An analysis of anonymity in the bitcoin system

545Citations
Citations of this article
806Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified only by public-keys. An attacker wishing to de-anonymize users will attempt to construct the one-tomany mapping between users and public-keys, and associate information external to the system with the users. Bitcoin tries to prevent this attack by storing the mapping of a user to his or her public-keys on that user's node only and by allowing each user to generate as many public-keys as required. In this chapter we consider the topological structure of two networks derived from Bitcoin's public transaction history. We show that the two networks have a non-trivial topological structure, provide complementary views of the Bitcoin system, and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a market value of approximately US$500,000.

Author supplied keywords

Cite

CITATION STYLE

APA

Reid, F., & Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Security and Privacy in Social Networks (pp. 197–223). Springer New York. https://doi.org/10.1007/978-1-4614-4139-7_10

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free