Inicio  /  Applied Sciences  /  Vol: 10 Par: 23 (2020)  /  Artículo
ARTÍCULO
TITULO

Profitable Double-Spending Attacks

Jehyuk Jang and Heung-No Lee    

Resumen

Our aim in this paper is to investigate the profitability of double-spending (DS) attacks that manipulate an a priori mined transaction in a blockchain. It was well understood that a successful DS attack is established when the proportion of computing power an attacker possesses is higher than that of the honest network. What is not yet well understood is how threatening a DS attack with less than 50% computing power used can be. Namely, DS attacks at any proportion can be a threat as long as the chance to make a good profit exists. Profit is obtained when the revenue from making a successful DS attack is greater than the cost of carrying out one. We have developed a novel probability theory for calculating a finite time attack probability. This can be used to size up attack resources needed to obtain the profit. The results enable us to derive a sufficient and necessary condition on the value of a transaction targeted by a DS attack. Our result is quite surprising: we theoretically show how a DS attack at any proportion of computing power can be made profitable. Given one?s transaction value, the results can also be used to assess the risk of a DS attack. An example of profitable DS attack against BitcoinCash is provided.

 Artículos similares

       
 
Georgios M. Nikolopoulos and Marc Fischlin    
Quantum key distribution protocols allow two honest distant parties to establish a common truly random secret key in the presence of powerful adversaries, provided that the two users share a short secret key beforehand. This pre-shared secret key is used... ver más
Revista: Applied Sciences

 
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu    
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho... ver más
Revista: Applied Sciences

 
Mohamed Shenify, Fokrul Alom Mazarbhuiya and A. S. Wungreiphi    
There are many applications of anomaly detection in the Internet of Things domain. IoT technology consists of a large number of interconnecting digital devices not only generating huge data continuously but also making real-time computations. Since IoT d... ver más
Revista: Applied Sciences

 
Junyao Zhang, Hao Zhan and Baigang Mi    
The submerged inlet exhibits good stealth characteristics and lower drag, but it has a low total pressure recovery coefficient and high distortion rate, which limits its widespread application. This paper proposes a vortex diverter aimed at enhancing the... ver más
Revista: Aerospace

 
Changwu Liang, Hong Li, Taoyong Su, Caleb Alistair Frank and Kewei Li    
An electrically controlled rotor (ECR), also known as a swashplateless rotor, eliminates the swashplate system to implement the primary control via the trailing-edge flaps (TEFs), which can result in enhancements in rotor performance, as well as substant... ver más
Revista: Aerospace