Please use this identifier to cite or link to this item:
http://hdl.handle.net/1893/31688
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Wang, Yilei | en_UK |
dc.contributor.author | Bracciali, Andrea | en_UK |
dc.contributor.author | Yang, Guoyu | en_UK |
dc.contributor.author | Li, Tao | en_UK |
dc.contributor.author | Yu, Xiaomei | en_UK |
dc.date.accessioned | 2020-09-19T00:07:21Z | - |
dc.date.available | 2020-09-19T00:07:21Z | - |
dc.date.issued | 2020 | en_UK |
dc.identifier.other | 106605 | en_UK |
dc.identifier.uri | http://hdl.handle.net/1893/31688 | - |
dc.description.abstract | Criminals can launder crypto-currencies through mixing coins, whose original purpose is preservation of privacy in the presence of traceability. Therefore, it is essential to elaborately design mixing polices to achieve both privacy and anti-money laundering. Existing work on mixing policies relies on the knowledge of a blacklist. However, these policies are paralysed under the scenario where the blacklist is unknown or evolving. In this paper, we regard the above scenario as games under incomplete information where parties put down a deposit for the quality of coins, which is suitably managed by a smart contract in case of mixing bad coins. We extend the poison and haircut policies to incomplete information games, where the blacklist is updated after mixing. We prove the existence of equilibria for the improved polices, while it is known that there is no equilibria in the original poison and haircut policies, where blacklist is public known. Furthermore, we propose a seminal suicide policy: the one who mixes more bad coins will be punished by not having the deposit refunded. Thus, parties have no incentives to launder money by leveraging mixing coins. In effect, all three policies contrast money laundering while preserving privacy under incomplete information. Finally, we simulate and verify the validity of these policies. | en_UK |
dc.language.iso | en | en_UK |
dc.publisher | Elsevier | en_UK |
dc.relation | Wang Y, Bracciali A, Yang G, Li T & Yu X (2020) Adversarial behaviours in mixing coins under incomplete information. Applied Soft Computing, 96, Art. No.: 106605. https://doi.org/10.1016/j.asoc.2020.106605 | en_UK |
dc.rights | This item has been embargoed for a period. During the embargo please use the Request a Copy feature at the foot of the Repository record to request a copy directly from the author. You can only request a copy if you wish to use this work for your own research or private study. Accepted refereed manuscript of: Wang Y, Bracciali A, Yang G, Li T & Yu X (2020) Adversarial behaviours in mixing coins under incomplete information. Applied Soft Computing, 96, Art. No.: 106605. https://doi.org/10.1016/j.asoc.2020.106605 © 2020, Elsevier. Licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_UK |
dc.rights.uri | http://creativecommons.org/licenses/by-nc-nd/4.0/ | en_UK |
dc.subject | Mixing coins | en_UK |
dc.subject | Incomplete information | en_UK |
dc.subject | Smart contract | en_UK |
dc.subject | Equilibrium | en_UK |
dc.title | Adversarial behaviours in mixing coins under incomplete information | en_UK |
dc.type | Journal Article | en_UK |
dc.rights.embargodate | 2021-08-05 | en_UK |
dc.rights.embargoreason | [Adversarial_Yilei-1.pdf] Publisher requires embargo of 12 months after formal publication. | en_UK |
dc.identifier.doi | 10.1016/j.asoc.2020.106605 | en_UK |
dc.citation.jtitle | Applied Soft Computing | en_UK |
dc.citation.issn | 1568-4946 | en_UK |
dc.citation.volume | 96 | en_UK |
dc.citation.publicationstatus | Published | en_UK |
dc.citation.peerreviewed | Refereed | en_UK |
dc.type.status | AM - Accepted Manuscript | en_UK |
dc.author.email | abb@cs.stir.ac.uk | en_UK |
dc.citation.date | 04/08/2020 | en_UK |
dc.contributor.affiliation | Qufu Normal University | en_UK |
dc.contributor.affiliation | Computing Science | en_UK |
dc.contributor.affiliation | Qufu Normal University | en_UK |
dc.contributor.affiliation | Guizhou University | en_UK |
dc.contributor.affiliation | Shandong Normal University | en_UK |
dc.identifier.isi | WOS:000582762000029 | en_UK |
dc.identifier.scopusid | 2-s2.0-85089480676 | en_UK |
dc.identifier.wtid | 1659698 | en_UK |
dc.contributor.orcid | 0000-0003-1451-9260 | en_UK |
dc.date.accepted | 2020-07-29 | en_UK |
dcterms.dateAccepted | 2020-07-29 | en_UK |
dc.date.filedepositdate | 2020-09-18 | en_UK |
rioxxterms.apc | not required | en_UK |
rioxxterms.type | Journal Article/Review | en_UK |
rioxxterms.version | AM | en_UK |
local.rioxx.author | Wang, Yilei| | en_UK |
local.rioxx.author | Bracciali, Andrea|0000-0003-1451-9260 | en_UK |
local.rioxx.author | Yang, Guoyu| | en_UK |
local.rioxx.author | Li, Tao| | en_UK |
local.rioxx.author | Yu, Xiaomei| | en_UK |
local.rioxx.project | Internal Project|University of Stirling|https://isni.org/isni/0000000122484331 | en_UK |
local.rioxx.freetoreaddate | 2021-08-05 | en_UK |
local.rioxx.licence | http://www.rioxx.net/licenses/under-embargo-all-rights-reserved||2021-08-04 | en_UK |
local.rioxx.licence | http://creativecommons.org/licenses/by-nc-nd/4.0/|2021-08-05| | en_UK |
local.rioxx.filename | Adversarial_Yilei-1.pdf | en_UK |
local.rioxx.filecount | 1 | en_UK |
local.rioxx.source | 1568-4946 | en_UK |
Appears in Collections: | Computing Science and Mathematics Journal Articles |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
Adversarial_Yilei-1.pdf | Fulltext - Accepted Version | 481.48 kB | Adobe PDF | View/Open |
This item is protected by original copyright |
A file in this item is licensed under a Creative Commons License
Items in the Repository are protected by copyright, with all rights reserved, unless otherwise indicated.
The metadata of the records in the Repository are available under the CC0 public domain dedication: No Rights Reserved https://creativecommons.org/publicdomain/zero/1.0/
If you believe that any material held in STORRE infringes copyright, please contact library@stir.ac.uk providing details and we will remove the Work from public display in STORRE and investigate your claim.