Monero ring attack

recreating zero mixin transaction effect

Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

3 Citations (Scopus)

Abstract

Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques such as linkable ring signature and one-time public key. Recent studies show that the majority of Monero inputs are traceable prior to mandatory RingCT transaction. After the RingCT was implemented, the problems were mitigated. We propose a novel attack to reduce the anonymity of Monero transactions or even to fully deanonymise the inputs. The proposed protocol can be launched in RingCT protocol and enables multiple attackers to collaborate without trusting each other. The attack scheme can be planted in the existing Monero services without extra fees and without putting the users' money at risk.

Original languageEnglish
Title of host publicationProceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018)
Subtitle of host publication2018 IEEE Trustcom/BigDataSE
EditorsKim-Kwang Raymond Choo, Yongxin Zhu, Zongming Fei, Bhavani Thuraisingham, Yang Xiang
Place of PublicationPiscataway NJ USA
PublisherIEEE, Institute of Electrical and Electronics Engineers
Pages1196-1201
Number of pages6
ISBN (Print)9781538643877
DOIs
Publication statusPublished - 5 Sep 2018
EventIEEE International Conference on Trust, Security and Privacy in Computing and Communications and IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) 2018 - New York, United States of America
Duration: 31 Jul 20183 Aug 2018
Conference number: 17th
http://www.cloud-conf.net/trustcom18/

Conference

ConferenceIEEE International Conference on Trust, Security and Privacy in Computing and Communications and IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) 2018
Abbreviated titleTrustCom 2018
CountryUnited States of America
CityNew York
Period31/07/183/08/18
Internet address

Keywords

  • anonymity
  • Monero
  • privacy
  • ring signature
  • traceable

Cite this

Wijaya, D. A., Liu, J., Steinfeld, R., & Liu, D. (2018). Monero ring attack: recreating zero mixin transaction effect. In K-K. R. Choo, Y. Zhu, Z. Fei, B. Thuraisingham, & Y. Xiang (Eds.), Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE (pp. 1196-1201). [8456034] Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00165
Wijaya, Dimaz Ankaa ; Liu, Joseph ; Steinfeld, Ron ; Liu, Dongxi. / Monero ring attack : recreating zero mixin transaction effect. Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. editor / Kim-Kwang Raymond Choo ; Yongxin Zhu ; Zongming Fei ; Bhavani Thuraisingham ; Yang Xiang. Piscataway NJ USA : IEEE, Institute of Electrical and Electronics Engineers, 2018. pp. 1196-1201
@inproceedings{258e0ecea6eb4df59a71a4e6ed88a399,
title = "Monero ring attack: recreating zero mixin transaction effect",
abstract = "Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques such as linkable ring signature and one-time public key. Recent studies show that the majority of Monero inputs are traceable prior to mandatory RingCT transaction. After the RingCT was implemented, the problems were mitigated. We propose a novel attack to reduce the anonymity of Monero transactions or even to fully deanonymise the inputs. The proposed protocol can be launched in RingCT protocol and enables multiple attackers to collaborate without trusting each other. The attack scheme can be planted in the existing Monero services without extra fees and without putting the users' money at risk.",
keywords = "anonymity, Monero, privacy, ring signature, traceable",
author = "Wijaya, {Dimaz Ankaa} and Joseph Liu and Ron Steinfeld and Dongxi Liu",
year = "2018",
month = "9",
day = "5",
doi = "10.1109/TrustCom/BigDataSE.2018.00165",
language = "English",
isbn = "9781538643877",
pages = "1196--1201",
editor = "Choo, {Kim-Kwang Raymond} and Yongxin Zhu and Zongming Fei and Bhavani Thuraisingham and Yang Xiang",
booktitle = "Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018)",
publisher = "IEEE, Institute of Electrical and Electronics Engineers",
address = "United States of America",

}

Wijaya, DA, Liu, J, Steinfeld, R & Liu, D 2018, Monero ring attack: recreating zero mixin transaction effect. in K-KR Choo, Y Zhu, Z Fei, B Thuraisingham & Y Xiang (eds), Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE., 8456034, IEEE, Institute of Electrical and Electronics Engineers, Piscataway NJ USA, pp. 1196-1201, IEEE International Conference on Trust, Security and Privacy in Computing and Communications and IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE) 2018, New York, United States of America, 31/07/18. https://doi.org/10.1109/TrustCom/BigDataSE.2018.00165

Monero ring attack : recreating zero mixin transaction effect. / Wijaya, Dimaz Ankaa; Liu, Joseph; Steinfeld, Ron; Liu, Dongxi.

Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. ed. / Kim-Kwang Raymond Choo; Yongxin Zhu; Zongming Fei; Bhavani Thuraisingham; Yang Xiang. Piscataway NJ USA : IEEE, Institute of Electrical and Electronics Engineers, 2018. p. 1196-1201 8456034.

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

TY - GEN

T1 - Monero ring attack

T2 - recreating zero mixin transaction effect

AU - Wijaya, Dimaz Ankaa

AU - Liu, Joseph

AU - Steinfeld, Ron

AU - Liu, Dongxi

PY - 2018/9/5

Y1 - 2018/9/5

N2 - Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques such as linkable ring signature and one-time public key. Recent studies show that the majority of Monero inputs are traceable prior to mandatory RingCT transaction. After the RingCT was implemented, the problems were mitigated. We propose a novel attack to reduce the anonymity of Monero transactions or even to fully deanonymise the inputs. The proposed protocol can be launched in RingCT protocol and enables multiple attackers to collaborate without trusting each other. The attack scheme can be planted in the existing Monero services without extra fees and without putting the users' money at risk.

AB - Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques such as linkable ring signature and one-time public key. Recent studies show that the majority of Monero inputs are traceable prior to mandatory RingCT transaction. After the RingCT was implemented, the problems were mitigated. We propose a novel attack to reduce the anonymity of Monero transactions or even to fully deanonymise the inputs. The proposed protocol can be launched in RingCT protocol and enables multiple attackers to collaborate without trusting each other. The attack scheme can be planted in the existing Monero services without extra fees and without putting the users' money at risk.

KW - anonymity

KW - Monero

KW - privacy

KW - ring signature

KW - traceable

UR - http://www.scopus.com/inward/record.url?scp=85054058206&partnerID=8YFLogxK

U2 - 10.1109/TrustCom/BigDataSE.2018.00165

DO - 10.1109/TrustCom/BigDataSE.2018.00165

M3 - Conference Paper

SN - 9781538643877

SP - 1196

EP - 1201

BT - Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018)

A2 - Choo, Kim-Kwang Raymond

A2 - Zhu, Yongxin

A2 - Fei, Zongming

A2 - Thuraisingham, Bhavani

A2 - Xiang, Yang

PB - IEEE, Institute of Electrical and Electronics Engineers

CY - Piscataway NJ USA

ER -

Wijaya DA, Liu J, Steinfeld R, Liu D. Monero ring attack: recreating zero mixin transaction effect. In Choo K-KR, Zhu Y, Fei Z, Thuraisingham B, Xiang Y, editors, Proceedings - The 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2018) - The 12th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2018): 2018 IEEE Trustcom/BigDataSE. Piscataway NJ USA: IEEE, Institute of Electrical and Electronics Engineers. 2018. p. 1196-1201. 8456034 https://doi.org/10.1109/TrustCom/BigDataSE.2018.00165