Deanonymisation On Ethereum Survey Elsevier FGFS Journal
Deanonymisation On Ethereum Survey Elsevier FGFS Journal
• This insightful survey provides a novel systematic analysis of privacy preservation techniques in conjunction with
the state-of-the-art Deanonymisation methods in Blockchain and Ethereum ecosystems following novel systematic
scrutiny.
• The paper also suggests applicable and potential techniques for the countermeasure of those Deanonymisation methods,
exploring the intricate dynamics of privacy and deanonymization in the Ethereum blockchain ecosystem.
• It also examines the regulatory-compliance challenges and their implications arising from the intersection of the GDPR
and Ethereum, which is vital for ensuring the coexistence and advancement of groundbreaking blockchain capabilities
and protecting user data.
A Survey on Ethereum Pseudonymity: Techniques, Challenges, and
Future Directions
Shivani Jamwala,∗ , José Canoa , Gyu Myoung Leeb , Nguyen H. Tranc and Nguyen Truonga,∗∗
a School of Computing Science, University of Glasgow, Glasgow G12 8RZ, United Kingdom
b School of Computing Science, Liverpool John Moores University, Liverpool L3 3AF, United Kingdom
c School of Computer Science, The University of Sydney, Darlington, 2008, NSW, Australia.
become a crucial issue that dramatically limits blockchain easily detected. This characteristic benefits security but also
applications [20]. results in the problem that sensitive data cannot be removed
Each transaction on a blockchain is time-stamped, im- from the blockchain.
mutable, and linked to the previous transaction, forming Immutability means whose state cannot be altered after
a chain of blocks. Any alteration in a block impacts all its creation. Immutable transactions make it impossible for
subsequent blocks, making unauthorized changes nearly im- any entity to manipulate and falsify data stored on the
possible without detection [20]. This immutability feature network [138]. Since historical transactions can be audited
enhances transparency and trust in the system, as partici- at any point, immutability enables high data integrity.
pants can verify the integrity of transactions without relying
on third-party intermediaries [215]. 2.3. Ethereum platform
Ethereum, launched in 2015, is an open-source, blockch-
2.2.3. Non-repudiation ain-based platform that enables the development and exe-
Non-repudiation is an inherent property of blockchain cution of smart contracts [32]. The earlier cryptocurrency,
technology that ensures irreversible and undeniable proof Bitcoin, influenced the design of Ethereum, but with signif-
of participation in a transaction or event [66]. The non- icant enhancements to extend its functionalities beyond just
repudiation of Blockchain refers to (i) No one can deny a peer-to-peer electronic cash system.
transaction contents created by himself and (ii) No one can Ethereum, since its inception, has revolutionized the
repudiate the transaction time generated by himself. This blockchain landscape by introducing the concept of pro-
characteristic is vital for creating a trustless environment grammable contracts known as “smart contracts”. This plat-
where participants can confidently interact, knowing their form enables developers to create decentralized applications
actions cannot be denied later. Non-repudiation is achieved that operate on a blockchain, leading to trustless and trans-
in blockchain technology through the use of cryptographic parent interactions over the internet [49].
digital signatures [217]. In a transaction process, the sender In Ethereum, users can create accounts, transfer their
signs the transaction with their private key, which anyone native Ether (ETH) cryptocurrency, and interact with smart
can verify using the sender’s public key. This signature contracts. Smart contracts are immutable and autonomous
serves as strong proof of the origin and integrity of the scripts stored on the Ethereum blockchain that execute
transaction. Once the transaction is included in a block and predefined functions when certain conditions are met [49].
the block is appended to the blockchain, the transaction These smart contracts are pivotal in allowing DApps to
becomes immutable and undeniable [217]. be built on Ethereum, making it more than just a plat-
Due to the characteristic of non-repudiation, if a trans- form for cryptocurrency transactions. One notable fea-
action exists in the Blockchain, it must be initiated by its ture of Ethereum is the introduction of the Ethereum Vir-
signer itself. The node cannot deny that it has published tual Machine (EVM), a runtime environment that executes
the transaction. The distributed nature of blockchain tech- smart contracts. This makes Ethereum a general-purpose
nology ensures that all nodes in the network hold a copy blockchain, unlike Bitcoin, designed with a specific use case
of the blockchain, and this duplication further bolsters non- [49].
repudiation. Suppose a participant attempts to deny their In parallel to Bitcoin, Ethereum offers its users a degree
action. In that case, other participants can refer to their local of anonymity through its use of pseudonymous addresses
blockchain copies to verify the action’s occurrence [217]. linked to each account. These addresses bear no explicit
Non-repudiation, while offering an added layer of se- identifiers tying them to the users’ real-world identities,
curity and trust in blockchain transactions, raises several offering a level of privacy that is essential for many [186].
implications, particularly privacy. Once a transaction is com- Nevertheless, this feature can be a double-edged sword as it
mitted, it is permanently recorded and openly verifiable. opens avenues for potential illicit activities [211].
This feature presents challenges for privacy-concerned users
who may need to obfuscate their activities to maintain their 2.4. Smart Contracts
privacy, bringing forth anonymity and pseudonymity in the A smart contract platform is software that runs on
blockchain. a blockchain, extending its functionality and broadening
its application. Smart contracts are programs stored on a
2.2.4. Verifiability and immutability blockchain that execute when certain predetermined con-
Verifiability means that the validity of each transaction ditions are fulfilled [32]. They are used to automate the
in the blockchain can be verified and cannot be modified execution of an agreement so that all participants can
or removed from the blockchain [138]. Since all miners instantly ascertain the outcome, thus eliminating any need
confirm the blocks in which transactions are recorded via for an intermediary or wasting time. Workflow automation
the consensus mechanism, invalid transactions will not be is possible, triggering the subsequent action when conditions
recorded in the blockchain. Any data modification in the are met [32].
blockchain will be denied unless the adversary compromises Smart contracts are defined in many ways. Szabo first
the whole system. Also, blocks are organized in a chain using proposed that ’Smart contracts are a computable transaction
the hash function, which makes any modification to the data protocol to execute contract terms’ [177]. Ethereum’s smart
contract is a digital asset control program based on the However, although the security embedded, blockchain is
blockchain [22]. In a narrow sense, a smart contract is a prone to attacks such as double spending, wallet-based at-
program code involving business logic, algorithms, complex tacks (i.e., client-side security), network-based attacks such
relationships among people, legal agreements, and networks. as DDoS, Sybil, and eclipse and mining-based attacks such
A smart contract is a computer protocol that can self-execute as 51% [208], block withholding and bribery [86], [54],
and self-verify after deployment [177]. [172]. As a prominent platform for decentralized applica-
The operation of smart contracts involves three proce- tions, Ethereum presents unique security challenges stem-
dures: contract creation, contract publishing, and contract ming from its open, decentralized, and complex nature.
execution [197]. During contract creation, the contract par- These challenges can broadly be categorised into protocol-
ticipants will negotiate to clarify parties’ rights and obliga- level challenges, smart contract vulnerabilities, and network-
tions, determine the standard contract text, and then program level threats as follows:
them into a smart contract program. The contract program
generally requires auditing for secure execution. In contract • Protocol-Level Challenges: Like all blockchain systems,
publishing, the contract creator signs and requests a miner to Ethereum is subject to attacks that attempt to manipulate
record the signed contract into the blockchain. The contract the consensus protocol. Examples include 51% attacks,
execution is based on an event-triggered mechanism on the where a malicious entity with control over the major-
blockchain, which encompasses transaction processing and ity of the network’s hashing power can manipulate the
preservation mechanisms and is a complete state machine. blockchain, and eclipse attacks, where a node is isolated
Specifically, the external nodes can interact with a smart from the rest of the network and fed false information [65].
contract program by sending transactions. The transactions
• Smart Contract Vulnerabilities: Ethereum’s distinctive
can change the status of the contract. All miners monitor the
feature, the smart contract, introduces unique security
status, and once they detect its change, they execute the smart
issues. These programmable contracts, while powerful,
contract based on its design.
have been a common target for attackers due to vulner-
2.5. Security and Privacy in Ethereum abilities in their code. Notable attacks exploiting smart
contract vulnerabilities include the DAO and Parity wallet
This section delves into the security and privacy con-
incidents. Detecting and eliminating such vulnerabilities
cerns in Ethereum platforms. While the inherent structure of
before contract deployment remains challenging due to
blockchain offers significant security measures, Ethereum,
the Turing completeness of Ethereum’s programming lan-
with its unique characteristics, poses unique challenges in
guage, Solidity, and the immutability of deployed con-
ensuring user data protection and malicious attempts.
tracts [115].
2.5.1. Security • Network-Level Threats: Ethereum is also subject to com-
Security in the blockchain is based on the following mon network-level attacks as part of the Internet. These
factors. First, blockchain technology relies on a decentral- include DDoS attacks, Sybil attacks, and routing attacks.
ized ledger to keep track of all financial transactions. The Effective defence mechanisms are needed to maintain the
“master” ledger would be a point of vulnerability [12]. If robustness and reliability of the Ethereum network [13].
the ledger was compromised, then it could lead to a system
breakdown. Secondly, the ledger exists as a long chain of 2.5.2. Privacy
cryptographically encrypted sequential blocks, reducing the Data privacy of blockchain refers to the property that
risk of data tampering. Blockchain consists of hundreds to blockchain can firstly provide Anonymity where it is the
thousands of unique nodes. Every node has a complete copy state of being anonymous and unidentified [86], [92], [69]
of the digital ledger. The nodes can work independently for and secondly ensure Unlinkbaility where users’ transactions
the verification of a transaction. If the nodes do not agree, related to themselves cannot be linked [169], [162], [69].
then the transaction is cancelled. Despite its innovative applications and significant potential,
Thirdly, The cryptographic keys and two key systems Ethereum grapples with inherent privacy challenges. These
used in blockchain exchanges are very long, complex and issues are related to the system’s pseudonymous nature,
difficult to decipher unless one has the authorisation to view transparency of transactions, and the interaction of smart
the keys. The public key and private key in public-key contracts as follows:
cryptography. Both of these keys are generated using the
Elliptic Curve cryptography method. Firstly, it creates the • Pseudonymity and Linkability: Ethereum accounts are
private key, and then a public key from the private key is pseudonymous, and transactions are publicly visible. This
created using the Elliptic Curve Algorithm (ECDSA) [99]. leaves room for the potential deanonymization of user
Therefore, private and public keys are cryptographically accounts through data analysis. An attacker can link ad-
and mathematically linked. Therefore security in blockchain dresses to identify a unique user or organization and then
ensures confidentiality , availability ,integrity and ledger analyze their financial behaviour. Although this trans-
consistency parency is necessary for ensuring the system’s integrity,
it presents significant privacy concerns [33].
