浏览全部资源
扫码关注微信
1.中国人民公安大学侦查学院,北京 100038
2.中国信息通信研究院安全研究所,北京 100191
3.中国科学院软件研究所并行软件与计算科学实验室,北京 100190
4.中国人民公安大学法学院,北京 100038
5.中央财经大学金融学院,北京 100081
[ "程杰(1994- ),女,河北秦皇岛人,博士,中国人民公安大学讲师,主要研究方向为经济犯罪侦查、数据分析、可信验证等。" ]
[ "金伟(1994- ),女,北京人,博士,中国信息通信研究院工程师,主要研究方向为网络安全政策标准、访问控制。" ]
[ "夏清(1994- ),女,重庆人,博士,中国科学院软件研究所副研究员,主要研究方向为区块链智能合约、链上攻击检测、大模型应用。" ]
[ "李淼(1993- ),男,湖南郴州人,博士,中国人民公安大学讲师,主要研究方向为刑法中的共同犯罪、网络犯罪。" ]
[ "戴韡(1982- ),男,福建南安人,博士,中央财经大学副教授,主要研究方向为金融科技、区块链、数字货币和不确定理论。" ]
[ "张亚丰 (1993- ),男,山西太原人,中国科学院软件研究所工程师,主要研究方向为区块链技术和大模型应用。" ]
[ "戴蓬(1971- ),男,山东济南人,中国人民公安大学教授,主要研究方向为经济犯罪侦查。" ]
[ "李玉成(1961- ),男,浙江温州人,中国科学院软件研究所研究员,主要研究方向为并行软件与计算科学、大数据分析、区块链技术。" ]
收稿日期:2024-08-07,
修回日期:2024-10-08,
纸质出版日期:2024-11-25
移动端阅览
程杰,金伟,夏清等.比特币去匿名化技术研究综述[J].通信学报,2024,45(11):244-266.
CHENG Jie,JIN Wei,XIA Qing,et al.Survey of Bitcoin de-anonymization technology[J].Journal on Communications,2024,45(11):244-266.
程杰,金伟,夏清等.比特币去匿名化技术研究综述[J].通信学报,2024,45(11):244-266. DOI: 10.11959/j.issn.1000-436x.2024184.
CHENG Jie,JIN Wei,XIA Qing,et al.Survey of Bitcoin de-anonymization technology[J].Journal on Communications,2024,45(11):244-266. DOI: 10.11959/j.issn.1000-436x.2024184.
比特币系统基于区块链技术,具备去中心化、无国界、匿名性等特点,受到产学研界广泛关注。然而,比特币系统在为用户提供隐私保护的同时,也为不法分子开展非法活动提供便利。因此,去匿名化技术研究持续进行并取得系列成果。现有综述多关注隐私保护方案,缺乏去匿名化技术系统梳理。基于此,从用户身份识别、关联地址识别、资金链路追踪3个维度分析现有去匿名化技术及其效果,总结发展现状和难点,并指出未来研究方向。
The Bitcoin system
based on blockchain technology
features decentralization
borderlessness
and anonymity
drawing widespread attention from academia and industry. While providing privacy protection for users
the Bitcoin system also facilitates illegal activities. Consequently
de-anonymization techniques have been actively researched
yielding a series of research results. Existing surveys primarily focus on privacy protection schemes
lacking a systematic analysis of de-anonymization techniques. The existing de-anonymization techniques and their effectiveness were analyzed from three dimensions
user identity identification
associated address recognition
and asset flow tracing. The current development status and challenges are summarized
and future research directions are pointed out.
SQUAREPANTS S . Bitcoin: a peer-to-peer electronic cash system [R ] . 2008 .
FOLEY S , KARLSEN J R , PUTNIŅŠ T J . Sex, drugs, and Bitcoin: how much illegal activity is financed through cryptocurrencies? [J ] . The Review of Financial Studies , 2019 , 32 ( 5 ): 1798 - 1853 .
李旭东 , 牛玉坤 , 魏凌波 , 等 . 比特币隐私保护综述 [J ] . 密码学报 , 2019 , 6 ( 2 ): 133 - 149 .
LI X D , NIU Y K , WEI L B , et al . Overview on privacy protection in Bitcoin [J ] . Journal of Cryptologic Research , 2019 , 6 ( 2 ): 133 - 149 .
张奥 , 白晓颖 . 区块链隐私保护研究与实践综述 [J ] . 软件学报 , 2020 , 31 ( 5 ): 1406 - 1434 .
ZHANG A , BAI X Y . Survey of research and practices on blockchain privacy protection [J ] . Journal of Software , 2020 , 31 ( 5 ): 1406 - 1434 .
