咨询与建议

看过本文的还看了

相关文献

该作者的其他文献

文献详情 >Analyzing and De-Anonymizing B... 收藏

Analyzing and De-Anonymizing Bitcoin Networks:An IP Matching Method with Clustering and Heuristics

Analyzing and De-Anonymizing Bitcoin Networks: An IP Matching Method with Clustering and Heuristics

作     者:Teng Long Jiasheng Xu Luoyi Fu Xinbing Wang Teng Long;Jiasheng Xu;Luoyi Fu;Xinbing Wang

作者机构:School of Information EngineeringChina University of GeosciencesBeijing 100083China Department of Electronic EngineeringShanghai Jiao Tong UniversityShanghai 200240China Department of Computer Science and EngineeringShanghai Jiao Tong UniversityShanghai 200240China 

出 版 物:《China Communications》 (中国通信(英文版))

年 卷 期:2022年第19卷第6期

页      面:263-278页

核心收录:

学科分类:12[管理学] 02[经济学] 0202[经济学-应用经济学] 1201[管理学-管理科学与工程(可授管理学、工学学位)] 0201[经济学-理论经济学] 020204[经济学-金融学(含∶保险学)] 020203[经济学-财政学(含∶税收学)] 020101[经济学-政治经济学] 

基  金:supported by National Natural Science Foundation of China(No.62002332) 

主  题:Bitcoin blockchain de-anonymization heuristics 

摘      要:The anonymity and de-anonymity of blockchain and Bitcoin have always been a hot topic in blockchain related *** Bitcoin was created by Nakamoto in 2009,it has,to some extent,deviated from its currency attribute as a trading medium but instead turned into an object for financial investment and *** this paper,the power-law distribution that the Bitcoin network obeys is given with mathematical proof,while traditional deanonymous methods such as clustering fail to satisfy ***,considering the profit-oriented characteristics of Bitcoin traders in such occasion,we put forward a de-anonymous heuristic approach that recognizes and analyzes the behavioral patterns of financial High-Frequency Transactions(HFT),with realtime exchange rate of Bitcoin *** heuristic approach used for de-anonymity,algorithm that deals with the adjacency matrix and transition probability matrix are also put forward,which then makes it possible to apply clustering to the IP matching *** on the heuristic approach and additional algorithm for clustering,finally we established the de-anonymous method that matches the activity information of the IP with the transaction records in *** on IP matching method are applied to the actual *** turns out that similar behavioral pattern between IP and transaction records are shown,which indicates the superiority of IP matching method.

读者评论 与其他读者分享你的观点

用户名:未登录
我的评分