A search-theoretic model of double-spending fraud

被引:2
|
作者
Li, Yiting [1 ]
Wang, Chien-Chiang [1 ]
机构
[1] Natl Taiwan Univ, Dept Econ, 1,Sec 4,Roosevelt Rd, Taipei 10617, Taiwan
来源
关键词
Cryptocurrency; Money; Search; Imperfect information; Fraud; MONEY;
D O I
10.1016/j.jedc.2021.104157
中图分类号
F [经济];
学科分类号
02 ;
摘要
We study double-spending attacks in a digital payment system, such as cryptocurrency, wherein agents send transaction messages to facilitate the transfers of digital currencies. The system is imperfect such that the payer can send a double-spending message to transfer the currency to another account owned by herself after the original message is sent, and the payment system may recognize the double-spending message instead of the original one as the real transaction. If this occurs, the seller will not receive the payment, and the payer may retract the payment but keep the merchandise. We consider multiple mechanisms that can be applied to deter double-spending attempts, including a cost to send a message, a currency deposit, and currency deletions. However, applying the above mechanisms is costly. If the probability of detecting fraudulent activity is low, employing fraud deterrents may not be ideal, and allowing for double spending may instead reflect an optimal equilibrium. (C) 2021 Elsevier B.V. All rights reserved.
引用
收藏
页数:22
相关论文
共 50 条
  • [41] Securing Financial Transactions with a Robust Algorithm: Preventing Double-Spending Attacks
    Hashim, Hasan
    Alzighaibi, Ahmad Reda
    Elessawy, Amaal Farag
    Gad, Ibrahim
    Abdul-Kader, Hatem
    Elsaid, Asmaa
    COMPUTERS, 2023, 12 (09)
  • [42] Vulnerability of scale-free cryptocurrency networks to double-spending attacks
    Zhang, Junhuan
    Xu, Yuqian
    Houser, Daniel
    EUROPEAN JOURNAL OF FINANCE, 2021, 27 (12): : 1235 - 1249
  • [43] Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain
    Zhang, Yu Yan
    Huang, Meng Yan
    Zhang, Xu
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 14 - 19
  • [44] DiFastBit: Transaction Differentiation Scheme to Avoid Double-Spending for Fast Bitcoin Payments
    Melo, David
    Pomares-Hernandez, Saul Eduardo
    Rodriguez-Henriquez, Lil Maria
    Perez-Sansalvador, Julio Cesar
    MATHEMATICS, 2024, 12 (16)
  • [45] RETRACTED: Countering Double-Spending in Next-Generation Blockchains (Retracted Article)
    Saad, Muhammad
    Mohaisen, Aziz
    Kamhoua, Charles
    Kwait, Kevin
    Njilla, Laurent
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [46] An Off-line Mobile Payment Protocol Providing Double-spending Detection
    Tso, Raylin
    Lin, Chen-Yi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 570 - 575
  • [47] Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork
    Stifter, Nicholas
    Judmayer, Aljosha
    Schindler, Philipp
    Weippl, Edgar
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 46 - 66
  • [48] Late marriage and transition from arranged marriages to love matches: A search-theoretic approach
    Kezuka, Kazuhiro
    JOURNAL OF MATHEMATICAL SOCIOLOGY, 2018, 42 (04): : 237 - 256
  • [49] Securing IoT Transactions Against Double-Spending Attacks based on Signaling Game Approach
    Benaddi, Hafsa
    Jouhari, Mohammed
    Ibrahimi, Khalil
    Benslimane, Abderrahim
    2021 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2021,
  • [50] PSPAB: Privacy-preserving average procurement bidding system with double-spending checking
    Li, Li
    Liu, Jiayong
    Jia, Peng
    Zheng, Rongfeng
    PLOS ONE, 2020, 15 (10):