Académique Documents
Professionnel Documents
Culture Documents
Imagine a world where every single transaction you make is broadcast to everyone
in the world – this is what a blockchain would do. Andreas Antonopoulos believes
that solving the problem of privacy is more important than that of scalability and
throughput. The opposite mentality was used when first creating the Internet and
privacy has become the most valuable asset on the Internet. Every piece of
information that you disclose on the Internet is monitored, registered, sold and even
hacked. Bitcoin can only offer partial anonymity known as pseudonymity, we still do
not have complete financial privacy. On a normal blockchain, the ledger contains
information about the sender, receiver, quantity of asset and the specific asset.
However, through the creation of privacy coins we are one step closer to the goal of
complete financial privacy. The 3 main attributes of the coins in this category are:
privacy, fungibility and decentralization. Zcash, Monero, Dash and PivX are amongst
the most popular privacy coins. Each of these privacy coins implements a different
type of cryptography to ensure the security and encryption of the data.
The prover goes into the cave and stands at the back; the verifier then goes into the
entrance and shouts a direction (A or B) for the prover to walk out. This protocol
will be repeated ‘X’ number of times, each time making the likelihood of the prover
being a malicious actor more unlikely. There are a couple scenarios that could occur:
if the prover is lying and does not know the combination to the door then there is an
extremely high probability (exponentially increasing with each trial) that the
verifier would call a direction the prover did not enter in the cave (the verifier
would see this because the verifier would not be able to walk out the correct
direction), if the prover does know the code then they will be able to exit the cave
the right direction 100% of the time.
RingCT
Before we jump into the cryptographic methods that the Monero network uses, it is
important to understand the difference between unlinkability and untraceability.
Unlinkability means that a receiving address can be public yet all the payments
made to the address can’t be linked to it (stealth addresses). The ring signatures
provide untraceability – each transaction uses multiple cryptographic signatures
that control multiple outputs to mix with the output of the sender. An observer
cannot tell which party controls which outputs, thus providing untraceability (and
plausible deniability for everyone in the ring signature).
Confidential Transactions include a cryptographic proof that the sum of the input
numbers is the same as the sum of the output numbers without having to reveal the
actual numbers, but you can still trace which address sent/received the tokens (if
CT was your only privacy method).
Stealth Addresses
Stealth addresses perform a very specific function; they prevent any public
association of a transaction’s output with a recipient’s wallet and conceal a
transaction’s actual destination address. They are based on the elliptic-curve Diffie-
Hellman cryptography. Stealth addresses allow for a person to receive payments
from multiple people and obfuscate all the other transactions except the one that
they sent.
Coinjoin
Coinjoin is an anonymization method proposed by Gregory Maxwell. The underlying
idea is “when making a payment, find someone else who wants to make a payment
and make a joint payment.” Through the use of a coinjoin protocol, it is either hard
or impossible to link inputs to outputs. Thus the user’s unlinkability is improved and
taint analysis is harder, if not impossible. Coinjoin requires parties jointly sign an
agreement to mix their coins.
DASH is the most popular coin that utilizes the coinjoin cryptography, but similar
protocols can be (and have been) implemented on Bitcoin to improve the
anonymization of the network.
Sources
https://masterthecrypto.com/privacy-coins-anonymous-cryptocurrencies/
https://monero.stackexchange.com/questions/95/what-is-ringct-and-how-does-it-
compare-to-confidential-transactions/107#107
https://masterthecrypto.com/verifying-cryptocurrency-transactions/
https://people.xiph.org/~greg/confidential_values.txt
https://bitcoinmagazine.com/articles/coinjoin-combining-bitcoin-transactions-to-
obfuscate-trails-and-increase-privacy-1465235087/
https://en.bitcoin.it/wiki/CoinJoin
https://en.wikipedia.org/wiki/CoinJoin
https://bitcoin.stackexchange.com/questions/41875/what-is-the-difference-from-
coinjoin-and-a-coinshuffle-transaction
https://www.mycryptopedia.com/everything-need-know-stealth-addresses/
https://www.investopedia.com/terms/s/stealth-address-cryptocurrency.asp
https://bitcoin.stackexchange.com/questions/20701/what-is-a-stealth-address
https://monero.stackexchange.com/questions/1500/what-is-a-stealth-address
http://www.nicolascourtois.com/bitcoin/paycoin_privacy_monero_6.pdf