Text Correction
- 1.
- There was an error in the original publication [1]: “In a recentralized network, since most computing resources are concentrated on a small number of pools, it could be not difficult for them to conspire to alter the block content for their own benefits, if not aiming to double-spend, more probable.”
A correction has been made to this sentence located in Section 1, Introduction, in paragraph 4 on line 7:
“In a recentralized network, since most computing resources are concentrated on a small number of pools, it could be not difficult for them to conspire to alter the block content for their own benefits, if aiming to double-spend.
”
- 2.
- There was an error in the original publication: “Definition 2. For a given cut-time , the success of DS attack is declared if and only if there exists a DSA time at which and in Definition 1 has been achieved.”
A correction has been made to Definition 2:
“Definition 2. For a given cut-time, the success of DS attack is declared if, and only if, there exists a DSA time atwhich and inDefinition1havebeenachieved.”
- 3.
- There was an error in the original publication: “The sets for each are mutually exclusive as each of them represents the first satisfaction of the block confirmation condition exactly at the -th state.”
A correction has been made to this sentence located in Section 2, The Attack Model, Section 2.3, DS Attack Achieving Time, in the paragraph 5 on line 1:
“The sets for all
are mutually exclusive as each of them represents the first satisfaction of the block confirmation condition exactly at the
-th state.”
- 4.
- There was an error in the original publication: “From Equation (13), the PDF of requires the probabilities of two random events; one is the state progression time in Equation (5); and the other is the event that a given state index satisfies .”
A correction has been made to this sentence located in Section 3, The Attack Probabilities, in the paragraph 2 on line 1:
“From Equation (13), the PDF of requires the probabilities of two random events: one is the state progression time in Equation (5); and the other is the event that a given state index satisfies .”
- 5.
- There was an error in the original publication: “By taking infinite summations of in Lemma 1 for all indices , we can compute the probability that a DS attack will ever achieve the necessary conditions in Definition 1.”
A correction has been made to this sentence located in Section 3, The Attack Probabilities, in the paragraph 4 on line 1:
“By taking infinite summations of
in Lemma 1 for all indices
, we can compute the probability
that a DS attack will ever achieve the necessary conditions in Definition 1.”
- 6.
- There was an error in the original publication: “If there does not exist such an index , with the probability of , then .”
A correction has been made to this sentence located in Section 3, The Attack Probabilities, in the paragraph 5 on line 2:
“If there does not exist such an index
, with the probability of
,
.
”
- 7.
- There was an error to Equation (19) in the original publication:
A correction has been made to Equation (19):
- 8.
- There was an error in the original publication: “The previous probabilistic analyses in [1,6] show that the success of DS attacks is not guaranteed when .”
A correction has been made to this sentence located in Section 4, Profitable DS Attacks, in the paragraph 1 on line 1:
“The previous probabilistic analyses in [1,6] have shown that the success of DS attacks is not guaranteed when .”
- 9.
- There was an error in the original publication: “With regards to , if an attack succeeds, the revenue comes from , as it is double-spent, and for the number of blocks minded during the time duration , i.e., .”
A correction has been made to this sentence located in Section 4, Profitable DS Attacks, in the paragraph 4 on line 1:
”With regards to
, if an attack succeeds, the revenue comes from
, as it is double-spent,
added to
for the number of blocks mined during the time duration
, i.e.,
.”
- 10.
- There was an error to Equation (35) in the original publication:
A correction has been made to Equation (35):
- 11.
- There was an error in the original publication: “Specifically, under, it is required for the honest chain to have added blocks, while under their condition, it was the fraudulent chain to do so (see Section 3 of [16]).”
A correction has been made to a sentence located in Section 6, Related Works, in the paragraph 10 on line 6:
“Specifically, under our definition, it is required for the honest chain to have added blocks, while under their condition it was fraudulent for the chain to do so (see Section 3 of [16]).
”
- 12.
- There was an error in the original publication: “Note that for , since the minimum number of states for an attack success is ; number of ’s state transitions for the block confirmation; and number of ’s state transitions for the success of PoW competition. Thus, for . □”
A correction has been made to the paragraph 2 of Appendix A, Proof of Lemma 1:
“Note that
for
for , since the minimum number of states for an attack success is
:
number of +1’s state transitions for the block confirmation; and
number of −1’s state transitions for the success of PoW competition. Thus,
for
.”
- 13.
- There was an error in the original publication: “Finally, substituting Equation (A3) and Equation (A4) into Equation (A2) results in Equation (15).”
A correction has been made to the last paragraph of Appendix A, Proof of Lemma 1:
“Finally, substituting Equations (A3) and (A4) into Equation (A2) results in Equation (15). □
”
- 14.
- There was an error in the original publication: “From Equation (19) and Equation (26), when , we obtainwhere [22].”
A correction has been made to this sentence located in Appendix B, Proof of Proposition 2, in the paragraph 1 on line 1:
“From Equations (19) and (26), when , we obtain
where [22]. ”
- 15.
- There was an error in the original publication: “Attack success probability ()”
A correction has been made to the second item on the first column of Table 1:
“Attack success probability ()”
- 16.
- There was an error in the original publication: “Attack success probability ()”
A correction has been made to the second item on the first column of Table 2:
“Attack success probability ()”
The authors apologize for any inconvenience caused and state that the scientific conclusions are unaffected. This correction was approved by the Academic Editor. The original publication has also been updated.
Reference
- Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).