Уважаемые пользователи Голос!
Сайт доступен в режиме «чтение» до сентября 2020 года. Операции с токенами Golos, Cyber можно проводить, используя альтернативные клиенты или через эксплорер Cyberway. Подробности здесь: https://golos.io/@goloscore/operacii-s-tokenami-golos-cyber-1594822432061
С уважением, команда “Голос”
GOLOS
RU
EN
UA
robertdecrypto
5 лет назад

The Veil Project Improve of Privacy-Focused Cryptocurrencies by Creating a Secure And Highly Anonymous Coin

Even though researchers have traditionally centered on the privacy consequences of this blockchain. But it appears in lower-layer vulnerabilities which originate from Bitcoin's peer reviewed Recent work has shown P2P-layer anonymity vulnerabilities that enable trades to be connected to customers' IP addresses with accuracies more than 30%. Knowing how to spot those vulnerabilities without damaging usefulness remains an open issue. The objective of work is to suggest a practical, lightweight modification to Bitcoin's media stack that provides theoretical ideology guarantees from the sorts of attacks exhibited in, along with others. We start with a summary of Bitcoin's P2P system, and clarify the reason why it empowers deanonymization strikes.

Bitcoin nodes are linked over a P2P system of TCP connections. This system is used to convey trades, both the blockchain, and control packets, and it plays an essential part in keeping the community's consistency. Each peer is recognized with its (IP address, interface ) combination. Every time a node creates a trade, it broadcasts a listing of this trade over the P2P system; seriously, trade messages don't contain the sender's IP address--just their pseudonym. Since the system isn't fully-connected, trades are relayed in accordance with outbreak flooding. This guarantees that all nodes get the trade and may add it into the blockchain. Hence, trade broadcasting permits the network to find out about them reliably and quickly.

Improvement technology from existing ones

Most work depends on two thoughts: randomized routing (e.g., onion routing, Chaumian mixes) or dining cryptographer (DC) networks. Systems that utilize DC nets are generally created for broadcast communication, which will be program of attention. But, DC nets are proven to be both inefficient and brittle. Proposed systems have enhanced these properties Significantly, but DC networks never became scalable to enjoy widespread adoption in training.

The most Important solution for this problem is That a Current proposal Named Dandelion, -the technology that adopt by Veil project- which Uses statistical obfuscation to offer anonymity against dispersed, Veil will use multiple stems, rather than one, to increase the level of IP anonymity and privacy. Inspired by BIP 156. resource-limited adversaries Dandelion propagates trades in 2 stages:

  1. An anonymity stage
  2. A spreading stage

At the ideology period, every message is passed into one, randomly-chosen neighbor within an admin chart H (this chart may be an overlay of this P2P graph G). This propagation lasts for a geometric variety of jumps with parameter q. Nevertheless, unlike related previous work (e.g., Crowds), distinct users forward their trades along precisely the exact same route from the mining chart H, which can be preferred as a directed cycle within; this little difference causes Crowds to become sub-optimal beneath the metrics tested in and here and considerably affects the consequent anonymity guarantees. At the dispersing phase, Messages are bombarded across the P2P network pumped through diffusion, as in the modern Bitcoin network. Dandelion occasionally re-randomizes the line chart, therefore the adversaries' comprehension of this chart is Supposed to be limited to their own immediate locality.

RingCT

CryptoNote and Ring Coin innovative this notion by using "ring signatures" that were initially portrayed in as a"digital signature which defines a group of potential signers such that the verifier can not tell which member really produced the signature" The idea therefore is to possess the source pubkey of a trade Concealed in a set of pubkeys all of which include exactly the identical number of coins, so no one can tell which consumer really delivered coins.
The initial CryptoNote protocol as explained in implements a small modification of the to stop double spends. Notably at a"traceable ring touch," that is a small modification of these described in is used. This sort of ring signature gets the advantage of not letting the owner of a coin to signal two ring signatures with the identical pubkey without being discovered on the blockchain. The apparent reason behind this is to stop"double-spending" that, in Bitcoin, describes investing in a coin twice.

Some coins like Dash (initially called Darkcoin), try to negate it by utilizing a larger amount of reputable mixers (in this instance masternodes) but this amount is still considerably smaller compared to users of this coin. In contrast, using a spontaneous ring touch, trades can be created by the owner of a Particular pubkey (that really is actually the spontaneous, or"ad-hoc" land ) without relying upon any reliable host, and consequently providing for smoother anonymity.

A clear means to negate the drawbacks of this CryptNote protocol, as explained in the prior section, is to employ concealed amounts for any trade. Within this article, I try to describe a modification to this Monero protocol, a PoW cryptocurrency extending the initial CryptoNote protocol, which permits the figures delivered in a trade to be concealed. This modification is based upon the Confidential Transactions that are utilized on the Components side-chain in Bitcoin, but it allows for their use in ring titles. As a result, the alteration is provided the clear title of Ring Confidential Transactions for Monero.

The Apparent benefit of this Way of Switching from Observable Amounts to obligations is the number of coins created by the mining procedure is trustlessly verifiable.
Since Monero is firmly decentralized (i.e. proof of work) it is imperative to cover miners a transaction fee for every trade. This assists with community security to reduce blockchain bloat. This why I mostly comfort with the veil that efficient using Proof of Stake, Veil is more profitable and complete than exist nowadays.

Zerocoin

Zcoin is your initial privacy coin but it isn't the final. A great deal of solitude coins have emerged through time, each attempting to claim the name of the ideal privacy coin. But not all solitude coins utilize the Zerocoin Protocol because fresh researches in the sphere of cryptography have contributed to new methods of anonymizing transactions. The programmers behind PIVX, an anonymization cryptocurrency found in 2015, are currently developing a brand new coin into dethrone PIVX. After being involved with solitude coins to the many past decades, PIVX's staff has discovered the issues with their solitude coin and other solitude coins. These programmers are currently focusing on Veil Project. The Veil Project is a brand new work which employs the Zerocoin Protocol, together with other technology, to make a solitude coin. As was mentioned previously, as soon as a zerocoin is invested, zero knowledge proofs provide confirmation for the trade without having to disclose any additional info. Basecoins and zerocoins both may be employed to invest the money in a pocket. The distinction is that zerocoin payments will probably be refundable but basecoins payments will be observable on a public string. This is an issue Particl and Monero have solved RingCT signatures as I mention above. VEIL cryptocurrency has numerous technologies in the office to make certain transactions are anonymous once spent as zerocoins and when spent as basecoins.

Website | Discord | Telegram | Github | Reddit

Author:
Bitcointalk: roberdecryptos
Basic coin Address: bv1q3swzzak24g0g6305rrmpsd40uc69yar39wpyfw

2
1.927 GOLOS
На Golos с April 2019
Комментарии (1)
Сортировать по:
Сначала старые