{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:32:20Z","timestamp":1760239940163,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032079008","type":"print"},{"value":"9783032079015","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T00:00:00Z","timestamp":1760227200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-07901-5_7","type":"book-chapter","created":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:04Z","timestamp":1760185804000},"page":"126-146","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis of\u00a0Input-Output Mappings in\u00a0Coinjoin Transactions with\u00a0Arbitrary Values"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-9026-781X","authenticated-orcid":false,"given":"Jiri","family":"Gavenda","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9784-7624","authenticated-orcid":false,"given":"Petr","family":"Svenda","sequence":"additional","affiliation":[]},{"given":"Stanislav","family":"Bobon","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2409-661X","authenticated-orcid":false,"given":"Vladimir","family":"Sedlacek","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,12]]},"reference":[{"key":"7_CR1","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Financial Cryptography and Data Security, pp. 34\u201351. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"7_CR2","unstructured":"Boltzmann authors: Boltzmann (2016), https:\/\/github.com\/Samourai-Wallet\/boltzmann, Accessed 28 Apr 2025"},{"key":"7_CR3","unstructured":"BTCPay server: BTCPay server, https:\/\/btcpayserver.org\/, Accessed 28 Apr 2025"},{"key":"7_CR4","unstructured":"De\u00a0Bruijn, N.G.: Asymptotic Methods in Analysis. Courier Corporation (2014)"},{"issue":"1","key":"7_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008). Jan","journal-title":"Commun. ACM"},{"key":"7_CR6","unstructured":"Dufka, A., R\u00fdpar, D.: EmuCoinJoin: a container-based setup for the emulation of CoinJoin transactions on RegTest network, https:\/\/github.com\/crocs-muni\/coinjoin-emulator, Accessed 03 Nov 2025"},{"key":"7_CR7","unstructured":"Ficsor, A.: Dumplings (2020), https:\/\/github.com\/nopara73\/Dumplings, Accessed 28 Apr 2025"},{"key":"7_CR8","unstructured":"Ficsor, A.: Sake (2021), https:\/\/github.com\/nopara73\/Sake, Accessed 28 Apr 2025"},{"key":"7_CR9","unstructured":"Ficsor, A.: ZeroLink: the bitcoin fungibility framework (2022), https:\/\/nopara73.medium.com\/introducing-zerolink-the-bitcoin-fungibility-framework-dc5338086198, Accessed 28 Apr 2025"},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Ficsor, A., Seres, I.A., Kogman, Y., Ontivero, L.: Wabisabi: centrally coordinated coinjoins with variable amounts (2021)","DOI":"10.21428\/58320208.29539ffd"},{"issue":"4","key":"7_CR11","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1515\/popets-2018-0038","volume":"2018","author":"S Goldfeder","year":"2018","unstructured":"Goldfeder, S., Kalodner, H.A., Reisman, D., Narayanan, A.: When the cookie meets the blockchain: privacy risks of web payments via cryptocurrencies. Proc. Priv. Enhancing Technol. 2018(4), 179\u2013199 (2018)","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"7_CR12","unstructured":"JoinMarket authors: JoinMarket, https:\/\/github.com\/JoinMarket-Org\/joinmarket-clientserver, Accessed 28 Apr 2025"},{"key":"7_CR13","unstructured":"Kalodner, H., et al.: BlockSci: design and applications of a blockchain analysis platform. In: USENIX Security 2020, pp. 2721\u20132738, August 2020"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Kellerer, H., Pferschy, U., Pisinger, D.: The subset sum problem, pp. 73\u2013115. Springer, Berlin, Heidelberg (2004)","DOI":"10.1007\/978-3-540-24777-7_4"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Maesa, D.D.F., Marino, A., Ricci, L.: Uncovering the bitcoin blockchain: an analysis of the full users graph. In: IEEE International Conference on Data Science and Advanced Analytics (DSAA), pp. 537\u2013546 (2016)","DOI":"10.1109\/DSAA.2016.52"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Maurer, F.K., Neudecker, T., Florian, M.: Anonymous CoinJoin transactions with arbitrary values. In: IEEE Trustcom\/Bigdatase\/Icess, pp. 522\u2013529 (2017)","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.280"},{"key":"7_CR17","unstructured":"Maxwell, G.: CoinJoin: bitcoin privacy for the real world (2013), https:\/\/bitcointalk.org\/index.php?topic=279249.0, Accessed 28 Apr 2025"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Internet Measurement Conference, pp. 127\u2013140 (2013)","DOI":"10.1145\/2504730.2504747"},{"issue":"2","key":"7_CR19","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1093\/cybsec\/tyx007","volume":"3","author":"M M\u00f6ser","year":"2017","unstructured":"M\u00f6ser, M., B\u00f6hme, R.: The price of anonymity: empirical evidence from a market for bitcoin anonymization. J. Cybersecur. 3(2), 127\u2013135 (2017)","journal-title":"J. Cybersecur."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system, pp. 197\u2013223. Springer, New York (2013)","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Financial Cryptography and Data Security, pp. 6\u201324. Springer, Berlin, Heidelberg (2013)","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"7_CR22","unstructured":"Samourai authors: Samourai wallet - whirlpool, https:\/\/web.archive.org\/web\/20240417214653\/, https:\/\/www.samouraiwallet.com\/whirlpool, Accessed 28 Apr 2025"},{"key":"7_CR23","unstructured":"Schnoering, H., Vazirgiannis, M.: Heuristics for detecting coinjoin transactions on the bitcoin blockchain. arXiv:2311.12491 (2023)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"St\u00fctz, R., Stockinger, J., Moreno-Sanchez, P., Haslhofer, B., Maffei, M.: Adoption and actual privacy of decentralized CoinJoin implementations in bitcoin. In: AFT 2022, pp. 254\u2013267. ACM, New York, USA (2023)","DOI":"10.1145\/3558535.3559782"},{"key":"7_CR25","doi-asserted-by":"crossref","unstructured":"Tironsakkul, T., Maarek, M., Eross, A., Just, M.: The unique dressing of transactions: wasabi CoinJoin transaction detection. In: EICC 2022, pp. 21\u201328. ACM, New York, USA (2022)","DOI":"10.1145\/3528580.3528585"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Wahrst\u00e4tter, A., Taudes, A., Svetinovic, D.: Reducing privacy of coinjoin transactions: quantitative bitcoin network analysis. IEEE Trans. Dependable Secure Comput. 21(5) (2024)","DOI":"10.1109\/TDSC.2024.3353803"},{"key":"7_CR27","unstructured":"Wasabi Wallet authors: wasabi wallet - bitcoin privacy wallet with coinjoin, https:\/\/wasabiwallet.io\/, Accessed 28 Apr 2025"},{"key":"7_CR28","unstructured":"zkSNACKs: wasabi wallet, https:\/\/github.com\/WalletWasabi\/WalletWasabi\/tree\/v1.98.4.0, Accessed 28 Apr 2025"}],"container-title":["Lecture Notes in Computer Science","Computer Security \u2013 ESORICS 2025"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-07901-5_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T12:30:11Z","timestamp":1760185811000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-07901-5_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,12]]},"ISBN":["9783032079008","9783032079015"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-07901-5_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,12]]},"assertion":[{"value":"12 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ESORICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Symposium on Research in Computer Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Toulouse","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"esorics2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.esorics2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}