{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,23]],"date-time":"2026-01-23T06:26:07Z","timestamp":1769149567070,"version":"3.49.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T00:00:00Z","timestamp":1633478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100018967","name":"Universitat Pompeu Fabra","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100018967","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>The Bitcoin P2P network currently represents a reference benchmark for modern cryptocurrencies. Its underlying protocol defines how transactions and blocks are distributed through all participating nodes. To protect user privacy, the identity of the node originating a message is kept hidden. However, an adversary observing the whole network can analyze the spread pattern of a transaction to trace it back to its source. This is possible thanks to the so-called <jats:italic>rumor centrality<\/jats:italic>, which is caused by the symmetry in the spreading of <jats:italic>gossip<\/jats:italic>-like protocols. Recent works try to address this issue by breaking the symmetry of the Diffusion protocol, currently used in Bitcoin, and leveraging proxied broadcast. Nonetheless, the complexity of their design can be a barrier to their adoption in real life. In this work, we propose Clover, a novel transaction relay protocol that protects the source of transaction messages with a simple, yet effective, design. Compared to previous solutions, our protocol does not require building propagation graphs, and reduces the ability of the adversary to gain precision by opening multiple connections towards the same node. Experimental results show that the deanonymization accuracy of an <jats:italic>eavesdropper<\/jats:italic> adversary against Clover is up to 10 times smaller compared to Diffusion.<\/jats:p>","DOI":"10.1007\/s12083-021-01241-z","type":"journal-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T13:20:40Z","timestamp":1633526440000},"page":"290-303","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Clover: An anonymous transaction relay protocol for the bitcoin P2P network"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6697-5431","authenticated-orcid":false,"given":"Federico","family":"Franzoni","sequence":"first","affiliation":[]},{"given":"Vanesa","family":"Daza","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,6]]},"reference":[{"key":"1241_CR1","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Bitcoin. 4\u00a0https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"1241_CR2","doi-asserted-by":"crossref","unstructured":"Androulaki E, Karame GO, Roeschlin M, Scherer T, Capkun S (2013) Evaluating user privacy in bitcoin. In A.-R. Sadeghi, editor, Financial Cryptography and Data Security, pp 34\u201351, Berlin, Heidelberg. Springer Berlin Heidelberg. ISBN: 978-3-642-39884-1","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"1241_CR3","doi-asserted-by":"publisher","unstructured":"Reid F, Harrigan M (2013)\u00a0An Analysis of Anonymity in the Bitcoin System.\u00a0Springer New York, pp 197\u2013223. ISBN: 978-1-4614-4139-7\u00a0https:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"1241_CR4","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomart\u00ed J (2015) Research and challenges on bitcoin anonymity. In: Garcia-Alfaro J, Herrera-Joancomart\u00ed J, Lupu E, Posegga J, Aldini A, Martinelli F, Suri N (eds) Data Privacy Management. Autonomous Spontaneous Security, and Security Assurance. Springer International Publishing, Cham, pp 3\u201316. ISBN: 978-3-319-17016-9.","DOI":"10.1007\/978-3-319-17016-9_1"},{"key":"1241_CR5","doi-asserted-by":"publisher","unstructured":"Meiklejohn S, Pomarole M, Jordan G, Levchenko K, McCoy D, Voelker GM, Savage S (2013) A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the 2013 Conference on Internet Measurement Conference, IMC \u201913, pp 127\u2013140, New York, NY, USA. ACM. ISBN: 978-1-4503-1953-9.\u00a0https:\/\/doi.org\/10.1145\/2504730.2504747","DOI":"10.1145\/2504730.2504747"},{"key":"1241_CR6","unstructured":"Nick JD (2015) Data-driven de-anonymization in bitcoin. Master\u2019s thesis, ETH-Z\u00fcrich"},{"key":"1241_CR7","unstructured":"Neudecker T, Hartenstein H (2017) Could network information facilitate address clustering in bitcoin? In: Brenner M, Rohloff K, Bonneau J, Miller A, Ryan PY, Teague V, Bracciali A, Sala M, Pintore F, Jakobsson M (eds) Financial Cryptography and Data Security. pp. Springer International Publishing, Cham, pp 155\u2013169. ISBN: 978-3-319-70278-0."