3. Privacy Preservation Techniques in data, preserving the privacy of the underlying information
Blockchain Platforms [205]. The Zether protocol brought Differential Privacy to
Ethereum, providing statistical privacy by obscuring indi-
Since the introduction of Blockchain, various privacy- vidual data within aggregated data sets [31]. Collectively,
preservation techniques have continuously been adopted and these advancements have been seen to contribute to the ro-
integrated to enhance the confidentiality and anonymity of bust framework of privacy within the Ethereum ecosystem.
users’ identities and transaction data on the networks. In These privacy-preservation techniques are briefly summa-
this section, we delve into the significant milestones in rized in Table 2 with their pros and cons.
the journey of the privacy evolution in blockchain sys-
tems, particularly Ethereum, from the implementation of 3.1. Mixing Services
Ring Signatures in 2015 to more advancements, such as Mixing services are essential tools in the blockchain
Mixing Services and Differential Privacy. In the journey ecosystem for enhancing user privacy, particularly in ad-
towards enhancing privacy on the Ethereum blockchain, as dressing the non-anonymous nature of cryptocurrencies
seen in Figure 2, several implementations of these privacy- such as Bitcoin. Despite employing pseudonymous ad-
preserving techniques stand out. To name a few, introducing dresses, the public nature of Bitcoin transactions allows for
a unique ring signature scheme using secp256k1 elliptic the analysis and correlation of a user’s transactions. Mixing
curve that provides anonymity for signers within a group services, such as Tornado Cash on the Ethereum platform
[129]and integrating ZKPs to bolster scalability and confi- [147], obfuscate transaction trails to impede address linkage.
dentiality in transactions via zk-SNARKs [131]. Ethereum’s However, they do not protect against coin theft [38]. Notable
privacy mechanisms further expanded with Tornado Cash, a mixing services include MixCoin [29], CoinJoin [52], and
decentralized, non-custodial mixing service that uses smart Private CoinJoin as implemented in DASH [56]. These
contracts and zero-knowledge proofs to enhance transac- services play a pivotal role in preserving user anonymity in
tion privacy [147]. Tornado Cash breaks the on-chain link the blockchain. Several notable mixing services have been
between sender and receiver addresses, providing a higher proposed as follows:
degree of anonymity and privacy for Ethereum transactions
[147]. 1. MixCoin: Introduced by Bonneau [29], MixCoin aims
Additionally, SMPC is used in REN Protocol, an open to provide anonymous transactions for Bitcoin and sim-
protocol built to provide interoperability and liquidity be- ilar cryptocurrencies. It counters passive adversaries by
tween different blockchain platforms [179]. Attribute-based broadening the anonymity set, facilitating simultaneous
Encryption (ABE) technique in Ethereum is the integration coin mixing by all users. Against active adversaries, Mix-
of ABE with smart contracts for fine-grained access control, Coin offers anonymity akin to traditional communication
where data access can be precisely controlled according to a mixes. Significantly, MixCoin incorporates an account-
set of attributes, such as user roles, permissions, or other cri- ability mechanism, deterring coin theft by aligning user
teria, without revealing the identities of the users involved, incentives and fostering rational usage.
particularly relevant for use cases where sensitive data is
involved, such as in healthcare [98]. Lastly, the introduction 2. CoinJoin: Conceived in 2013, CoinJoin offers an alter-
of HE techniques allowed for computations on encrypted native for anonymizing Bitcoin transactions [52, 124].
Table 2
Comparative Analysis of Privacy-Preservation Techniques in Blockchain Platforms.
Technique Pros Cons
Mixing Services [147, 29, 52, Efficiently obscures transaction trails, making Enhances privacy but do not necessarily in-
124, 56, 9, 24, 168, 199, 201] linking addresses and tracing transactions crease security against theft or loss of cryp-
back to users difficult. tocurrency.
Ring Signature [15, 76, 174, Ensures anonymity of the signer within Do not conceal the transaction amounts or
174, 118, 3, 209, 185, 47, 140, a group, thereby effectively shielding the the recipient’s address. The presence of com-
43] sender’s identity in a transaction. putational overhead associated with larger
ring sizes can affect transaction processing
times.
ABE [202, 198, 98, 28, 37, Supports both confidentiality and access con- Limited adoption of certain DApps is at-
123, 132, 87, 153, 95, 203, trol and has the potential for decentralized tributed mainly to their complexity and the
206, 143] multi-authority systems. challenges associated with implementation.
SMPC [116, 128, 213, 216, Enables confidential computations involving Computationally complex and can lead to in-
17, 5, 17, 220] multiple entities while ensuring the privacy creased network latency, affecting blockchain
of data segments among participants. networks’ efficiency.
ZKP [146, 30, 83, 146, 149, Allows for validating blockchain transactions Introduces significant computational over-
85, 26, 93, 131, 144] in DApps without revealing sensitive data and head, especially in non-optimized implemen-
offers strong cryptographic privacy guaran- tations.
tees.
Differential Privacy [8, 59, 60, Offers strong mathematical assurances May lead to diminished data utility, impact-
1, 105, 78, 125, 90, 73, 114, against data breaches, crucial in protecting ing the effectiveness of data-driven deci-
97, 96, 145] individual privacy during computations sions in blockchain applications. Privacy level
pertinent in DApps for processing or sharing depends on parameter configuration, which
sensitive data. requires careful balancing to achieve desired
privacy without significantly compromising
data usefulness.
HE [79, 53, 133, 189, 113, Enables computation on encrypted data while Complex implementation and computation-
189, 167] preserving privacy; ideal for DApps which ally intensive which results in slower perfor-
manage and process sensitive data either on- mance, less scalable, and impracticality for
chain or off-chain. smart contract operations.
Rooted in the concept of joint payments, CoinJoin allows Mixing services represent a pivotal advancement in pre-
a user to collaborate with another user to execute a serving user anonymity within the blockchain realm, espe-
collective payment within a single transaction. Such joint cially given the transparency challenges posed by cryptocur-
payments considerably diminish the likelihood of tracing rencies like Bitcoin. While they mask transactional histories,
input-output links or discerning a specific user’s mon- inherent vulnerabilities remain, particularly regarding coin
etary flow direction. Early mixing services employing security. As blockchain technology progresses, a deep un-
this approach, like SharedCoin [9], relied on centralized derstanding of these services’ pros and cons becomes crucial
servers. However, such centralization, while simplifying for developers and users [168].
the process, introduced trust issues. Users had to trust
these service operators to safeguard the bitcoins and 3.2. Ring signature
not retain transaction logs, which would undermine the Ring signatures, introduced by Rivest, Shamir, and Tau-
privacy efforts. man [156], represent a sophisticated approach to digital
signatures that allow a member of a group to sign messages
3. Private CoinJoin: DASH has implemented an advanced anonymously. An example of ring signatures in practical
version of CoinJoin [56] providing privacy features throu- use is in anonymous voting systems [15], where they ensure
gh its 𝑃 𝑟𝑖𝑣𝑎𝑡𝑒𝑆𝑒𝑛𝑑 function [56, 24, 52]. 𝑃 𝑟𝑖𝑣𝑎𝑡𝑒𝑆𝑒𝑛𝑑 voter anonymity while maintaining vote integrity.As Figure
is an optional feature in DASH that blends multiple 3 illustrates, the ring consists of several members, any of
transactions, making it substantially challenging to deter- whom could be the actual signer, depicted by the figures
mine the source, destination, and amounts in individual around the “RING”. This ensures that while the signature
transactions. This CoinJoin-inspired method allows users validates the message as originating from the group, the
to utilise the increased privacy feature without making it actual author’s identity remains concealed, depicted by the
mandatory for all DASH transactions [52]. detached figure holding the “Signature Value”.
Integrating SMPC in blockchain frameworks epitomizes As depicted in Figure 4, the process involves two parties:
an evolutionary step towards enhancing user privacy [213, a Prover and a Verifier. The Prover sends a confidential
216, 17]. Bitcoin, for instance, has harnessed variations of information, generates a proof of their knowledge using
multi-party computation for the augmentation of transac- func(makeProof), and sends this proof to the Verifier. The
tional privacy, a significant illustration being its deployment Verifier then uses func(checkProof) to verify the proof’s
in the generation of threshold signatures [5]. Central to this validity and concludes the process by obtaining the results.
privacy-centric methodology is the imperative for the ma- This succinctly illustrates the ZKP methodology where the
jority of participants to maintain probity, thereby ensuring Prover can affirm the possession of confidential information
the sanctity and security of the collective computations. without revealing any information itself, thus preserving
Nonetheless, it is pertinent to acknowledge the computa- privacy.
tional intricacies introduced by SMPC, especially in terms
of network latency - attributed to the inherent inter-node data
exchanges requisite for MPC computation [17].
In the decentralized computational landscape, the Enigma
platform, unveiled in 2015, is a paragon of SMPC implemen-
tation [220]. Enigma harnesses a verifiable secret-sharing
scheme, fortifying its computational model’s integrity and
privacy. Further, instead of engendering a nascent blockchain,
Enigma employs an auxiliary blockchain as an immutable
event ledger, concurrently facilitating peer-to-peer network Figure 4: Privacy Preservation techniques based on Zero
governance, which addresses identity management and ac- Knowledge Proof where a formal proof performed by a Verifier
cess control nuances [220]. helps verify program’s execution from a Prover.
rigorous guarantee: an adversary’s knowledge about an in- user information, especially during federated learning pro-
dividual remains invariant, whether or not the individual’s cesses or while chronicling crowd-sourced endeavours [90,
data is part of the computational dataset. Given two adjacent 73, 97, 96].
databases, 𝐷1 and 𝐷2, that differ by precisely one record, A notable stride in this direction was the introduction of a
the probabilities of obtaining any specific output from these blockchain-centric data-sharing framework [73]. This novel
databases should be nearly identical [57, 60]. Consequently, approach empowers data proprietors with the capability to
an adversary remains indecisive about the database of ori- oversee anonymization procedures, thereby thwarting poten-
gin for a particular output, which implies that, even when tial data mining-centric threats targeted at blocking informa-
equipped with supplementary data, the adversary needs to tion. Using local differential privacy (LDP) in conjunction
gain additional insights about the individual in question. with blockchain has also been an approach - LDP is a
The concept is exemplified in Figure 5, which outlines privacy-preserving technique that ensures individual privacy
the fundamental operation of differential privacy. The two while allowing statistical data analysis [59]. By combining
databases, 𝐷1 and 𝐷2, differ by only one record. When blockchain and LDP, a secure genomic data management
each is subjected to an equivalent analysis or computation, system was built that addresses privacy concerns associated
the resulting answers, 𝐴 for 𝐷1 and 𝐵 for 𝐷2, should be with sharing gene data using LDP.[145].
nearly indistinguishable. This ensures that the participation
of an individual’s record in either database does not provide 3.7. Homomorphic Encryption
significant information that could lead to their identification. Homomorphic Encryption (HE), a significant advance-
ment in cryptographic techniques, facilitates operations di-
rectly on encrypted data, obviating the need for decryption
prior to computation [79, 53]. For example, in blockchain-
based healthcare services, HE enables data analytics on pa-
tient records without exposing individual data [189]. There
are primarily two forms of HE: Fully HE (FHE) and Partially
HE (PHE). FHE allows for addition and multiplication oper-
ations on encrypted data, whereas PHE restricts operations
to addition or multiplication [133]. This capability paves the
way for more secure data processing and holds particular
promise for blockchain applications.
These FHE and PHE encryption schemes have been pro-
gressively integrated into blockchain frameworks, fortifying
Figure 5: Differential Privacy safeguards blockchain users’ data data privacy even during computational phases. Such imple-
published onchain with nearly identical outputs when being mentations become indispensable for sectors handling crit-
processed. ical and sensitive data. Within the blockchain domain, exe-
cuting private smart contracts or undertaking computations
The efficiency of differential privacy is parameterized by on confidential data without compromising data integrity
the privacy constant, 𝜀, and the cumulative queries executed is invaluable [113]. Also, in blockchain-based healthcare
over a duration [57, 60, 58]. The smaller the value of 𝜀, services, where patient records demand utmost confidential-
the stronger the privacy guarantee; however, it often comes ity, HE allows data analytics and research without exposing
at a utility cost. Notable applications of differential privacy individual patient data [189, 167].
include its integration in systems like the U.S. Census Bu- Implementing HE in blockchains poses several chal-
reau’s OnTheMap [1], Google’s RAPPOR, Apple, and Mi- lenges due to blockchain systems’ specific needs and proper-
crosoft [105], showcasing its practical usage so far. Moving ties. The computational demands of operating on encrypted
from a theoretical approach to real-world implementation data, mainly using FHE, can hinder the blockchain’s per-
presents challenges, including requiring a skilled person formance and scalability. Designing effective HE schemes
and an appropriate computing development environment and should balance robust security and practical computation
determining the most favourable 𝜀 parameters [78]. with processes to ensure accurate decryption. Integrating en-
In recent years, the blockchain landscape has identified cryption into established blockchain architectures demands
the potential of incorporating differential privacy mecha- attention to compatibility and maintaining the decentraliza-
nisms [125, 90, 73]. For instance, research has been con- tion structure. Beyond technical aspects, there are regulatory
ducted on using differential privacy and blockchain together and legal hurdles since privacy norms differ globally, em-
with Bitcoin [114]. These studies [114] aim to find ways of phasising adherence to global regulations. The complex na-
preserving privacy in the overall structure of the blockchain ture of HE requires enhanced educational awareness and ex-
and to evaluate the effectiveness of differential privacy in im- pertise among blockchain developers and researchers [167].
proving anonymity. Such integrations are paramount when
adversaries exploit blockchain records to deduce sensitive
4. Deanonymization Techniques on Ethereum cryptocurrencies (i.e., tokens) are linked to specific outputs,
and users own private keys to claim ownership of these
With its open ledger, Ethereum offers unparalleled trans-
outputs. The UTXO model is expected to provide anonymity,
parency, where every transaction is auditable. However, this as the unused transaction information is confidential; it also
transparency does not equate to a complete loss of pri- promotes privacy due to its decentralized transaction linkage
vacy. Users can interact with the Ethereum network through and is amenable to parallelism in transaction validation.
pseudonymous addresses, ensuring transactions are visible
In comparison, the account-based model implemented
while the real-world identity of the actors remains obscured.
by Ethereum is similar to a conventional bank account
Despite employing a number of privacy-preserving tech-
system where each account has an explicit balance. Trans-
niques on Ethereum-based platforms, there is still a possi- actions in this model adjust account balances, leading to
bility that sensitive information about users, including their a direct association between transactions and account ad-
real-world identities, can be inferred and revealed. Ethereum dresses. The design facilitates intricate smart contract func-
has been at the center of several deanonymization attacks,
tionalities and provides a structure that resonates with tra-
ranging from simple address clustering to sophisticated traf-
ditional financial frameworks. In the account-based model,
fic analysis techniques. Ethereum uses accounts as explicit entities. There are two
types of accounts in Ethereum: user accounts, also known
4.1. Account-based vs UTXO Transaction Models
as Externally Owned Accounts (EOA), and smart contracts.
