An Analysis of Anonymity in the Bitcoin System

Anonymity in Bit coin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one to-many mapping between users and public-keys and associate information external to the system with the users. Bitcoinfrustrates this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this paper we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bit coins, which, at the time of the theft, had a market value of approximately half a million U.S. dollars.


[2]  A. H. Anderson An electronic cash and credit system , 1966 .

[3]  Moni Naor,et al.  Pricing via Processing or Combatting Junk Mail , 1992, CRYPTO.

[4]  Albert,et al.  Emergence of scaling in random networks , 1999, Science.

[5]  Adam Back,et al.  Hashcash - A Denial of Service Counter-Measure , 2002 .

[6]  Felix Stalder Failures and Successes: Notes on the Development of Electronic Cash , 2002, Inf. Soc..

[7]  Hector Garcia-Molina,et al.  PPay: micropayments for peer-to-peer systems , 2003, CCS '03.

[8]  Emin Gün Sirer,et al.  KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .

[9]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[10]  Huseyin Cavusoglu,et al.  Emerging Issues in Responsible Vulnerability Disclosure , 2005, WEIS.

[11]  斉藤 賢爾 i-WAT : the internet WAT system : an architecture for maintaining trust and facilitating peer-to-peer barter relationships , 2006 .

[12]  T. Geisel,et al.  The scaling laws of human travel , 2006, Nature.

[13]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[14]  Marco Gonzalez,et al.  Tastes, ties, and time: A new social network dataset using , 2008, Soc. Networks.

[15]  Rajeev Motwani,et al.  Link Privacy in Social Networks , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[16]  Vitaly Shmatikov,et al.  Robust De-anonymization of Large Sparse Datasets , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[17]  N. Kichiji,et al.  Network Analyses of the Circulation Flow of Community Currency , 2008 .

[18]  Rami Puzis,et al.  Collaborative attack on Internet users' anonymity , 2009, Internet Res..

[19]  Mark E. J. Newman,et al.  Power-Law Distributions in Empirical Data , 2007, SIAM Rev..

[20]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[21]  Dan Cosley,et al.  Inferring social ties from geographic coincidences , 2010, Proceedings of the National Academy of Sciences.

[22]  Alex Pentland,et al.  Stealing Reality: When Criminals Become Data Scientists (or Vice Versa) , 2011, IEEE Intelligent Systems.

[23]  Jon M. Kleinberg,et al.  Wherefore art thou R3579X? , 2011, Commun. ACM.

[24]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.

[25]  Reuben Grinberg Bitcoin: An Innovative Alternative Digital Currency , 2011 .