Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (4)

Search Parameters:
Keywords = probability of successful double-spend

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
33 pages, 5696 KB  
Article
DiFastBit: Transaction Differentiation Scheme to Avoid Double-Spending for Fast Bitcoin Payments
by David Melo, Saúl Eduardo Pomares-Hernández, Lil María Rodríguez-Henríquez and Julio César Pérez-Sansalvador
Mathematics 2024, 12(16), 2484; https://doi.org/10.3390/math12162484 - 11 Aug 2024
Cited by 1 | Viewed by 3228
Abstract
Bitcoin is a payment system that generates a decentralized digital currency without ensuring temporal constraints in its transactions; therefore, it is vulnerable to double-spending attacks. Karame has proposed a formalization for a successful double-spending attack based on meeting three requirements. This focuses on [...] Read more.
Bitcoin is a payment system that generates a decentralized digital currency without ensuring temporal constraints in its transactions; therefore, it is vulnerable to double-spending attacks. Karame has proposed a formalization for a successful double-spending attack based on meeting three requirements. This focuses on fast payment scenarios where the product is delivered immediately after the payment is announced in the mempool, without waiting for transaction confirmation. This scenario is key in Bitcoin to increase the probability of a successful double-spending attack. Different approaches have been proposed to mitigate these attacks by addressing one or more of Karame’s three requirements. These include the following: flooding every transaction without restrictions, introducing listeners/observers, avoiding isolation by blocking incoming connections, penalizing malicious users by revealing their identity, and using machine learning and bio-inspired techniques. However, to our knowledge, no proposal deterministically avoids double-spending attacks in fast payment scenarios. In this paper, we introduce DiFastBit: a distributed transaction differentiation scheme that shields Bitcoin from double-spending attacks in fast payment scenarios. To achieve this, we modeled Bitcoin from a distributed perspective of events and processes, reformulated Karame’s requirements based on Lamport’s happened-before relation (HBR), and introduced a new theorem that consolidates the reformulated requirements and establishes the necessary conditions for a successful attack on fast Bitcoin payments. Finally, we introduce the specifications for DiFastBit, formally prove its correctness, and analyze DiFastBit’s confirmation time. Full article
(This article belongs to the Special Issue Modeling and Simulation Analysis of Blockchain System)
Show Figures

Figure 1

13 pages, 550 KB  
Communication
Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus
by Mikolaj Karpinski, Lyudmila Kovalchuk, Roman Kochan, Roman Oliynykov, Mariia Rodinko and Lukasz Wieclaw
Sensors 2021, 21(19), 6408; https://doi.org/10.3390/s21196408 - 25 Sep 2021
Cited by 15 | Viewed by 5361
Abstract
Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends on the network parameters and the number of confirmation blocks. These results can be used to define how many confirmation blocks [...] Read more.
Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends on the network parameters and the number of confirmation blocks. These results can be used to define how many confirmation blocks a vendor should wait after a correspondent transaction before sending goods or services. Full article
(This article belongs to the Special Issue Internet of Things for Smart Community Solutions)
Show Figures

Figure 1

23 pages, 541 KB  
Article
Profitable Double-Spending Attacks
by Jehyuk Jang and Heung-No Lee
Appl. Sci. 2020, 10(23), 8477; https://doi.org/10.3390/app10238477 - 27 Nov 2020
Cited by 32 | Viewed by 6365 | Correction
Abstract
Our aim in this paper is to investigate the profitability of double-spending (DS) attacks that manipulate an a priori mined transaction in a blockchain. It was well understood that a successful DS attack is established when the proportion of computing power an attacker [...] Read more.
Our aim in this paper is to investigate the profitability of double-spending (DS) attacks that manipulate an a priori mined transaction in a blockchain. It was well understood that a successful DS attack is established when the proportion of computing power an attacker possesses is higher than that of the honest network. What is not yet well understood is how threatening a DS attack with less than 50% computing power used can be. Namely, DS attacks at any proportion can be a threat as long as the chance to make a good profit exists. Profit is obtained when the revenue from making a successful DS attack is greater than the cost of carrying out one. We have developed a novel probability theory for calculating a finitetime attack probability. This can be used to size up attack resources needed to obtain the profit. The results enable us to derive a sufficient and necessary condition on the value of a transaction targeted by a DS attack. Our result is quite surprising: we theoretically show how a DS attack at any proportion of computing power can be made profitable. Given one’s transaction value, the results can also be used to assess the risk of a DS attack. An example of profitable DS attack against BitcoinCash is provided. Full article
(This article belongs to the Special Issue New Trends in Blockchain Technology)
Show Figures

Figure 1

10 pages, 366 KB  
Proceeding Paper
Optimal Transaction Throughput in Proof-of-Work Based Blockchain Networks
by B. Swaroopa Reddy and G. V. V. Sharma
Proceedings 2019, 28(1), 6; https://doi.org/10.3390/proceedings2019028006 - 22 Oct 2019
Cited by 2 | Viewed by 2289
Abstract
As of today, Bitcoin suffers with restrictive transaction throughput of 3–7 transactions per sec and the transaction confirmation takes several min as bitcoin blockchain was designed with a block creation time of 10 min and each block is restricted with less blocksize for [...] Read more.
As of today, Bitcoin suffers with restrictive transaction throughput of 3–7 transactions per sec and the transaction confirmation takes several min as bitcoin blockchain was designed with a block creation time of 10 min and each block is restricted with less blocksize for fast transmission. In this paper, we obtained the optimal transaction throughput for a Proof-of-Work (PoW) based longest chain rule blockchain network (called bitcoin protocol). This is done by modeling the delay diameter (D) and double spending attack in a Erd o ¨ s-R e ´ nyi random network topology as constraints. Through numerical results, it is shown that the throughput can be significatly improved without compromising the fairness of the network. Full article
Show Figures

Figure 1

Back to TopTop