Ethereum employs an account-based transaction model,
Transactions in Ethereum are changes in the account bal-
distinguishing itself from the UTXO model of Bitcoin. As
ance. The account-based model allows for complex state
illustrated in Figure 6, instead of dealing with unspent trans-
transitions through smart contracts written in a Turing-
action outputs, Ethereum maintains a global state of ac-
complete scripting language.
counts where each account possesses an associated balance,
Ethereum’s account-based model and UTXO have dif-
and in the case of smart contract accounts, related code
ferent approaches to handling transactions and account bal-
and internal storage [32]. Transactions in this paradigm
ances. The account-based model in Ethereum allows for
directly alter this global state by transferring Ether between
complex state transitions through smart contracts. In con-
accounts or invoking operations in smart contract accounts,
trast, the UTXO model provides anonymity and can run in
as depicted in the right side of Figure 6. This framework
parallel. Both models have advantages and disadvantages,
facilitates intricate interactions with smart contracts and the
and the choice between them depends on the specific require-
subsequent development of DApps.
ments of the blockchain platform [121].
Table 3
Comparison of Deanonymization Techniques: Ethereum vs. Bitcoin.
Technique Bitcoin Ethereum
Transaction Graph Analysis TGA relies on the simpler UTXO model. It TGA is more complex due to the layered
[35, 127] primarily uses the common input ownership interactions involving smart contracts and
heuristic, suggesting that all transaction in- internal transactions. This complexity allows
puts likely belong to one entity. The model for a deeper, though more challenging, anal-
is straightforward and capable of capturing ysis of transaction flows and user behaviours.
complex transaction patterns unique to Bit-
coin.
Address Reuse & Cluster Bitcoin’s vulnerability to address reuse makes Ethereum’s norm of address reuse is similar
Analysis [107, 89] it more amenable to cluster analysis, as to Bitcoin, but the presence of smart con-
addresses can be grouped to identify users tracts acting as mixers introduces additional
potentially. The transparency of its transac- complexity. It requires more sophisticated
tions simplifies this process. methods to differentiate between user and
contract addresses.
Off-Chain Data Cross- In Bitcoin, linking transactions with off- Ethereum’s application of off-chain data
Referencing [81, 107] chain data like KYC(Know Your Customer) cross-referencing is similar to Bitcoin’s. How-
information and social media activity can ever, the involvement of smart contracts and
effectively deanonymize users by associating diverse transaction types adds layers of com-
on-chain activities with real-world identities. plexity in drawing direct associations between
on-chain activities and real-world identities.
Timing Analysis [136, 18] Bitcoin’s timing analysis is effective for pro- Ethereum’s transaction timing offers insights
filing users, as transaction patterns, like fre- into user habits and locations, but the com-
quency and regularity, can be more easily plex nature of transactions, including inter-
correlated with specific behaviours due to the actions with smart contracts, adds additional
regularity and simplicity of Bitcoin transac- layers to the analysis.
tions.
Network Traffic Analysis [42, In Bitcoin, network traffic analysis helps iden- In Ethereum, it is used to study the network’s
24] tify transaction origins and pinpoint node lo- propagation patterns and node distribution.
cations, thus potentially revealing user identi- The diverse node distribution in Ethereum
ties. The analysis benefits from Bitcoin’s less complicates the analysis but helps identify
complex transaction model. security threats and inefficiencies.
Machine Learning [18, 182, Machine learning techniques such as entity Machine learning can analyse transac-
41, 159, 62] identification and graph representation learn- tion data and identify patterns that can
ing are utilized for deanonymization, which deanonymize users by pairing Ethereum ac-
analyzes transaction networks and money counts of the same user and identifying
flows, focusing on identifying and categoriz- sensitive activities linked to public identities.
ing entities and detecting illegal activities.
as the “common input ownership” heuristic [4, 46]. In [173, 187, 102] as shown in 7. A common practice among
contrast, Ethereum’s account-based model and the com- cryptocurrency users is to use a fresh address for every
plexity introduced by smart contracts require a different transaction to protect their privacy. However, when users
approach to deanonymization, focusing more on contract try to consolidate funds from multiple addresses or spend
interactions, internal transactions, and gas usage patterns more than they have in a single address, they unintention-
[18, 31]. Thus, while both blockchains share the broad goal ally link these addresses, allowing for clustering [39, 187].
of pseudonymity, the nuances in their designs have spawned This inadvertent linkage creates identifiable patterns, which,
diverse challenges and methods in forensic analysis and when analysed, can help deanonymize users or at least link
deanonymization [19]. multiple addresses to a single entity [157, 35, 187].
Another aspect to consider is the “change address”. In
4.3. Address Clustering Technique scenarios where the output value of a transaction is less than
Address clustering is one of the most salient techniques its input, a change address is often returned the remaining
for Blockchain, including Ethereum, deanonymization [139, balance. In comparison, Ethereum’s account-based model
63, 39]. The key idea driving this is that addresses used does not function precisely like Bitcoin’s UTXO model, the
as inputs in a single transaction are likely controlled by concepts of fund consolidation and distribution across ad-
the same entity, thereby allowing for the grouping of ad- dresses still apply and can be exploited for clustering. While
dresses into clusters representing individual users or entities address clustering can provide valuable insights, it is crucial
to approach its results with caution. False positives, where millions of Ethereum transactions to identify blacklisted ad-
unrelated addresses are incorrectly linked, can occur. This dresses and potential security threats within seconds [110].
mandates using supplemental information or techniques to
validate the associations derived from clustering.
In the context of Ethereum, tools like Tornado Cash 4.5. Transaction Fingerprint and Timing Analysis
have emerged to enhance transactional privacy [147, 109]. Transaction fingerprint is a specialised technique used
Tornado Cash, a non-custodial coin mixer on Ethereum, predominantly in blockchain analytics, focusing on some
is designed to protect the privacy of addresses [147, 109]. unique attributes of transactions, including the temporal
However, certain transaction behaviours within its mixing attributes such as Hour of Day, Time of Day, Time of Hour,
mechanism can lead to potential privacy risks. Specifically, and Random time-interval so-called Timing Analysis [4,
malicious attackers can link multiple addresses of the same 18]. Generally, by analyzing the timestamps of transactions
users based on transaction data. This highlights the chal- within a blockchain, timing analysis endeavours to identify
lenges and nuances of maintaining privacy even when us- patterns, correlate activities, and potentially deduce the iden-
ing additional privacy-preservation techniques designed to tities or behaviours of participants [136]. The foundational
enhance it [178]. theory of the timing analysis in blockchain revolves around
the observation that while addresses may be pseudony-
4.4. Transaction Graph Analysis mous, their activities, marked by timestamps, are transparent
Transaction Graph Analysis (TGA) leverages graph the- [4, 18]. This transparency means that by merely analyzing
ory to map out the intricate web of blockchain transac- the frequency, regularity, or timing of transactions from a
tions. Nodes correspond to individual addresses, and di- specific address, it might be possible to glean information
rected edges trace the movement of currency, revealing about the user or entity behind it. For instance, patterns
transaction volumes and patterns [107]. For instance, TGA that emerge, such as transactions consistently occurring at
is used to depict a typical daily transaction graph where specific times of the day, can provide hints about the user’s
nodes, indicated by PageRank metrics, represent critical timezone or habits [18].
actors within the blockchain as illustrated in Figure 8. These Other transaction fingerprints can also be Coin-Flow
nodes significantly influence the flow of cryptocurrency due and Input/Output balance [4] so that when combined with
to their high transaction volumes. This method is integral the temporal attributes, it might increase the probability to
to detecting typical and anomalous behaviour within the deanonymize individual users. For instance, Androulaki et
network, which is essential for security analysis and market al. have based on the transaction fingerprints of Bitcoin
research [11, 127]. transactions in a university campus to successfully identify
TGA has become a pivotal tool in privacy research, 40% user profiles, even when the users generate new ad-
uncovering the blockchain’s pseudonymity limits and iden- dresses for every transaction. This technique can be imple-
tifying traceable patterns that could lead back to real-world mented for Ethereum and Bitcoin transactions, regardless
entities [4, 35, 72, 158]. It faces challenges from evolving of their transaction models (i.e., account-based and UTXO)
blockchain features, like smart contracts, and obfuscation [136, 18].
methods such as tumblers [74, 42, 103]. In addressing se- A notable application of the transaction fingerprint tech-
curity concerns, graph analysis has revealed the identities nique is the study of user behaviours concerning exchange
behind Ethereum attacks by dissecting transaction data asso- platforms [181]. For example, when a user interacts with a
ciated with various security breaches [35, 42, 119, 210, 100]. decentralized exchange, there is often a discernible delay
Advances in TGA have enabled the rapid analysis of exten- between when funds are sent to an exchange address and
sive data, such as in the work of researchers who analyzed when they are withdrawn or traded. By closely examining
these time deltas and cross-referencing them with off-chain blockchain analysis. By analyzing transaction-related textual
events like exchange downtimes or high trading volumes, data and public forum discussions, NLP techniques help
researchers can get insights into user strategies, preferences, correlate on-chain activities with real-world identities [159],
or even identities in some cases [14, 181]. which could add another dimension to deanonymization
Despite its usefulness, this analysis comes with certain methodologies. Predictive analytics using historical data
limitations. The increasing adoption of privacy-enhancing could forecast future transaction patterns and behaviours
technologies and best practices, like CoinJoin or mixers, in blockchain, identifying unusual or user-specific patterns.
can obfuscate transaction patterns, making pure timing- These insights are crucial to uncovering the hidden aspects
based analysis less effective. Furthermore, as blockchains of pseudonymity in blockchain, offering a deeper under-
grow and transaction volumes swell, the sheer number of standing of user behavior that necessitates further study
transactions can make it challenging to definitively correlate [41, 18, 159].
events solely based on timings [155]. This section has elucidated various deanonymization
techniques, each with a unique facet of potential vulnerabili-
4.6. Network-Level Analysis ties within the Ethereum network. From address clustering’s
Blockchain operations depend on a peer-to-peer net- propensity to link multiple addresses to transaction graph
work, making understanding this layer crucial for improv- analysis’s power to reveal intricate transactional relation-
ing system efficiency and examining vulnerabilities. Since ships to the subtle cues offered by timing analysis and the
blockchain interactions leave traces at the network layer, holistic insights of network-level examinations, each method
their study can reveal insights into on-chain pseudonymity offers a glimpse into the hidden intricacies of user interac-
[92]. The network-level analysis investigates interactions, tions. However, these techniques are not without challenges,
data flows, and traffic in blockchain networks, seeking in- demanding continuous refinement in light of the evolving
formation about nodes, transactions, and user behaviour blockchain ecosystem.
