2020
DOI: 10.1109/access.2020.2980950
|View full text |Cite
|
Sign up to set email alerts
|

Privacy and Cryptocurrencies—A Systematic Literature Review

Abstract: Our transaction history in the current centralized banking system has the ability to reveal a lot of private information for each spender, both to the banking system itself, but also to those entities that surround it (e.g., governments, industry etc). Examples of leaking information constitute the amounts spent, the goods on which the amounts were spent, the spending locations and the users we exchange money with. This knowledge is powerful in the hands of those who have it, and can be used in multiple ways, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(17 citation statements)
references
References 73 publications
(117 reference statements)
0
16
0
Order By: Relevance
“…Bitcoin's weakness is simultaneously its strength-the entire blockchain is publicly open ledger, and all transactions and their history could be followed (Herskind et al 2020;Harvey and Branco-Illodo 2020). If a person pays, e.g., to an online store by giving identification information (what is typically required so the retailer knows who their customers are), then the retailer has information about the wallet, its ID and also the network address of the used device.…”
Section: Literature Reviewmentioning
confidence: 99%
See 3 more Smart Citations
“…Bitcoin's weakness is simultaneously its strength-the entire blockchain is publicly open ledger, and all transactions and their history could be followed (Herskind et al 2020;Harvey and Branco-Illodo 2020). If a person pays, e.g., to an online store by giving identification information (what is typically required so the retailer knows who their customers are), then the retailer has information about the wallet, its ID and also the network address of the used device.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, follow-ups from criminal activity and/or chasing of Nakamoto tell that different countries and authorities are nowadays very well aware of who is using Bitcoin, when, where and how. Just only by following graphical form transactions of one unknown wallet and then seeing what is purchased, where, when and if known wallets are also used in the screening, much of the "unknown" wallet user is already known (Orcutt 2017;Eldefrawy et al 2019;Herskind et al 2020). Although, Bitcoin is increasingly popular nowadays, its ownership is extremely concentrated.…”
Section: Literature Reviewmentioning
confidence: 99%
See 2 more Smart Citations
“…Combining confidentiality with public verifiability is not easy. Privacy issues related to blockchain technology can be found, for example, in the surveys of Khalilov and Levi [17], Feng et al [23] and Herskind et al [24]. All nodes need to be able to verify the validity of the data.…”
Section: Blockchain and Privacymentioning
confidence: 99%