{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T15:23:57Z","timestamp":1774365837523,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,1,29]],"date-time":"2019-01-29T00:00:00Z","timestamp":1548720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,1,29]]},"DOI":"10.1145\/3290688.3290693","type":"proceedings-article","created":{"date-parts":[[2019,1,14]],"date-time":"2019-01-14T13:15:25Z","timestamp":1547471725000},"page":"1-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["A Survey of Anonymity of Cryptocurrencies"],"prefix":"10.1145","author":[{"given":"Niluka","family":"Amarasinghe","sequence":"first","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"given":"Xavier","family":"Boyen","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Brisbane, Australia"}]},{"given":"Matthew","family":"McKague","sequence":"additional","affiliation":[{"name":"Queensland University of Technology, Australia, Queensland"}]}],"member":"320","published-online":{"date-parts":[[2019,1,29]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08593-7_11"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_4"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_31"},{"key":"e_1_3_2_1_6_1","volume-title":"2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 40--49","author":"Chator A.","unstructured":"A. Chator and M. Green . 2018. How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies . In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 40--49 . A. Chator and M. Green. 2018. How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies. In 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 40--49."},{"key":"e_1_3_2_1_7_1","volume-title":"A survey on security and privacy issues of bitcoin","author":"Conti Mauro","year":"2018","unstructured":"Mauro Conti , Sandeep Kumar , Chhagan Lal , and Sushmita Ruj . 2018. A survey on security and privacy issues of bitcoin . IEEE Communications Surveys & Tutorials ( 2018 ). Mauro Conti, Sandeep Kumar, Chhagan Lal, and Sushmita Ruj. 2018. A survey on security and privacy issues of bitcoin. IEEE Communications Surveys & Tutorials (2018)."},{"key":"e_1_3_2_1_8_1","volume-title":"Dash: A PrivacyCentric CryptoCurrency.","author":"Duffield Evan","year":"2014","unstructured":"Evan Duffield and Daniel Diaz . 2014 . Dash: A PrivacyCentric CryptoCurrency. Evan Duffield and Daniel Diaz. 2014. Dash: A PrivacyCentric CryptoCurrency."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3224424"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"e_1_3_2_1_11_1","volume-title":"Research and Challenges on Bitcoin Anonymity","author":"Herrera-Joancomart\u00ed Jordi","unstructured":"Jordi Herrera-Joancomart\u00ed . 2015. Research and Challenges on Bitcoin Anonymity . In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomart\u00ed, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri (Eds.). Springer International Publishing , Cham , 3--16. Jordi Herrera-Joancomart\u00ed. 2015. Research and Challenges on Bitcoin Anonymity. In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomart\u00ed, Emil Lupu, Joachim Posegga, Alessandro Aldini, Fabio Martinelli, and Neeraj Suri (Eds.). Springer International Publishing, Cham, 3--16."},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/scalingbitcoin.org\/papers\/mimblewimble.txt","author":"Jedusor Tom Elvis","year":"2017","unstructured":"Tom Elvis Jedusor . 2017. MIMBLEWIMBLE. ( 2017 ). https:\/\/scalingbitcoin.org\/papers\/mimblewimble.txt Tom Elvis Jedusor. 2017. MIMBLEWIMBLE. (2017). https:\/\/scalingbitcoin.org\/papers\/mimblewimble.txt"},{"key":"e_1_3_2_1_14_1","unstructured":"M. C. K. Khalilov and A. Levi. 2018. A Survey on Anonymity and Privacy in Bitcoin-like Digital Cash Systems. IEEE Communications Surveys Tutorials (2018) 1--1.  M. C. K. Khalilov and A. Levi. 2018. A Survey on Anonymity and Privacy in Bitcoin-like Digital Cash Systems. IEEE Communications Surveys Tutorials (2018) 1--1."},{"key":"e_1_3_2_1_15_1","volume-title":"Computer Security -- ESORICS","author":"Kumar Amrit","year":"2017","unstructured":"Amrit Kumar , Cl\u00e9ment Fischer , Shruti Tople , and Prateek Saxena . 2017. A Traceability Analysis of Monero's Blockchain . In Computer Security -- ESORICS 2017 , Simon N. Foley, Dieter Gollmann , and Einar Snekkenes (Eds.). Springer International Publishing , Cham, 153--173. Amrit Kumar, Cl\u00e9ment Fischer, Shruti Tople, and Prateek Saxena. 2017. A Traceability Analysis of Monero's Blockchain. In Computer Security -- ESORICS 2017, Simon N. Foley, Dieter Gollmann, and Einar Snekkenes (Eds.). Springer International Publishing, Cham, 153--173."