[25, 23]. Central to this analysis is traffic pattern examination
[24]. When a transaction is broadcast, it initially reaches
a few nodes before spreading network-wide. Identifying a 5. Countermeasures for Deanonymization on
transaction’s origin or early receivers helps pinpoint the Ethereum platforms: the Road Ahead
initiator. Analyzing block propagation can hint at miners’ Although revolutionary for its decentralized and im-
locations or identities. mutable characteristics, blockchain technology confronts
This approach helps identify Sybil attacks, where at- significant privacy preservation challenges. The public na-
tackers create many nodes to disrupt traffic [193]. Recent ture of permissionless blockchain ensures transparency but
research has shed light on a significant privacy concern: the may also inadvertently expose some sensitive information.
exposure of Bitcoin users to vulnerabilities through Tor’s Ethereum is not an exception, even though it is renowned
hidden services [2]. Tracing a Bitcoin transaction back to for its pseudonymous nature, as the platform maintains
its origin is feasible by scrutinising publicly available data. public transactions without directly revealing real-world
Linking a previous transaction to a specific Bitcoin address identities—the trade-off between its pseudonymous nature
can reveal the user’s identity. This revelation highlights and the risk of exposing sensitive transactional information.
a critical intersection between blockchain technology and Privacy preservation in permissionless blockchain systems
user privacy, underlining the need for enhanced security like Ethereum is a pivotal yet intricate endeavour, and
measures in blockchain networks to protect user anonymity achieving the ideal balance between transparency, security,
[2]. and privacy still presents a multifaceted set of challenges.
In this section, we delve into the complex landscape of pri-
4.7. Machine Learning-based Analysis
vacy preservation in permissionless blockchain systems like
Machine learning has revolutionized blockchain analysis
Ethereum, exploring the intricate challenges and potential
by enabling the identification of complex patterns within
solutions.
transaction data. These algorithms analyze large datasets to
uncover transaction frequencies, amounts, timing, and in- 5.1. Openness versus Privacy: a Long-standing
teractions between addresses, aiding in profiling blockchain
Challenge
users and potentially linking pseudonymous addresses to
Ethereum, often complimented for its transparency and
real-world identities [18]. This capability extends to iden-
decentralized nature, inherently poses significant challenges
tifying control over multiple addresses by single entities,
when ensuring user privacy. This subsection discusses the
which is crucial for deanonymization efforts. Complement-
inherent conflict between Ethereum’s design priorities and
ing this, graph databases provide a powerful means to vi-
privacy concerns. The system design and techniques imple-
sualize and analyze the interconnectedness of transactions
mented in the Ethereum blockchain prioritise transparency
and addresses, unveiling fund movement and interaction
over anonymity. This intrinsic design ensures trustworthi-
patterns that are key to understanding blockchain dynamics
ness among decentralized nodes, as every transaction is ver-
[75, 18, 41].
ifiable by any participant. However, the flip side to openness
In parallel, Natural Language Processing (NLP) and
is that all transaction details become publicly available. Even
predictive analytics contribute significantly to the depth of
Figure 9: Forthcoming solutions for enhancing privacy on the Ethereum blockchain, encompassing mixers, P2P security, Layer-2
scaling, and educational initiatives.
technology significantly enhances anonymity and exposes integration facilitates the aggregation of hundreds of trans-
distinct packet characteristics that may compromise privacy actions into one, significantly enhancing scalability and pri-
[92]. vacy on the Ethereum blockchain [117]. One of the notable
Recent advancements in P2P protocols demonstrate Ethereum’s zk-SNARKs integration methods, Ethereum’s
the potential to obfuscate the origin and destination of Istanbul upgrade, has brought notable changes in gas costs,
blockchain transactions, thereby strengthening anonymity allowing for zk-SNARKs operations to be more affordable
[148]. These advancements include onion routing [40, 104] and hence paving the way for more private transactions on
and cryptographic shuffling [111], instrumental in con- Ethereum [131].
cealing user 𝐼𝑃 addresses and transaction details from Another type of Rollups is Optimistic Rollups tech-
network observers. Such techniques are imperative in an nique, which posts the transaction data to the main-chain
era where blockchain forensic tools are increasingly adept but executes them on the Layer-2 network [7]. Unlike zk-
at deanonymizing P2P ledger activities. Rollups, this Optimistic Rollups technique does not use
The advocacy for anonymous communication channels, ZKP-variants; instead, it assumes transactions are valid by
particularly the Tor network, emphasizes the necessity of default and only runs computations in case of a challenge us-
access-related privacy within decentralized architectures. ing its dispute resolution mechanism [7]. To do so, optimistic
The scholarly consensus points towards the need for systems rollups implement a fraud-proving scheme to detect incor-
that enable users to conduct and retrieve transactions without rect transactions by computing a fraud-proof for the chal-
revealing network addresses or transaction specifics. This lenge [7, 163]. Ethereum co-founder’s belief in rollups as a
requirement extends to access transaction details without di- promising solution for Layer-2 functionality in Ethereum 2.0
vulging individual transactional behaviours or preferences, underscores their importance in addressing scalability issues
preserving privacy against traffic analysis attacks [92, 148]. while maintaining data privacy and availability [171, 196].
Integrating privacy-focused P2P solutions with Ethere- A new development in the Ethereum ecosystem called
um’s smart contracts and DApps can address some of the in- Proto-Danksharding is an evolution of sharding technology
herent limitations of public blockchains in protecting trans- to improve network scalability. It is designed to increase the
actional privacy. Such integrations could also facilitate a space available for processing large volumes of data, thereby
more secure and private infrastructure for decentralized fi- enhancing the overall efficiency of the Ethereum network.
nance (DeFi) applications, which are particularly sensitive This approach is expected to reduce gas fees significantly
to the risks of financial privacy breaches. and speed up transaction processing, making Ethereum more
scalable and capable of supporting a more extensive user
5.4.3. Layer-2 Solutions base [68].
Layer-2 scaling solutions address the scalability and
privacy challenges inherent to Ethereum’s Layer-1. These 5.4.4. Off-chain Solutions
solutions operate on top of the Ethereum mainnet (Layer- Off-chain solutions allow transactions to be processed
1). Being Layer-2 solutions, these methods operate on top at a third-party centralised server, outside the Ethereum
of the Ethereum mainnet and can process transactions more main-net, with only the final state or a summary updated
efficiently, offering scalability and enhanced privacy [117]. on the main chain [112]. The off-chain solutions primarily
One of the prominent Layer-2 solutions is Rollups, a cooperate with the blockchain main-net at Layer-2 to record
technique that uses Layer-2 network entities to process com- the final state or updates on-chain using several Layer-2
ponent transactions outside of the main-chain. These entities on-chain/off-chain interaction techniques, including State
then interact with the blockchain through smart contracts to Channels and Plasma. This approach offers significant ad-
post transaction data to the main chain as calldata. Rollups vantages in terms of both scalability and privacy [112].
provide a mechanism to batch multiple transactions into one
transaction, reducing the on-chain data footprint. By aggre- • State Channels: State channels are two-way pathways
gating multiple transactions, Rollups enhance the through- opened between two participants. Once a state channel
put and make it more challenging for adversaries to analyze is opened, participants can transact amongst themselves
individual transactions, offering privacy [180]. without involving the main chain [61]. Only their transac-
There are two primary types of Rollups: zk-Rollups and tions’ final state is recorded on the Ethereum blockchain.
Optimistic Rollups [180]. zk-Rollups technique utilizes zk- This ensures rapid and cost-effective transactions and
SNARKs to bundle multiple transactions into a single proof, provides privacy, as intermediate states are not publicly
which is then submitted to the main-chain. This ensures recorded. State channels benefit applications where mul-
scalability and provides a layer of privacy due to the suc- tiple rapid transactions are expected between participants,
cinct nature of zk-SNARKs [135]. The integration of zk- such as in gaming or micro-payment scenarios [191].
SNARKs, a privacy cryptography protocol, and zk-Rollups,
• Plasma: Plasma is a framework that allows for the cre-
a Layer-2 scaling solution, plays a crucial role in improving
ation of child chains branching off the main Ethereum
the scalability and privacy of the Ethereum ecosystem. This
chain. These child chains can process transactions in-
dependently, reducing the load on the main Ethereum
chain [151]. Periodically, these child chains submit a sum- 6.1. Regulatory-compliance Challenges
mary of their transactions to the main chain. Since only Integrating blockchain technology, specifically Ethere-
summaries are recorded on the main chain, individual um’s decentralized architecture, with the GDPR presents a
transaction details on the child chains remain obfuscated, complex and challenging landscape [71]. At the core of this
providing a layer of privacy [151]. tension lies the differing operational philosophies: Ethereum
operates on principles of decentralization and immutability,
5.4.5. Education and Privacy Awareness whereas GDPR is built around individual data rights and
As seen in platforms like Ethereum, the rapid advance- control. This dichotomy raises pertinent questions regarding
ment of blockchain technology emphasizes the importance assigning roles like data controllers and processors within
of education and privacy awareness when navigating a bal- a decentralized system, a fundamental aspect of GDPR’s
ance between decentralization, pseudonymity, and regula- framework [176].
tory compliance [154]. Although Ethereum provides a layer
of privacy through its inherent pseudonymity, it does not of- • Legal and Regulatory Complexity: Blockchain technol-
fer complete anonymity. Users must be well-informed about ogy’s cornerstone is its immutability. Once data enters
the nuances of their public addresses, transaction patterns, the blockchain, its alteration or deletion becomes impos-
and the potential for linkage to real-world identities to make sible. This characteristic directly challenges Article 17 of
informed decisions about their on-chain activities. the GDPR, which introduces the “right to be forgotten,”
As deanonymization techniques evolve, raising aware- granting individuals the privilege to request their personal
ness about these methods within the Ethereum community data’s deletion under predefined conditions [64]. Appli-
is crucial. Workshops, webinars, and online resources can be cations developed atop the Ethereum platform, which
vital in disseminating knowledge about emerging threats and inscribe personal data directly onto the blockchain, may
countermeasures. While smart contracts have the potential inherently breach the GDPR’s right to erasure. This has
to revolutionize contractual paradigms, they also introduce led to extensive deliberations among technologists and
unique privacy challenges. Users require guidance on vetting legal scholars [94]. sqlCopy code
smart contracts, understanding their underlying logic, and
• Regulatory and Compliance Pressures: Regulatory bod-
ensuring their interactions do not compromise personal data.
ies worldwide are increasingly interested in cryptocurren-
cies. Though often well-intended, their push for oversight
6. Regulatory-compliance for DApps and transparency can place strains on maintaining user
privacy. For instance, as smart contracts can represent and
In April 2016, an important data protection regula-
even automate real-world agreements, they often intersect
tion, the GDPR (General Data Protection Regulation), was
with traditional legal systems [194]. Determining the ju-
adopted. It became enforceable in May 2018 and was created
risdiction, applicability of laws, and the legal status of a
by the European Parliament, the Council of the European
smart contract execution **presents unique** challenges.
