Papers
Topics
Authors
Recent
Search
2000 character limit reached

Dandelion: Redesigning the Bitcoin Network for Anonymity

Published 16 Jan 2017 in cs.CR, cs.IT, and math.IT | (1701.04439v1)

Abstract: Bitcoin and other cryptocurrencies have surged in popularity over the last decade. Although Bitcoin does not claim to provide anonymity for its users, it enjoys a public perception of being a `privacy-preserving' financial system. In reality, cryptocurrencies publish users' entire transaction histories in plaintext, albeit under a pseudonym; this is required for transaction validation. Therefore, if a user's pseudonym can be linked to their human identity, the privacy fallout can be significant. Recently, researchers have demonstrated deanonymization attacks that exploit weaknesses in the Bitcoin network's peer-to-peer (P2P) networking protocols. In particular, the P2P network currently forwards content in a structured way that allows observers to deanonymize users. In this work, we redesign the P2P network from first principles with the goal of providing strong, provable anonymity guarantees. We propose a simple networking policy called Dandelion, which achieves nearly-optimal anonymity guarantees at minimal cost to the network's utility. We also provide a practical implementation of Dandelion.

Citations (63)

Summary

  • The paper introduces Dandelion, a novel two-phase protocol that obscures Bitcoin transaction origins to significantly improve anonymity.
  • It employs dynamic P2P graph management combined with rigorous theoretical modeling to establish optimal anonymity bounds against deanonymization.
  • Empirical evaluations show that Dandelion effectively reduces adversary precision and recall, offering enhanced privacy for Bitcoin users.

Analysis of "Dandelion: Redesigning the Bitcoin Network for Anonymity"

The paper, "Dandelion: Redesigning the Bitcoin Network for Anonymity," by Bojja Venkatakrishnan, Fanti, and Viswanath, addresses critical shortcomings in the anonymity features of Bitcoin's networking protocol. Although Bitcoin does not inherently promise anonymity, the public perception often misconstrues its privacy capabilities, potentially exposing users to significant risks if pseudonyms are traceable to real identities. This paper identifies structural weaknesses in Bitcoin's peer-to-peer (P2P) networking that can lead to deanonymization and proposes a redesigned protocol, "Dandelion," to enhance user anonymity effectively.

Core Contributions

  1. Network Redesign: The primary contribution of this paper is the introduction of Dandelion, a novel P2P communication protocol aimed at improving anonymity within the Bitcoin network. Dandelion utilizes a two-phase approach—initial anonymity phase followed by a diffusion phase—to obscure the origin of transactions before they are broadcast over the network. This approach is intended to provide strong, provable guarantees of anonymity while minimizing impacts on network performance metrics like latency.
  2. Anonymity Guarantee: The authors establish that any networking protocol, including Dandelion, can achieve maximum precision and recall against a contextual adversary only if it lies within certain theoretical bounds. They prove that Dandelion can achieve close to optimal anonymity guarantees, effectively minimizing the (recall, precision) region for adversaries attempting to link transaction origins to users.
  3. Theoretical and Practical Implementation: The paper combines theoretical modeling of P2P anonymity with practical implementation challenges. It explores dynamic versus static graph settings for maintaining a network topology that supports Dandelion's two-phase operation. The authors advocate for dynamic management of P2P graphs, which prevents adversaries from learning the network structure over time, hence averting deanonymization attacks.
  4. Empirical Evaluation: Performance assessments of Dandelion, including simulations and comparative analyses against baseline protocols like diffusion, show that Dandelion significantly lowers the likelihood of successful attacks by adversaries. The analysis demonstrates that an adversary can only achieve higher deanonymization rates than the theoretical lower bounds when employing the currently flawed protocols in the Bitcoin stack.

Implications and Future Directions

From a practical standpoint, integrating Dandelion into the Bitcoin network could substantially bolster the privacy of transactions, shielding user identities from potential exploits. The design advocates lightweight statistical adjustments over traditional cryptographic solutions, appealing due to lower computational requirements and ease of deployment without significant modification to the existing Bitcoin codebase.

Theoretically, the work enriches the academic discourse on network anonymity by providing rigorous bounds on anonymity metrics such as precision and recall. The proof structures and assumptions presented in the paper could extend to other cryptocurrency networks facing similar privacy challenges.

For future developments, exploring the balance between anonymity and latency further could yield improvements in both user experience and system robustness. The work opens pathways for investigating adversarial models that account for malicious deviations from protocol specifications. Moreover, real-world deployment of Dandelion and its reception within the broader cryptocurrency community would provide valuable insights into the scalability and effectiveness of such network redesigns.

In conclusion, the paper provides a solid framework for enhancing network anonymity in Bitcoin and similar distributed ledger systems, thereby addressing critical privacy concerns that have persisted in these technologies. Its combination of theoretical and practical insights sets the benchmark for future research and development in cryptocurrency anonymity protocols.

Paper to Video (Beta)

Whiteboard

No one has generated a whiteboard explanation for this paper yet.

Open Problems

We haven't generated a list of open problems mentioned in this paper yet.

Collections

Sign up for free to add this paper to one or more collections.