Abstract
Many cryptocurrencies including Bitcoin are susceptible to a so-called double-spend attack, where someone dishonestly attempts to reverse a recently confirmed transaction. The duration and likelihood of success of such an attack depends on the recency of the transaction and the computational power of the attacker, and these can be related to the distribution of time for counts from one Poisson process to exceed counts from another by some desired amount. We derive an exact expression for this distribution and show how it can be used to obtain efficient simulation estimators. We also give closed-form analytic approximations and illustrate their accuracy.
Publisher
Cambridge University Press (CUP)
Subject
Industrial and Manufacturing Engineering,Management Science and Operations Research,Statistics, Probability and Uncertainty,Statistics and Probability
Reference18 articles.
1. Ozisik, A.P. & Levine, B.N. (2017). An explanation of Nakamoto's analysis of double-spend attacks. arXiv preprint arXiv:1701.03977.
2. Saia, R. , Carta, S. , Reforgiato Recupero, D. , & Fenu, G. (2019). Internet of entities (IoE): A blockchain-based distributed paradigm for data exchange between wireless-based devices. In Conference: 8th International Conference on Sensor Networks (SENSORNETS-2019), Prague, Czech Republic.
3. Double-spend Attack Models with Time Advantange for Bitcoin
4. Rosenfeld, M. (2012). Analysis of hashrate-based doublespending. https://www.bitcoil.co.il/Doublespend.pdf.
5. A combinatorial-probabilistic analysis of bitcoin attacks
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Tree-Mapped Taxonomy of Blockchain Attacks;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16
2. Digital exchange attributes and the risk of closure;Blockchain: Research and Applications;2023-06
3. ON PROFITABILITY OF NAKAMOTO DOUBLE SPEND;Probability in the Engineering and Informational Sciences;2021-02-15
4. Automated Detection of SQL Injection Attack on Blockchain-Based Database;Advances in Library and Information Science;2021
5. The Detection of SQL Injection on Blockchain-Based Database;Revolutionary Applications of Blockchain-Enabled Privacy and Access Control;2021