祝烈煌 , 高峰 , 沈蒙 , 等 . 区块链隐私保护研究综述 [J ] . 计算机研究与发展 , 2017 , 54 ( 10 ): 2170 - 2186 .
ZHU L H , GAO F , SHEN M , et al . Survey on privacy preserving techniques for blockchain technology [J ] . Journal of Computer Research and Development , 2017 , 54 ( 10 ): 2170 - 2186 .
沈蒙 , 车征 , 祝烈煌 , 等 . 区块链数字货币交易的匿名性: 保护与对抗 [J ] . 计算机学报 , 2023 , 46 ( 1 ): 125 - 146 .
SHEN M , CHE Z , ZHU L H , et al . Anonymity in blockchain digital currency transactions: protection and confrontation [J ] . Chinese Journal of Computers , 2023 , 46 ( 1 ): 125 - 146 .
ANTONOPOULOS A M . Mastering Bitcoin: unlocking digital crypto-currencies [M ] . Sebastopol : O’Reilly Media , 2015 .
夏清 , 窦文生 , 郭凯文 , 等 . 区块链共识协议综述 [J ] . 软件学报 , 2021 , 32 ( 2 ): 277 - 299 .
XIA Q , DOU W S , GUO K W , et al . Survey on blockchain consensus protocol [J ] . Journal of Software , 2021 , 32 ( 2 ): 277 - 299 .
OBER M , KATZENBEISSER S , HAMACHER K . Structure and anonymity of the Bitcoin transaction graph [J ] . Future Internet , 2013 , 5 ( 2 ): 237 - 250 .
AL JAWAHERI H , AL SABAH M , BOSHMAF Y , et al . Deanonymizing Tor hidden service users through Bitcoin transactions analysis [J ] . Computers & Security , 2020 , 89 : 101684 .
PORTNOFF R S , HUANG D Y , DOERFLER P , et al . Backpage and Bitcoin: uncovering human traffickers [C ] // Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining . New York : ACM Press , 2017 : 1595 - 1604 .
GOLDFEDER S , KALODNER H , REISMAN D , et al . When the cookie meets the blockchain: privacy risks of web payments via cryptocurrencies [J ] . Proceedings on Privacy Enhancing Technologies , 2018 ( 4 ): 179 - 199 .
KOSHY P , KOSHY D , MCDANIEL P . An analysis of anonymity in Bitcoin using P2P network traffic [C ] // Proceedings of the 18th International Conference on Financial Cryptography and Data Security . Berlin : Springer , 2014 : 469 - 485 .
BIRYUKOV A , KHOVRATOVICH D , PUSTOGAROV I . Deanonymisation of clients in Bitcoin P2P network [C ] // Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2014 : 15 - 29 .
BIRYUKOV A , PUSTOGAROV I . Bitcoin over tor isnot a good idea [C ] // Proceedings of the 2015 IEEE Symposium on Security and Privacy . Piscataway : IEEE Press , 2015 : 122 - 134 .
高峰 , 毛洪亮 , 吴震 , 等 . 轻量级比特币交易溯源机制 [J ] . 计算机学报 , 2018 , 41 ( 5 ): 989 - 1004 .
GAO F , MAO H L , WU Z , et al . Lightweight transaction tracing technology for Bitcoin [J ] . Chinese Journal of Computers , 2018 , 41 ( 5 ): 989 - 1004 .
SHAO W , LI H , CHEN M Q , et al . Identifying Bitcoin users using deep neural network [C ] // Algorithms and Architectures for Parallel Processing: 18th International Conference . Berlin : Springer , 2018 : 178 - 192 .
JOURDAN M , BLANDIN S , WYNTER L , et al . Characterizing entities in the Bitcoin blockchain [C ] // Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW) . Piscataway : IEEE Press , 2018 : 55 - 62 .
HARLEV M A , SUN Y H , LANGENHELDT K C , et al . Breaking bad: de-anonymising entity types on the bitcoin blockchain using supervised machine learning [C ] // Proceedings of the 51st Hawaii International Conference on System Sciences . Piscataway : IEEE Press , 2018 : 1 - 14 .
YIN H H S , LANGENHELDT K , HARLEV M , et al . Regulating cryptocurrencies: a supervised machine learning approach to de-anonymizing the Bitcoin blockchain [J ] . Journal of Management Information Systems , 2019 , 36 ( 1 ): 37 - 73 .
HAN W L , CHEN D J , PANG J , et al . Temporal networks based industry identification for Bitcoin users [C ] // Proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications . Berlin : Springer , 2021 : 108 - 120 .