Union, and the European Commission [64]. While GDPR
primarily targets data protection within the EU and EEA, its
6.2. Regulatory Implications
global implications affect any organization dealing with EU
The decentralized nature of Ethereum, where multiple
residents’ data. GDPR aims to consolidate data protection
nodes validate and record transactions simultaneously, dis-
for all individuals within the European Union (EU) and
rupts the traditional understanding of the three roles (i.e.,
the European Economic Area (EEA), emphasizing giving
Data Subject, Data Controller, and Data Processor) defined
citizens and residents greater control over their data. Addi-
in the GDPR. This dissonance complicates the identification
tionally, it aims to streamline the regulatory framework for
of responsible parties (e.g., lawful bases for data processing,
international businesses [64].
the obligations of the Data Controller, and the rights of
The utilisation of blockchain architecture has increased
Data Subjects). It also raises concerns about accountability
since Nakamoto publicised the foundational article in 2009,
in cases of regulatory breaches. Below are notable aspects
particularly after the inauguration of Ethereum in 2015
considered for harmonizing permissionless blockchains like
[134]. Since then, many solutions have relied on this de-
Ethereum with the GDPR [176].
centralized database to process personal data. However,
the permanent nature of recorded data in these solutions • Right to be Forgotten: The GDPR, through Article 17, in-
raises concerns about how to ensure GDPR compliance. troduces the “Right to be Forgotten”, allowing individuals
The challenge intensifies when considering the global na- the power to have their personal data erased under certain
ture of blockchain technology and the varying data protec- conditions [64]. This clashes directly with the immutabil-
tion laws across different jurisdictions. This paper examines ity feature of blockchain. It was mentioned that the inher-
the regulatory-compliance challenges and their implications ent unsuitability of decentralized systems like blockchain
arising from the intersection of the GDPR and Ethereum, for storing personal data [80]. Instead of hosting personal
focusing mainly on areas of compatibility and tension. data, blockchain’s strengths should be towards achieving
consensus and verification, with personal data storage
allocated to traditional systems. This aligns with Bitcoin’s
initial design, which operates without storing directly method, however, may conflict with the decentralized
identifiable data. By using Ethereum addresses instead of nature of blockchain [170].
personal identification, the public ledgers sidestep many In healthcare, where GDPR compliance is critical, block-
GDPR issues. chain applications must carefully navigate data protection
A solution to reconcile the GDPR with blockchain is and interoperability requirements. Ensuring patient data
through encryption [80]. It was pointed out that encrypted transferred across borders via blockchain technologies
personal data can fulfil GDPR’s erasure requirements if complies with GDPR is essential [91].
the decryption key is held off-chain or destroyed. The
idea of a referenced approach was presented [183]. Var- • Privacy by Design (PbD): The principle of “Privacy by
ious GDPR compliance proposals for blockchain include Design” (PbD) is a proactive approach for centralised
Chameleon Hash for data modification, secret sharing for systems, suggesting that privacy considerations should be
more comprehensive modification access, cryptographic central to any system or process design from its inception
deletion via Linkable Digital Multi-signature, minimal- [120]. The GDPR has enshrined this concept, making it
impact alteration with Reconstructable Ephemeral Key, a legal requirement for any system handling the personal
local Erasure Database for participant-led data removal, data of EU citizens as the role of a Data Controller [183].
blockchain-based authentication and authorization, and In DApps developed on blockchain platforms such as
Tree Structure for more straightforward data deletion [80]. Ethereum, the inherent decentralization characteristic of
these platforms is mirrored. This architectural choice
• Automated Decisions and Smart Contracts: Smart con- negates centralized control over the operations of DApps,
tracts, conceptualised by Szabo, execute contractual obli- leading to the distribution of operational data across many
gations automatically [177]. However, this concept en- nodes. This distribution paradigm presents significant
counters GDPR’s Article 22, which grants individuals the deviations from traditional data management and privacy
right to challenge decisions based exclusively on auto- protocols [94, 183, 219]. Recent scholarly discussions
mated processing. The significance of integrating ’exit have pointed out that the attributes underpinning the
strategies’ within smart contracts to ensure GDPR com- revolutionary nature of DApps may concurrently result in
pliance has been underscored in the past. These strate- inherent challenges in aligning with GDPR compliance
gies are essential for adapting smart contracts to legal [219]. Establishing a centralized oversight entity within
frameworks like the GDPR, allowing for adjustments in the decentralized sphere of DApps is a potential solution.
response to automated decisions [51]. Consent remains This entity would be tasked with monitoring, enforcing,
a significant element in the GDPR’s framework. Trans- and rectifying potential GDPR breaches [165]. It could
parent and explicit consent in blockchain contexts could also serve as a resource for standardized guidelines, best
mitigate potential conflicts. This approach is particularly practices, and tools, thereby ensuring the embedding of
effective when users can challenge or modify the conse- privacy considerations at the core of DApps’ design under
quences of their consent. the Privacy by Design principle.
• Cross-border transfer: The General Data Protection Reg- While Ethereum’s principles may initially seem antithet-
ulation (GDPR) has specific provisions concerning trans- ical to GDPR’s mandates, exploring avenues that harmo-
ferring personal data across borders, particularly outside nize these conflicting foundations is imperative, particularly
the European Economic Area (EEA). Article 44 of the in incorporating new technologies into existing regulatory
GDPR [64] mandates that any transfer of personal data frameworks. This reconciliation is vital for ensuring the
which are undergoing processing or are intended for pro- coexistence and advancement of groundbreaking blockchain
cessing after transfer to a third country or an international capabilities and protecting user data, including ensuring ac-
organization shall take place only if the conditions laid countability of data processing as well as offering individual
down in the regulation are complied with by the data con- data rights, as one of the ultimate goals for establishing the
troller and processor, ensuring that the level of protection GDPR.
guaranteed by the GDPR is not undermined [64].
In the blockchain and DApps context, the distributed 7. Conclusion
nature of blockchain technologies presents challenges in
ensuring GDPR compliance. Anonymizing personal data This insightful survey paper has comprehensively ex-
in blockchains through public key cryptography may not plored the intricate dynamics of privacy and deanonymiza-
exempt it from GDPR, as pseudonymous data still qualify tion in the Ethereum blockchain ecosystem. The decen-
as personal data under the regulation [150]. Adapting tralized and open-source nature of Ethereum, while instru-
blockchain to comply with GDPR’s data transfer require- mental in driving innovation and transparency, concurrently
ments may require new legal frameworks or significant poses significant privacy challenges. The inherent trans-
modifications to existing ones [88]. One approach is ’data parency of Ethereum’s public ledger, essential for trust and
localization’, which involves storing and processing data auditability, paradoxically creates avenues for potential pri-
within the data origin’s geographical boundaries. This vacy invasions. Deanonymization techniques, such as ad-
dress clustering, transaction graph analysis, and transaction
fingerprint analysis, leverage the openly available transac- 2013, Okinawa, Japan, April 1-5, 2013, Revised Selected Papers 17,
tional data to potentially expose user identities and be- Springer. pp. 34–51.
haviours. Furthermore, these techniques can be combined [5] Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, Ł.,
2016. Secure multiparty computations on bitcoin. Communications
with off-chain information including network-level, social of the ACM 59, 76–84.
network, and web-crawling data for more effectiveness of [6] Antonopoulos, A.M., Wood, G., 2018. Mastering ethereum: building
the re-identification of users. While beneficial for forensic smart contracts and dapps. O’reilly Media.
analysis and network security, these techniques underscore [7] Armstrong, M., 2021. Ethereum, smart contracts and the optimistic
the vulnerabilities in Ethereum’s pseudonymous framework. roll-up. BSc Dissertation: University of Dublin, Trinity College .
[8] Asplund, A., Hartvigsen, P.F., 2015. Reclaiming data ownership:
The advent of various privacy-preserving methodolo- Differential privacy in a decentralized setting. URL: https://api.
gies, including mixers, zk-SNARKs, and network-layer so- semanticscholar.org/CorpusID:55245471.
lutions, signifies the ongoing efforts to bolster privacy in [9] Aspnes, J., Attiya, H., Censor, K., 2010. Combining shared-coin
Ethereum. However, these solutions have limitations, often algorithms. Journal of Parallel and Distributed Computing 70, 317–
with trade-offs between privacy, scalability, and regulatory 322.
[10] Atzei, N., Bartoletti, M., Cimoli, T., 2017. A survey of attacks on
compliance. Introducing blockchain layer-2 solutions, off- ethereum smart contracts (sok). Principles of Security and Trust
chain transactions, and advanced privacy enhancing tech- 10204, 164–186.
niques like zk-STARKs presents promising avenues for user [11] Bai, Q., Zhang, C., Liu, N., Chen, X., Xu, Y., Wang, X., 2021.
privacy. However, they also necessitate a balance between Evolution of transaction pattern in ethereum: A temporal graph
the inherent decentralization of blockchain and the regula- perspective. IEEE Transactions on Computational Social Systems
9, 851–866.
tory demands, particularly in light of GDPR compliance. [12] Banerjee, S., Das, D., Biswas, M., Biswas, U., 2020. Study and
Furthermore, the complexity of smart contracts adds another survey on blockchain privacy and security issues, in: Cross-industry
layer to the privacy puzzle, necessitating robust design and use of Blockchain Technology and Opportunities for the Future. IGI
operational strategies to safeguard user data. Global, pp. 80–102.
The tension between the immutable nature of blockchain [13] Baria, N., Parmar, D., Panchal, V., 2022. Blockchain user, network
and system-level attacks and mitigation, in: The Auditor’s Guide to
and emerging data protection regulations like the GDPR also Blockchain Technology. CRC Press, pp. 223–243.
presents a formidable challenge, calling for innovative solu- [14] Baum, C., David, B., Frederiksen, T.K., 2021. P2dex: privacy-
tions that harmonize decentralized technology with evolving preserving decentralized cryptocurrency exchange, in: Interna-
legal frameworks. Presumably, Ethereum’s blockchain sig- tional Conference on Applied Cryptography and Network Security,
nificantly advances decentralized applications; however, its Springer. pp. 163–194.
[15] Benabdallah, A., Audras, A., Coudert, L., El Madhoun, N., Badra,
engagement with privacy issues and the need to comply with M., 2022. Analysis of blockchain solutions for e-voting: A system-
regulatory standards is an ongoing and developing area. atic literature review. IEEE Access .
Therefore, the road ahead should concentrate on creating [16] Benet, J., 2014. Ipfs-content addressed, versioned, p2p file system.
advanced methods to protect privacy in ways that meet arXiv preprint arXiv:1407.3561 .
legal requirements, improve the security of smart contracts, [17] Benhamouda, F., Halevi, S., Halevi, T., 2019. Supporting private
data on hyperledger fabric with secure multiparty computation. IBM
and promote better understanding and knowledge about Journal of Research and Development 63, 3–1.
these complex issues. Achieving a balance between trans- [18] Béres, F., Seres, I.A., Benczúr, A.A., Quintyne-Collins, M., 2021.
parency, privacy, and adherence to regulatory frameworks Blockchain is watching you: Profiling and deanonymizing ethereum
in Ethereum goes beyond technology alone; it also involves users, in: 2021 IEEE international conference on decentralized ap-
legal and ethical considerations. This necessitates a collabo- plications and infrastructures (DAPPS), IEEE. pp. 69–78.
[19] Bernabe, J.B., Canovas, J.L., Hernandez-Ramos, J.L., Moreno, R.T.,
rative effort across various disciplines to ensure blockchain Skarmeta, A., 2019. Privacy-preserving solutions for blockchain:
technology’s responsible and sustainable growth. Review and challenges. IEEE Access 7, 164908–164940.
[20] Bertino, E., Kundu, A., Sura, Z., 2019. Data transparency with
blockchain and ai ethics. Journal of Data and Information Quality
References (JDIQ) 11, 1–8.
[1] Abowd, J.M., 2018. The us census bureau adopts differential privacy, [21] Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-policy
in: Proceedings of the 24th ACM SIGKDD international conference attribute-based encryption, in: 2007 IEEE symposium on security
on knowledge discovery & data mining, pp. 2867–2867. and privacy (SP’07), IEEE. pp. 321–334.
[2] Al Jawaheri, H., Al Sabah, M., Boshmaf, Y., Erbad, A., 2020. [22] Bhargavan, K., Delignat-Lavaud, A., Fournet, C., Gollamudi, A.,
Deanonymizing tor hidden service users through bitcoin transactions Gonthier, G., Kobeissi, N., Rastogi, A., Sibut-Pinote, T., Swamy, N.,
analysis. Computers & Security 89, 101684. Zanella-Béguelin, S., 2016. Formal verification of smart contracts:
[3] Alberto Torres, W.A., Steinfeld, R., Sakzad, A., Liu, J.K., Kuchta, Short paper, in: Proceedings of the 2016 ACM Workshop on Pro-
V., Bhattacharjee, N., Au, M.H., Cheng, J., 2018. Post-quantum gramming Languages and Analysis for Security, ACM. pp. 91–96.
one-time linkable ring signature and application to ring confidential [23] Biryukov, A., Tikhomirov, S., 2019a. Deanonymization and link-
transactions in blockchain (lattice ringct v1. 0), in: Information ability of cryptocurrency transactions based on network analysis,
Security and Privacy: 23rd Australasian Conference, ACISP 2018, in: 2019 IEEE European symposium on security and privacy (Eu-
Wollongong, NSW, Australia, July 11-13, 2018, Proceedings 23, roS&P), IEEE. pp. 172–184.
Springer. pp. 558–576. [24] Biryukov, A., Tikhomirov, S., 2019b. Security and privacy of mobile
[4] Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Cap- wallet users in bitcoin, dash, monero, and zcash. Pervasive and
kun, S., 2013. Evaluating user privacy in bitcoin, in: Financial Mobile Computing 59, 101030.
