Category | Full Reference | * |
---|---|---|
Web Resources | Alexandre, Ana. “Germany Warns of Privacy Token Usage in Money Laundering and Terrorism”. Cointelegraph. Oct 22, 2019. Accessed before May 2020. https://cointelegraph.com/news/germany-warns-of-privacy-token-usage-in-money-laundering-and-terrorism | |
Web Resources | Ashish. “Introduction to Zero Knowledge Proof: The protocol of next generation Blockchain”. Medium. Oct 08, 2018. Accessed before May 2020. https://medium.com/@kotsbtechcdac/introduction-to-zero-knowledge-proof-the-protocol-of-next-generation-blockchain-305b2fc7f8e5 | |
Web Resources | Beampedia. “Beam”. Creation date unknown. Accessed before May 2020. https://beam.mw/beampedia-item/beam | |
Web Resources | Birch, Joseph. “FATF AML Regulation: Can the Crypto Industry Adapt to the Travel Rule?”. Cointelegraph. Oct 10, 2019. Accessed before May 2020. https://cointelegraph.com/news/fatf-aml-regulation-can-the-crypto-industry-adapt-to-the-travel-rule | |
Web Resources | Cassiopeia Services. “Challenges and issues in cryptocurrency trading: beyond the conversations”. Medium. Feb 28, 2019. Accessed before May 2020. https://cassiopeiaservicesltd.medium.com/challenges-and-issues-in-cryptocurrency-trading-beyond-the-controversies-12bebb7c3849 | |
Web Resources | Chainalysis Team. “Understanding Tornado Cash, Its Sanctions Implications, and Key Compliance Questions”. Chanalysis. Aug 30, 2022. Accessed between October 2022 and February 2023. https://blog.chainalysis.com/reports/tornado-cash-sanctions-challenges/ | |
Web Resources | Chen, Richard. “An Overview of Privacy in Cryptocurrencies”. The Control Blog. Aug 09, 2018. Accessed before May 2020. https://thecontrol.co/an-overview-of-privacy-in-cryptocurrencies-893dc078d0d7 | |
Web Resources | Cohn, Cindy. “Nine Epic Failures of Regulating Cryptography”. Electronic Frontier Foundation. Sep 26, 2014. Accessed before May 2020. https://www.eff.org/deeplinks/2014/09/nine-epic-failures-regulating-cryptography | |
Web Resources | Cryptoslate. “Market Capitalization of Privacy Tokens”. Creation date unknown. Accessed before May 2020. https://cryptoslate.com/cryptos/privacy/ | |
Web Resources | Curran, Brian. “What is the BEAM Coin? Mimblewimble & Grin vs Beam”. Blockonomi. Jan 30, 2019. Accessed before May 2020. https://blockonomi.com/beam-coin-guide | |
Web Resources | Dame-Boyle, Alison. “EFF at 25: Remembering the Case that Established Code as Speech”. Electronic Frontier Foundation. Apr 16, 2015. Accessed before May 2020. https://www.eff.org/deeplinks/2015/04/remembering-case-established-code-speech | |
Web Resources | Darknetlive. “German Officials Claim Monero is Untraceable”. Oct 23, 2019. Accessed before May 2020. https://web.archive.org/web/20220330034819/https://darknetlive.com/post/german-officials-claim-monero-poses-a-money-laundering-threat/ | |
Web Resources | Dusk Network. “Zero Knowledge Smart Contracts on Dusk Network”. Medium. Jul 01, 2019. Accessed before May 2020. https://web.archive.org/web/20191207044734/https://medium.com/dusk-network/zero-knowledge-smart-contracts-on-dusk-network-85f95644d673 | |
Web Resources | Jedusor, Tom E. “MIMBLEWIMBLE”. Jul 19, 2016. Accessed before May 2020. https://download.wpsoftware.net/bitcoin/wizardry/mimblewimble.txt | |
Web Resources | Kappos, George. “USENIX Security ‘18 - An Empirical Analysis of Anonymity in Zcash”. Posted by “USENIX”. Sep 18, 2018. Accessed before May 2020. https://www.youtube.com/watch?v=onIVyKg3kAI&ab_channel=USENIX | |
Web Resources | Liu, Kevin. “2019 Privacy Token Review”. Hackernoon. Feb 16, 2019. Accessed before May 2020. https://hackernoon.com/2019-privacy-token-review-c28b6ceef637 | |
Web Resources | Monero. “About Monero: A Brief History”. Creation date unknown. Accessed before May 2020. https://www.getmonero.org/resources/about/ | |
Web Resources | Office of Foreign Assets Control. “Specially Designated Nationals And Blocked Persons List (SDN) Human Readable Lists”. Sep 02, 2022. Accessed between October 2022 and February 2023. https://ofac.treasury.gov/specially-designated-nationals-and-blocked-persons-list-sdn-human-readable-lists | |
Web Resources | Opsahl, Kurt. “Code, Speech, and the Tornado Cash Mixer”. Electronic Frontier Foundation. Aug 22, 2022. Accessed between October 2022 and February 2023. https://www.eff.org/deeplinks/2022/08/code-speech-and-tornado-cash-mixer | |
Web Resources | Patel, Nik. “Coin Report #36: PirateChain”. Altcoin Trader’s Handbook. Oct 03, 2019. Accessed before May 2020. https://www.altcointradershandbook.com/coin-report-piratechain/ | |
Web Resources | Riggins, Jennifer. “Are Programmers Ethically (and Legally) Responsible for Their Code?”. Thenewstack. Aug 16, 2018. Accessed before May 2020. https://thenewstack.io/are-programmers-ethically-and-legally-responsible-for-their-code/ | |
Web Resources | Sun, Yi; Zhang, Yan. “Privacy in Cryptocurrencies: An Overview”. Medium. Oct 25, 2018. Accessed before May 2020. https://medium.com/@yi.sun/privacy-in-cryptocurrencies-d4b268157f6c | |
Web Resources | Sun, Yi; Zhang, Yan. “Privacy in Cryptocurrencies: Mixing-based Approaches”. Medium. Dec 04, 2018. Accessed before May 2020. https://medium.com/@yi.sun/privacy-in-cryptocurrencies-mixing-based-approaches-ce08d0040c88 | |
Web Resources | Sun, Yi; Zhang, Yan. “Privacy in Cryptocurrencies: Zero-Knowledge and zk-SNARKs (1/2)”. Medium. Jan 25, 2019. Accessed before May 2020. https://medium.com/@krzhang/privacy-in-cryptocurrencies-zero-knowledge-and-zk-snarks-1-2-68ce1838fd9c | |
Web Resources | Trustnodes. “EY Scaling Ethereum with ZK-Snarks, 20 Transactions For the Cost of One”. Dec 05, 2019. Accessed before May 2020. https://www.trustnodes.com/2019/12/05/ey-scaling-ethereum-with-zk-snarks-20-transactions-for-the-cost-of-one | |
Web Resources | U.S. Department Of The Treasury. “U.S. Treasury Sanctions Notorious Virtual Currency Mixer Tornado Cash”. Aug 08, 2022. Accessed between October 2022 and February 2023. https://home.treasury.gov/news/press-releases/jy0916 | |
Web Resources | Vikati, Alex. “How Private Are Privacy Coins: A Closer Look at Zcash and Zclassic’s Blockchains”. Hackernoon. Mar 01, 2018. Accessed before May 2020. https://hackernoon.com/how-private-are-privacy-coins-a-closer-look-at-zcash-and-zclassics-blockchains-32dae60d5b9f | |
Web Resources | Walters, Steve. “BEAM Review: Mimblewimble Based Scalable Privacy Coin”. Coinbureau. Oct 08, 2019. Accessed before May 2020. https://www.coinbureau.com/review/beam-coin/ | |
Web Resources | Willemse, Linda. “Beam, the Privacy Focused Cryptocurrency Built on The Mimblewimble Protocol”. Hackernoon. Feb 06, 2019. Accessed before May 2020. https://hackernoon.com/beam-the-privacy-focused-cryptocurrency-built-on-the-mimblewimble-protocol-7540b289a45 | |
