Virtual money: User’s identity can be revealed much easier than thought

Several research groups worldwide have shown that it is possible to find out which transactions belong together, even if the client uses different pseudonyms. However it was not clear if it is also possible to reveal the IP address behind each transaction. This has changed: researchers at the University of Luxembourg have now demonstrated how this is feasible with only a few computers and about €1500.

“It’s hard to predict the future, but some people think that Bitcoin could do to finance what the Internet did to communications”, says Prof. Alex Biryukov, who leads digital currency research at the University. “So I think especially for Luxembourg it is important to watch what happens with Bitcoin”.

The Bitcoin system is not managed by a central authority, but relies on a peer-to-peer network on the Internet. Anyone can join the network as a user or provide computing capacity to process the transactions. In the network, the user’s identity is hidden behind a cryptographic pseudonym, which can be changed as often as is wanted. Transactions are signed with this pseudonym and broadcast to the public network to verify their authenticity and attribute the Bitcoins to the new owner.

In their new study, researchers at the Laboratory of Algorithmics, Cryptology and Security of the University of Luxembourg have shown that Bitcoin does not protect user’s IP address and that it can be linked to the user’s transactions in real-time. To find this out, a hacker would need only a few computers and about €1500 per month for server and traffic costs. Moreover, the popular anonymization network “Tor” can do little to guarantee Bitcoin user’s anonymity, since it can be blocked easily.

The basic idea behind these findings is that Bitcoin entry nodes, to which the user’s computer connects in order to make a transaction, form a unique identifier for the duration of user’s session. This unique pattern can be linked to a user’s IP address. Moreover, transactions made during one session, even those made via unrelated pseudonyms, can be linked together. With this method, hackers can reveal up to 60 percent of the IP addresses behind the transactions made over the Bitcoin network.

“This Bitcoin network analysis combined with previous research on transaction flows shows that the level of anonymity in the Bitcoin network is quite low”, explains Dr. Alex Biryukov. In the paper recently presented at the ACM Conference on Computer and Communications Security the team also described how to prevent such an attack on user’s privacy. Software patches written by the researchers are currently under discussion with the Bitcoin core developers.

The University of Luxembourg, founded in 2003, is a multilingual, international research university with 6200 students and staff from all over the globe. Its research focuses on computational sciences, law and especially European law, finance, educational sciences as well as interdisciplinary research conducted by the Interdisciplinary Centre for Security, Reliability and Trust (SnT) and the Luxembourg Centre for Systems Biomedicine (LCSB).

Notes to editor

The full scientific article “Deanonymisation of clients in Bitcoin P2P network” as published in the Proceedings of the ACM Conference on Computer and Communications Security can be viewed here: http://orbilu.uni.lu/handle/10993/18679 . DOI: 10.1145/2660267.2660379 

Weitere Informationen:

http://orbilu.uni.lu/handle/10993/18679  – Full scientific article: “Deanonymisation of clients in Bitcoin P2P network”
http://wwwen.uni.lu/recherche/fstc/laboratory_of_algorithmics_cryptology_and_security_lacs  – Laboratory of Algorithmics, Cryptology and Security (LACS) at the University of Luxembourg

Media Contact

Sophie Kolb idw - Informationsdienst Wissenschaft

All latest news from the category: Information Technology

Here you can find a summary of innovations in the fields of information and data processing and up-to-date developments on IT equipment and hardware.

This area covers topics such as IT services, IT architectures, IT management and telecommunications.

Back to home

Comments (0)

Write a comment

Newest articles

Superradiant atoms could push the boundaries of how precisely time can be measured

Superradiant atoms can help us measure time more precisely than ever. In a new study, researchers from the University of Copenhagen present a new method for measuring the time interval,…

Ion thermoelectric conversion devices for near room temperature

The electrode sheet of the thermoelectric device consists of ionic hydrogel, which is sandwiched between the electrodes to form, and the Prussian blue on the electrode undergoes a redox reaction…

Zap Energy achieves 37-million-degree temperatures in a compact device

New publication reports record electron temperatures for a small-scale, sheared-flow-stabilized Z-pinch fusion device. In the nine decades since humans first produced fusion reactions, only a few fusion technologies have demonstrated…

Partners & Sponsors