Most Reputable Users

Patrick Joyce
Garrett Young
Bernie Klinder
Nicholas Straiton
Olga Grushko
lb win
Angus Keenan
Mykhailo Shulga
sdfjcvbxcvlf sxcvbmglfd
Antonín Pavelka

Trending Papers in cryptography and security

A new technique to track bitcoins that have been through a mixing service
From Paper: Tracking Mixed Bitcoins
Published: Sep 2020
  • The results show that it is possible to track mixed Bitcoins from the deposited Bitcoins using address taint analysis and the number of potential transaction outputs can be significantly reduced with the filtering criteria
  • This paper introduces a novel tracking method called address taint analysis that focuses on tainting at the address level
Submitted by Patrick Joyce
Slide 1 of 1
Bitcoin Transaction Graph Analysis
Michael Fleder, Michael S. Kester, Sudeep Pillai
Published: Feb 2015
Bitcoins have recently become an increasingly popular cryptocurrency through which users trade electronically and more anonymously than via traditional electronic transfers. Bitcoin's design keeps all transactions in a public ledger. The sender and receiver for each transaction are identified only by cryptographic public-key ids. This leads to a common misconception that it inherently provides anonymous use. While Bitcoin's presumed anonymity offers new avenues for commerce, several recent studies raise user-privacy concerns. We explore the level of anonymity in the Bitcoin system. Our approach is two-fold: (i) We annotate the public transaction graph by linking bitcoin public keys to "real" people - either definitively or statistically. (ii) We run the annotated graph through our graph-analysis framework to find and summarize activity of both known and unknown users.
Retrieved from arxiv
Incentive-based integration of useful work into blockchains
David Amar, Lior Zilpa
Published: Jan 2019
Blockchains have recently gained popularity thanks to their ability to record "digital truth". They are designed to keep persistence, security, and avoid attacks which is useful for many applications. However, they are still problematic in their energy consumption, governance, and scalability Current solutions either require vast computing power via Proof-of-Work (PoW) or cannot directly utilize computing power as a resource in virtual mining. Here, we propose incentive-based protocols that use competitions to integrate computing power into blockchains. We introduce Proof-of-Accumulated-Work (PoAW): miners compete in costumer-submitted jobs, accumulate recorded work whenever they are successful, and, over time, are remunerated. The underlying competition replaces the standard hash puzzle-based competitions of PoW. A competition is managed by a dynamically-created small masternode network (dTMN) of invested miners. dTMNs allow for scalability as we do not need the entire network to manage the competition. Using careful design on incentives, our system preserves security, avoids attacks, and offers new markets to miners. When there are no costumers the system converges into a standard protocol. Our proposed solution improves the way by which the blockchain infrastructure works and makes use of its computing power. We also discuss how the protocol can be used by fields that require solving difficult optimization problems, such as Artificial Intelligence and Pattern Recognition in Big Data.
Retrieved from arxiv