Web Resources | Young, Joseph. “Privacy-Focused Cryptos Hunted Down by Forensics and Exchanges”. Cointelegraph. Oct 25, 2019. Accessed before May 2020. https://cointelegraph.com/news/privacy-focused-cryptos-hunted-down-by-forensics-and-exchanges | |
Web Resources | Zcash. “What are zk-SNARKs?”. Sep 21, 2018. Accessed Nov 20, 2019. https://z.cash/technology/zksnarks/ | |
Books | Berg, Chris. The Classical Liberal Case for Privacy in a World of Surveillance and Technological Change. London: Palgrave Macmillan, 2018. | |
Books | Schulz, Wolfgang; Hoboken, Joris v. Human rights and encryption. UNESCO, 2016. https://unesdoc.unesco.org/ark:/48223/pf0000246527. | |
Books | Williamson, Oliver E. The Economic Institutions of Capitalism. New York: Free Press, 1988. | |
Papers | Abramova, Svetlana; Böhme, Rainer. “Your Money or Your Privacy: A Systematic Approach to Coin Selection”. Cryptoeconomics Systems Journal (2020): https://assets.pubpub.org/dwq1f9g6/71581340076503.pdf | |
Papers | Alonso, Kurt M. “Zero To Monero: First Edition - A Technical Guide To A Private Digital Currency; For Beginners, Amateurs, And Experts”. Monero (2018): https://web.archive.org/web/20220723113859/https://www.getmonero.org/library/Zero-to-Monero-1-0-0.pdf | |
Papers | Androulaki, Elli; Karame, Ghassan O.; Roeschlin, Marc; Scherer, Tobias; Capkun, Srdjan. “Evaluating User Privacy in Bitcoin”. Presented at FC 2013: International Conference on Financial Cryptography and Data Security. Okinawa, Japan. April 1-5 (2013): pp. 34-51. | |
Papers | Behera, Chandan K.; Bhaskari, Lalitha. “Different Obfuscation Techniques for Code Protection”. Procedia Computer Science Volume 70 (2015): pp. 757-763. https://www.sciencedirect.com/science/article/pii/S1877050915032780 | |
Papers | Berg, Alastair; Berg, Chris; Davidson, Sinclair; Potts, Jason. “The Institutional Economics of Identity”. RMIT University Working Paper (2017): https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3072823 | |
Papers | Berg, Alastair. “Identity in Economics: A Review”. SSRN Electronic Journal (September 2019): http://dx.doi.org/10.2139/ssrn.3421215 | |
Papers | Berg, Alastair. “The Identity, Fungibility, and Anonymity of Money”. SSRN Electronic Journal Volume 39, Issue 2 (July 2018): pp. 104-117. http://dx.doi.org/10.2139/ssrn.3211011 | |
Papers | Berg, Chris; Davidson, Sinclair. “Selling Your Data Without Selling Your Soul”. Competitive Enterprise Institute Issue Analysis Number 4 (2019): pp. 1-32. https://cei.org/sites/default/files/data-privacy-paper-final.pdf | |
Papers | Buckley, Ross P.; Stanley, Rebecca. “Protecting the West, Excluding the Rest: The Impact of the AML/CTF Regime on Financial Inclusion in the Pacific, and Potential Responses”. Melbourne Journal of International Law Volume 17, Issue 1 (2016): pp. 83-106. https://dx.doi.org/10.2139/ssrn.2738330 | |
Papers | Chaum, David. “Achieving Electronic Privacy”. Scientific American Volume 267, Issue 2 (1992): pp. 96-101. https://chaum.com/wp-content/uploads/2021/12/ScientificAmerican-AEP.pdf | |
Papers | Coase, Ronald H. “The Nature of the Firm”. Economica Volume 4, Issue 16 (1937): pp. 386-405. https://onlinelibrary.wiley.com/doi/10.1111/j.1468-0335.1937.tb00002.x | |
Papers | Coase, Ronald H. “The Problem Of Social Cost”. The Journal of Law & Economics Volume 3 (1960): pp. 1-44. https://www.jstor.org/stable/724810 | |
Papers | Goldfeder, Steven; Kalodner, Harry; Reisman, Dillon; Narayanan, Arvind. “When the cookie meets the blockchain: Privacy risks of web payments via cryptocurrencies”. Proceedings on Privacy Enhancing Technologies Issue 4 (2018): pp. 179-199. https://www.petsymposium.org/2018/files/papers/issue4/popets-2018-0038.pdf | |