WANG K , PANG J , CHEN D J , et al . A large-scale empirical analysis of ransomware activities in Bitcoin [J ] . ACM Transactions on the Web , 2022 , 16 ( 2 ): 1 - 29 .
WEBER M , DOMENICONI G , CHEN J , et al . Anti-money laundering in Bitcoin: experimenting with graph convolutional networks for financial forensics [J ] . arXiv Preprint , arXiv: 1908.02591 , 2019 .
LO W W , KULATILLEKE G K , SARHAN M , et al . Inspection-L: self-supervised GNN node embeddings for money laundering detection in Bitcoin [J ] . Applied Intelligence , 2023 , 53 ( 16 ): 19406 - 19417 .
ALARAB I , PRAKOONWIT S , NACER M I . Competence of graph convolutional networks for anti-money laundering in Bitcoin blockchain [C ] // Proceedings of the 2020 5th International Conference on Machine Learning Technologies . New York : ACM Press , 2020 : 23 - 27 .
ELMOUGY Y , LIU L . Demystifying fraudulent transactions and illicit nodes in the Bitcoin network for financial forensics [C ] // Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining . New York : ACM Press , 2023 : 3979 - 3990 .
REID F , HARRIGAN M . An analysis of anonymity in the Bitcoin system [C ] // Proceedings of the 3rd International Conference on Privacy, Security, Risk and Trust . Berlin : Springer , 2012 : 197 - 223 .
MEIKLEJOHN S , POMAROLE M , JORDAN G , et al . A fistful of Bitcoins: characterizing payments among men with no names [C ] // Proceedings of the 2013 conference on Internet measurement conference . New York : ACM Press , 2013 : 127 - 140 .
RAPHAEL J . Denial of harm: sex trafficking, backpage, and free speech absolutism [J ] . Dignity: A Journal of Analysis of Exploitation and Violence , 2017 , 2 ( 1 ): 1 - 10 .
ENGLEHARDT S , NARAYANAN A . Online tracking: a 1-million-site measurement and analysis [C ] // Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2016 : 1388 - 1401 .
MASTAN I D , PAUL S . A new approach to deanonymization of unreachable Bitcoin nodes [C ] // Proceedings of the 16th International Conference on Cryptology and Network Security . Berlin : Springer , 2018 : 277 - 298 .
MONACO J V . Identifying Bitcoin users by transaction behavior [C ] // Proceedings of the Biometric and Surveillance Technology for Human and Activity Identification XII . Bellingham : SPIE Press , 2015 : 25 - 39 .
RON D , SHAMIR A . Quantitative analysis of the full Bitcoin transaction graph [C ] // Proceedings of the 17th International Conference on Financial Cryptography and Data Security . Berlin : Springer , 2013 : 6 - 24 .
HAMILTON W L , YING R , LESKOVEC J . Inductive representation learning on large graphs [J ] . arXiv Preprint , arXiv: 1706.02216 , 2017 .
LEE C , MAHARJAN S , KO K , et al . Toward detecting illegal transactions on Bitcoin using machine-learning methods [C ] // Proceedings of the 2019 International Conference on Blockchain and Trustworthy Systems . Berlin : Springer , 2019 : 520 - 533 .
ZHANG L J , ZHANG J J , TOYODA K , et al . A Bitcoin address multi-classification mechanism based on bipartite graph-based maximization consensus [C ] // Proceedings of the 29th InternationalConference on Computational and Experimental Engineering and Sciences . Berlin : Springer , 2023 : 473 - 487 .
TOYODA K , OHTSUKI T , MATHIOPOULOS P T . Multi-class Bitcoin-enabled service identification based on transaction history summarization [C ] // Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData) . Piscataway : IEEE Press , 2018 : 1153 - 1160 .
VASSALLO D , VELLA V , ELLUL J . Application of gradient boosting algorithms for anti-money laundering in cryptocurrencies [J ] . SN Computer Science , 2021 , 2 ( 3 ): 143 .
DUPONT J , SQUICCIARINI A C . Toward de-anonymizing Bitcoin by mapping users location [C ] // Proceedings of the 5th ACM Conference on Data and Application Security and Privacy . New York : ACM Press , 2015 : 139 - 141 .
YOUSAF H , KAPPOS G , MEIKLEJOHN S . Tracing transactions across cryptocurrency ledgers [J ] . arXiv Preprint , arXiv: 1810.12786 , 2018 .
KALODNER H , MÖSER M , LEE K , et al . BlockSci: Design and applications of a blockchain analysis platform [C ] // Proceedings of the 29th USENIX Security Symposium . Berkeley : USENIX Association , 2020 : 2721 - 2738 .
