Skip to main content
Log in

Towards bitcoin transaction anonymity with recurrent attack prevention

  • Original article
  • Published:
International Journal of System Assurance Engineering and Management Aims and scope Submit manuscript

Abstract

The unprecedented financial and economic ledger performing bitcoin is continuously suffering from anonymity troubles. In bitcoin framework, users as nodes submit coins publicly in which transactions lead to privacy breaches resulting from recurrent attacks by malicious and/or dishonest nodes. Thereby, introducing anonymity into bitcoin transaction becomes an utmost necessity such that adversaries will find it relatively impossible to trace the transaction trajectories of the original bitcoin users. Thus, anonymity is seen to improve the difficulties in revealing the true identities of users, original transactions, transaction addresses and coins. Nonetheless, the perfectly honest condition of mixing services in the bitcoin framework is subjected to compromising attacks. Moreover, Lockmix model and other related mixing service schemes in recent decades are introduced to specifically secure bitcoin and to generally enhance the privacy and accountability framework of blockchain ecosystem. However, providing flexible anonymous and secure mixing services remain a challenge. Therefore, this paper adopts attribute-based signcryption scheme and further proposes Anonymix technique to obfuscates the true identity of clients and their coins prior to transacting with mixing services. The security protocol underlying the Anonymix technique overlays the existing Lockmix model technique to enhance flexibility and achieve complete anonymized bitcoin transaction. The proposed Anonymix technique is composed of properties such as unforgeability, confidentiality, fine-grained access control, authentication, privacy and public verifiability. Anonymix technique is compatible with bitcoin framework and supports trust requirement management for mixing services. Our theoretical analysis proves the Anonymix technique as secured against possible recurrent attacks in the bitcoin framework.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Bao Z, Shi W, Kumari S, Kong Z-Y, Chen C-M (2019) Lockmix: a secure and privacy-preservingmix service for bitcoin anonymity. Int J Inf Secur. https://doi.org/10.1007/s10207-019-00459-6

    Article  Google Scholar 

  • Barber S, Boyen X, Shi E, Uzun E (2012) Bitter to better — how to make bitcoin a better currency. In: Keromytis AD (ed) FC 2012 LNCS. Springer, Heidelberg

    Google Scholar 

  • Bartolucci S, Caccioli F, Vivo P (2020) A percolation model for the emergence of the bitcoin lightning network. Sci Rep 10:4488. https://doi.org/10.1038/s41598-020-61137-5

    Article  Google Scholar 

  • Beimel A (1996) Secure schemes for secret sharing and key distribution Ph.D thesis, Technion-Israel Institute of technology, Faculty of computer science

  • Bin W, Bao Z, Zhang Y, Wang Q, and Shi W (2018) Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity

  • Bissias G, Ozisik A P, Levine BN, and Liberatore M (2014) Sybil-resistant Mixing for Bitcoin. In Proceedings of the 13th Workshop on Privacy in the Electronic Society. ACM, pp. 149–158

  • Bonneau J, Narayanan A, Miller A, Clark J, Kroll JA, Felten EW (2014) Mixcoin: anonymity for bitcoin with accountable mixes. In: Christin N, Safavi-Naini R (eds) Financial cryptography and data security, LNCS 8437. Springer, Berlin

    Google Scholar 

  • Burton R (2020) Unsupervised Learning Techniques for Malware Characterization: Understanding Certain DNS-based DDoS Attacks. Digit. Threat.: Res. Pract. 1, 3, Article 14, pp. 26

  • Cai Y, Yee GOM, Gu YX, Lung C-H (2020) Threats to online advertising and countermeasures: a technical survey. Digit Threat: Res Pract 11:27. https://doi.org/10.1145/3374136

    Article  Google Scholar 

  • Chaum D (1983) Blind signatures for untraceable payments. In: Chaum D, Rivest RL, Sherman AT (eds) CRYPTO 1982. Springer, New York, pp 199–203

    Google Scholar 

  • Coinmarketcap.com. Available from: https://coinmarketcap.com/currencies/Bitcoin/

  • Danezis G, Fournet C, Kohlweiss M, and Parno B (2013) Pinocchio coin: Building zerocoin from a succinct pairing-based proof system, in Proceedings of the First ACM workshop on Language Support for Privacy-enhancing Technologies, ACM, 27–30

  • Deng F, Wang Y, Peng L et al (2018) Ciphertext-policy attribute-based signcryption with verifiable outsourced designcryption for sharing personal health records. IEEE Access 6:39473–39486

    Article  Google Scholar 

  • Dingledine R, Mathewson N, and Syverson P (2004) Tor: The second-generation onion router. In: 2004 USENIX Security

  • Fan C, Huang VS, Ruan H (2014) Arbitrary-state attribute-based encryption with dynamic membership. IEEE T Comp 63:1951–1961

    Article  MathSciNet  Google Scholar 

  • Gagné M, Narayan S, Safavi-Naini R (2010) Threshold attribute-based signcryption. In: Garay JA, De Prisco R (eds) Section and cryptocoin for network. Springer, Berlin Heidelberg

    Google Scholar 

  • Gao S and Yingpei Z (2008) Attribute-based signature scheme, in 2008 International Conference on Information Security and Assurance (isa 2008), pp. 509–511.

