Difference between revisions of "Cryptocurrency FinTech"

From CryptoLUX
Jump to: navigation, search
Line 17: Line 17:
 
* [[Alex Biryukov]], [[Sergei Tikhomirov]], "[https://orbilu.uni.lu/handle/10993/39728 Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains]" ([https://orbilu.uni.lu/bitstream/10993/39728/2/biryukov-tikhomirov-transaction-clustering-slides.pdf slides]), 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock), 2019
 
* [[Alex Biryukov]], [[Sergei Tikhomirov]], "[https://orbilu.uni.lu/handle/10993/39728 Transaction Clustering Using Network Traffic Analysis for Bitcoin and Derived Blockchains]" ([https://orbilu.uni.lu/bitstream/10993/39728/2/biryukov-tikhomirov-transaction-clustering-slides.pdf slides]), 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock), 2019
  
In the following works, we focus on the privacy aspects of the privacy-preserving cryptocurrency Zcash, with an increased attention towards mining. In our paper "[https://orbilu.uni.lu/handle/10993/39995 Portrait of a Miner in a Landscape]" we focus on the mining hardware hierarchy and the hardware of specific miners in GPU dominated Proof-of-Work mining. In the paper "[https://orbilu.uni.lu/handle/10993/39996 Privacy and Linkability of Mining in Zcash]" we show how one can link more than 90% of the Zcash block reward payments, even though it should be theoretically unlinkable. Finally, in our paper "Privacy Aspects and Subliminal Channels in Zcash" we investigate further linkability methods in Zcash and utilize them build active attacks against specific users. We also show the existence of practical subliminal channels in the zero-knowledge proofs of Zcash.
+
In the following works, we focus on the privacy aspects of the privacy-preserving cryptocurrency Zcash, with an increased attention towards mining. In our paper "[https://orbilu.uni.lu/handle/10993/39995 Portrait of a Miner in a Landscape]" we focus on the mining hardware hierarchy and the hardware of specific miners in GPU dominated Proof-of-Work mining. In the paper "[https://orbilu.uni.lu/handle/10993/39996 Privacy and Linkability of Mining in Zcash]" we show how one can link more than 90% of the Zcash block reward payments, even though it should be theoretically unlinkable. Finally, in our paper "Privacy Aspects and Subliminal Channels in Zcash" we investigate further linkability methods in Zcash and utilize them to show possibility of active attacks targeting specific users. We also show the existence of practical subliminal channels in the zero-knowledge proofs of Zcash as well as mitigations.
  
 
* [[Alex Biryukov]], [[Daniel Feher]], "[https://orbilu.uni.lu/handle/10993/39995 Portrait of a Miner in a Landscape]" 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock), 2019
 
* [[Alex Biryukov]], [[Daniel Feher]], "[https://orbilu.uni.lu/handle/10993/39995 Portrait of a Miner in a Landscape]" 2nd Workshop on Cryptocurrencies and Blockchains for Distributed Systems (CryBlock), 2019

Revision as of 15:04, 13 December 2019

Privacy and Anonymity

Informal description of the Bitcoin deanonymization attack.
 Press release on secure, anonymous, easy way to pay for online content

In the following works, we focus on the privacy aspects of the privacy-preserving cryptocurrency Zcash, with an increased attention towards mining. In our paper "Portrait of a Miner in a Landscape" we focus on the mining hardware hierarchy and the hardware of specific miners in GPU dominated Proof-of-Work mining. In the paper "Privacy and Linkability of Mining in Zcash" we show how one can link more than 90% of the Zcash block reward payments, even though it should be theoretically unlinkable. Finally, in our paper "Privacy Aspects and Subliminal Channels in Zcash" we investigate further linkability methods in Zcash and utilize them to show possibility of active attacks targeting specific users. We also show the existence of practical subliminal channels in the zero-knowledge proofs of Zcash as well as mitigations.


New Proofs of Work


New Consensus Protocols