ZCC: Mitigating Double-spending Attacks in Micropayment Bitcoin Transactions

被引:0
|
作者
Arote, Prerna [1 ]
Kuri, Joy [1 ]
机构
[1] Indian Inst Sci, Dept Elect Syst Engn, Bangalore, India
关键词
Bitcoin; Micropayment transactions; Double-spending attack; Confirmation delay; SIGNATURES;
D O I
10.1109/BCCA55292.2022.9921877
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin is one of the popular cryptocurrencies but it has many pitfalls due to its slow payment nature. The average confirmation time of a Bitcoin transaction is ten minutes. Block propagation, validation, and mining are time-consuming tasks in the Bitcoin network. They increase confirmation delay, which becomes a large overhead, especially for micropayment transactions. In a micropayment transaction, the buyer expects quick service and the seller expects fast payment. Another downside of excess delay is that attackers get better chances to perform successful double-spending attacks. In this paper, we propose a protocol named ZCC that not only provides quick service to users but also guarantees payment to sellers. In ZCC, a group of full nodes acts as an approval committee that commits the user's ZCC transactions based on majority approvals obtained from group members. In the ZCC scheme, mining time is much less compared to the mining time of Bitcoin transactions because of lower difficulty targets. We analyze total acceptance time and the probability of a double-spending attack in the ZCC scheme. Also, we evaluate the performance of ZCC using the BlockSim simulator for the different transaction and block-related parameters, and observe substantially improved performance for the ZCC scheme.
引用
收藏
页码:245 / 252
页数:8
相关论文
共 41 条
  • [21] A Solution for the Offline Double-Spending Issue of Digital Currencies
    Hong, Zhexuan
    Chen, Jiageng
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 455 - 471
  • [22] A Strong Adaptive Strategic Double-spending Attack on Blockchains
    Ramezan, Gholamreza
    Leung, Cyril
    Wang, Z. Jane
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1219 - 1227
  • [23] Discussion of "A Search-Theoretic Model of Double-Spending Fraud"
    Koeppl, Thorsten, V
    JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2022, 142
  • [24] RETRACTED: Countering Double-Spending in Next-Generation Blockchains (Retracted Article)
    Saad, Muhammad
    Mohaisen, Aziz
    Kamhoua, Charles
    Kwait, Kevin
    Njilla, Laurent
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [25] An Off-line Mobile Payment Protocol Providing Double-spending Detection
    Tso, Raylin
    Lin, Chen-Yi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 570 - 575
  • [26] Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork
    Stifter, Nicholas
    Judmayer, Aljosha
    Schindler, Philipp
    Weippl, Edgar
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 46 - 66
  • [27] Profitability Analysis of Time-Restricted Double-Spending Attack on PoW-Based Large Scale Blockchain With the Aid of Multiple Types of Attacks
    Jiang, Yiming
    Zhang, Jiangfan
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2024, 19 : 8155 - 8171
  • [28] Is Bitcoin Future as Secure asWe Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions
    Ebrahimpour, Ghader
    Haghighi, Mohammad Sayad
    ACM TRANSACTIONS ON PRIVACY AND SECURITY, 2024, 27 (02)
  • [29] PSPAB: Privacy-preserving average procurement bidding system with double-spending checking
    Li, Li
    Liu, Jiayong
    Jia, Peng
    Zheng, Rongfeng
    PLOS ONE, 2020, 15 (10):
  • [30] Cryptocurrency and double spending history: transactions with zero confirmation
    Kang, Kee-Youn
    ECONOMIC THEORY, 2023, 75 (02) : 453 - 491