},{"key":"e_1_3_2_1_16_1","unstructured":"Y. Liu X. Liu C. Tang J. Wang and L. Zhang. 2018. Unlinkable Coin Mixing Scheme For Transaction Privacy Enhancement of Bitcoin. IEEE Access (2018) 1--1.  Y. Liu X. Liu C. Tang J. Wang and L. Zhang. 2018. Unlinkable Coin Mixing Scheme For Transaction Privacy Enhancement of Bitcoin. IEEE Access (2018) 1--1."},{"key":"e_1_3_2_1_17_1","volume-title":"A survey on approaches to anonymity in bitcoin and other cryptocurrencies. Informatik 2016","author":"Maurer Felix Konstantin","year":"2016","unstructured":"Felix Konstantin Maurer . 2016. A survey on approaches to anonymity in bitcoin and other cryptocurrencies. Informatik 2016 ( 2016 ). Felix Konstantin Maurer. 2016. A survey on approaches to anonymity in bitcoin and other cryptocurrencies. Informatik 2016 (2016)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"F. K. Maurer T. Neudecker and M. Florian. 2017. Anonymous CoinJoin Transactions with Arbitrary Values. In 2017 IEEE Trustcom\/BigDataSE\/ICESS. 522--529.  F. K. Maurer T. Neudecker and M. Florian. 2017. Anonymous CoinJoin Transactions with Arbitrary Values. In 2017 IEEE Trustcom\/BigDataSE\/ICESS. 522--529.","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.280"},{"key":"e_1_3_2_1_19_1","volume-title":"Privacy-Enhancing Overlays in Bitcoin","author":"Meiklejohn Sarah","unstructured":"Sarah Meiklejohn and Claudio Orlandi . 2015. Privacy-Enhancing Overlays in Bitcoin . In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg , Berlin, Heidelberg , 127--141. Sarah Meiklejohn and Claudio Orlandi. 2015. Privacy-Enhancing Overlays in Bitcoin. In Financial Cryptography and Data Security, Michael Brenner, Nicolas Christin, Benjamin Johnson, and Kurt Rohloff (Eds.). Springer Berlin Heidelberg, Berlin, Heidelberg, 127--141."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_21_1","unstructured":"Andrew Miller Malte Moeser Kevin Lee and Arvind Narayanan. 2017. An Empirical Analysis of Linkability in the Monero Blockchain. (2017).  Andrew Miller Malte Moeser Kevin Lee and Arvind Narayanan. 2017. An Empirical Analysis of Linkability in the Monero Blockchain. (2017)."},{"key":"e_1_3_2_1_23_1","volume-title":"2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 32--41","author":"M\u00f6ser M.","unstructured":"M. M\u00f6ser and R. B\u00f6hme . 2017. Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques . In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 32--41 . M. M\u00f6ser and R. B\u00f6hme. 2017. Anonymous Alone? Measuring Bitcoin's Second-Generation Anonymization Techniques. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 32--41."},{"key":"e_1_3_2_1_24_1","volume-title":"Auditable Zerocoin. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 59--63","author":"Naganuma K.","unstructured":"K. Naganuma , M. Yoshino , H. Sato , and T. Suzuki . 2017 . Auditable Zerocoin. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 59--63 . K. Naganuma, M. Yoshino, H. Sato, and T. Suzuki. 2017. Auditable Zerocoin. In 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). 59--63."},{"key":"e_1_3_2_1_25_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). https:\/\/bitcoin.org\/bitcoin.pdf Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"e_1_3_2_1_26_1","unstructured":"Surae Noether. 2014. Review of CryptoNote white paper. (2014).  Surae Noether. 2014. Review of CryptoNote white paper. (2014)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.34"},{"key":"e_1_3_2_1_29_1","volume-title":"Monero is not that mysterious. Technical report","author":"Noether Shen","year":"2014","unstructured":"Shen Noether and Sarang Noether . 2014. Monero is not that mysterious. Technical report ( 2014 ). https:\/\/lab.getmonero.org\/pubs\/MRL-0003.pdf Shen Noether and Sarang Noether. 2014. Monero is not that mysterious. Technical report (2014). https:\/\/lab.getmonero.org\/pubs\/MRL-0003.pdf"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.3390\/fi5020237"},{"key":"e_1_3_2_1_31_1","unstructured":"Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity Unlinkability Undetectability Unobservability Pseudonymity and Identity Management. Http:\/\/dud.inf.tudresden.de\/literatur\/Anon__Terminology__v0.34.pdf. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon__Terminology__v0.34.pdf V0.34.  Andreas Pfitzmann and Marit Hansen. 2010. A terminology for talking about privacy by data minimization: Anonymity Unlinkability Undetectability Unobservability Pseudonymity and Identity Management. Http:\/\/dud.inf.tudresden.de\/literatur\/Anon__Terminology__v0.34.pdf. http:\/\/dud.inf.tu-dresden.de\/literatur\/Anon__Terminology__v0.34.pdf V0.34."