Blockchain access privacy: Challenges and directions
Privacy, facilitated by a confluence of cryptography and decentralization, is one of the
primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy …
primary motivations for the adoption of cryptocurrencies like Bitcoin. Alas, Bitcoins privacy …
Systematizing decentralization and privacy: Lessons from 15 years of research and deployments
C Troncoso, M Isaakidis, G Danezis… - ar** communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …
Blinder--Scalable, Robust Anonymous Committed Broadcast
Anonymous Committed Broadcast is a functionality that extends DC-nets and allows a set of
clients to privately commit messages to set of servers, which can then simultaneously open …
clients to privately commit messages to set of servers, which can then simultaneously open …
Dandelion++ lightweight cryptocurrency networking with formal anonymity guarantees
Recent work has demonstrated significant anonymity vulnerabilities in Bitcoin's networking
stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third …
stack. In particular, the current mechanism for broadcasting Bitcoin transactions allows third …
Anonymity trilemma: Strong anonymity, low bandwidth overhead, low latency-choose two
This work investigates the fundamental constraints of anonymous communication (AC)
protocols. We analyze the relationship between bandwidth overhead, latency overhead, and …
protocols. We analyze the relationship between bandwidth overhead, latency overhead, and …
Structural data de-anonymization: Quantification, practice, and implications
In this paper, we study the quantification, practice, and implications of structural data (eg,
social data, mobility traces) De-Anonymization (DA). First, we address several open …
social data, mobility traces) De-Anonymization (DA). First, we address several open …
Preserving link privacy in social network based systems
A growing body of research leverages social network based trust relationships to improve
the functionality of the system. However, these systems expose users' trust relationships …
the functionality of the system. However, these systems expose users' trust relationships …
Mycelium: Large-scale distributed graph queries with differential privacy
This paper introduces Mycelium, the first system to process differentially private queries over
large graphs that are distributed across millions of user devices. Such graphs occur, for …
large graphs that are distributed across millions of user devices. Such graphs occur, for …
[PDF][PDF] Privacy preserving payments in credit networks
A credit network models trust between agents in a distributed environment and enables
payments between arbitrary pairs of agents. With their flexible design and robustness …
payments between arbitrary pairs of agents. With their flexible design and robustness …