On Identity, Transaction, and Smart Contract Privacy on Permissioned and Permissionless Blockchain: A Comprehensive Survey
Blockchain is a decentralized distributed ledger that combines multiple technologies,
including chain data structures, P2P networks, consensus algorithms, cryptography, and …
including chain data structures, P2P networks, consensus algorithms, cryptography, and …
Blockchain censorship
Permissionless blockchains promise resilience against censorship by a single entity. This
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
suggests that deterministic rules, not third-party actors, decide whether a transaction is …
On how zero-knowledge proof blockchain mixers improve, and worsen user privacy
Zero-knowledge proof (ZKP) mixers are one of the most widely-used blockchain privacy
solutions, operating on top of smart contract-enabled blockchains. We find that ZKP mixers …
solutions, operating on top of smart contract-enabled blockchains. We find that ZKP mixers …
Altruistic and profit-oriented: Making sense of roles in web3 community from airdrop perspective
Regardless of which community, incentivizing users is a necessity for well-sustainable
operations. In the blockchain-backed Web3 communities, known for their transparency and …
operations. In the blockchain-backed Web3 communities, known for their transparency and …
Improving cryptocurrency crime detection: Coinjoin community detection approach
The potential of Bitcoin for money laundering and terrorist financing represents a significant
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
challenge in law enforcement. In recent years, the use of privacy-improving CoinJoin …
Cashing out crypto: state of practice in ransom payments
The fast pace of blockchain technology and cryptocurrencies' evolution makes people
vulnerable to financial fraud and provides a relatively straightforward monetisation …
vulnerable to financial fraud and provides a relatively straightforward monetisation …
A survey on ethereum pseudonymity: Techniques, challenges, and future directions
Blockchain technology has emerged as a transformative force in various sectors, including
finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin's …
finance, healthcare, supply chains, and intellectual property management. Beyond Bitcoin's …
Cybercrime bitcoin revenue estimations: Quantifying the impact of methodology and coverage
Multiple works have leveraged the public Bitcoin ledger to estimate the revenue
cybercriminals obtain from their victims. Estimations focusing on the same target often do not …
cybercriminals obtain from their victims. Estimations focusing on the same target often do not …
Towards Understanding Asset Flows in Crypto Money Laundering Through the Lenses of Ethereum Heists
With the overall momentum of the blockchain industry, financial crimes related to blockchain
crypto-assets are becoming increasingly prevalent. After committing a crime, the main goal …
crypto-assets are becoming increasingly prevalent. After committing a crime, the main goal …
Efficient and effective attributed hypergraph clustering via k-nearest neighbor augmentation
Hypergraphs are an omnipresent data structure used to represent high-order interactions
among entities. Given a hypergraph H wherein nodes are associated with attributes …
among entities. Given a hypergraph H wherein nodes are associated with attributes …