On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies

01/27/2022
by   Piyush Kumar Sharma, et al.
0

Cryptocurrency systems can be subject to deanonymization attacks by exploiting the network-level communication on their peer-to-peer network. Adversaries who control a set of colluding node(s) within the peer-to-peer network can observe transactions being exchanged and infer the parties involved. Thus, various network anonymity schemes have been proposed to mitigate this problem, with some solutions providing theoretical anonymity guarantees. In this work, we model such peer-to-peer network anonymity solutions and evaluate their anonymity guarantees. To do so, we propose a novel framework that uses Bayesian inference to obtain the probability distributions linking transactions to their possible originators. We characterize transaction anonymity with those distributions, using entropy as metric of adversarial uncertainty on the originator's identity. In particular, we model Dandelion, Dandelion++ and Lightning Network. We study different configurations and demonstrate that none of them offers acceptable anonymity to their users. For instance, our analysis reveals that in the widely deployed Lightning Network, with just 5 strategically chosen colluding nodes the adversary can uniquely determine the originator for 67 adversary that controls 15 4 possible originators. Moreover, we observe that due to the way Dandelion and Dandelion++ are designed, increasing the network size does not correspond to an increase in the anonymity set of potential originators, highlighting the limitations of existing proposals.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
12/01/2020

Byzantine Eventual Consistency and the Fundamental Limits of Peer-to-Peer Databases

Sybil attacks, in which a large number of adversary-controlled nodes joi...
research
08/04/2023

SABRE: Robust Bayesian Peer-to-Peer Federated Learning

We introduce SABRE, a novel framework for robust variational Bayesian pe...
research
02/23/2018

Enhanced PeerHunter: Detecting Peer-to-peer Botnets through Network-Flow Level Community Behavior Analysis

Peer-to-peer (P2P) have become one of the major threats in network secur...
research
08/02/2016

Infinite Unlimited Churn

We study unlimited infinite churn in peer-to-peer overlay networks. Unde...
research
07/23/2019

Map-Z: Exposing the Zcash Network in Times of Transition

Zcash is a privacy-preserving cryptocurrency that provides anonymous mon...
research
11/16/2021

Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System

Proof-of-Stake (PoS) blockchain systems, especially those that allow sta...

Please sign up or login with your details

Forgot password? Click here to reset