SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques

Simin Ghesmati (Corresponding author), Walid Fdhila, Edgar Weippl

Publications: Contribution to bookContribution to proceedingsPeer Reviewed

Abstract

Blockchain is a disruptive technology that promises a multitude of benefits, such as transparency, traceability, and immutability. However, this unique bundle of key characteristics has proved to be a double-edged sword that can put users' privacy at risk. Unlike in traditional systems, Bitcoin transactions are publicly and permanently recorded, and anyone can access the full history of the records. Despite using pseudonymous identities, an adversary can undermine users' financial privacy and reveal their actual identities by using advanced heuristics and techniques to identify possible links between transactions, senders, receivers, and consumed services (e.g., online purchases). Hence, a multitude of approaches has been proposed to reduce financial transparency and enhance users' anonymity. These techniques range from mixing services to off-chain transactions that address different privacy issues. In this paper, we particularly focus on comparing and evaluating privacy techniques in the Bitcoin blockchain (which can be applied in (Unspent Transaction Output (UTXO) based blockchains), present their limitations, and highlight new challenges.

Original languageEnglish
Title of host publicationProceedings of the 17th International Conference on Availability, Reliability and Security, ARES 2022
Place of PublicationNew York
PublisherAssociation for Computing Machinery (ACM)
Pages1-14
ISBN (Electronic)9781450396707
ISBN (Print)978-1-4503-9670-7
DOIs
Publication statusPublished - Aug 2022

Austrian Fields of Science 2012

  • 102025 Distributed systems

Keywords

  • Anonymity
  • Bitcoin
  • Blockchain
  • Deanonymization
  • Distributed Ledger
  • Mixing
  • Privacy
  • Tumbling

Fingerprint

Dive into the research topics of 'SoK: How private is Bitcoin? Classification and Evaluation of Bitcoin Privacy Techniques'. Together they form a unique fingerprint.

Cite this