7
0

EGNInfoLeaker: Unveiling the Risks of Public Key Reuse and User Identity Leakage in Blockchain

Chenyu Li
Xueping Liang
Xiaorui Gong
Xiu Zhang
Main:9 Pages
12 Figures
Bibliography:2 Pages
1 Tables
Abstract

While Ethereum's discovery protocols (Discv4/ Discv5) incorporate robust cryptographic designs to protect user privacy, real-world deployment reveals critical vulnerabilities when users deviate from security guidelines. In this paper, we design a system called EGNInfoLeaker. Our study is the first work that uncovers widespread public key reuse across Ethereum's peer-to-peer networks - a practice that fundamentally undermines the protocol's privacy guarantees. Through systematic analysis of 300 real-world network snapshots, we identify 83 users controlling 483 service nodes via public key reuse, enabling precise de-anonymization through IP correlation. Using evidence collected by EGNInfoLeaker, our Graph-Based Identity Association Algorithm links users to network entities and generates comprehensive user profiles. For User27, it exposes the public key, IP, network ID, location (country/region/city), and ISP/ORG details. The EGNInfoLeaker system demonstrates how such cryptographic misuse transforms theoretical anonymity into practical identity leakage, exposing users to surveillance and targeted attacks. These findings establish that protocol security depends not only on sound design but also on strict user compliance. Going forward, our detection framework provides a foundation for enhancing real-world privacy preservation in decentralized networks.

View on arXiv
@article{li2025_2507.01635,
  title={ EGNInfoLeaker: Unveiling the Risks of Public Key Reuse and User Identity Leakage in Blockchain },
  author={ Chenyu Li and Xueping Liang and Xiaorui Gong and Xiu Zhang },
  journal={arXiv preprint arXiv:2507.01635},
  year={ 2025 }
}
Comments on this paper