Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users
Authors:
Ferenc Béres,
István András Seres,
András A. Benczúr,
Mikerah Quintyne-Collins
Abstract:
Ethereum is the largest public blockchain by usage. It applies an account-based model, which is inferior to Bitcoin's unspent transaction output model from a privacy perspective. Due to its privacy shortcomings, recently several privacy-enhancing overlays have been deployed on Ethereum, such as non-custodial, trustless coin mixers and confidential transactions. In our privacy analysis of Ethereum'…
▽ More
Ethereum is the largest public blockchain by usage. It applies an account-based model, which is inferior to Bitcoin's unspent transaction output model from a privacy perspective. Due to its privacy shortcomings, recently several privacy-enhancing overlays have been deployed on Ethereum, such as non-custodial, trustless coin mixers and confidential transactions. In our privacy analysis of Ethereum's account-based model, we describe several patterns that characterize only a limited set of users and successfully apply these quasi-identifiers in address deanonymization tasks. Using Ethereum Name Service identifiers as ground truth information, we quantitatively compare algorithms in recent branch of machine learning, the so-called graph representation learning, as well as time-of-day activity and transaction fee based user profiling techniques. As an application, we rigorously assess the privacy guarantees of the Tornado Cash coin mixer by discovering strong heuristics to link the mixing parties. To the best of our knowledge, we are the first to propose and implement Ethereum user profiling techniques based on quasi-identifiers. Finally, we describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays on Ethereum. By incorporating user activity statistics from our data set, we estimate the success probability of such an attack.
△ Less
Submitted 13 October, 2020; v1 submitted 28 May, 2020;
originally announced May 2020.
Building Scalable Decentralized Payment Systems
Authors:
John Adler,
Mikerah Quintyne-Collins
Abstract:
Increasing the transactional throughput of decentralized blockchains in a secure manner has been the holy grail of blockchain research for most of the past decade. This paper introduces a scheme for scaling blockchains while retaining virtually identical security and decentralization, colloquially known as optimistic rollup. We propose a layer-2 scaling technique using a permissionless side chain…
▽ More
Increasing the transactional throughput of decentralized blockchains in a secure manner has been the holy grail of blockchain research for most of the past decade. This paper introduces a scheme for scaling blockchains while retaining virtually identical security and decentralization, colloquially known as optimistic rollup. We propose a layer-2 scaling technique using a permissionless side chain with merged consensus. The side chain only supports functionality to transact UTXOs and transfer funds to and from a parent chain in a trust-minimized manner. Optimized implementation and engineering of client code, along with improvements to block propagation efficiency versus currently deployed systems, allow use of this side chain to scale well beyond the capacities exhibited by contemporary blockchains without undue resource demands on full nodes.
△ Less
Submitted 23 July, 2020; v1 submitted 12 April, 2019;
originally announced April 2019.