[Resource Topic] 2018/348: Monero Ring Attack: Recreating Zero Mixin Transaction Effect

Welcome to the resource topic for 2018/348

Monero Ring Attack: Recreating Zero Mixin Transaction Effect

Authors: Dimaz Ankaa Wijaya, Joseph Liu, Ron Steinfeld, Dongxi Liu


Monero is one of the privacy-preserving cryptocurrencies employing CryptoNote protocol. The privacy features in Monero are provided by cryptographic techniques called linkable ring signature and one-time public key. Recent studies show that the majority of Monero inputs are traceable prior to mandatory RingCT transaction. After the RingCT was implemented, the problem was mitigated. We propose a novel attack to reduce the anonymity of Monero transactions or even to fully deanonymise the inputs. The proposed protocol can be launched in RingCT scenario and enable multiple attackers to collaborate without trusting each other. The attack scheme can be planted in the existing Monero services without extra fees and without putting the users’ money at risk.

ePrint: https://eprint.iacr.org/2018/348

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .