Privacy aspects and subliminal channels in ZCaSH

32Citations
Citations of this article
74Readers
Mendeley users who have this article in their library.
Get full text

Abstract

In this paper we analyze two privacy and security issues for the privacy-oriented cryptocurrency Zcash. First we study shielded transactions and show ways to fingerprint user transactions, including active attacks. We introduce two new attacks which we call Danaan-gift attack and Dust attack. Following the recent Sapling update of Zcash protocol we study the interaction between the new and the old zk-SNARK protocols and the effects of their interaction on transaction privacy. In the second part of the paper we check for the presence of subliminal channels in the zk-SNARK protocol and in Pedersen Commitments. We show presence of efficient 70-bit channels which could be used for tagging of shielded transactions which would allow the attacker (malicious transaction verifier) to link transactions issued by a maliciously modified zk-SNARK prover, while would be indistinguishable from regular transactions for the honest verifier/user. We discuss countermeasures against both of these privacy issues.

Cite

CITATION STYLE

APA

Biryukov, A., Feher, D., & Vitto, G. (2019). Privacy aspects and subliminal channels in ZCaSH. In Proceedings of the ACM Conference on Computer and Communications Security (pp. 1813–1829). Association for Computing Machinery. https://doi.org/10.1145/3319535.3345663

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free