Anonymity in Bit coin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bit coins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.
ON A CLASS OF SKEW DISTRIBUTION FUNCTIONS
A. H. Anderson.
An electronic cash and credit system
Moni Naor,et al.
Pricing via Processing or Combatting Junk Mail
Emergence of scaling in random networks
Adam Back,et al.
Hashcash - A Denial of Service Counter-Measure
Failures and Successes: Notes on the Development of Electronic Cash
Hector Garcia-Molina,et al.
PPay: micropayments for peer-to-peer systems
Emin Gün Sirer,et al.
KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing
Alessandro Acquisti,et al.
Information revelation and privacy in online social networks
Huseyin Cavusoglu,et al.
Emerging Issues in Responsible Vulnerability Disclosure
i-WAT : the internet WAT system : an architecture for maintaining trust and facilitating peer-to-peer barter relationships
T. Geisel,et al.
The scaling laws of human travel
Cynthia Dwork,et al.
Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography
Marco Gonzalez,et al.
Tastes, ties, and time: A new social network dataset using Facebook.com
Rajeev Motwani,et al.
Link Privacy in Social Networks
2008 IEEE 24th International Conference on Data Engineering.
Vitaly Shmatikov,et al.
Robust De-anonymization of Large Sparse Datasets
2008 IEEE Symposium on Security and Privacy (sp 2008).
N. Kichiji,et al.
Network Analyses of the Circulation Flow of Community Currency
Rami Puzis,et al.
Collaborative attack on Internet users' anonymity
Mark E. J. Newman,et al.
Power-Law Distributions in Empirical Data
Vitaly Shmatikov,et al.
De-anonymizing Social Networks
2009 30th IEEE Symposium on Security and Privacy.
Dan Cosley,et al.
Inferring social ties from geographic coincidences
Proceedings of the National Academy of Sciences.
Alex Pentland,et al.
Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)
IEEE Intelligent Systems.
Jon M. Kleinberg,et al.
Wherefore art thou R3579X?
Fergal Reid,et al.
An Analysis of Anonymity in the Bitcoin System
2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
Bitcoin: An Innovative Alternative Digital Currency