  • Heilman E, Alshenibr L, Baldimtsi F, Scafuro A, and Goldberg S (2017) TumbleBit: An untrusted bitcoin-compatible anonymous payment hub, in Proceeding 24th Annual Network Distribution System Security Symposium (NDSS), San Diego, CA, USA

  • Kesdogan D, Egner J, Buschkes R (1998) Stop-and-go-mixes providing probabilistic anonymity in an open system. In: Aucsmith D (ed) IH, LNCS, vol 1525. Springer, Heidelberg, pp 83–98

    Google Scholar 

  • Kibiwott KP, Zhao Y, Kogo J, Zhang F (2019) Verifiable fully outsourced attribute-based signcryption system for IoT eHealth big data in cloud computing. Math Biosci Eng (MBE) 16(5):3561–3594

    Article  MathSciNet  Google Scholar 

  • Kroll JA, Davey IC, and Felten EW (2013) The economics of bitcoin mining, or bitcoin in the presence of adversaries. In: WEIS, June 2013

  • Kwansah Ansah AK, Adu-Gyamfi D (2020) Enhancing User and transaction privacy in bitcoin with unlinkable coin mixing scheme. Int J Comput Sci Eng, Indersci 23(4):381–395

    Google Scholar 

  • Kwansah Ansah AK, Zhang F, Adu-Gyamfi D (2020) RingCoin: an accountable mix for achieving bitcoin anonymity. Int J Netw Secur 23(3):505–515

    Google Scholar 

  • Kwansah Ansah AK, Adu-Gyamfi D, and Anokye S. (2019) Privacy-preservation of users in p2p e-payment system. Proceedings of the 2019 Third IEEE International Conference on Electrical, Computer and Communication Technologies, Coimbatore, p. 1–8

  • Li CT, Chen CL, Lee CC et al (2018) A novel three-party password-based authenticated key exchange protocol with user anonymity based on chaotic maps. Soft Comput 22(2018):2495–2506

    Article  Google Scholar 

  • Lin JC, Zhang WY, Fournier-Viger P et al (2018a) A metaheuristic algorithm for hiding sensitive itemsets. In: Hartmann S, Ma H, Hameurlain A, Pernul G, Wagner RR (eds) Database and Expert systems applications. Springer International Publishing, Cham, pp 492–498

    Chapter  Google Scholar 

  • Lin, J. C.W., Liu, Q., Fournier-Viger, P., & et al. (2018). Anonymization of multiple and personalized sensitive attributes. In: C. Ordonez and L. Bellatreche 20th International Conference, DaWaK 2018 on Big Data Analysis and Knowledging Disc. (eds.), Springer Intl Publishing, Cham, pp. 204–215

  • Liu Y, Liu X, Tang C, Wang J, Zhang L (2018) Unlinkable Coin mixing scheme for transaction privacy enhancement of bitcoin,". IEEE Access 6:23261–23270

    Article  Google Scholar 

  • Maji HK, Prabhakaran M, Rosulek M (2011) Attribute-based signatures. In: Kiayias A (ed) Topics in cryptology–CT-RSA 2011. Springer, Berlin Heidelberg, pp 376–392

    Chapter  Google Scholar 

  • Maji, H., Prabhakaran, M., & Rosulek, M. (2008). Attribute-based signatures: Achieving attribute-privacy and collusion-resistance.

  • Maxwell G (2013) CoinJoin: bitcoin privacy for the real world, August 2013. Bitcoin Forum. https://bitcointalk.org/?topic=279249

  • Nakamoto S (2008) Bitcoin: A peer-to-peer electionic cash system

  • Rao YS (2017) Attribute‐based online/offline signcryption scheme. Int. J. Communication Systems, 30. Available from: https://doi.org/10.1002/dac.3322.

  • Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Altshuler Y, Elovici Y, Cremers AB, Aharony N, Pentland A (eds) Security and privacy in social networks. Springer, Heidelberg

    Google Scholar 

  • Rivest RL, Shamir A, Tauman Y (2001) How to Leak a Secret. In: Boyd C (ed) Advances in cryptology — ASIACRYPT 2001 lecture notes in computer science vol 2248. Springer, Heidelberg

    Google Scholar 

  • Ruffing T, Moreno-Sanchez P (2017) ValueShuffle: Mixing confidential transactions for comprehensive transaction privacy in bitcoin, in Proc. Int. Workshops, WAHC, BITCOIN, VOTING, WTSC, TA, Financial Cryptogr. Data Secur., FC, Sliema, Malta, Apr. 2017, pp. 133–154

  • Ruffing T, Moreno-Sanchez P, and Kate A (2014) CoinShuffle: Practical Decentralized Coin Mixing for Bitcoin. “In Computer Security - ESORICS 2014”, vol 871, Springer, pp 345–364

  • Ruffing T, Moreno-Sanchez P, and Kate A (2017b) P2P mixing and unlinkable bitcoin transactions, in Proc. IACR Cryptol. ePrint Arch., 2017, p. 824

  • Salman T, Zolanvari M, Erbad A, Jain R, Samaka M (2019) Security services using blockchains: a state of the art survey. Commun Surv Tutorials IEEE 21(1):858–880

    Article  Google Scholar 

  • Scofield D, Miles C, Kuhn S (2020) Automated model learning for accurate detection of malicious digital documents. Digit Threat Res Pract 15:21

    Google Scholar 

  • Serjantov A, Dingledine R, Syverson P (2003) From a trickle to a flood: active attacks on several mix types. In: Petitcolas FAP (ed) IH 2002. LNCS, Springer, Heidelberg

    Google Scholar 

  • Shahandashti SF, Safavi-Naini R (2009) Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel B (ed) Progress in cryptology–AFRICACRYPT 2009. Springer, Berlin Heidelberg, pp 198–216

    Chapter  Google Scholar 

  • Shalini S, and Santhi H (2019) A Survey on Various Attacks in Bitcoin and Cryptocurrency. Communication and Signal Processing (ICCSP) International Conference on, pp. 0220–0224.

  • Shamir A (1985) Identity-based cryptosystems and signature schemes. In: Blakley GR, Chaum D (eds) Advances in cryptology. Springer, Berlin Heidelberg

    Google Scholar 

  • Sharma R, Sibal R, Sabharwal S (2021) Software vulnerability prioritization using vulnerability description. Int J Syst Assur Eng Manag 12:58–64

    Article  Google Scholar 

  • Somin S, Altshuler Y, Gordon G, Pentland AS, Shmueli E (2020) Network dynamics of a financial ecosystem. Sci Rep 10:4587. https://doi.org/10.1038/s41598-020-61346-y

    Article  Google Scholar 

  • Tan SY, Heng SH, Goi BM (2009) On the security of an attribute-based signature scheme. In: Ezak DS, Kim TH, Ma J, Fang WC, Sandnes FE, Kang BH, Gu B (eds) U- and E-service, science and technology. Springer, Berlin Heidelberg, pp 161–168

    Chapter  Google Scholar 

  • Xiong H, Zhang H, and Sun J (2018) Attribute-based privacy-preserving data sharing for dynamic groups in cloud computing. IEEE Sys J, 1–22

  • Xu Q, Tan C, Fan Z et al (2018a) Secure multi-authority data access control scheme in cloud storage system based on attribute-based signcryption. IEEE Access 6(2018):34051–34074

    Article  Google Scholar 

  • Xu Q, Tan C, Fan Z, &, et al (2018b) Secure data access control for fog computing based on multi-authority attribute-based signcryption with computation outsourcing and attribute revocation. Sensors 18:1609

    Article  Google Scholar 

  • Zhang S, Lee J (2020) Mitigations on sybil-based double-spend attacks in bitcoin. IEEE Consumer Electron Magaz. https://doi.org/10.1109/MCE.2020.2988031

    Article  Google Scholar 

  • Zhang M, Feng F, Zhang Z, Wen J (2020) A new business process verification approach for e-commerce using petri nets. Int J Enterp Inf Syst (IJEIS) 16(1):92–107. https://doi.org/10.4018/IJEIS.2020010105

    Article  Google Scholar 

  • Ziegeldorf JH, Grossmann F, Henze M, Inden N, and Wehrle K (2015) CoinParty: Secure multi-party mixing of bitcoins, in Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 75–86.

Download references

Acknowledgements

This work was supported by the National Natural Science Foundation of China [Grant No.61602097, No.61502087, and No.61472064]

Funding

No funding was received to assist with the preparation of this manuscript.

Author information

Authors and Affiliations

Authors

Contributions

Authors contributed equally to the study conception and design, material preparation, data collection and analysis, etc. The first draft of the manuscript was written by Daniel Adu-Gyamfi and all other authors commented on previous versions of the manuscript. All authors read and approved the final and revised manuscript for submission.

Corresponding author

Correspondence to Daniel Adu-Gyamfi.

Ethics declarations

Conflict of interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Adu-Gyamfi, D., Kwansah Ansah, A.K., Armah, G.K. et al. Towards bitcoin transaction anonymity with recurrent attack prevention. Int J Syst Assur Eng Manag 13, 1–17 (2022). https://doi.org/10.1007/s13198-021-01506-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s13198-021-01506-z

Keywords

Navigation