{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T06:20:55Z","timestamp":1743142855999,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":34,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662643211"},{"type":"electronic","value":"9783662643228"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_10","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T22:17:23Z","timestamp":1634941043000},"page":"205-225","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach"],"prefix":"10.1007","author":[{"given":"Niluka","family":"Amarasinghe","sequence":"first","affiliation":[]},{"given":"Xavier","family":"Boyen","sequence":"additional","affiliation":[]},{"given":"Matthew","family":"McKague","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"10_CR1","unstructured":"Introduction to mimblewimble and grin (August 2020). https:\/\/github.com\/mimblewimble\/grin\/blob\/master\/doc\/intro.md"},{"key":"10_CR2","unstructured":"Alonso, K.M.: Zero to Monero (2020). https:\/\/src.getmonero.org\/library\/Zero-to-Monero-1-0-0.pdf"},{"key":"10_CR3","doi-asserted-by":"crossref","unstructured":"Alsalami, N., Zhang, B.: SoK: A systematic study of anonymity in cryptocurrencies. In: 2019 IEEE Conference on Dependable and Secure Computing (DSC) (2019)","DOI":"10.1109\/DSC47296.2019.8937681"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Amarasinghe, N., Boyen, X., McKague, M.: A survey of anonymity of cryptocurrencies. In: Proceedings of the Australasian Computer Science Week Multiconference, pp. 2:1\u20132:10. ACSW 2019, ACM, New York (2019)","DOI":"10.1145\/3290688.3290693"},{"key":"10_CR5","unstructured":"Amarasinghe, N., Boyen, X., McKague, M.: The cryptographic complexity of anonymous coins: A systematic exploration. Cryptology ePrint Archive, Report 2021\/036 (2021). https:\/\/eprint.iacr.org\/2021\/036"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Tikhomirov, S.: Deanonymization and linkability of cryptocurrency transactions based on network analysis. In: 2019 IEEE European Symposium on Security and Privacy (EuroS P), pp. 172\u2013184 (June 2019)","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"10_CR8","first-page":"1070","volume":"2017","author":"C Cachin","year":"2017","unstructured":"Cachin, C., De Caro, A., Moreno-Sanchez, P., Tackmann, B., Vukolic, M.: The transaction graph for modeling blockchain semantics. IACR Cryptology ePrint Archive 2017, 1070 (2017)","journal-title":"IACR Cryptology ePrint Archive"},{"issue":"4","key":"10_CR9","doi-asserted-by":"publisher","first-page":"3416","DOI":"10.1109\/COMST.2018.2842460","volume":"20","author":"M Conti","year":"2018","unstructured":"Conti, M., Kumar, S., Lal, C., Ruj, S.: A survey on security and privacy issues of bitcoin. IEEE Commun. Surv. Tutorials 20(4), 3416\u20133452 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/3-540-36467-6_5","volume-title":"Privacy Enhancing Technologies","author":"C D\u00edaz","year":"2003","unstructured":"D\u00edaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P. (eds.) PET 2002. LNCS, vol. 2482, pp. 54\u201368. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36467-6_5"},{"key":"10_CR11","doi-asserted-by":"crossref","unstructured":"Fuchsbauer, G., Orr\u00f9, M., Seurin, Y.: Aggregate cash systems: a cryptographic investigation of mimblewimble. In: EUROCRYPT (2019)","DOI":"10.1007\/978-3-030-17653-2_22"},{"key":"10_CR12","unstructured":"Hopwood, D., Bowe, S., Hornby, T., Wilcox, N.: Zcash protocol specification version 2020.1.3. Technical Report, Electric Coin Company (2020)"},{"key":"10_CR13","unstructured":"Jedusor, T.E.: Mimblewimble (2017). https:\/\/scalingbitcoin.org\/papers\/mimblew- imble.txt"},{"key":"10_CR14","unstructured":"Kappos, G., Yousaf, H., Maller, M., Meiklejohn, S.: An empirical analysis of anonymity in zcash. CoRR abs\/1805.03180 (2018)"},{"key":"10_CR15","first-page":"1","volume":"3","author":"MCK Khalilov","year":"2018","unstructured":"Khalilov, M.C.K., Levi, A.: A survey on anonymity and privacy in bitcoin-like digital cash systems. IEEE Commun. Surv. Tutorials 3, 1 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"10_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-66399-9_9","volume-title":"Computer Security","author":"A Kumar","year":"2017","unstructured":"Kumar, A., Fischer, C., Tople, S., Saxena, P.: A traceability analysis of monero\u2019s blockchain. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 153\u2013173. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_9"},{"key":"10_CR17","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. IMC 2013, ACM, New York (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"10_CR18","unstructured":"Miller, A., Moeser, M., Lee, K., Narayanan, A.: An empirical analysis of linkability in the monero blockchain. arXiv preprint arXiv:1704.04299 (2017)"},{"key":"10_CR19","unstructured":"Morris, L.: Anonymity Analysis of Cryptocurrencies. Ph.D. thesis, Rochester Institute of Techology (2015)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M., et al.: Narayanan, A., et al.: An empirical analysis of traceability in the monero blockchain. Proceedings on Privacy Enhancing Technologies (3) (2018)","DOI":"10.1515\/popets-2018-0025"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Ober, M., Katzenbeisser, S., Hamacher, K.: Structure and anonymity of the bitcoin transaction graph. Future Internet 5(2), 237\u2013250 (2013). copyright - Copyright MDPI AG 2013; Last updated - 2014\u201307-30","DOI":"10.3390\/fi5020237"},{"key":"10_CR22","unstructured":"Pfitzmann, A., Hansen, M.: A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon_Terminology_v0.34.pdf (August 2010), v0.34"},{"key":"10_CR23","unstructured":"Poelstra, A.: Mimblewimble (2016). https:\/\/scalingbitcoin.org\/he\/papers\/mimblewimble.pdf"},{"key":"10_CR24","unstructured":"Quesnelle, J.: An Analysis of Anonymity in the Zcash Cryptocurrency. Master\u2019s thesis, University of Michigan-Dearborn (2018)"},{"key":"10_CR25","doi-asserted-by":"crossref","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197\u2013223. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"10_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"10_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/978-3-319-70278-0_8","volume-title":"Financial Cryptography and Data Security","author":"T Ruffing","year":"2017","unstructured":"Ruffing, T., Moreno-Sanchez, P., et al.: ValueShuffle: mixing confidential transactions for comprehensive transaction privacy in\u00a0bitcoin. In: Brenner, M. (ed.) FC 2017. LNCS, vol. 10323, pp. 133\u2013154. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_8"},{"key":"10_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"issue":"05","key":"10_CR29","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"L Sweeney","year":"2002","unstructured":"Sweeney, L.: k-anonymity: a model for protecting privacy. Int. J. Uncertainty Fuzziness Knowl.-Based Syst. 10(05), 557\u2013570 (2002)","journal-title":"Int. J. Uncertainty Fuzziness Knowl.-Based Syst."},{"key":"10_CR30","doi-asserted-by":"crossref","unstructured":"Tsukada, Y., Mano, K., Sakurada, H., Kawabe, Y.: Anonymity, privacy, onymity, and identity: a modal logic approach. In: 2009 International Conference on Computational Science and Engineering, vol. 3, pp. 42\u201351 (August 2009)","DOI":"10.1109\/CSE.2009.251"},{"key":"10_CR31","unstructured":"Van Saberhagen, N.: Cryptonote v 2. 0 (2013). https:\/\/cryptonote.org\/whitepaper.pdf"},{"key":"10_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-030-14234-6_5","volume-title":"Information Security and Cryptology","author":"DA Wijaya","year":"2019","unstructured":"Wijaya, D.A., Liu, J., Steinfeld, R., Liu, D., Yuen, T.H.: Anonymity reduction attacks to monero. In: Guo, F., Huang, X., Yung, M. (eds.) Inscrypt 2018. LNCS, vol. 11449, pp. 86\u2013100. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-14234-6_5"},{"key":"10_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-319-49151-6_19","volume-title":"Information Security Practice and Experience","author":"DA Wijaya","year":"2016","unstructured":"Wijaya, D.A., Liu, J.K., Steinfeld, R., Sun, S.-F., Huang, X.: Anonymizing bitcoin transaction. In: Bao, F., Chen, L., Deng, R.H., Wang, G. (eds.) ISPEC 2016. LNCS, vol. 10060, pp. 271\u2013283. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-49151-6_19"},{"key":"10_CR34","doi-asserted-by":"publisher","first-page":"31845","DOI":"10.1109\/ACCESS.2020.2973291","volume":"8","author":"Z Zhang","year":"2020","unstructured":"Zhang, Z., Li, W., Liu, H., Liu, J.: A refined analysis of zcash anonymity. IEEE Access 8, 31845\u201331853 (2020)","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T12:43:39Z","timestamp":1673613819000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}