},{"key":"1241_CR8","doi-asserted-by":"publisher","unstructured":"Biryukov A, Khovratovich D, Pustogarov I (2014) Deanonymisation of clients in bitcoin p2p network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS \u201914, pp 15\u201329, New York, NY, USA. ACM. ISBN: 978-1-4503-2957-6. https:\/\/doi.org\/10.1145\/2660267.2660379","DOI":"10.1145\/2660267.2660379"},{"key":"1241_CR9","doi-asserted-by":"crossref","unstructured":"Koshy P, Koshy D, McDaniel P (2014) An analysis of anonymity in bitcoin using p2p network traffic. In Financial Cryptography and Data Security, pp 469\u2013485, Berlin, Heidelberg. Springer Berlin Heidelberg","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"1241_CR10","doi-asserted-by":"publisher","unstructured":"Biryukov A, Pustogarov I (2015) Bitcoin over tor isn\u2019t a good idea. In 2015 IEEE Symposium on Security and Privacy.\u00a0pp 122\u2013134. https:\/\/doi.org\/10.1109\/SP.2015.15","DOI":"10.1109\/SP.2015.15"},{"key":"1241_CR11","unstructured":"Fanti G, Viswanath P (2017) Deanonymization in the bitcoin p2p network. In I.\u00a0Guyon, U.\u00a0V. Luxburg, S.\u00a0Bengio, H.\u00a0Wallach, R.\u00a0Fergus, S.\u00a0Vishwanathan, and R.\u00a0Garnett, editors, Advances in Neural Information Processing Systems30, pp 1364\u20131373. Curran Associates, Inc. https:\/\/papers.nips.cc\/paper\/6735-deanonymization-in-the-bitcoin-p2p-network.pdf"},{"key":"1241_CR12","unstructured":"Fanti GC, Viswanath P (2017) Anonymity properties of the bitcoin P2P network. CoRR, abs\/1703.08761"},{"key":"1241_CR13","doi-asserted-by":"publisher","unstructured":"Shah D, Zaman T (2012) Rumor centrality: A universal source detector. In Proceedings of the 12th ACM SIGMETRICS \/ PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS\u201912, pp 199\u2013210. New York, NY, USA. Association for Computing Machinery. https:\/\/doi.org\/10.1145\/2254756.2254782","DOI":"10.1145\/2254756.2254782"},{"issue":"8","key":"1241_CR14","doi-asserted-by":"publisher","first-page":"5163","DOI":"10.1109\/TIT.2011.2158885","volume":"57","author":"D Shah","year":"2011","unstructured":"Shah D, Zaman T (2011) Rumors in a network: Who\u2019s the culprit? IEEE Trans Inf Theory 57(8):5163\u20135181. https:\/\/doi.org\/10.1109\/TIT.2011.2158885","journal-title":"IEEE Trans Inf Theory"},{"key":"1241_CR15","doi-asserted-by":"publisher","unstructured":"Bojja\u00a0Venkatakrishnan S, Fanti G, Viswanath P (2017) Dandelion: Redesigning the bitcoin network for anonymity. Proc ACM Meas Anal Comput Syst\u00a01(1):22:1\u201322:34. https:\/\/doi.org\/10.1145\/3084459","DOI":"10.1145\/3084459"},{"key":"1241_CR16","doi-asserted-by":"crossref","unstructured":"Franzoni F, Daza V (2020) Improving bitcoin transaction propagation by leveraging unreachable nodes. arXiv:2010.15070 [cs.NI]","DOI":"10.1109\/Blockchain50366.2020.00031"},{"key":"1241_CR17","unstructured":"Bitcoin Wiki. Bitcoin core 0.11 (ch 4): P2p network. Last Accessed: 01\/04\/2021.\u00a0https:\/\/en.bitcoin.it\/wiki\/Bitcoin_Core_0.11_(ch_4):_P2P_Network"},{"key":"1241_CR18","doi-asserted-by":"publisher","unstructured":"Fanti G, Venkatakrishnan SB, Bakshi S, Denby B, Bhargava S, Miller A, Viswanath P (2018) Dandelion++: Lightweight cryptocurrency networking with formal anonymity guarantees. Proc ACM Meas Anal Comput Syst\u00a02(2). https:\/\/doi.org\/10.1145\/3224424","DOI":"10.1145\/3224424"},{"key":"1241_CR19","unstructured":"Wang L, Pustogarov I (2017) Towards better understanding of bitcoin unreachable peers. CoRR, abs\/1709.06837"},{"key":"1241_CR20","unstructured":"Kaminsky D (2011) Black ops of tcp\/ip. Black Hat USA, 44"},{"key":"1241_CR21","doi-asserted-by":"publisher","unstructured":"Biryukov A, Tikhomirov S (2019) Deanonymization and linkability of cryptocurrency transactions based on network analysis. In 2019 IEEE European Symposium on Security and Privacy (EuroSP)\u00a0pp 172\u2013184. https:\/\/doi.org\/10.1109\/EuroSP.2019.00022","DOI":"10.1109\/EuroSP.2019.00022"},{"key":"1241_CR22","doi-asserted-by":"crossref","unstructured":"Mastan ID, Paul S (2018) A new approach to deanonymization of unreachable bitcoin nodes. In: Capkun S, Chow SSM (eds) Cryptology and Network Security. pp. Springer International Publishing, Cham, pp 277\u2013298. ISBN: 978-3-030-02641-7","DOI":"10.1007\/978-3-030-02641-7_13"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01241-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-021-01241-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-021-01241-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,20]],"date-time":"2022-01-20T02:17:10Z","timestamp":1642645030000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-021-01241-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,6]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,1]]}},"alternative-id":["1241"],"URL":"https:\/\/doi.org\/10.1007\/s12083-021-01241-z","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,10,6]]},"assertion":[{"value":"18 December 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 October 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}