MoneroResearch.info |
Resource type: Proceedings Article DOI: 10.1109/ICBC51069.2021.9461084 BibTeX citation key: 2021a View all bibliographic details |
Categories: Monero-focused Creators: Kreutz, Otávio Chervinski, Yu Collection: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC) |
Views: 267/4063
|
Attachments Analysis_of_transaction_flooding_attacks_against_Monero.pdf [35/550] | URLs https://ieeexplore ... t/document/9461084, https://eprint.iacr.org/2019/455 |
Abstract |
Monero was one of the first cryptocurrencies to address the problem of providing privacy-preserving digital asset trading. Currently, it has a market capitalization of over 2.5 billion US dollars and is among the 15 most valuable cryptocurrencies. This digital currency aims to protect users' identities and hide transaction information by using obfuscation mechanisms such as stealth addresses and ring signatures. However, in spite of the efforts to protect Monero's users' privacy, researchers have found ways to identify true payment keys within a ring signature in the past, making attacks against transaction privacy feasible. Since then, the system has received updates and adopted improved measures to provide privacy. This work presents an analysis on how an attacker can take advantage of the system's current settings to conduct both a high-profile transaction flooding attack and a stealthier version. Our results show that after flooding the network for 12 months, the attacker can identify the true spend of 46.24% of newly created transaction inputs by conducting the strongest attack and 14.47% by using the low-profile strategy.
Added by: Jack Last edited by: Jack |