Network analysis and traceability on monero blockchain
Monero was introduced as a privacy-focused alternative to Bitcoin in 2014. Based on privacy enhancing features such as ring signatures, stealth addresses and RingCT, it is supposed to protect the privacy of users while still solving the issue of double spending, which is rare in crypto currency. How...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2021
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/148293 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Monero was introduced as a privacy-focused alternative to Bitcoin in 2014. Based on privacy enhancing features such as ring signatures, stealth addresses and RingCT, it is supposed to protect the privacy of users while still solving the issue of double spending, which is rare in crypto currency. However, Monero is not foolproof when it comes to privacy, as previous studies have shown that it is vulnerable to weakness such as the 0-mixin attack. In this study, we explore just how much of Monero transactions are traceable, using previously known exploits to de-anonymize Monero inputs. The end goal of this study is to show that Monero is not as untraceable as thought to be, and that for Monero to achieve its privacy goals, it has to enforce privacy-by-default measures, such as using a minimum number of mixins. |
---|