NICK J D . Data-driven de-anonymization in bitcoin [D ] . Zürich : ETH-Zürich , 2015 .
MÖSER M , NARAYANAN A . Resurrecting address clustering in Bitcoin [C ] // Proceedings of the 21st International Conference on Financial Cryptography and Data Security . Berlin : Springer , 2022 : 386 - 403 .
LIU F , LI Z H , JIA K , et al . Bitcoin address clustering based on change address improvement [J ] . IEEE Transactions on Computational Social Systems , 2023 , 10 ( 4 ): 1813 - 1825 .
CHANG T H , SVETINOVIC D . Improving Bitcoin ownership identification using transaction patterns analysis [J ] . IEEE Transactions on Systems, Man, and Cybernetics: Systems , 2020 , 50 ( 1 ): 9 - 20 .
KAPPOS G , YOUSAF H , STÜTZ R , et al . How to peel a million: Validating and expanding bitcoin clusters [C ] /// Proceedings of the 31st USENIX Security Symposium . Berkeley : USENIX Association , 2022 : 2207 - 2223 .
ANDROULAKI E , KARAME G O , ROESCHLIN M , et al . Evaluating user privacy in Bitcoin [C ] // Proceedings of the 2013 17th International Conference on Financial Cryptography and Data Security . Berlin : Springer , 2013 : 34 - 51 .
KIM M , LEE J , KWON H , et al . Get off of chain: unveiling dark web using multilayer Bitcoin address clustering [J ] . IEEE Access , 2022 , 10 : 70078 - 70091 .
QIN F C , WU Y , TAO F , et al . Multi-input address incremental clustering for the Bitcoin blockchain based on Petri net model analysis [J ] . Digital Communications and Networks , 2022 , 8 ( 5 ): 680 - 686 .
WANG K , CHENG Y K , TONG M W , et al . Exploring unconfirmed transactions for effective Bitcoin address clustering [C ] // Proceedings of the ACM Web Conference 2024 . New York : ACM Press , 2024 : 1880 - 1891 .
BONNEAU J , NARAYANAN A , MILLER A , et al . Mixcoin: anonymity for Bitcoin with accountable mixes [C ] // Proceedings of the 18th International Conference on Financial Cryptography and Data Security . Berlin : Springer , 2014 : 486 - 504 .
LEE S , YOON C , KANG H , et al . Cybercriminal Minds: an investigative study of cryptocurrency abuses in the Dark Web [C ] // Proceedings of the 2019 Network and Distributed System Security Symposium . Reston : Internet Society , 2019 : 1 - 15 .
SCHNOERING H , PORTHAUX P , VAZIRGIANNIS M . Assessing the efficacy of heuristic-based address clustering for Bitcoin [J ] . arXiv Preprint , arXiv: 2403.00523 , 2024 .
REMY C , RYM B , MATTHIEU L . Tracking Bitcoin users activity using community detection on a network of weak signals [C ] // Proceedings of the 15th International Workshop on Complex Systems and Networks . Berlin : Springer , 2017 : 166 - 177 .
BÉRES F , SERES I A , BENCZÚR A A , et al . Blockchain is watching you: profiling and deanonymizing ethereum users [C ] // Proceedings of the 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS) . Piscataway : IEEE Press , 2021 : 69 - 78 .
XIA P C , WANG H Y , GAO B Y , et al . Trade or trick? [J ] . Proceedings of the ACM on Measurement and Analysis of Computing Systems , 2021 , 5 ( 3 ): 1 - 26 .
MÖSER M , BÖHME R , BREUKER D , Towards risk scoring of Bitcoin transactions [C ] // Proceedings of the 18th International Conference on Financial Cryptography and Data Security . Berlin : Springer , 2014 : 16 - 32 .
WU J J , LIN D , FU Q S , et al . Toward understanding asset flows in crypto money laundering through the lenses of ethereum heists [J ] . IEEE Transactions on Information Forensics and Security , 2024 , 19 : 1994 - 2009 .
TOVANICH N , CAZABET R . Pattern Analysis of Money Flows in the Bitcoin Blockchain [C ] // Proceedings of the 2022 International Conference on Complex Networks and Their Applications . Berlin : Springer , 2023 : 443 - 455 .
BATTISTA G D , DONATO V D , PATRIGNANI M , et al . Bitconeview: visualization of flows in the Bitcoin transaction graph [C ] // Proceedings of the 2015 IEEE Symposium on Visualization for Cyber Security (VizSec) . Piscataway : IEEE Press , 2015 : 1 - 8 .