},{"key":"e_1_3_2_1_32_1","unstructured":"Andrew Poelstra. 2016. Mimblewimble. (2016).  Andrew Poelstra. 2016. Mimblewimble. (2016)."},{"key":"e_1_3_2_1_33_1","volume-title":"On the linkability of Zcash transactions. ArXiv e-prints (Dec","author":"Quesnelle J.","year":"2017","unstructured":"J. Quesnelle . 2017. On the linkability of Zcash transactions. ArXiv e-prints (Dec . 2017 ). arXiv:cs.CR\/1712.01210 J. Quesnelle. 2017. On the linkability of Zcash transactions. ArXiv e-prints (Dec. 2017). arXiv:cs.CR\/1712.01210"},{"key":"e_1_3_2_1_34_1","volume-title":"An Analysis of Anonymity in the Bitcoin System","author":"Reid Fergal","unstructured":"Fergal Reid and Martin Harrigan . 2013. An Analysis of Anonymity in the Bitcoin System . Springer New York , New York, NY , 197--223. Fergal Reid and Martin Harrigan. 2013. An Analysis of Anonymity in the Bitcoin System. Springer New York, New York, NY, 197--223."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/JMLC-07-2016-0027"},{"key":"e_1_3_2_1_36_1","volume-title":"ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin","author":"Ruffing Tim","unstructured":"Tim Ruffing and Pedro Moreno-Sanchez . 2017. ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin . In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing , Cham , 133--154. Tim Ruffing and Pedro Moreno-Sanchez. 2017. ValueShuffle: Mixing Confidential Transactions for Comprehensive Transaction Privacy in Bitcoin. In Financial Cryptography and Data Security, Michael Brenner, Kurt Rohloff, Joseph Bonneau, Andrew Miller, Peter Y.A. Ryan, Vanessa Teague, Andrea Bracciali, Massimiliano Sala, Federico Pintore, and Markus Jakobsson (Eds.). Springer International Publishing, Cham, 133--154."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"e_1_3_2_1_38_1","first-page":"824","article-title":"P2P Mixing and Unlinkable Bitcoin Transactions","volume":"2016","author":"Ruffing Tim","year":"2016","unstructured":"Tim Ruffing , Pedro Moreno-Sanchez , and Aniket Kate . 2016 . P2P Mixing and Unlinkable Bitcoin Transactions . IACR Cryptology ePrint Archive 2016 (2016), 824 . Tim Ruffing, Pedro Moreno-Sanchez, and Aniket Kate. 2016. P2P Mixing and Unlinkable Bitcoin Transactions. IACR Cryptology ePrint Archive 2016 (2016), 824.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_3_2_1_40_1","unstructured":"Jan-Willem Selij. 2015. CoinShuffle anonymity in the Block chain. (2015).  Jan-Willem Selij. 2015. CoinShuffle anonymity in the Block chain. (2015)."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488502001648"},{"key":"e_1_3_2_1_42_1","unstructured":"Nicolas Van Saberhagen. 2013. Cryptonote v 2. 0. https:\/\/cryptonote.org\/whitepaper.pdf  Nicolas Van Saberhagen. 2013. Cryptonote v 2. 0. https:\/\/cryptonote.org\/whitepaper.pdf"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2787563"},{"key":"e_1_3_2_1_44_1","volume-title":"Anonymizing Bitcoin Transaction","author":"Wijaya Dimaz Ankaa","unstructured":"Dimaz Ankaa Wijaya , Joseph K. Liu , Ron Steinfeld , Shi-Feng Sun , and Xinyi Huang . 2016. Anonymizing Bitcoin Transaction . In Information Security Practice and Experience, Feng Bao, Liqun Chen, Robert H. Deng, and Guojun Wang (Eds.). Springer International Publishing , Cham , 271--283. Dimaz Ankaa Wijaya, Joseph K. Liu, Ron Steinfeld, Shi-Feng Sun, and Xinyi Huang. 2016. Anonymizing Bitcoin Transaction. In Information Security Practice and Experience, Feng Bao, Liqun Chen, Robert H. Deng, and Guojun Wang (Eds.). Springer International Publishing, Cham, 271--283."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.05.018"}],"event":{"name":"ACSW 2019: Australasian Computer Science Week 2019","location":"Sydney NSW Australia","acronym":"ACSW 2019","sponsor":["CORE - Computing Research and Education","Macquarie University-Sydney"]},"container-title":["Proceedings of the Australasian Computer Science Week Multiconference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290693","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3290688.3290693","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:17Z","timestamp":1750204397000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3290688.3290693"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,1,29]]},"references-count":42,"alternative-id":["10.1145\/3290688.3290693","10.1145\/3290688"],"URL":"https:\/\/doi.org\/10.1145\/3290688.3290693","relation":{},"subject":[],"published":{"date-parts":[[2019,1,29]]},"assertion":[{"value":"2019-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}