MoneroResearch.info |
Resource type: Proceedings Article ID no. (ISBN etc.): 978-3-030-51280-4 BibTeX citation key: Cao2020 View all bibliographic details |
Categories: Monero-focused Creators: Bonneau, Cao, Decouchant, Heninger, Luo, Verissimo, Yu Publisher: Springer International Publishing Collection: Financial Cryptography and Data Security |
Views: 34/3410
|
Attachments 10.1007@978-3-030-51280-4.pdf [6/1468] | URLs https://link.sprin ... 8-3-030-51280-4_31 |
Abstract |
As of September 2019, Monero is the most capitalized privacy-preserving cryptocurrency, and is ranked tenth among all cryptocurrencies. Monero's on-chain data privacy guarantees, i.e., how mixins are selected in each transaction, have been extensively studied. However, despite Monero's prominence, the network of peers running Monero clients has not been analyzed. Such analysis is of prime importance, since potential vulnerabilities in the peer-to-peer network may lead to attacks on the blockchain's safety (e.g., by isolating a set of nodes) and on users' privacy (e.g., tracing transactions flow in the network).
Added by: Rucknium |
Notes |
"On average, our toolset identified approximately 2,758 active nodes per day." It is not clear exactly when the data was collected, but it appears to be December 2018 when Monero had about 5,000 transactions per day.
"We plan to release our toolset as an open source project shortly." Tools apparently not yet released as of December 2022. Added by: Rucknium Last edited by: Rucknium |