2022
DOI: 10.56553/popets-2022-0091
|View full text |Cite
|
Sign up to set email alerts
|

SoK: Assumptions Underlying Cryptocurrency Deanonymizations

Abstract: In recent years, cryptocurrencies have increasingly been used in cybercrime and have become the key means of payment in darknet marketplaces, partly due to their alleged anonymity. Furthermore, the research attacking the anonymity of even those cryptocurrencies that claim to offer anonymity by design is growing and is being applied by law enforcement agencies in the fight against cybercrime. Their investigative measures require a certain degree of suspicion and it is unclear whether findings resulting from att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2023
2023
2025
2025

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(9 citation statements)
references
References 35 publications
0
9
0
Order By: Relevance
“…However, it is crucial to note that the legal issues examined in this section are universal and are not limited to the legal systems or jurisdictions of states that ratified the Convention. This universality is illustrated by considering both the US, representing a common-law jurisdiction, and Germany, indicative of a civil-law jurisdiction-following the example of Deuber et al [11]. As both states also ratified the Convention, these examples illustrate that the principles of the Convention apply across different legal systems.…”
Section: Legal Backgroundmentioning
confidence: 99%
See 3 more Smart Citations
“…However, it is crucial to note that the legal issues examined in this section are universal and are not limited to the legal systems or jurisdictions of states that ratified the Convention. This universality is illustrated by considering both the US, representing a common-law jurisdiction, and Germany, indicative of a civil-law jurisdiction-following the example of Deuber et al [11]. As both states also ratified the Convention, these examples illustrate that the principles of the Convention apply across different legal systems.…”
Section: Legal Backgroundmentioning
confidence: 99%
“…They suggest specific measures to achieve reliability, such as sharing any information necessary to assess reliability, without discussing how they can be implemented in practice. As a step in that direction, Deuber et al [11] provide a taxonomy for the different assumptions underlying deanonymisation attacks on cryptocurrency users-while only briefly discussing their taxonomy's applicability in legal practice.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…A successful deanonymizaton attack on a Bitcoin mixer, such as the one illustrated in Figure 4, would be able to identify the input and output addresses of the mixing transaction that belongs to the same user. A deanonymization attack is slightly different from a re-identification attack, which entails identifying addresses to the true identity of an individual or organization (Deuber et al , 2022). While important for AML, re-identification attacks are not in scope of this paper as any successful re-identification attack on a mixed Bitcoin transaction can be extended to the general Bitcoin network as a whole, thus not unique to just the context of Bitcoin mixing.…”
Section: Addressing Laundered Bitcoin In Mixed Transactionsmentioning
confidence: 99%