Cryptography and Data Security: 17th International Conference, FC [25] Biryukov, A., Tikhomirov, S., 2019c. Transaction clustering using
network traffic analysis for bitcoin and derived blockchains, in: IEEE
[67] Feige, U., Lapidot, D., Shamir, A., 1990. Multiple non-interactive parallel and distributed systems 23, 2150–2162.
zero knowledge proofs based on a single random string, in: Proceed- [88] Han, S., Park, S., 2022. A gap between blockchain and general data
ings [1990] 31st Annual Symposium on Foundations of Computer protection regulation: A systematic review. IEEE Access .
Science, IEEE. pp. 308–317. [89] Harrigan, M., Fretter, C., 2016. The unreasonable effectiveness
[68] Fekete, D.L., Kiss, A., 2024. Trust-minimized optimistic cross- of address clustering, in: 2016 Intl IEEE Conferences on Ubiq-
rollup arbitrary message bridge. Journal of Network and Computer uitous Intelligence & Computing, Advanced and Trusted Com-
Applications 221, 103771. puting, Scalable Computing and Communications, Cloud and Big
[69] Feng, Q., He, D., Zeadally, S., Khan, M.K., Kumar, N., 2019. A Data Computing, Internet of People, and Smart World Congress
survey on privacy protection in blockchain system. Journal of (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), IEEE. pp. 368–
Network and Computer Applications 126, 45–58. 373.
[70] Fiege, U., Fiat, A., Shamir, A., 1987. Zero knowledge proofs of [90] Hassan, M.U., Rehmani, M.H., Chen, J., 2020. Differential privacy
identity, in: Proceedings of the nineteenth annual ACM symposium in blockchain technology: A futuristic approach. Journal of Parallel
on Theory of computing, pp. 210–217. and Distributed Computing 145, 50–74.
[71] Finck, M., 2018. Blockchains and data protection in the european [91] Hasselgren, A., Wan, P.K., Horn, M., Kralevska, K., Gligoroski, D.,
union. Eur. Data Prot. L. Rev. 4, 17. Faxvaag, A., 2020. Gdpr compliance for blockchain applications in
[72] Fleder, M., Kester, M.S., Pillai, S., 2015. Bitcoin transaction graph healthcare. Computer Science & Information Technology .
analysis. arXiv preprint arXiv:1502.01657 . [92] Henry, R., Herzberg, A., Kate, A., 2018. Blockchain access privacy:
[73] Gai, K., Wu, Y., Zhu, L., Zhang, Z., Qiu, M., 2019. Differential Challenges and directions. IEEE Security & Privacy 16, 38–45.
privacy-based blockchain for industrial internet-of-things. IEEE [93] Hopwood, D., Bowe, S., Hornby, T., Wilcox, N., 2016. Zcash
Transactions on Industrial Informatics 16, 4156–4165. protocol specification. GitHub: San Francisco, CA, USA , 1.
[74] Gaihre, A., Luo, Y., Liu, H., 2018. Do bitcoin users really care [94] Humbeeck, A.V., et al., 2019. The blockchain-gdpr paradox. Journal
about anonymity? an analysis of the bitcoin transaction graph, in: of Data Protection & Privacy 2, 208–212.
2018 ieee international conference on big data (big data), IEEE. pp. [95] Hur, J., 2011. Improving security and efficiency in attribute-based
1198–1207. data sharing. IEEE transactions on knowledge and data engineering
[75] Gaihre, A., Pandey, S., Liu, H., 2019. Deanonymizing cryptocur- 25, 2271–2282.
rency with graph learning: The promises and challenges, in: 2019 [96] Javed, L., Anjum, A., Yakubu, B.M., Iqbal, M., Moqurrab, S.A.,
IEEE Conference on Communications and Network Security (CNS), Srivastava, G., 2023. Sharechain: Blockchain-enabled model for
IEEE. pp. 1–3. sharing patient data using federated learning and differential privacy.
[76] Gamage, C., Gras, B., Crispo, B., Tanenbaum, A.S., 2006. An Expert Systems 40, e13131.
identity-based ring signature scheme with enhanced privacy, in: [97] Jia, B., Zhang, X., Liu, J., Zhang, Y., Huang, K., Liang, Y., 2021.
2006 Securecomm and Workshops, IEEE. pp. 1–5. Blockchain-enabled federated learning data protection aggregation
[77] Gao, Y., Shi, J., Wang, X., Shi, R., Yin, Z., Yang, Y., 2021. Practical scheme with differential privacy and homomorphic encryption in
deanonymization attack in ethereum based on p2p network anal- iiot. IEEE Transactions on Industrial Informatics 18, 4049–4058.
ysis, in: 2021 IEEE Intl Conf on Parallel & Distributed Process- [98] Jiang, Y., Xu, X., Xiao, F., 2022. Attribute-based encryption with
ing with Applications, Big Data & Cloud Computing, Sustainable blockchain protection scheme for electronic health records. IEEE
Computing & Communications, Social Computing & Networking Transactions on Network and Service Management 19, 3884–3895.
(ISPA/BDCloud/SocialCom/SustainCom), IEEE. pp. 1402–1409. [99] Johnson, D., Menezes, A., Vanstone, S., 2001. The elliptic curve dig-
[78] Garfinkel, S.L., Abowd, J.M., Powazek, S., 2018. Issues encountered ital signature algorithm (ecdsa). International journal of information
deploying differential privacy, in: Proceedings of the 2018 Workshop security 1, 36–63.
on Privacy in the Electronic Society, pp. 133–137. [100] Kabla, A.H.H., Anbar, M., Manickam, S., Al-Amiedy, T.A., Cruspe,
[79] Gentry, C., 2009. A fully homomorphic encryption scheme. Stan- P.B., Al-Ani, A.K., Karuppayah, S., 2022. Applicability of intrusion
ford university. detection system on ethereum attacks: A comprehensive review.
[80] Godyn, M., Kedziora, M., Ren, Y., Liu, Y., Song, H., 2022. Analysis IEEE Access 10, 71632–71655.
of solutions for a blockchain compliance with gdpr. Scientific [101] Kalra, S., Goel, S., Dhawan, M., Sharma, S., 2018. Zeus: Analyzing
Reports 12, 15021. doi:10.1038/s41598-022-19341-y. safety of smart contracts, in: Network and Distributed Systems
[81] Goldfeder, S., Kalodner, H., Reisman, D., Narayanan, A., 2018. Security (NDSS) Symposium, pp. 1–12.
When the cookie meets the blockchain: Privacy risks of web pay- [102] Kang, C., Lee, C., Ko, K., Woo, J., Hong, J.W.K., 2020. De-
ments via cryptocurrencies. Proceedings on Privacy Enhancing anonymization of the bitcoin network using address clustering, in:
Technologies 4, 179–199. Blockchain and Trustworthy Systems: Second International Con-
[82] Goldreich, O., Oren, Y., 1994. Definitions and properties of zero- ference, BlockSys 2020, Dali, China, August 6–7, 2020, Revised
knowledge proof systems. Journal of Cryptology 7, 1–32. Selected Papers 2, Springer. pp. 489–501.
[83] Goldwasser, S., Micali, S., Rackoff, C., 2019. The knowledge [103] Kappos, G., Yousaf, H., Maller, M., Meiklejohn, S., 2018. An
complexity of interactive proof-systems, in: Providing Sound Foun- empirical analysis of anonymity in zcash, in: 27th USENIX Security
dations for Cryptography: On the Work of Shafi Goldwasser and Symposium (USENIX Security 18), pp. 463–477.
Silvio Micali, pp. 203–225. [104] Kelen, D.M., Seres, I.A., Béres, F., Benczúr, A.A., 2023. In-
[84] Goyal, V., Pandey, O., Sahai, A., Waters, B., 2006. Attribute- tegrated onion routing for peer-to-peer validator privacy in the
based encryption for fine-grained access control of encrypted data, ethereum network. URL: https://info.ilab.sztaki.hu/~kdomokos/
in: Proceedings of the 13th ACM conference on Computer and OnionRoutingP2PEthereumPrivacy.pdf.
communications security, pp. 89–98. [105] Kenthapadi, K., Mironov, I., Thakurta, A.G., 2019. Privacy-
[85] Guan, Z., Wan, Z., Yang, Y., Zhou, Y., Huang, B., 2020. Blockmaze: preserving data mining in industry, in: Proceedings of the Twelfth
An efficient privacy-preserving account-model blockchain based on ACM International Conference on Web Search and Data Mining,
zk-snarks. IEEE Transactions on Dependable and Secure Computing pp. 840–841.
19, 1446–1463. [106] Kerber, T., Kiayias, A., Kohlweiss, M., 2021. Kachina – foundations
[86] Halpin, H., Piekarska, M., 2017. Introduction to security and privacy of private smart contracts, in: 2021 IEEE 34th Computer Security
on the blockchain, in: 2017 IEEE European Symposium on Security Foundations Symposium (CSF), pp. 1–16. doi:10.1109/CSF51468.
and Privacy Workshops, IEEE. pp. 1–3. 2021.00002.
[87] Han, J., Susilo, W., Mu, Y., Yan, J., 2012. Privacy-preserving decen- [107] Khan, A., 2022. Graph analysis of the ethereum blockchain data:
tralized key-policy attribute-based encryption. IEEE transactions on A survey of datasets, methods, and future work, in: 2022 IEEE
International Conference on Blockchain (Blockchain), IEEE. pp. [126] Meiklejohn, S., Mercer, R., 2018. Möbius: Trustless tumbling for
250–257. transaction privacy. Proceedings on Privacy Enhancing Technolo-
[108] Khan, S.N., Loukil, F., Ghedira-Guegan, C., Benkhelifa, E., Bani- gies 2018. doi:10.1515/popets-2018-0015.
Hani, A., 2021. Blockchain smart contracts: Applications, chal- [127] Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy,
lenges, and future trends. Peer-to-peer Networking and Applications D., Voelker, G.M., Savage, S., 2013. A fistful of bitcoins: character-
14, 2901–2925. izing payments among men with no names, in: Proceedings of the
[109] Khovratovich, D., Vladimirov, M., 2019. Tornado privacy solution: 2013 conference on Internet measurement conference, pp. 127–140.
Cryptographic review. version 1.1. ABDK Consulting, November [128] Merani, M.L., Croce, D., Tinnirello, I., 2021. Rings for privacy: an
29. architecture for large scale privacy-preserving data mining. IEEE
[110] Kılıç, B., Özturan, C., Sen, A., 2022. Parallel analysis of ethereum Transactions on Parallel and Distributed Systems 32, 1340–1352.
blockchain transaction data using cluster computing. Cluster Com- [129] Mercer, R., 2016. Privacy on the blockchain: Unique ring signatures.
puting 25, 1885–1898. arXiv:1612.01188.
[111] Killer, C., Eck, M., Rodrigues, B., von der Assen, J., Staubli, R., [130] Messias, J., Pahari, V., Chandrasekaran, B., Gummadi, K.P.,
Stiller, B., 2022. Provotumn: Decentralized, mix-net-based, and Loiseau, P., 2023. Dissecting bitcoin and ethereum transactions: On
receipt-free voting system, in: 2022 IEEE International Conference the lack of transaction contention and prioritization transparency in
on Blockchain and Cryptocurrency (ICBC), IEEE. pp. 1–9. blockchains. arXiv preprint arXiv:2302.06962 .
[112] Kim, S., Kwon, Y., Cho, S., 2018. A survey of scalability solutions [131] Moralis, . Breaking down eth 2.0 - zk-snarks and zk-
on blockchain, in: 2018 International Conference on Information and rollups. https://academy.moralis.io/blog/breaking-down-eth-2-0-zk-
Communication Technology Convergence (ICTC), IEEE. pp. 1204– snarks-and-zk-rollups. Accessed: 2023-12-01.
1207. [132] Müller, S., Katzenbeisser, S., Eckert, C., 2009. Distributed attribute-
[113] Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C., based encryption, in: Information Security and Cryptology–ICISC
2016. Hawk: The blockchain model of cryptography and privacy- 2008: 11th International Conference, Seoul, Korea, December 3-5,
preserving smart contracts, in: 2016 IEEE symposium on security 2008, Revised Selected Papers 11, Springer. pp. 20–36.
and privacy (SP), IEEE. pp. 839–858. [133] Naehrig, M., Lauter, K., Vaikuntanathan, V., 2011. Can homo-
[114] Kus, M.C., Levi, A., 2022. Investigation and application of differen- morphic encryption be practical?, in: Proceedings of the 3rd ACM
tial privacy in bitcoin. IEEE Access 10, 25534–25554. doi:10.1109/ workshop on Cloud computing security workshop, pp. 113–124.
