An Analysis of Anonymity in the Bitcoin System
Top Cited Papers
- 1 October 2011
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
- p. 1318-1326
- https://doi.org/10.1109/passat/socialcom.2011.79
Abstract
Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.Keywords
All Related Versions
This publication has 10 references indexed in Scilit:
- An Analysis of Anonymity in the Bitcoin SystemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2011
- Inferring social ties from geographic coincidencesProceedings of the National Academy of Sciences, 2010
- De-anonymizing Social NetworksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2009
- Collaborative attack on Internet users' anonymityInternet Research, 2009
- Robust De-anonymization of Large Sparse DatasetsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2008
- Network Analyses of the Circulation Flow of Community CurrencyEvolutionary and Institutional Economics Review, 2008
- Wherefore art thou r3579x?Published by Association for Computing Machinery (ACM) ,2007
- The scaling laws of human travelNature, 2006
- PPayPublished by Association for Computing Machinery (ACM) ,2003
- Failures and Successes: Notes on the Development of Electronic CashThe Information Society, 2002