In:
Proceedings on Privacy Enhancing Technologies, Privacy Enhancing Technologies Symposium Advisory Board, Vol. 2022, No. 3 ( 2022-7), p. 538-557
Abstract:
In a ring-signature-based anonymous cryptocurrency, signers of a transaction are hidden among a set of potential signers, called a ring, whose size is much smaller than the number of all users. The ringmembership relations specified by the sets of transactions thus induce bipartite transaction graphs, whose distribution is in turn induced by the ring sampler underlying the cryptocurrency. Since efficient graph analysis could be performed on transaction graphs to potentially deanonymise signers, it is crucial to understand the resistance of (the transaction graphs induced by) a ring sampler against graph analysis. Of particular interest is the class of partitioning ring samplers. Although previous works showed that they provide almost optimal local anonymity, their resistance against global, e.g. graph-based, attacks were unclear. In this work, we analyse transaction graphs induced by partitioning ring samplers. Specifically, we show (partly analytically and partly empirically) that, somewhat surprisingly, by setting the ring size to be at least logarithmic in the number of users, a graph-analysing adversary is no better than the one that performs random guessing in deanonymisation up to constant factor of 2.
Type of Medium:
Online Resource
ISSN:
2299-0984
DOI:
10.56553/popets-2022-0085
Language:
Unknown
Publisher:
Privacy Enhancing Technologies Symposium Advisory Board
Publication Date:
2022
detail.hit.zdb_id:
2877594-6
Permalink