ACCESS.2022.3151784. [134] Nakamoto, S., 2008. Bitcoin: A peer-to-peer electronic cash system.
[115] Kushwaha, S.S., Joshi, S., Singh, D., Kaur, M., Lee, H.N., 2022. Decentralized Business Review , 21260.
Systematic review of security vulnerabilities in ethereum blockchain [135] Neiheiser, R., Inácio, G., Rech, L., Montez, C., Matos, M., Ro-
smart contract. IEEE Access 10, 6605–6621. drigues, L., 2023. Practical limitations of ethereum’s layer-2. IEEE
[116] Lapets, A., Albab, K.D., Issa, R., Qin, L., Varia, M., Bestavros, A., Access 11, 8651–8662.
Jansen, F., 2019. Role-based ecosystem for the design, development, [136] Neudecker, T., Andelfinger, P., Hartenstein, H., 2016. Tim-
and deployment of secure multi-party data analytics applications, in: ing analysis for inferring the topology of the bitcoin peer-
2019 IEEE Cybersecurity Development (SecDev), IEEE. pp. 129– to-peer network, in: 2016 Intl IEEE Conferences on Ubiqui-
140. tous Intelligence & Computing, Advanced and Trusted Comput-
[117] Lavaur, T., Lacan, J., Chanel, C.P., 2022. Enabling blockchain ing, Scalable Computing and Communications, Cloud and Big
services for ioe with zk-rollups. Sensors 22, 6493. Data Computing, Internet of People, and Smart World Congress
[118] Li, X., Mei, Y., Gong, J., Xiang, F., Sun, Z., 2020a. A blockchain (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld), IEEE. pp. 358–
privacy protection scheme based on ring signature. IEEE Access 8, 367.
76765–76772. [137] Nguyen, C.T., Hoang, D.T., Nguyen, D.N., Niyato, D., Nguyen,
[119] Li, Y., Islambekov, U., Akcora, C., Smirnova, E., Gel, Y.R., Kantar- H.T., Dutkiewicz, E., 2019. Proof-of-stake consensus mechanisms
cioglu, M., 2020b. Dissecting ethereum blockchain analytics: What for future blockchain networks: Fundamentals, applications and
we learn from topology and geometry of the ethereum graph?, in: opportunities. IEEE Access 7, 85727–85745. doi:10.1109/ACCESS.
Proceedings of the 2020 SIAM international conference on data 2019.2925010.
mining, SIAM. pp. 523–531. [138] Nikolakis, W., John, L., Krishnan, H., 2018. How blockchain can
[120] Lima, C., 2018. Blockchain gdpr privacy by design. IEEE shape sustainable global value chains: An evidence, verifiability, and
blockchain group 4. enforceability (eve) framework. Sustainability 10, 3926.
[121] Liu, Jiangyan, Cai, Zhiyuan, Liu, Dunnan, Jin, Tianyi, 2021. [139] Niranjanamurthy, M., Nithya, B., Jagannatha, S., 2019. Analysis of
Research on distributed energy transaction technology based on blockchain technology: pros, cons and swot. Cluster Computing 22,
blockchain. E3S Web Conf. 236, 02011. URL: https://doi.org/ 14743–14757.
10.1051/e3sconf/202123602011, doi:10.1051/e3sconf/202123602011. [140] Noether, S., Mackenzie, A., et al., 2016. Ring confidential transac-
[122] Lotti, L., 2016. Contemporary art, capitalization and the blockchain: tions. Ledger 1, 1–18.
On the autonomy and automation of art’s value. Finance and Society [141] Sáez de Ocáriz Borde, H., 2022. An overview of trees in blockchain
2, 96–110. technology: Merkle trees and merkle patricia tries. Department of
[123] Lu, H., Yu, R., Zhu, Y., He, X., Liang, K., Chu, W.C.C., Engineering, University of Cambridge .
2022. Policy-driven data sharing over attribute-based [142] Omar, I.A., Jayaraman, R., Salah, K., Simsekler, M.C.E., Yaqoob,
encryption supporting dual membership. Journal of I., Ellahham, S., 2020. Ensuring protocol compliance and data
Systems and Software 188, 111271. URL: https://www. transparency in clinical trials using blockchain smart contracts.
sciencedirect.com/science/article/pii/S0164121222000346, BMC Medical Research Methodology 20, 1–17.
doi:https://doi.org/10.1016/j.jss.2022.111271. [143] Ouaddah, A., Elkalam, A.A., Ouahman, A.A., 2017. Towards a
[124] Maurer, F.K., Neudecker, T., Florian, M., 2017. Anonymous novel privacy-preserving access control model based on blockchain
coinjoin transactions with arbitrary values, in: 2017 ieee trust- technology in iot, in: Rocha, Á., Serrhini, M., Felgueiras, C. (Eds.),
com/bigdatase/icess, IEEE. pp. 522–529. Europe and MENA Cooperation Advances in Information and Com-
[125] McSherry, F., Talwar, K., 2007. Mechanism design via differential munication Technologies, Springer International Publishing, Cham.
privacy, in: 48th Annual IEEE Symposium on Foundations of Com- pp. 523–533.
puter Science (FOCS’07), IEEE. pp. 94–103. [144] Panait, A.E., Olimid, R.F., 2021. On using zk-snarks and zk-
starks in blockchain-based identity management, in: Innovative Se-
curity Solutions for Information Technology and Communications:
13th International Conference, SecITC 2020, Bucharest, Romania, through blockchain technology. Futures 122, 102611.
November 19–20, 2020, Revised Selected Papers 13, Springer. pp. [166] Seres, I.A., Nagy, D.A., Buckland, C., Burcsi, P., 2019. Mixeth:
130–145. efficient, trustless coin mixing service for ethereum. Cryptology
[145] Park, Y.H., Kim, Y., Shim, J., 2021. Blockchain-based privacy- ePrint Archive doi:10.4230/OASIcs.Tokenomics.2019.13.
preserving system for genomic data management using local dif- [167] Shi, Y., Cao, K., Yao, J., Ge, X., 2023. A semi-homomorphic privacy
ferential privacy. Electronics 10. URL: https://www.mdpi.com/ computing solution based on sm2 and blockchain, in: International
2079-9292/10/23/3019, doi:10.3390/electronics10233019. Conference on Cryptography, Network Security, and Communica-
[146] Partala, J., Nguyen, T.H., Pirttikangas, S., 2020. Non-interactive tion Technology (CNSCT 2023), SPIE. pp. 29–38.
zero-knowledge for blockchain: A survey. IEEE Access 8, 227945– [168] Shojaeinasab, A., Motamed, A.P., Bahrak, B., 2023. Mixing detec-
227961. tion on bitcoin transactions using statistical patterns. IET Blockchain
[147] Pertsev, A., Semenov, R., Storm, R., 2019. Tornado cash privacy 3, 136–148.
solution version 1.4. Tornado cash privacy solution version 1. [169] Singh, K., Heulot, N., Hamida, E.B., 2018. Towards anonymous,
[148] Petrov, S., Kendzierskyj, S., Jahankhani, H., 2020. Protecting unlinkable, and confidential transactions in blockchain, in: 2018
privacy and security using tor and blockchain and de-anonymization IEEE International Conference on Internet of Things (iThings) and
risks. Cyber Defence in the Age of AI, Smart Societies and IEEE Green Computing and Communications (GreenCom) and
Augmented Humanity , 199–232. IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE
[149] Pinto, A.M., 2020. An introduction to the use of zk-snarks in Smart Data (SmartData), IEEE. pp. 1642–1649.
blockchains, in: Mathematical Research for Blockchain Economy. [170] Singh, N.P., 2021. Regulating Cross Border Data Flows: An Assess-
Springer, pp. 233–249. ment of India’s Data Localisation Framework. Ph.D. thesis. National
[150] Politou, E., Casino, F., Alepis, E., Patsakis, C., 2019. Blockchain Law School of India University, Bangalore.
mutability: Challenges and proposed solutions. IEEE Transactions [171] Stevens, R., 2022. What are ethereum rollups? a scaling solution
on Emerging Topics in Computing 9, 1972–1986. to cut transaction costs. URL: https://decrypt.co/resources/
[151] Poon, J., Buterin, V., 2017. Plasma: Scalable autonomous smart what-are-ethereum-rollups-scaling-solution-cut-transaction-costs.
contracts. White paper , 1–47. [172] Suma, V., 2019. Security and privacy mechanism using blockchain.
[152] Rackoff, C., Simon, D.R., 1991. Non-interactive zero-knowledge Journal of Ubiquitous Computing and Communication Technologies
proof of knowledge and chosen ciphertext attack, in: Annual inter- (UCCT) 1, 45–54.
national cryptology conference, Springer. pp. 433–444. [173] Sun, H., Ruan, N., Liu, H., 2019. Ethereum analysis via node
[153] Rahulamathavan, Y., Phan, R.C.W., Rajarajan, M., Misra, S., Kon- clustering, in: Network and System Security: 13th International
doz, A., 2017. Privacy-preserving blockchain based iot ecosystem Conference, NSS 2019, Sapporo, Japan, December 15–18, 2019,
using attribute-based encryption, in: 2017 IEEE International Con- Proceedings 13, Springer. pp. 114–129.
ference on Advanced Networks and Telecommunications Systems [174] Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H., 2017. Ringct 2.0: A
(ANTS), IEEE. pp. 1–6. compact accumulator-based (linkable ring signature) protocol for
[154] Rao, U.P., Shukla, P.K., Trivedi, C., Gupta, S., Shibeshi, Z.S., 2021. blockchain cryptocurrency monero, in: European Symposium on
Blockchain for Information Security and Privacy. CRC Press. Research in Computer Security, Springer. pp. 456–474.
[155] Reynolds, P., Irwin, A.S., 2017. Tracking digital footprints: [175] Sun, X., Yu, F.R., Zhang, P., Sun, Z., Xie, W., Peng, X., 2021. A
anonymity within the bitcoin system. Journal of Money Laundering survey on zero-knowledge proof in blockchain. IEEE network 35,
Control 20, 172–189. 198–205.
[156] Rivest, R.L., Shamir, A., Tauman, Y., 2006. How to leak a secret: [176] Suripeddi, M.K.S., Purandare, P., 2021. Blockchain and gdpr – a
Theory and applications of ring signatures. Theoretical Computer study on compatibility issues of the distributed ledger technology
Science: Essays in Memory of Shimon Even , 164–186. with gdpr data processing. Journal of Physics: Conference Series
[157] Ron, D., Shamir, A., 2013a. Quantitative analysis of the full bitcoin 1964. URL: https://api.semanticscholar.org/CorpusID:236205971.
transaction graph, in: Sadeghi, A.R. (Ed.), Financial Cryptography [177] Szabo, N., 1997. Formalizing and securing relationships on public
and Data Security, Springer Berlin Heidelberg, Berlin, Heidelberg. networks. First monday .
pp. 6–24. doi:10.1007/978-3-642-39884-1\_2. [178] Tang, Y., Xu, C., Zhang, C., Wu, Y., Zhu, L., 2021. Analysis of
[158] Ron, D., Shamir, A., 2013b. Quantitative analysis of the full bitcoin address linkability in tornado cash on ethereum. ieee , 39–50.
transaction graph, in: Financial Cryptography and Data Security: [179] Team, E., 2024. Republic protocol (ren) review: Complete be-
17th International Conference, FC 2013, Okinawa, Japan, April 1-5, ginners guide to ren. URL: https://www.coinbureau.com/review/
2013, Revised Selected Papers 17, Springer. pp. 6–24. republic-protocol-ren/.
[159] Sabry, F., Labda, W., Erbad, A., Malluhi, Q., 2020. Cryptocurrencies [180] Thibault, L.T., Sarry, T., Hafid, A.S., 2022. Blockchain scaling using
and artificial intelligence: Challenges and opportunities. IEEE rollups: A comprehensive survey. IEEE Access .
Access 8, 175840–175858. doi:10.1109/ACCESS.2020.3025211. [181] Thyagarajan, S.A., Malavolta, G., Moreno-Sanchez, P., 2022.
