Introduction Detecting malicious activity in cryptocurrency networks like Bitcoin relies on datasets labeled with licit and illicit transactions. However, these datasets often suffer from...
Introduction Ring Signatures Overview The main idea behind ring signatures is that a user $u$, who is part of a user group $$R =...