On Defeating Graph Analysis of Anonymous Transactions (2402.18755v1)
Abstract: In a ring-signature-based anonymous cryptocurrency, signers of a transaction are hidden among a set of potential signers, called a ring, whose size is much smaller than the number of all users. The ring-membership relations specified by the sets of transactions thus induce bipartite transaction graphs, whose distribution is in turn induced by the ring sampler underlying the cryptocurrency. Since efficient graph analysis could be performed on transaction graphs to potentially deanonymise signers, it is crucial to understand the resistance of (the transaction graphs induced by) a ring sampler against graph analysis. Of particular interest is the class of partitioning ring samplers. Although previous works showed that they provide almost optimal local anonymity, their resistance against global, e.g. graph-based, attacks were unclear. In this work, we analyse transaction graphs induced by partitioning ring samplers. Specifically, we show (partly analytically and partly empirically) that, somewhat surprisingly, by setting the ring size to be at least logarithmic in the number of users, a graph-analysing adversary is no better than the one that performs random guessing in deanonymisation up to constant factor of 2.
- “Random graphs” Cambridge university press, 2001
- Ioannis Chatzigeorgiou “Bounds on the Lambert Function and Their Application to the Outage Analysis of User Cooperation” In IEEE Commun. Lett. 17.8, 2013, pp. 1505–1508 DOI: 10.1109/LCOMM.2013.070113.130972
- A. L. Dulmage and N. S. Mendelsohn “Coverings of Bipartite Graphs” In Canadian Journal of Mathematics 10 Cambridge University Press, 1958, pp. 517–534 DOI: 10.4153/CJM-1958-052-0
- “On random graphs I Publ” In Math. Debrecen 6, 1959, pp. 290–297
- Edgar N Gilbert “Random graphs” In The Annals of Mathematical Statistics 30.4 JSTOR, 1959, pp. 1141–1144
- Alasdair J Graham and David A Pike “A note on thresholds and connectivity in random directed graphs” In Atl. Electron. J. Math 3.1, 2008, pp. 1–5
- “A Traceability Analysis of Monero’s Blockchain” In ESORICS 2017, Part II 10493, LNCS Springer, Heidelberg, 2017, pp. 153–173 DOI: 10.1007/978-3-319-66399-9_9
- Tomasz Łuczak “On the equivalence of two basic models of random graphs” In Random graphs 87, 1987, pp. 151–157
- Joseph K. Liu, Victor K. Wei and Duncan S. Wong “Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups (Extended Abstract)” In ACISP 04 3108, LNCS Springer, Heidelberg, 2004, pp. 325–335 DOI: 10.1007/978-3-540-27800-9_28
- R Daniel Mauldin “The Scottish Book” Springer, 1981
- Adam Mackenzie, Surae Noether and Monero Core Team “Improving Obfuscation in the CryptoNote Protocol” URL: https://ww.getmonero.org/resources/research-lab/pubs/MRL-0004.pdf
- “An Empirical Analysis of Traceability in the Monero Blockchain” In PoPETs 2018.3 De Gruyter, 2018, pp. 143–163 DOI: 10.1515/popets-2018-0025
- Surae Noether, Sarang Noether and Adam Mackenzie “A Note on Chain Reactions in Traceability in CryptoNote 2.0” URL: https://ww.getmonero.org/resources/research-lab/pubs/MRL-0001.pdf
- Ilona Palásti “On the strong connectedness of directed random graphs” In Studia Sci. Math. Hungar 1, 1966, pp. 205–214
- J Scott Provan and Michael O Ball “The complexity of counting cuts and of computing the probability that a graph is connected” In SIAM Journal on Computing 12.4 SIAM, 1983, pp. 777–788
- Mathew D Penrose “The strong giant in a random digraph” In Journal of Applied Probability 53.1 Cambridge University Press, 2016, pp. 57–70
- “Asymptotic distribution of the numbers of vertices and arcs of the giant strong component in sparse random digraphs” In Random Structures & Algorithms 49.1 Wiley Online Library, 2016, pp. 3–64
- “Eos a Universal Verifiable and Coercion Resistant Voting Protocol” In Electronic Voting - Second International Joint Conference, E-Vote-ID 2017, Bregenz, Austria, October 24-27, 2017, Proceedings 10615, Lecture Notes in Computer Science Springer, 2017, pp. 210–227 DOI: 10.1007/978-3-319-68687-5\_13
- “Foundations of Ring Sampling” In PoPETs 2021.3 De Gruyter, 2021, pp. 265–288 DOI: 10.2478/popets-2021-0047
- Tamir Tassa “Finding all maximally-matchable edges in a bipartite graph” In Theoretical Computer Science 423, 2012, pp. 50–58 DOI: https://doi.org/10.1016/j.tcs.2011.12.071
- Saravanan Vijayakumaran “Analysis of CryptoNote Transaction Graphs using the Dulmage-Mendelsohn Decomposition” https://ia.cr/2021/760, Cryptology ePrint Archive, Report 2021/760, 2021
- “Monero Ring Attack: Recreating Zero Mixin Transaction Effect” In TrustCom/BigDataSE 2018 IEEE, 2018, pp. 1196–1201 DOI: 10.1109/TrustCom/BigDataSE.2018.00165
- Jiangshan Yu, Man Ho Allen Au and Paulo Jorge Esteves Veríssimo “Re-Thinking Untraceability in the CryptoNote-Style Blockchain” In CSF 2019 Computer Security Foundations Symposium IEEE Computer Society Press, 2019, pp. 94–107 DOI: 10.1109/CSF.2019.00014
- “Platform-Independent Secure Blockchain-Based Voting System” In ISC 2018 11060, LNCS Springer, Heidelberg, 2018, pp. 369–386 DOI: 10.1007/978-3-319-99136-8_20
- “New Empirical Traceability Analysis of CryptoNote-Style Blockchains” In FC 2019 11598, LNCS Springer, Heidelberg, 2019, pp. 133–149 DOI: 10.1007/978-3-030-32101-7_9