On how zero-knowledge proof blockchain mixers improve, and worsen user privacy

Z Wang, S Chaliasos, K Qin, L Zhou, L Gao… - Proceedings of the …, 2023 - dl.acm.org
Zero-knowledge proof (ZKP) mixers are one of the most widely-used blockchain privacy
solutions, operating on top of smart contract-enabled blockchains. We find that ZKP mixers …

[HTML][HTML] Measuring node decentralisation in blockchain peer to peer networks

A Howell, T Saber, M Bendechache - Blockchain: Research and …, 2023 - Elsevier
New blockchain platforms are launching at a high cadence, each fighting for attention,
adoption, and infrastructure resources. Several studies have measured the peer-to-peer …

Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey

D Pöhn, M Grabatin, W Hommel - Applied Sciences, 2023 - mdpi.com
Self-sovereign identity (SSI) is a digital identity management model managed in a
decentralized manner. It allows identity owners to manage and store their digital identities in …

Graphsense: A general-purpose cryptoasset analytics platform

B Haslhofer, R Stütz, M Romiti, R King - arXiv preprint arXiv:2102.13613, 2021 - arxiv.org
There is currently an increasing demand for cryptoasset analysis tools among cryptoasset
service providers, the financial industry in general, as well as across academic fields. At the …

Short paper: A centrality analysis of the lightning network

P Zabka, KT Foerster, C Decker, S Schmid - International Conference on …, 2022 - Springer
Payment channel networks (PCNs) such as the Lightning Network offer an appealing
solution to the scalability problem faced by many cryptocurrencies operating on a blockchain …

On the anonymity of peer-to-peer network anonymity schemes used by cryptocurrencies

PK Sharma, D Gosain, C Diaz - arXiv preprint arXiv:2201.11860, 2022 - arxiv.org
Cryptocurrency systems can be subject to deanonimization attacks by exploiting the network-
level communication on their peer-to-peer network. Adversaries who control a set of …

Analysis and probing of parallel channels in the lightning network

A Biryukov, G Naumenko, S Tikhomirov - International Conference on …, 2022 - Springer
Bitcoin can process only a few transactions per second, which is insufficient for a global
payment network. The Lightning Network (LN) aims to address this challenge. The LN …

Revelio: A Network-Level Privacy Attack in the Lightning Network

T Von Arx, M Tran, L Vanbever - 2023 IEEE 8th European …, 2023 - ieeexplore.ieee.org
The Lightning Network (LN) is a widely-adopted off-chain protocol that not only addresses
Bitcoin's scaling problem but also enables anonymous payments. Prior attacks have shown …

Hiding payments in lightning network with approximate differentially private payment channels

G van Dam, RA Kadir - Computers & Security, 2022 - Elsevier
Abstract Payment Channel Networks (PCN) form a class of techniques created to solve the
scalability problems that permissionless blockchains such as Bitcoin face. The Lightning …

Adoption and actual privacy of decentralized CoinJoin implementations in bitcoin

R Stütz, J Stockinger, P Moreno-Sanchez… - Proceedings of the 4th …, 2022 - dl.acm.org
We present a first measurement study on the adoption and actual privacy of two popular
decentralized CoinJoin implementations, Wasabi and Samourai, in the broader Bitcoin …