Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
156 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
45 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

On Defeating Graph Analysis of Anonymous Transactions (2402.18755v1)

Published 28 Feb 2024 in cs.CR

Abstract: In a ring-signature-based anonymous cryptocurrency, signers of a transaction are hidden among a set of potential signers, called a ring, whose size is much smaller than the number of all users. The ring-membership relations specified by the sets of transactions thus induce bipartite transaction graphs, whose distribution is in turn induced by the ring sampler underlying the cryptocurrency. Since efficient graph analysis could be performed on transaction graphs to potentially deanonymise signers, it is crucial to understand the resistance of (the transaction graphs induced by) a ring sampler against graph analysis. Of particular interest is the class of partitioning ring samplers. Although previous works showed that they provide almost optimal local anonymity, their resistance against global, e.g. graph-based, attacks were unclear. In this work, we analyse transaction graphs induced by partitioning ring samplers. Specifically, we show (partly analytically and partly empirically) that, somewhat surprisingly, by setting the ring size to be at least logarithmic in the number of users, a graph-analysing adversary is no better than the one that performs random guessing in deanonymisation up to constant factor of 2.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (25)
  1. “Random graphs” Cambridge university press, 2001
  2. Ioannis Chatzigeorgiou “Bounds on the Lambert Function and Their Application to the Outage Analysis of User Cooperation” In IEEE Commun. Lett. 17.8, 2013, pp. 1505–1508 DOI: 10.1109/LCOMM.2013.070113.130972
  3. A. L. Dulmage and N. S. Mendelsohn “Coverings of Bipartite Graphs” In Canadian Journal of Mathematics 10 Cambridge University Press, 1958, pp. 517–534 DOI: 10.4153/CJM-1958-052-0
  4. “On random graphs I Publ” In Math. Debrecen 6, 1959, pp. 290–297
  5. Edgar N Gilbert “Random graphs” In The Annals of Mathematical Statistics 30.4 JSTOR, 1959, pp. 1141–1144
  6. Alasdair J Graham and David A Pike “A note on thresholds and connectivity in random directed graphs” In Atl. Electron. J. Math 3.1, 2008, pp. 1–5
  7. “A Traceability Analysis of Monero’s Blockchain” In ESORICS 2017, Part II 10493, LNCS Springer, Heidelberg, 2017, pp. 153–173 DOI: 10.1007/978-3-319-66399-9_9
  8. Tomasz Łuczak “On the equivalence of two basic models of random graphs” In Random graphs 87, 1987, pp. 151–157
  9. Joseph K. Liu, Victor K. Wei and Duncan S. Wong “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)” In ACISP 04 3108, LNCS Springer, Heidelberg, 2004, pp. 325–335 DOI: 10.1007/978-3-540-27800-9_28
  10. R Daniel Mauldin “The Scottish Book” Springer, 1981
  11. Adam Mackenzie, Surae Noether and Monero Core Team “Improving Obfuscation in the CryptoNote Protocol” URL: https://ww.getmonero.org/resources/research-lab/pubs/MRL-0004.pdf
  12. “An Empirical Analysis of Traceability in the Monero Blockchain” In PoPETs 2018.3 De Gruyter, 2018, pp. 143–163 DOI: 10.1515/popets-2018-0025
  13. Surae Noether, Sarang Noether and Adam Mackenzie “A Note on Chain Reactions in Traceability in CryptoNote 2.0” URL: https://ww.getmonero.org/resources/research-lab/pubs/MRL-0001.pdf
  14. Ilona Palásti “On the strong connectedness of directed random graphs” In Studia Sci. Math. Hungar 1, 1966, pp. 205–214
  15. J Scott Provan and Michael O Ball “The complexity of counting cuts and of computing the probability that a graph is connected” In SIAM Journal on Computing 12.4 SIAM, 1983, pp. 777–788
  16. Mathew D Penrose “The strong giant in a random digraph” In Journal of Applied Probability 53.1 Cambridge University Press, 2016, pp. 57–70
  17. “Asymptotic distribution of the numbers of vertices and arcs of the giant strong component in sparse random digraphs” In Random Structures & Algorithms 49.1 Wiley Online Library, 2016, pp. 3–64
  18. “Eos a Universal Verifiable and Coercion Resistant Voting Protocol” In Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings 10615, Lecture Notes in Computer Science Springer, 2017, pp. 210–227 DOI: 10.1007/978-3-319-68687-5\_13
  19. “Foundations of Ring Sampling” In PoPETs 2021.3 De Gruyter, 2021, pp. 265–288 DOI: 10.2478/popets-2021-0047
  20. Tamir Tassa “Finding all maximally-matchable edges in a bipartite graph” In Theoretical Computer Science 423, 2012, pp. 50–58 DOI: https://doi.org/10.1016/j.tcs.2011.12.071
  21. Saravanan Vijayakumaran “Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition” https://ia.cr/2021/760, Cryptology ePrint Archive, Report 2021/760, 2021
  22. “Monero Ring Attack: Recreating Zero Mixin Transaction Effect” In TrustCom/BigDataSE 2018 IEEE, 2018, pp. 1196–1201 DOI: 10.1109/TrustCom/BigDataSE.2018.00165
  23. Jiangshan Yu, Man Ho Allen Au and Paulo Jorge Esteves Veríssimo “Re-Thinking Untraceability in the CryptoNote-Style Blockchain” In CSF 2019 Computer Security Foundations Symposium IEEE Computer Society Press, 2019, pp. 94–107 DOI: 10.1109/CSF.2019.00014
  24. “Platform-Independent Secure Blockchain-Based Voting System” In ISC 2018 11060, LNCS Springer, Heidelberg, 2018, pp. 369–386 DOI: 10.1007/978-3-319-99136-8_20
  25. “New Empirical Traceability Analysis of CryptoNote-Style Blockchains” In FC 2019 11598, LNCS Springer, Heidelberg, 2019, pp. 133–149 DOI: 10.1007/978-3-030-32101-7_9
Citations (4)

Summary

We haven't generated a summary for this paper yet.