111 | Username: -- | Bibliography: WIKINDX Master Bibliography | Style: American Psychological Association (APA)