论文标题

关于加密货币使用的点对点网络匿名方案的匿名性

On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies

论文作者

Sharma, Piyush Kumar, Gosain, Devashish, Diaz, Claudia

论文摘要

加密货币系统可以通过在其点对点网络上利用网络级通信来受到Deanonimization攻击。控制在点对点网络中一组勾结节点的对手可以观察交易交易并推断涉及的当事方。因此,已经提出了各种网络匿名计划来减轻此问题,其中一些解决方案提供了理论匿名性的保证。 在这项工作中,我们对此类对等网络匿名解决方案进行建模,并评估其匿名性保证。为此,我们提出了一个新型框架,该框架使用贝叶斯推断以获取将交易与可能发起人联系起来的概率分布。我们使用熵作为发起人身份的对抗性不确定性的指标来表征这些分布的交易匿名性。特别是,我们对蒲公英,蒲公英++和闪电网络进行建模。我们研究了不同的配置,并证明它们都没有为其用户提供可接受的匿名性。例如,我们的分析表明,在广泛部署的闪电网络中,具有1%的策略性选择的合并节点,对手可以唯一地确定网络中总交易的约50%的发起人。在蒲公英中,控制节点的15%的对手平均只有8位可能的发起者。此外,我们观察到,由于设计蒲公英和蒲公英++的方式,增加网络大小并不对应于潜在启动者的匿名集的增加。令人震惊的是,我们对闪电网络的纵向分析揭示了相当的趋势 - 随着网络的增长,整体匿名性降低。

Cryptocurrency systems can be subject to deanonimization attacks by exploiting the network-level communication on their peer-to-peer network. Adversaries who control a set of colluding node(s) within the peer-to-peer network can observe transactions being exchanged and infer the parties involved. Thus, various network anonymity schemes have been proposed to mitigate this problem, with some solutions providing theoretical anonymity guarantees. In this work, we model such peer-to-peer network anonymity solutions and evaluate their anonymity guarantees. To do so, we propose a novel framework that uses Bayesian inference to obtain the probability distributions linking transactions to their possible originators. We characterize transaction anonymity with those distributions, using entropy as metric of adversarial uncertainty on the originator's identity. In particular, we model Dandelion, Dandelion++ and Lightning Network. We study different configurations and demonstrate that none of them offers acceptable anonymity to their users. For instance, our analysis reveals that in the widely deployed Lightning Network, with 1% strategically chosen colluding nodes the adversary can uniquely determine the originator for about 50% of the total transactions in the network. In Dandelion, an adversary that controls 15% of the nodes has on average uncertainty among only 8 possible originators. Moreover, we observe that due to the way Dandelion and Dandelion++ are designed, increasing the network size does not correspond to an increase in the anonymity set of potential originators. Alarmingly, our longitudinal analysis of Lightning Network reveals rather an inverse trend -- with the growth of the network the overall anonymity decreases.

扫码加入交流群

加入微信交流群

微信交流群二维码

扫码加入学术交流群,获取更多资源