비트코인 익명화 기술 연구 동향

  • 홍영기 (고려대학교 컴퓨터학과 정보시스템보안연구실) ;
  • 허준범 (고려대학교 컴퓨터학과 정보시스템보안연구실)
  • Published : 2018.06.30

Abstract

세계적 열풍의 중심인 비트코인에는 많은 이슈가 발생하고 있다. 특히 비트코인의 익명성은 사회적으로 중요한 문제이다. 비트코인이 익명성을 보장하지 못할 경우 거래내역이 공개되어 프라이버시가 노출될 수 있다. 반대로 비트코인이 익명성을 보장할 경우 마약 거래, 자금 세탁, 랜섬웨어 공격 등의 각종 범죄가 발생할 수 있다. 이밖에도 다양한 상황에 적절한 대처를 하기 위해서는 비트코인 기술에 대한 정리와 이해가 필요하다. 본 논문에서는 비트코인의 익명성을 약화시키는 클러스터링 기술과, 비트코인의 익명성을 강화시키는 믹싱 프로토콜 기술에 대한 연구 흐름을 정리하였다.

Keywords

References

  1. Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system.
  2. Ron, D., & Shamir, A. (2013, April). Quantitative analysis of the full bitcoin transaction graph. In International Conference on Financial Cryptography and Data Security (pp. 6-24). Springer, Berlin, Heidelberg.
  3. Androulaki, E., Karame, G. O., Roeschlin, M., Scherer, T., & Capkun, S. (2013, April). Evaluating user privacy in bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 34-51). Springer, Berlin, Heidelberg.
  4. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M., & Savage, S. (2013, October). A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference (pp. 127-140). ACM.
  5. Spagnuolo, M., Maggi, F., & Zanero, S. (2014, March). Bitiodine: Extracting intelligence from the bitcoin network. In International Conference on Financial Cryptography and Data Security (pp. 457-468). Springer, Berlin, Heidelberg.
  6. Nick, J. D. (2015). Data-Driven De-Anonymization in Bitcoin (Master's thesis, ETH-Zurich).
  7. Harrigan, M., & Fretter, C. (2016, July). The unreasonable effectiveness of address clustering. In Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), 2016 Intl IEEE Conferences (pp. 368-373). IEEE.
  8. Biryukov, A., Khovratovich, D., & Pustogarov, I. (2014, November). Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (pp. 15-29). ACM.
  9. Koshy, P., Koshy, D., & McDaniel, P. (2014, March). An analysis of anonymity in bitcoin using p2p network traffic. In International Conference on Financial Cryptography and Data Security (pp. 469-485). Springer, Berlin, Heidelberg.
  10. Biryukov, A., & Pustogarov, I. (2015, May). Bitcoin over Tor isn't a good idea. In Security and Privacy (SP), 2015 IEEE Symposium on (pp. 122-134). IEEE.
  11. Bonneau, J., Narayanan, A., Miller, A., Clark, J., Kroll, J. A., & Felten, E. W. (2014, March). Mixcoin: Anonymity for Bitcoin with accountable mixes. In International Conference on Financial Cryptography and Data Security (pp. 486-504). Springer, Berlin, Heidelberg.
  12. Valenta, L., & Rowan, B. (2015, January). Blindcoin: Blinded, accountable mixes for bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 112-126). Springer, Berlin, Heidelberg.
  13. Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., & Goldberg, S. (2017). Tumblebit: An untrusted bitcoin-compatible anonymous payment hub. Proceedings of NDSS 2017.
  14. Maxwell, G.: CoinJoin: Bitcoin privacy for the real world. Post on Bitcoin Forum (August 2013), https://bitcointalk.org/index.php?topic=279249
  15. Ruffing, T., Moreno-Sanchez, P., & Kate, A. (2014, September). CoinShuffle: Practical decentralized coin mixing for Bitcoin. In European Symposium on Research in Computer Security (pp. 345-364). Springer, Cham.
  16. Ruffing, T., Moreno-Sanchez, P., Kate, A. (2017). P2P mixing and unlinkable Bitcoin transactions. In: NDSS 2017
  17. Ruffing, T., & Moreno-Sanchez, P. (2017, April). ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin. In International Conference on Financial Cryptography and Data Security (pp. 133-154). Springer, Cham.
  18. Maxwell, G.: Confidential transactions (2015). https://people.xiph.org/-greg/confidential values.txt
  19. Todd, P.: Stealth addresses. Post on Bitcoin development mailing list. https://www.mail-archive.com/bitcoin-development@lists.sourceforge.net/msg03613.html