Abstract
The unprecedented financial and economic ledger performing bitcoin is continuously suffering from anonymity troubles. In bitcoin framework, users as nodes submit coins publicly in which transactions lead to privacy breaches resulting from recurrent attacks by malicious and/or dishonest nodes. Thereby, introducing anonymity into bitcoin transaction becomes an utmost necessity such that adversaries will find it relatively impossible to trace the transaction trajectories of the original bitcoin users. Thus, anonymity is seen to improve the difficulties in revealing the true identities of users, original transactions, transaction addresses and coins. Nonetheless, the perfectly honest condition of mixing services in the bitcoin framework is subjected to compromising attacks. Moreover, Lockmix model and other related mixing service schemes in recent decades are introduced to specifically secure bitcoin and to generally enhance the privacy and accountability framework of blockchain ecosystem. However, providing flexible anonymous and secure mixing services remain a challenge. Therefore, this paper adopts attribute-based signcryption scheme and further proposes Anonymix technique to obfuscates the true identity of clients and their coins prior to transacting with mixing services. The security protocol underlying the Anonymix technique overlays the existing Lockmix model technique to enhance flexibility and achieve complete anonymized bitcoin transaction. The proposed Anonymix technique is composed of properties such as unforgeability, confidentiality, fine-grained access control, authentication, privacy and public verifiability. Anonymix technique is compatible with bitcoin framework and supports trust requirement management for mixing services. Our theoretical analysis proves the Anonymix technique as secured against possible recurrent attacks in the bitcoin framework.
Similar content being viewed by others
References
Bao Z, Shi W, Kumari S, Kong Z-Y, Chen C-M (2019) Lockmix: a secure and privacy-preservingmix service for bitcoin anonymity. Int J Inf Secur. https://doi.org/10.1007/s10207-019-00459-6
Barber S, Boyen X, Shi E, Uzun E (2012) Bitter to better — how to make bitcoin a better currency. In: Keromytis AD (ed) FC 2012 LNCS. Springer, Heidelberg
Bartolucci S, Caccioli F, Vivo P (2020) A percolation model for the emergence of the bitcoin lightning network. Sci Rep 10:4488. https://doi.org/10.1038/s41598-020-61137-5
Beimel A (1996) Secure schemes for secret sharing and key distribution Ph.D thesis, Technion-Israel Institute of technology, Faculty of computer science
Bin W, Bao Z, Zhang Y, Wang Q, and Shi W (2018) Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity
Bissias G, Ozisik A P, Levine BN, and Liberatore M (2014) Sybil-resistant Mixing for Bitcoin. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, pp. 149–158
Bonneau J, Narayanan A, Miller A, Clark J, Kroll JA, Felten EW (2014) Mixcoin: anonymity for bitcoin with accountable mixes. In: Christin N, Safavi-Naini R (eds) Financial cryptography and data security, LNCS 8437. Springer, Berlin
Burton R (2020) Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks. Digit. Threat.: Res. Pract. 1, 3, Article 14, pp. 26
Cai Y, Yee GOM, Gu YX, Lung C-H (2020) Threats to online advertising and countermeasures: a technical survey. Digit Threat: Res Pract 11:27. https://doi.org/10.1145/3374136
Chaum D (1983) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) CRYPTO 1982. Springer, New York, pp 199–203
Coinmarketcap.com. Available from: https://coinmarketcap.com/currencies/Bitcoin/
Danezis G, Fournet C, Kohlweiss M, and Parno B (2013) Pinocchio coin: Building zerocoin from a succinct pairing-based proof system, in Proceedings of the First ACM workshop on Language Support for Privacy-enhancing Technologies, ACM, 27–30
Deng F, Wang Y, Peng L et al (2018) Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records. IEEE Access 6:39473–39486
Dingledine R, Mathewson N, and Syverson P (2004) Tor: The second-generation onion router. In: 2004 USENIX Security
Fan C, Huang VS, Ruan H (2014) Arbitrary-state attribute-based encryption with dynamic membership. IEEE T Comp 63:1951–1961
Gagné M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption. In: Garay JA, De Prisco R (eds) Section and cryptocoin for network. Springer, Berlin Heidelberg
Gao S and Yingpei Z (2008) Attribute-based signature scheme, in 2008 International Conference on Information Security and Assurance (isa 2008), pp. 509–511.
Heilman E, Alshenibr L, Baldimtsi F, Scafuro A, and Goldberg S (2017) TumbleBit: An untrusted bitcoin-compatible anonymous payment hub, in Proceeding 24th Annual Network Distribution System Security Symposium (NDSS), San Diego, CA, USA
Kesdogan D, Egner J, Buschkes R (1998) Stop-and-go-mixes providing probabilistic anonymity in an open system. In: Aucsmith D (ed) IH, LNCS, vol 1525. Springer, Heidelberg, pp 83–98
Kibiwott KP, Zhao Y, Kogo J, Zhang F (2019) Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Math Biosci Eng (MBE) 16(5):3561–3594
Kroll JA, Davey IC, and Felten EW (2013) The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: WEIS, June 2013
Kwansah Ansah AK, Adu-Gyamfi D (2020) Enhancing User and transaction privacy in bitcoin with unlinkable coin mixing scheme. Int J Comput Sci Eng, Indersci 23(4):381–395
Kwansah Ansah AK, Zhang F, Adu-Gyamfi D (2020) RingCoin: an accountable mix for achieving bitcoin anonymity. Int J Netw Secur 23(3):505–515
Kwansah Ansah AK, Adu-Gyamfi D, and Anokye S. (2019) Privacy-preservation of users in p2p e-payment system. Proceedings of the 2019 Third IEEE International Conference on Electrical, Computer and Communication Technologies, Coimbatore, p. 1–8
Li CT, Chen CL, Lee CC et al (2018) A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput 22(2018):2495–2506
Lin JC, Zhang WY, Fournier-Viger P et al (2018a) A metaheuristic algorithm for hiding sensitive itemsets. In: Hartmann S, Ma H, Hameurlain A, Pernul G, Wagner RR (eds) Database and Expert systems applications. Springer International Publishing, Cham, pp 492–498
Lin, J. C.W., Liu, Q., Fournier-Viger, P., & et al. (2018). Anonymization of multiple and personalized sensitive attributes. In: C. Ordonez and L. Bellatreche 20th International Conference, DaWaK 2018 on Big Data Analysis and Knowledging Disc. (eds.), Springer Intl Publishing, Cham, pp. 204–215
Liu Y, Liu X, Tang C, Wang J, Zhang L (2018) Unlinkable Coin mixing scheme for transaction privacy enhancement of bitcoin,". IEEE Access 6:23261–23270
Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Topics in cryptology–CT-RSA 2011. Springer, Berlin Heidelberg, pp 376–392
Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance.
Maxwell G (2013) CoinJoin: bitcoin privacy for the real world, August 2013. Bitcoin Forum. https://bitcointalk.org/?topic=279249
Nakamoto S (2008) Bitcoin: A peer-to-peer electionic cash system
Rao YS (2017) Attribute‐based online/offline signcryption scheme. Int. J. Communication Systems, 30. Available from: https://doi.org/10.1002/dac.3322.
Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers AB, Aharony N, Pentland A (eds) Security and privacy in social networks. Springer, Heidelberg
Rivest RL, Shamir A, Tauman Y (2001) How to Leak a Secret. In: Boyd C (ed) Advances in cryptology — ASIACRYPT 2001 lecture notes in computer science vol 2248. Springer, Heidelberg
Ruffing T, Moreno-Sanchez P (2017) ValueShuffle: Mixing confidential transactions for comprehensive transaction privacy in bitcoin, in Proc. Int. Workshops, WAHC, BITCOIN, VOTING, WTSC, TA, Financial Cryptogr. Data Secur., FC, Sliema, Malta, Apr. 2017, pp. 133–154
Ruffing T, Moreno-Sanchez P, and Kate A (2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. “In Computer Security - ESORICS 2014”, vol 871, Springer, pp 345–364
Ruffing T, Moreno-Sanchez P, and Kate A (2017b) P2P mixing and unlinkable bitcoin transactions, in Proc. IACR Cryptol. ePrint Arch., 2017, p. 824
Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using blockchains: a state of the art survey. Commun Surv Tutorials IEEE 21(1):858–880
Scofield D, Miles C, Kuhn S (2020) Automated model learning for accurate detection of malicious digital documents. Digit Threat Res Pract 15:21
Serjantov A, Dingledine R, Syverson P (2003) From a trickle to a flood: active attacks on several mix types. In: Petitcolas FAP (ed) IH 2002. LNCS, Springer, Heidelberg
Shahandashti SF, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel B (ed) Progress in cryptology–AFRICACRYPT 2009. Springer, Berlin Heidelberg, pp 198–216
Shalini S, and Santhi H (2019) A Survey on Various Attacks in Bitcoin and Cryptocurrency. Communication and Signal Processing (ICCSP) International Conference on, pp. 0220–0224.
Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology. Springer, Berlin Heidelberg
Sharma R, Sibal R, Sabharwal S (2021) Software vulnerability prioritization using vulnerability description. Int J Syst Assur Eng Manag 12:58–64
Somin S, Altshuler Y, Gordon G, Pentland AS, Shmueli E (2020) Network dynamics of a financial ecosystem. Sci Rep 10:4587. https://doi.org/10.1038/s41598-020-61346-y
Tan SY, Heng SH, Goi BM (2009) On the security of an attribute-based signature scheme. In: Ezak DS, Kim TH, Ma J, Fang WC, Sandnes FE, Kang BH, Gu B (eds) U- and E-service, science and technology. Springer, Berlin Heidelberg, pp 161–168
Xiong H, Zhang H, and Sun J (2018) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Sys J, 1–22
Xu Q, Tan C, Fan Z et al (2018a) Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6(2018):34051–34074
Xu Q, Tan C, Fan Z, &, et al (2018b) Secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation. Sensors 18:1609
Zhang S, Lee J (2020) Mitigations on sybil-based double-spend attacks in bitcoin. IEEE Consumer Electron Magaz. https://doi.org/10.1109/MCE.2020.2988031
Zhang M, Feng F, Zhang Z, Wen J (2020) A new business process verification approach for e-commerce using petri nets. Int J Enterp Inf Syst (IJEIS) 16(1):92–107. https://doi.org/10.4018/IJEIS.2020010105
Ziegeldorf JH, Grossmann F, Henze M, Inden N, and Wehrle K (2015) CoinParty: Secure multi-party mixing of bitcoins, in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 75–86.
Acknowledgements
This work was supported by the National Natural Science Foundation of China [Grant No.61602097, No.61502087, and No.61472064]
Funding
No funding was received to assist with the preparation of this manuscript.
Author information
Authors and Affiliations
Contributions
Authors contributed equally to the study conception and design, material preparation, data collection and analysis, etc. The first draft of the manuscript was written by Daniel Adu-Gyamfi and all other authors commented on previous versions of the manuscript. All authors read and approved the final and revised manuscript for submission.
Corresponding author
Ethics declarations
Conflict of interest
The authors declare that they have no conflict of interest.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
About this article
Cite this article
Adu-Gyamfi, D., Kwansah Ansah, A.K., Armah, G.K. et al. Towards bitcoin transaction anonymity with recurrent attack prevention. Int J Syst Assur Eng Manag 13, 1–17 (2022). https://doi.org/10.1007/s13198-021-01506-z
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-021-01506-z