Giter VIP home page Giter VIP logo

Comments (5)

EthanHeilman avatar EthanHeilman commented on May 21, 2024 1

"Sybil-Resistant Mixing for Bitcoin" has a neat analysis of sybil resistance in a semi-similar setting.

from zerolink.

nopara73 avatar nopara73 commented on May 21, 2024

It does certainly work, although there can be many ways to defend it. I cannot think of anything not complex, so I leave it as is and added a new section.

E. Sybil Attack

It is possible to deanonymize a user if every participant of the mix is the attacker, except the user. The cost of this attack grows as the liquidity grows. This attack is only feasible if the Tumbler is the attacker. If the attacker is not the Tumbler, it would have to figure out exactly in which rounds the targeted user participates and it must make sure nobody else gets to participate in that mix. However executing a covert Sybil attack as a Tumbler is not evident, it depends on the protocol implementation. Overt Sybil attack as a Tumbler is always possible, however in that case the Tumbler is accountable.

To execute this attack: when Tumbler notices an input is registered that it wants to deanonymize, it must refuse all following input registration and all the input confirmation that has already been registered and is not from the target. Refusing input registration can happen for many raeason, therefore it can be done in a covert way, however refusing input conformination cannot. It can only happen if the input has been spent, therefore malicious Tumbler can be noticed. Clients whose input confirmations are refused and they did not prematurely spent their inputs SHOULD NOT use the Tumbler anymore.
The cost of the Sybil attack at $1 tranasction fees is 1.2 * number of sybils * $1. If the number of sybils is 100 and the denomination is one bitcoin, the Tumbler must first predivide 100btc into 100 one btc outputs, which is about $1*(100*0.2)= $20, wait until the transaction confirms, then it must pay the CoinJoin fees, which is about $100, so the cost of this attack is $120 per round.
This pattern can be noticed by the post-mix wallet. In this case the post mix wallet MAY require re-mixing the coins.

There are various other ways to address Tumbler Sybil attacks in expense of the complexity of pre-mix wallet implementations. Defending Sybil attack should be an interest of future research.

from zerolink.

nopara73 avatar nopara73 commented on May 21, 2024

mix partners based on ads placed in the block chain.

Makes the scheme too expensive today.

We show that Xim’s design increases attacker costs linearly with the total number of participants

As I described the same applies to ZeroLink, the difference is in XIM, because of the ads are placed in the blockchain, in ZeroLink because the inputs must be predivided per participants.

Question: Why Figure 1 is saying CoinShuffle is centralized?

Final note: There might be many hidden gems I missed.

from zerolink.

EthanHeilman avatar EthanHeilman commented on May 21, 2024

Question: Why Figure 1 is saying CoinShuffle is centralized?

Some possibilities:

(1). It could be a typo. Later in the paper they refer to Coinshuffle's pairing protocol as decentralized

Decentralized Pairing and Mixing. Only two protocols provide fully distributed pairing and mixing: our protocol Xim, CoinShuffle [24].

For example, Barber et al. [7], CoinShuffle [24], CoinJoin [1], and others have proposed methods
for two or more parties to directly mix their coin. These approaches obviate centralized trust and are compatible with existing Bitcoin-like currencies.

To our knowledge, there are no detailed proposals for partner selection to review here: all use a trusted third party, except CoinShuffle, which we describe below.

(2). It could be a reference to the fact that Coinshuffle's bulletin board requires a mostly untrusted communication party to reduce the communication costs fro n^3 to n^2. Whereas XIM uses the most decentralized blockchain for this purpose.

from zerolink.

nopara73 avatar nopara73 commented on May 21, 2024

@EthanHeilman

I finally had the time to take a closer look at Xim. 
Chaumian CoinJoin has stronger Sybil attack resistance than Xim, because only the Tumbler can launch Sybil, as explained above. 
However the Tumbler Sybil attack resistance in  Chaumian CoinJoin is exactly as good as in Xim.

We show that because of Xim’s participation fees, launching inference or DoS attacks based on Sybil identities are costly. For a given success rate, a Sybil attacker’s costs grow
linearly with the number of mix participants, while honest participants’ costs remain small, fixed, and constant. 

Exactly the same applies to Chaumian CoinJoin. In our case the participation fee is the (1) predivision of a big output by  denomination, (2) pay the CoinJoin fees per participants.

from zerolink.

Related Issues (20)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.