Papers | Kahn, Charles M.; McAndrew, James; Roberds, Wiliam. “Money is Privacy”. International Economics Review Volume 46, Issue 2 (2005): pp. 377-399. https://www.jstor.org/stable/3663561 | |
Papers | Kumar, Amrit; Fischer, Clément; Tople, Shruti; Saxena, Prateek. “A Traceability Analysis of Monero’s Blockchain”. Proceedings of the European Symposium on Research in Computer Security. Oslo, Norway. September 11-15 (2017): pp. 153-173. https://link.springer.com/chapter/10.1007/978-3-319-66399-9_9 | |
Papers | Lalouette, Laure; Esselink, Henk. “Trends and developments in the use of euro cash over the past ten years”. European Central Bank Economic Bulletin Issue 6 (2018). https://www.ecb.europa.eu/pub/economic-bulletin/html/eb201806.en.html | |
Papers | Meiklejohn, Sarah; Pomarole, Marjori; Jordan, Grant; Levchenko, Kirill; McCoy, Damon; Voelker, Geoffrey M.; Savage, Stefan. “A fistful of Bitcoins: characterizing payments among men with no names”. Communications of the ACM Volume 59, Issue 4 (2016): pp. 86-93. https://dl.acm.org/doi/10.1145/2896384 | |
Papers | Möser, Malte; Soska, Kyle; Heilman, Ethan; Lee, Kevin; Heffan, Henry; Srivastava, Shashvat; Hogan, Kyle; et al. “An Empirical Analysis of Traceability in the Monero Blockchain”. Proceedings on Privacy Enhancing Technologies Volume 3 (2018): pp. 143-163. 10.1515/popets-2018-0025 | |
Papers | Quesnelle, Jeffrey. “On the linkability of Zcash transactions”. arXiv (2017): https://doi.org/10.48550/arXiv.1712.01210 | |
Papers | Reid, Fergal; Harrigan Martin. “An Analysis of Anonymity in the Bitcoin System”. Proceedings of the IEEE Third International Conference on Privacy, Security, Risk and Trust. Boston, USA. October 9-11 (2011): https://ieeexplore.ieee.org/document/6113303 | |
Papers | Reid, Kenneth G. C. “Banknotes and Their Vindication in Eighteenth-Century Scotland”. University of Edinburgh School of Law Working Paper Number 19 (2013): https://www.pure.ed.ac.uk/ws/portalfiles/portal/13523302/Reid_Banknotes.pdf | |
Papers | Ron, Dorit; Shamir, Adi. “Quantitative Analysis of the Full Bitcoin Transaction Graph”. Presented at FC 2013: International Conference on Financial Cryptography and Data Security. Okinawa, Japan. April 1-5 (2013): pp. 6-24. https://link.springer.com/chapter/10.1007/978-3-642-39884-1_2 | |
Papers | Williamson, Oliver E. “Transaction-Cost Economics: The Governance of Contractual Relations”. The Journal of Law & Economics Volume 22, Issue 2 (1979): pp. 233-261. https://www.jstor.org/stable/725118 | |
Papers | Yousaf, Haaroon; Kappos, George; Meiklejohn, Sarah. “Tracing Transactions Across Cryptocurrency Ledgers”. Proceedings of the 28th USENIX Security Symposium. Santa Clara, USA. August 14-16 (2019): https://www.usenix.org/system/files/sec19-yousaf_0.pdf | |
Papers | Zhang, Rui; Xue, Rui; Liu, Ling. “Security and Privacy on Blockchain”. ACM Computing Surveys Volume 53, Issue 3 (2020): pp. 1-34. https://doi.org/10.1145/3316481 | |
Project | AceD: https://web.archive.org/web/20220107034257/https://www.acedcoin.com/ | |
Project | Anoncoin: https://web.archive.org/web/20210618003059/https://anoncrypto.io/ | |
Project | Apollo: https://apollocurrency.com/ | |
Project | Arpa: https://arpachain.io/ | |
Project | Arqma: https://arqma.com/ | |
Project | Beam: https://beam.mw/ | |
