{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:01:41Z","timestamp":1775016101969,"version":"3.50.1"},"reference-count":91,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Danish Industry Foundation","award":["2019-0046"],"award-info":[{"award-number":["2019-0046"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.2980950","type":"journal-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T02:29:46Z","timestamp":1584412186000},"page":"54044-54059","source":"Crossref","is-referenced-by-count":39,"title":["Privacy and Cryptocurrencies\u2014A Systematic Literature Review"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9235-6383","authenticated-orcid":false,"given":"Lasse","family":"Herskind","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4316-6054","authenticated-orcid":false,"given":"Panagiota","family":"Katsikouli","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9575-2990","authenticated-orcid":false,"given":"Nicola","family":"Dragoni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2453434"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.109.068702"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"ref70","first-page":"469","article-title":"An analysis of anonymity in bitcoin using P2P network traffic","volume":"8437","author":"koshy","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref76","first-page":"122","article-title":"Bitcoin over Tor isn&#x2019;t a good idea","author":"biryukov","year":"2015","journal-title":"Proc IEEE Symp Secur Privacy"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2842460"},{"key":"ref74","article-title":"Anonymity properties of the bitcoin P2P network","author":"fanti","year":"2017","journal-title":"arXiv 1703 08761"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.018"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2852480"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.280"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3078505.3078528"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/3224424"},{"key":"ref33","author":"maxwell","year":"2013","journal-title":"Coinjoin Bitcoin Privacy for the Real World"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-48051-9_10"},{"key":"ref30","article-title":"Bitcoin transaction graph analysis","author":"fleder","year":"2015","journal-title":"arXiv 1502 01657"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23415"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-24907-6_20"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/ECRIME.2017.7945049"},{"key":"ref60","article-title":"Extending the anonymity of zcash","author":"kappos","year":"2019","journal-title":"arXiv 1902 07337"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref61","article-title":"Mimblewimble (commit e9f45ec)","author":"poelstra","year":"2016"},{"key":"ref63","article-title":"Towards a formally verified implementation of the MimbleWimble cryptocurrency protocol","author":"betarte","year":"2019","journal-title":"arXiv 1907 01688"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-17016-9_1"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_22"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/BF00196725"},{"key":"ref66","first-page":"514","article-title":"Short signatures from the Weil pairing","volume":"2248","author":"boneh","year":"2001","journal-title":"Adv Cryptology"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"ref67","first-page":"416","article-title":"Aggregate and verifiably encrypted signatures from bilinear maps","volume":"2656","author":"boneh","year":"2003","journal-title":"Adv Cryptology"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03329-3_15"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73420-8_37"},{"key":"ref2","first-page":"208","article-title":"Escalating U.S. police surveillance after 9\/11: An examination of causes and effects","volume":"4","author":"bloss","year":"2007","journal-title":"Surveillance and Society"},{"key":"ref1","first-page":"6","article-title":"Facebook scandal raises data privacy concerns","volume":"65","author":"tuttle","year":"2018","journal-title":"Risk Manage"},{"key":"ref20","article-title":"Using payments to promote cooperation in anonymity protocols","author":"figueiredo","year":"2009"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.91"},{"key":"ref21","first-page":"245","article-title":"A novel Peer-to-Peer payment system","volume":"1","author":"palaka","year":"2004","journal-title":"ICE Proceedings"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/588058.588060"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17653-2_23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858049"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.34"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00165"},{"key":"ref91","article-title":"Marlin: Preprocessing zksnarks with universal and updatable SRS","author":"chiesa","year":"2019"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339817"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990796"},{"key":"ref58","first-page":"463","article-title":"An empirical analysis of anonymity in zcash","author":"kappos","year":"2018","journal-title":"Proc 27th USENIX Conf Secur Symp"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-54970-4_5"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78967-3_24"},{"key":"ref55","first-page":"781","article-title":"Succinct non-interactive zero knowledge for a von Neumann architecture","author":"ben-sasson","year":"2014","journal-title":"Proc 23rd USENIX Secur Symp"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref53","doi-asserted-by":"crossref","first-page":"140","DOI":"10.1007\/978-3-662-44774-1_10","article-title":"Rational zero: Economic security for zerocoin with everlasting anonymity","volume":"8438","author":"garman","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-14234-6_5"},{"key":"ref10","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref11","first-page":"990","article-title":"Quisquis: A new design for anonymous cryptocurrencies","volume":"11921","author":"fauzi","year":"2018","journal-title":"Adv Cryptology"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0015"},{"key":"ref12","first-page":"191","article-title":"Zether: Towards privacy in a smart contract world","volume":"2019","author":"b\u00fcnz","year":"2019"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0030369"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028503"},{"key":"ref82","first-page":"837","article-title":"Tracing transactions across cryptocurrency ledgers","author":"yousaf","year":"2019","journal-title":"Proc 28th USENIX Security Symp"},{"key":"ref16","first-page":"374","article-title":"A new electronic cash model","volume":"1","author":"hou","year":"2005","journal-title":"Proc Int Conf Inf Technol Coding Comput"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0038"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CNSR.2005.45"},{"key":"ref84","article-title":"Scalable, transparent, and post-quantum secure computational integrity","author":"ben-sasson","year":"2018"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45472-1_4"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_9"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1314333.1314339"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/BF00206326"},{"key":"ref89","article-title":"Plonk: Permutations over Lagrange-bases for oecumenical noninteractive arguments of knowledge","author":"gabizon","year":"2019"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2818623"},{"key":"ref3","author":"nakamoto","year":"2008","journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.10.020"},{"key":"ref5","article-title":"Survey of confidentiality and privacy preserving technologies for blockchains","author":"yang","year":"2016"},{"key":"ref85","article-title":"Fractal: Post-quantum and transparent recursive proofs from holography","author":"chiesa","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2601248.2601268"},{"key":"ref86","article-title":"Transparent snarks from dark compilers","author":"bunz","year":"2019"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.03.007"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0025"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339820"},{"key":"ref9","first-page":"373","article-title":"Lelantus: Towards confidentiality and anonymity of blockchain transactions from standard assumptions","volume":"2019","author":"jivanyan","year":"2019"},{"key":"ref46","doi-asserted-by":"crossref","first-page":"122","DOI":"10.1007\/978-3-662-44774-1_9","article-title":"Increasing anonymity in bitcoin","volume":"8438","author":"saxena","year":"2014","journal-title":"Financial Cryptography and Data Security"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-70278-0_8"},{"key":"ref48","first-page":"153","article-title":"A traceability analysis of Monero&#x2019;s blockchain","volume":"10493","author":"kumar","year":"2017","journal-title":"Computers and Security"},{"key":"ref47","article-title":"Cryptonote v 2.0","author":"van saberhagen","year":"2013"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.5333"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1137\/0218012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.00020"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09036864.pdf?arnumber=9036864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,28]],"date-time":"2023-09-28T18:24:45Z","timestamp":1695925485000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9036864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":91,"URL":"https:\/\/doi.org\/10.1109\/access.2020.2980950","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}