all InfoSec news
On the Anonymity of Peer-To-Peer Network Anonymity Schemes Used by Cryptocurrencies. (arXiv:2201.11860v1 [cs.CR])
Jan. 31, 2022, 2:20 a.m. | Piyush Kumar Sharma, Devashish Gosain, Claudia Diaz
cs.CR updates on arXiv.org arxiv.org
Cryptocurrency systems can be subject to deanonymization attacks by
exploiting the network-level communication on their peer-to-peer network.
Adversaries who control a set of colluding node(s) within the peer-to-peer
network can observe transactions being exchanged and infer the parties
involved. Thus, various network anonymity schemes have been proposed to
mitigate this problem, with some solutions providing theoretical anonymity
guarantees.
In this work, we model such peer-to-peer network anonymity solutions and
evaluate their anonymity guarantees. To do so, we propose a novel …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
SOC 2 Manager, Audit and Certification
@ Deloitte | US and CA Multiple Locations
Information Systems Security Officer (ISSO) (Remote within HR Virginia area)
@ OneZero Solutions | Portsmouth, VA, USA
Security Analyst
@ UNDP | Tripoli (LBY), Libya
Senior Incident Response Consultant
@ Google | United Kingdom
Product Manager II, Threat Intelligence, Google Cloud
@ Google | Austin, TX, USA; Reston, VA, USA
Cloud Security Analyst
@ Cloud Peritus | Bengaluru, India