Cryptocurrency systems can be subject to deanonimization attacks by exploiting the network-level communication on their peer-to-peer network. Adversaries who control a set of colluding node(s) within the peer-to-peer network can observe transactions being exchanged and infer the parties involved. Thus, various network anonymity schemes have been proposed to mitigate this problem, with some solutions providing theoretical anonymity guarantees. In this work, we model such peer-to-peer network anonymity solutions and evaluate their anonymity guarantees. To do so, we propose a novel framework that uses Bayesian inference to obtain the probability distributions linking transactions to their possible originators. We characterize transaction anonymity with those distributions, using entropy as metric of adversarial uncertainty on the originator's identity. In particular, we model Dandelion, Dandelion++ and Lightning Network. We study different configurations and demonstrate that none of them offers acceptable anonymity to their users. For instance, our analysis reveals that in the widely deployed Lightning Network, with 1% strategically chosen colluding nodes the adversary can uniquely determine the originator for about 50% of the total transactions in the network. In Dandelion, an adversary that controls 15% of the nodes has on average uncertainty among only 8 possible originators. Moreover, we observe that due to the way Dandelion and Dandelion++ are designed, increasing the network size does not correspond to an increase in the anonymity set of potential originators. Alarmingly, our longitudinal analysis of Lightning Network reveals rather an inverse trend -- with the growth of the network the overall anonymity decreases.
翻译:加密的货币系统可能会通过在同行对同行网络上利用网络级别的通信进行网络级通信,进行去离子化攻击。 控制同行对同行网络内一组串串通节点的对口人可以观察交易的交换和推断所涉方。 因此, 提出了各种网络匿名计划来缓解这一问题, 提供了理论匿名保证的理论解决方案。 这项工作中, 我们模拟了这种同行对同行网络匿名解决方案, 并评价了它们的匿名保证。 为此, 我们提出了一个新框架, 利用巴伊西亚的推断来获取将交易与其可能的发端人连接起来的概率分布。 我们用对等对等网络进行匿名化, 使用对发端人身份的对抗不确定性的测试。 特别是, 我们模拟了Dandelion, Dandelion ++ 和 Lightning 网络。 我们研究不同的配置, 并表明这些配置没有为用户提供可接受的匿名。 例如, 我们的分析显示, 在广泛部署的光线网中, 以战略选择的断点连接将交易与长期发端者连接起来的概率分布, 我们只能对50个交易的端端端端点进行直径的网络进行精确度分析。