ANDERSON R , SHUMAILOV I , AHMED M . Making Bitcoin legal [C ] // Proceedings of the 26th International Workshop on Security Protocols XXVI . Berlin : Springer , 2018 : 243 - 253 .
孙鹏 . 金钱“占有即所有” 原理批判及权利流转规则之重塑 [J ] . 法学研究 , 2019 , 41 ( 5 ): 25 - 43 .
SUN P . A critique on the principle of “money possession that is all” and reconstruction of the rule of “money right transfer” [J ] . Chinese Journal of Law , 2019 , 41 ( 5 ): 25 - 43 .
AHMED M , SHUMAILOV I , ANDERSON R . Tendrils of crime: visualizing the diffusion of stolen Bitcoins [C ] // Proceedings of the 5th International Workshop on Graphical Models for Security . Berlin : Springer , 2019 : 1 - 12 .
TIRONSAKKUL T , MAAREK M , EROSS A , et al . Probing the mystery of cryptocurrency theft: an investigation into methods for cryptocurrency tainting analysis [C ] // Cryptocurrency Research Conference . Berlin : Springer , 2019 : 1 - 28 .
MCCORRY P , MÖSER M , ALI S T . Why preventing a cryptocurrency exchange heist isn’t good enough [C ] // Security Protocols XXVI: 26th International Workshop . Berlin : Springer , 2018 : 225 - 233 .
WU Z Y , LIU J L , WU J J , et al . TRacer: scalable graph-based transaction tracing for account-based blockchain trading systems [J ] . IEEE Transactions on Information Forensics and Security , 2023 , 18 : 2609 - 2621 .
ZHAO C , GUAN Y . A graph-based investigation of Bitcoin transactions [C ] // Proceedings of the 2015 IFIP International Conference on Digital Forensics . Berlin : Springer , 2015 : 79 - 95 .
PHETSOUVANH S , OGGIER F , DATTA A . EGRET: extortion graph exploration techniques in the Bitcoin network [C ] // Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW) . Piscataway : IEEE Press , 2018 : 244 - 251 .
OGGIER F , PHETSOUVANH S , DATTA A . BiVA: Bitcoin network visualization & analysis [C ] // Proceedings of the 2018 IEEE International Conference on Data Mining Workshops (ICDMW) . Piscataway : IEEE Press , 2018 : 1469 - 1474 .
SUN Y J , XIONG H , YIU S M , et al . BitAnalysis: a visualization system for Bitcoin wallet investigation [J ] . IEEE Transactions on Big Data , 2023 , 9 ( 2 ): 621 - 636 .
GOMEZ G , MORENO-SANCHEZ P , CABALLERO J . Watch your back: identifying cybercrime financial relationships in Bitcoin through back-and-forth exploration [C ] // Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security . New York : ACM Press , 2022 : 1291 - 1305 .
HUANG D Y , ALIAPOULIOS M M , LI V G , et al . Tracking ransomware end-to-end [C ] // Proceedings of the 2018 IEEE Symposium on Security and Privacy (SP) . Piscataway : IEEE Press , 2018 : 618 - 631 .
CHEN L , XU L , SHAH N , et al . Unraveling blockchain based crypto-currency system supporting oblivious transactions: a formalized approach [C ] // Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts . New York : ACM Press , 2017 : 23 - 28 .
WU L , HU Y F , ZHOU Y J , et al . Towards understanding and demystifying Bitcoin mixing services [C ] // Proceedings of the Web Conference 2021 . New York : ACM Press , 2021 : 33 - 44 .
LIN D , WU J J , XUAN Q , et al . Ethereum transaction tracking: Inferring evolution of transaction networks via link prediction [J ] . Physica A Statistical Mechanics and Its Applications , 2022 , 600 : 127504 .
KETHINENI S , CAO Y . The rise in popularity of cryptocurrency and associated criminal activity [J ] . International Criminal Justice Review , 2020 , 30 ( 3 ): 325 - 344 .
江溯 . 非法获取虚拟货币行为的定性 [J ] . 人民司法 , 2023 ( 11 ): 15 - 18 .
JIANG S . Nature determination of illegally Gaining other’s virtual currency [J ] . People’s Judicature , 2023 ( 11 ): 15 - 18 .
郭志浩 , 候柔倩 . 论虚拟货币的双重法律属性 [J ] . 河南社会科学 , 2024 , 32 ( 3 ): 78 - 86 .
GUO Z H , HOU R Q . On the dual legal properties of virtual currencies [J ] . Henan Social Sciences , 2024 , 32 ( 3 ): 78 - 86 .
FORCE F A T . Updated guidance for a risk-based approach to virtual assets and virtual asset service providers [R ] . 2021 .
0
浏览量
10
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构