Browse > Article
http://dx.doi.org/10.9708/jksci.2022.27.06.077

Overview of technologies: ensure anonymity of privacy coins  

Kwon, Hoon (Dept. of Software Convergence Design, Jeju Campus of Korea Polytechnic University)
Kim, Eun-Young (Dept. of Software Convergence Design, Jeju Campus of Korea Polytechnic University)
Abstract
Recently, various cryptocurrencies (coins) based on block chains have appeared, and interest in privacy coins, which is an anonymity-based cryptocurrency that values personal information protection, is growing. In this paper, we look at coin abuse cases using privacy coins, and analyze the technology that guarantees the anonymity of 8 mainly traded privacy coins (Monero, Dash, Zcash, BEAM, Grin, Horizen, Verge, and Pirate Chain). We would like to analyze the applied technologies for We present the problems that can occur in these privacy coins, check the technology and each element applied to the privacy coin, and analyze the technical difficulty of the anonymity guarantee technology for the mainly traded coins through this, and Appropriate countermeasures and classification of privacy coins for technical difficulty were presented through the problem. Through this, the standard for re-evaluating the value of the coin according to the application of appropriate technology for the privacy coin can be presented.
Keywords
Privacy Coin; Cryptocurrency; Block chain; anonymization; ensuring anonymity technology;
Citations & Related Records
연도 인용수 순위
  • Reference
1 DOMINIK STROUKAL, BARBORA NEDVEDOVA, "Bitcoin and other cryptocurrency as an instrument of crime in cyberspace", Proceedings of Business and Management Conferences 4407036, International Institute of Social and Economic Sciences, pp. 222-224, 2016-10-12
2 Satoshi Nakamoto, "Bitcoin: A Peer-to-Peer Electronic Cash System", pp. 1~8, 2008-10-31
3 Cryptocurrency Prices | Coin Market Overview | CoinLore, https://www.coinlore.com/ko/privacy-coins
4 Sergio Pastrana, Guillermo Suarez-Tangil, "A First Look at the Crypto-Mining Malware Ecosystem: A Decade of Unrestricted Wealth" IMC '19: Proceedings of the Internet Measurement Conference, pp. 73~86, 2019-09-25, DOI:https://doi.org/10.1145/3355369.3355576   DOI
5 U.S. Department of Justice, "Report of the Attorney General's Cyber Digital Task Force: Cryptocurrency Enforcement Framework", pp.41, 2020-10-08
6 S. Noether, A. Mackenzie, and the M. Research Lab, "Ring Confidential Transactions", ledger, vol. 1, pp. 1-18, 2016-12-21. DOI: https://doi.org/10.5195/ledger.2016.34   DOI
7 What are zk-SNARKs?. https://z.cash/ko_KR/technology/zksnarks/
8 Lelantus MW, https://github.com/BeamMW/beam/wiki/Lelantus-MW
9 Ivan Bogatyy, "Breaking Mimblewimble's Privacy Model", https://medium.com/dragonfly-research/breaking-mimblewimble-privacy-model-84bcd67bfe52
10 CryptoRekt, "Blackpaper Verge Currency 5th edition", pp. 01-30, 2019-01,
11 The Shadow Project. "Dual-key Stealth Addresses", in part of Shadow Documentation, https://doc.shadowproject.io/#dual-keystealth-addresses
12 Cryptocurrency 'Monero' with a market cap of $1 billion is virtually removed from Korea, https://m.etnews.com/20200416000179
13 IOCTA, INTERNET ORGANISED CRIME THREAT ASSESS MENT, pp.57~58, 2020-10-05
14 Shapeshift, "What Are Privacy Coins?".Medium(Blog), https://link.medium.com/hCokKIcSibb?fbclid=IwAR0bgxFhhuies9Nyrtv_a2si4DV_xGPHSVdI-lKPORCGB4lagZn09spky7I
15 Josh Grunzweig, The Rise of the Cryptocurrency Miners, https://unit42.paloaltonetworks.com/unit42-rise-cryptocurrency-miners/
16 Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage, "A fistful of Bitcoins: characterizing payments among men with no names" Commun. ACM 59, 4 , pp. 86-93, 2016-03, DOI:https://doi.org/10.1145/2504730.2504747   DOI
17 Andrew Poelstra, "Mimblewimble", 2016-10-06
18 BRIAN CURRAN, "What is the BEAM Coin? Mimblewimble & Grin vs Beam", https://blockonomi.com/beam-coin-guide/
19 Chainalysis Team, https://blog.chainalysis.com/reports/introducing-chainalysis-investigation-compliance-support-dash-zcash