You are looking at a specific version 20180418:192816 of this paper. See the latest version.

Paper 2018/348

Monero Ring Attack: Recreating Zero Mixin Transaction Effect

Dimaz Ankaa Wijaya and Joseph Liu and Ron Steinfeld and Dongxi Liu

Abstract

Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques called linkable ring signature and one-time public key. Recent studies show that the majority of Monero inputs are traceable prior to mandatory RingCT transaction. After the RingCT was implemented, the problem was mitigated. We propose a novel attack to reduce the anonymity of Monero transactions or even to fully deanonymise the inputs. The proposed protocol can be launched in RingCT scenario and enable multiple attackers to collaborate without trusting each other. The attack scheme can be planted in the existing Monero services without extra fees and without putting the users’ money at risk.

Metadata
Available format(s)
PDF
Publication info
Preprint. MINOR revision.
Contact author(s)
dimaz wijaya @ monash edu
History
2018-04-18: received
Short URL
https://ia.cr/2018/348
License
Creative Commons Attribution
CC BY
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.