Blockchain Double Spending With Low Mining Power and Network Delays

Author:

Natoli Chris1ORCID,Ekparinya Parinya1ORCID,Jourjon Guillaume2ORCID,Gramoli Vincent3ORCID

Affiliation:

1. University of Sydney, Australia

2. CSIRO, Australia

3. EPFL, University of Sydney and Redbelly Network, Australia

Abstract

Traditional blockchain systems offer a secure way of tracking the ownership of digital assets as long as the attacker does not control a large portion of the overall computational or mining power. They typically require participants to generate a proof-of-work before proposing a block at a given index of the chain. To choose one block among the candidate blocks at the same index, Nakamoto’s consensus, Ghost and the original Ethereum’s consensus select, respectively, the longest branch, the heaviest subtree and the branch with the most difficult crypto-puzzles. This allows an attacker who can generate proofs-of-work faster than others to double spend by overwriting any given branch. In this paper, we present a double spending attack, called the Balance attack, that simply needs to delay some messages. This result sheds new lights on an important, often implicit, assumption of the blockchain, synchrony , under which the transmission delay of any message should be within a known upper bound. We show that the attack succeeds with high probability on the protocols of the two largest blockchain systems in market capitalization, Bitcoin and Ethereum. To quantify the impact of our attack, we replicated the blockchain network run by fifty financial institutions and achieved double spending in less than 20 minutes. Finally, we demonstrate the success of the attack empirically by modifying the geth software and hijacking BGP in a controlled distributed system whose distribution of mining power is set to the distribution observed on the Ethereum main blockchain.

Publisher

Association for Computing Machinery (ACM)

Reference75 articles.

1. “CAIDA: Center for Applied Internet Data Analysis.”

2. “DB-IP - IP Geolocation and Network Intelligence.” [Online]. Available: https://db-ip.com/

3. “IP Address Details - ipinfo.io.” [Online]. Available: http://ipinfo.io/

4. “IP Address Geolocation to trace Country Region City ZIP Code etc.” [Online]. Available: https://www.eurekapi.com/

5. “IP Address to Identify Geolocation Information.” [Online]. Available: http://www.ip2location.com/

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3