Browse Source

Cite Monero and CryptoNote

master
Duke Leto 4 years ago
parent
commit
422d6b0dc0
  1. 14
      sietch.bib
  2. BIN
      sietch.pdf
  3. 14
      sietch.tex

14
sietch.bib

@ -14,6 +14,20 @@
urldate={2020-05-08}
}
@misc{Monero,
author={Monero Developers},
title={Monero - Secure, Private, Untraceable},
url={https://getmonero.org},
urldate={2020-05-08}
}
@misc{CryptoNote,
author={Nicolas van Saberhagen},
title={CryptoNote v2.0},
url={https://cryptonote.org/whitepaper.pdf},
urldate={2020-05-08}
}
@misc{CBCTIME,
author={Canvel, B., Hiltgen, A., Vaudenay, S., and M. Vuagnoux},
title={Password Interception in a SSL/TLS Channel},

BIN
sietch.pdf

Binary file not shown.

14
sietch.tex

@ -472,7 +472,7 @@ will also be enumerated for the first time publicly. The ideas in this paper app
to all cryptocoins which utilize transaction graphs, which is to say just about all
known coins. Specifically, the Metaverse Metadata class of attacks is applicable
to all Bitcoin source code forks (including Dash, Verge, Zerocoin and their forks),
CryptoNote Protocol coins (Monero and friends) and MimbleWimble Protocol (Grin, Beam, etc) coins
\CryptoNote Protocol coins (Monero and friends) and MimbleWimble Protocol (Grin, Beam, etc) coins
but these will not be addressed here other than a high-level description of how to apply
these methods to those chains.
@ -501,6 +501,14 @@ If dust can attack us, dust can protect us.
\nsection{Introduction}
Sietch increases the privacy of \cite{Zcash} Protocol by making metadata-leakage
much harder to perform and adding \textbf{non-determinsim}, i.e. \cite{Hush} does not act
in the same way given the same inputs.
Coupled with Hush transitioning to enforced privacy in late 2020, we believe this
provides the highest level of privacy to users in the Zcash world and directly competes with
the excellent privacy features of \cite{Monero} and other \cite{CryptoNote} Protocol coins.
\nsection{Metadata Analysis of Zcash Protocol Blockchains: Basics}
\nsubsection{Concepts and Definitions}
@ -530,7 +538,7 @@ by block explorers nor well understood by the industry.
A \sheilded transaction has at least one \shielded address, referred to as a \zaddr.
We here concern ourselves only with \textbf{Zcash Protocol} \cite{Zcash} which allows us to specify
We here concern ourselves only with \textbf{Zcash Protocol} which allows us to specify
a coherent language and symbols to describe the new ITM \zaddr linkability attack and mitigations
against it. All techniques here could technically also be used against transparent
blockchains, but since they leak all the useful metadata already, it would serve
@ -810,7 +818,7 @@ By design, Sietch is opt-out and by default all users use it without knowing it,
Sietch makes every individual shielded transaction more complex which creates a harder-to-analyze
transaction graph, helping even users which have custom software that does not use Sietch.
The effect of almost all Hush \cite{Hush} users using Sietch all the time without knowing it, is a
The effect of almost all Hush users using Sietch all the time without knowing it, is a
"herd immunity" against de-anonymization. The price is waiting a few extra seconds
for each transaction and the Hush community feels it is quite well worth it.

Loading…
Cancel
Save