Project | Beldex: https://web.archive.org/web/20210301163755/https://www.beldex.io/coin | |
Project | Bulwark: https://github.com/bulwark-crypto | |
Project | Bytecoin: https://bytecoin.org/ | |
Project | Bzedge: http://web.archive.org/web/20201001014839/https://getbze.com/ | |
Project | CloakCoin: https://www.cloakcoin.com/ | |
Project | Cova: https://web.archive.org/web/20190308074310/https://covalent.ai/ | |
Project | Crypticcoin: https://web.archive.org/web/20190528202359/https://crypticcoin.io/ | |
Project | Cuckoo: http://web.archive.org/web/20180814004333/https://github.com/tromp/cuckoo | |
Project | CUTcoin: http://cutcoin.org/ | |
Project | DAPS Coin: https://officialdapscoin.com/ | |
Project | Dash: https://www.dash.org/ | |
Project | Deeponion: https://deeponion.org/ | |
Project | Digitalnote: https://www.digitalnote.biz/ | |
Project | Dusk network: https://dusk.network/ | |
Project | Firo (Formerly ZCoin): https://zcoin.io/ | |
Project | Grin: https://grin-tech.org/ | |
Project | Horizen: https://horizen.global/ | |
Project | Hush: https://myhush.org/ | |
Project | Innovacoin: https://web.archive.org/web/20200501163204/https://innovacoin.io/ | |
Project | Komodo: https://komodoplatform.com/ | |
Project | Lobstex: https://web.archive.org/web/20190404012342/https://www.lobstex.com/ | |
Project | Loki: https://web.archive.org/web/20210308072139/https://loki.network/ | |
Project | Monero: https://www.getmonero.org/ | |
Project | Monerov: https://monerov.org/ | |
Project | Navcoin: https://navcoin.org/en | |
Project | Nightfall: https://github.com/EYBlockchain/nightfall | |
Project | Nix: https://web.archive.org/web/20200516184006/https://nixplatform.io/ | |
Project | ||
Project | Origo: https://origo.network/ | |
Project | Particl: https://particl.io/ | |
Project | pEOS: https://peos.one/ | |
Project | Phore: https://phore.io/ | |
Project | Piratechain: https://pirate.black/ | |
Project | Pivx: https://pivx.org/ | |
Project | ||
Project | Safecoin: https://safecoin.org/ | |
Project | Safex: https://safex.io/ | |
Project | Solariscoin (Fintatoken): https://solariscoin.com/ | |
Project | Spectrecoin: https://spectreproject.io/ | |
Project | Stealth: https://stealth.org/ | |
Project | Sumokoin: https://www.sumokoin.org/ | |
Project | Tarush: https://web.archive.org/web/20191002083814/https://tarush.tech/ | |
Project | Tixl (Autobahn Network): https://tixl.me/ | |
Project | Veil: https://veil-project.com | |
Project | Xuez: https://xuezcoin.com/ | |
Project | Zcash: https://z.cash/ | |
Project | zClassic: https://zclassic.org/ | |
Project | Zumcoin: https://web.archive.org/web/20220729234925/https://zumcoin.org/ |
Token Economy (Third Edition)
Volume: Web3 Infrastructure
Chapter: Privacy Tokens
Publication Date: 2023
This page lists all the sources used for the research of the chapters and provides a reading list for those who want to learn more about the topics in this chapter. The references are sorted by category, alphabetically, and by date when you select the drop down menu. In the date view, if the full date of a book or academic paper is not known, the last day of the publication year is used. The links on this page will be updated regularly to avoid broken links. Some links, especially those to the Internet Archives, may not be accessible in certain regions due to censorship. Thanks to Quentin Botha for the idea and the manual effort to categorize the references in this database format!