[160] Sahai, A., Waters, B., 2005. Fuzzy identity-based encryption, in: Universal atomic swaps: Secure exchange of coins across all
Annual international conference on the theory and applications of blockchains, in: 2022 IEEE Symposium on Security and Privacy
cryptographic techniques, Springer. pp. 457–473. (SP), IEEE. pp. 1299–1316.
[161] Sahu, N., Gajera, M., Chaudhary, A., 2023. zkfi: Privacy-preserving [182] Tovanich, N., Cazabet, R., 2023. Fingerprinting bitcoin entities
and regulation compliant transactions using zero knowledge proofs. using money flow representation learning. Applied Network Science
arXiv preprint arXiv:2307.00521 . 8, 63.
[162] Satybaldy, A., Nowostawski, M., 2020. Review of techniques for [183] Truong, N.B., Sun, K., Lee, G.M., Guo, Y., 2020. Gdpr-
privacy-preserving blockchain systems, in: Proceedings of the 2nd compliant personal data management: A blockchain-based solu-
ACM International Symposium on Blockchain and Secure Critical tion. IEEE Transactions on Information Forensics and Security
Infrastructure, pp. 1–9. 15, 1746–1761. URL: https://doi.org/10.1109/TIFS.2019.2948287,
[163] Schaffner, T., 2021. Scaling public blockchains: A comprehensive doi:10.1109/TIFS.2019.2948287.
analysis of optimistic and zero-knowledge rollups. Master Thesis: [184] Valdeolmillos, D., Mezquita, Y., González-Briones, A., Prieto, J.,
University of Basel . Corchado, J.M., 2020. Blockchain technology: a review of the cur-
[164] Schmitz, A., Rule, C., 2019. Online dispute resolution for smart rent challenges of cryptocurrency, in: Blockchain and Applications:
contracts. J. Disp. Resol. , 103. International Congress, Springer. pp. 153–160.
[165] Schulz, K.A., Gstrein, O.J., Zwitter, A.J., 2020. Exploring the gov- [185] Van Saberhagen, N., 2013. Cryptonote v2.0. URL: https://
ernance and implementation of sustainable development initiatives cryptonote.org/whitepaper.pdf.
[186] Varghese, H.M., Nagoree, D.A., Jayapandian, N., et al., 2021. Cryp- [204] Yakovenko, A., 2018. Solana: A new architecture for a high
tocurrency security and privacy issues: A research perspective, in: performance blockchain v0. 8.13. Whitepaper .
2021 6th International Conference on Communication and Electron- [205] Yan, Y., Shao, G., Song, D., Song, M., Jin, Y., 2023. He-dksap:
ics Systems (ICCES), IEEE. pp. 902–907. Privacy-preserving stealth address protocol via additively homomor-
[187] Victor, F., 2020. Address clustering heuristics for ethereum, in: phic encryption. arXiv:2312.10698.
Financial Cryptography and Data Security: 24th International Con- [206] Yang, K., Jia, X., 2012. Attributed-based access control for multi-
ference, FC 2020, Kota Kinabalu, Malaysia, February 10–14, 2020 authority systems in cloud storage, in: 2012 IEEE 32nd International
Revised Selected Papers 24, Springer. pp. 617–633. Conference on Distributed Computing Systems, IEEE. pp. 536–545.
[188] Vo, H.T., Kundu, A., Mohania, M.K., 2018. Research directions in [207] Yao, A.C., 1982. Protocols for secure computations, in: 23rd annual
blockchain data management and analytics., in: EDBT, pp. 445–448. symposium on foundations of computer science (sfcs 1982), IEEE.
[189] Wang, B., Li, H., Guo, Y., Wang, J., 2023. Ppflhe: A privacy- pp. 160–164.
preserving federated learning scheme with homomorphic encryption [208] Ye, C., Li, G., Cai, H., Gu, Y., Fukuda, A., 2018. Analysis
for healthcare data. Applied Soft Computing 146, 110677. of security in blockchain: Case study in 51%-attack detecting, in:
[190] Wang, G., Liu, Q., Wu, J., 2010. Hierarchical attribute-based 2018 5th International conference on dependable systems and their
encryption for fine-grained access control in cloud storage services, applications (DSA), IEEE. pp. 15–24.
in: Proceedings of the 17th ACM conference on Computer and [209] Zhang, J., Bai, W., Jiang, Z., 2020a. On the security of a practical
communications security, pp. 735–737. constant-size ring signature scheme. Int. J. Netw. Secur. 22, 392–
[191] Wang, Q., Zhang, Y., Bao, Z., Shi, W., Lei, H., Liu, H., Chen, 396.
B., 2022. Sortee: Service-oriented routing for payment channel [210] Zhang, M., Zhang, X., Zhang, Y., Lin, Z., 2020b. {TXSPECTOR}:
networks with scalability and privacy protection. IEEE Transactions Uncovering attacks in ethereum from transactions, in: 29th USENIX
on Network and Service Management 19, 3764–3780. doi:10.1109/ Security Symposium (USENIX Security 20), pp. 2775–2792.
TNSM.2022.3213559. [211] Zhang, R., Xue, R., Liu, L., 2019. Security and privacy on
[192] Wang, W., Hoang, D.T., Hu, P., Xiong, Z., Niyato, D., Wang, P., blockchain. ACM Computing Surveys (CSUR) 52, 1–34.
Wen, Y., Kim, D.I., 2019. A survey on consensus mechanisms and [212] Zhang, Y., Deng, R.H., Xu, S., Sun, J., Li, Q., Zheng, D., 2020c.
mining strategy management in blockchain networks. Ieee Access Attribute-based encryption for cloud computing access control: A
7, 22328–22370. survey. ACM Computing Surveys (CSUR) 53, 1–41.
[193] Wang, Y., Tan, M., 2023. Defense against sybil attack in blockchain [213] Zhao, C., Zhao, S., Zhao, M., Chen, Z., Gao, C.Z., Li, H., Tan,
based on improved consensus algorithm, in: 2023 IEEE International Y.a., 2019. Secure multi-party computation: theory, practice and
Conference on Control, Electronics and Computer Technology (IC- applications. Information Sciences 476, 357–372.
CECT), pp. 986–989. doi:10.1109/ICCECT57938.2023.10140278. [214] Zhao, H., Bai, X., Zheng, S., Wang, L., 2020. Rzcoin: Ethereum-
[194] Werbach, K., 2018. The blockchain and the new architecture of trust. based decentralized payment with optional privacy service. Entropy
MIT Press . 22, 712.
[195] Wilkinson, S., Lowry, J., Boshevski, T., 2014. Metadisk a [215] Zheng, Z., Xie, S., Dai, H., Chen, X., Wang, H., 2017. An
blockchain-based decentralized file storage application. Storj Labs overview of blockchain technology: Architecture, consensus, and
Inc., Technical Report, hal 1. future trends, in: 2017 IEEE international congress on big data
[196] Wind, P., 2021. Vitalik buterin is optimistic on rollups and other (BigData congress), Ieee. pp. 557–564.
layer 2 solutions to bring sufficient scaling to ethereum. URL: [216] Zhong, H., Sang, Y., Zhang, Y., Xi, Z., 2020. Secure multi-party
https://shorturl.at/oFGK8. computation on blockchain: An overview, in: Parallel Architec-
[197] Wohrer, M., Zdun, U., 2018. Smart contracts: security patterns in the tures, Algorithms and Programming: 10th International Symposium,
ethereum ecosystem and solidity, in: 2018 International Workshop PAAP 2019, Guangzhou, China, December 12–14, 2019, Revised
on Blockchain Oriented Software Engineering (IWBOSE), IEEE. Selected Papers 10, Springer. pp. 452–460.
pp. 2–8. [217] Zhou, J., Lam, K.Y., 1999. Securing digital signatures for non-
[198] Wu, A., Zhang, Y., Zheng, X., Guo, R., Zhao, Q., Zheng, D., repudiation. Computer Communications 22, 710–716.
2019. Efficient and privacy-preserving traceable attribute-based [218] Zou, W., Lo, D., Kochhar, P.S., Le, X.B.D., Xia, X., Feng, Y.,
encryption in blockchain. Annals of Telecommunications 74, 401– Chen, Z., Xu, B., 2019. Smart contract development: Challenges
411. and opportunities. IEEE Transactions on Software Engineering 47,
[199] Wu, J., Liu, J., Chen, W., Huang, H., Zheng, Z., Zhang, Y., 2021a. 2084–2106.
Detecting mixing services via mining bitcoin transaction network [219] Zwitter, A., Hazenberg, J., 2020. Decentralized network governance:
with hybrid motifs. IEEE Transactions on Systems, Man, and blockchain technology and the future of regulation. Frontiers in
Cybernetics: Systems 52, 2237–2249. Blockchain 3, 12.
[200] Wu, J., Liu, J., Zhao, Y., Zheng, Z., 2021b. Analysis of cryptocur- [220] Zyskind, G., Nathan, O., Pentland, A., 2015. Enigma: Decentralized
rency transactions from a network perspective: An overview. Journal computation platform with guaranteed privacy. arXiv preprint
of Network and Computer Applications 190, 103139. arXiv:1506.03471 .
[201] Wu, L., Hu, Y., Zhou, Y., Wang, H., Luo, X., Wang, Z., Zhang, F.,
Ren, K., 2021c. Towards understanding and demystifying bitcoin
mixing services, in: Proceedings of the Web Conference 2021, pp.
33–44.
[202] Xu, Z., Sun, Q., Han, H., Dong, X., Yan, Z., Zheng, Z., Tian,
W., 2022. Bmtac: a decentralized, auditable, time-limited,
multi-authority attribute access control scheme in blockchain en-
vironment, in: 2022 IEEE Smartworld, Ubiquitous Intelligence
& Computing, Scalable Computing & Communications, Digital
Twin, Privacy Computing, Metaverse, Autonomous & Trusted
Vehicles (SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta),
IEEE. pp. 1997–2002.
[203] Xue, L., Yu, Y., Li, Y., Au, M.H., Du, X., Yang, B., 2019. Efficient
attribute-based encryption with attribute revocation for assured data
deletion. Information Sciences 479, 640–650.
Shivani Jamwal is a M.Sc. Research student at the and Networking (2016-2020), IEEE Journal of Se-
School of Computing Science, the University of lected Areas in Communications, and IEEE Trans-
Glasgow, UK. Prior to her current research de- actions on Machine Learning in Communications
gree, she holds a M.Sc. and B.Tech degrees from Networking.
the University of Glasgow and Amity University
Dubai in 2018 and 2016 respectively. She has
worked as a Graduate Teaching Assistant at the Dr. Nguyen Truong is a Lecturer (i.e., Assistant
University of Glasgow. Her research interests are in Professor) at School of Computing Science, the
the domain of Information Security, Data Privacy, University of Glasgow, UK. Previously, he was a
GDPR, and Blockchain technology. Research Associate at Data Science Institute, De-
partment of Computing, Imperial College London,
UK in 2018-2022. He received his Ph.D, MSc,
José Cano is an Associate Professor in the School and BSc degrees from Liverpool John Moores
of Computing Science at the University of Glas- University, UK, Pohang University of Science and
gow, UK, where he leads the Intelligent Computing Technology, Korea, and Hanoi University of Sci-
Laboratory (gicLAB) and is deputy head of the ence and Technology, Vietnam in 2018, 2013, and
Systems research section. His research interests are 2008, respectively. He was a Software Engineer
in the broad areas of Computer Architecture, Com- at DASAN Networks, a leading company on Net-
puter Systems, Compilers, Machine Learning and working Products and Services in South Korea
Security. José received the MS and PhD degrees in 2012-2015. His research interests are includ-
in Computer Science from Universitat Politècnica ing, but are not limited to, Data Privacy, Security,
de València (UPV), Spain, in 2004 and 2012, re- and Trust, Data Management, Distributed Systems,
spectively. He was a postdoctoral researcher at Uni- Blockchain, and Federated Learning.
versitat Politècnica de Catalunya, Spain, between
2012 and 2013, and at the University of Edinburgh,
UK, between 2014 and 2018. He has authored over
45 refereed publications, and has served as co-
organizer, chair and TPC in numerous conferences
and workshops. He was a member of the IEEE
TPDS Review Board between 2020 and 2021, and
is currently associate editor of ACM TACO. He is
a senior member of IEEE and ACM, and a member
of HiPEAC.