Revisiting Double-Spending Attacks on the Bitcoin Blockchain: New Findings

被引:3
|
作者
Zheng, Jian [1 ]
Huang, Huawei [1 ]
Li, Canlin [1 ]
Zheng, Zibin [1 ]
Guo, Song [2 ]
机构
[1] Sun Yat Sen Univ, Sch Comp Sci & Engn, Guangzhou, Peoples R China
[2] Hong Kong Polytech Univ, Dept Comp, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Bitcoin Blockchain; Double-Spending Attack;
D O I
10.1109/IWQOS52092.2021.9521306
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Bitcoin is currently the cryptocurrency with the largest market share. Many previous studies have explored the security of Bitcoin from the perspective of blockchain mining. Especially on the double-spending attacks (DSA), some state-of-the-art studies have proposed various analytical models, aiming to understand the insights behind the double-spending attacks. However, we believe that advanced versions of DSA can be developed to create new threats for the Bitcoin ecosystem. To this end, this paper mainly presents a new type of double-spending attack named Adaptive DSA in the context of the Bitcoin blockchain, and discloses the associated insights. In our analytical model, the double-spending attack is converted into a Markov Decision Process. We then exploit the Stochastic Dynamic Programming (SDP) approach to obtain the optimal attack strategies towards Adaptive DSA. Through the proposed analytical model and the disclosed insights behind Adaptive DSA, we aim to alert the Bitcoin ecosystem that the threat of double-spending attacks is still at a dangerous level.
引用
收藏
页数:6
相关论文
共 50 条
  • [21] Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain
    Suliyanti, Widya Nita
    Sari, Riri Fitri
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 169 - 174
  • [22] Blockchain-based multi-malicious double-spending attack blacklist management model
    JunLu Wang
    Qiang Liu
    Baoyan Song
    The Journal of Supercomputing, 2022, 78 : 14726 - 14755
  • [23] Blockchain-based multi-malicious double-spending attack blacklist management model
    Wang, JunLu
    Liu, Qiang
    Song, Baoyan
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 14726 - 14755
  • [24] A search-theoretic model of double-spending fraud
    Li, Yiting
    Wang, Chien-Chiang
    JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2022, 142
  • [25] A Solution for the Offline Double-Spending Issue of Digital Currencies
    Hong, Zhexuan
    Chen, Jiageng
    SCIENCE OF CYBER SECURITY, SCISEC 2022, 2022, 13580 : 455 - 471
  • [26] A Strong Adaptive Strategic Double-spending Attack on Blockchains
    Ramezan, Gholamreza
    Leung, Cyril
    Wang, Z. Jane
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1219 - 1227
  • [27] Recipient-Oriented Transaction for Preventing Double Spending Attacks in Private Blockchain
    Lee, Hyunjae
    Shin, MyungJae
    Kim, Kyeong Seon
    Kang, Yeongeun
    Kim, Joongheon
    2018 15TH ANNUAL IEEE INTERNATIONAL CONFERENCE ON SENSING, COMMUNICATION, AND NETWORKING (SECON), 2018, : 454 - 455
  • [28] Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses
    Akbar, Nur Arifin
    Muneer, Amgad
    ElHakim, Narmine
    Fati, Suliman Mohamed
    FUTURE INTERNET, 2021, 13 (11)
  • [29] Discussion of "A Search-Theoretic Model of Double-Spending Fraud"
    Koeppl, Thorsten, V
    JOURNAL OF ECONOMIC DYNAMICS & CONTROL, 2022, 142
  • [30] k-Root-n: An Efficient Algorithm for Avoiding Short Term Double-Spending Alongside Distributed Ledger Technologies such as Blockchain
    Schreiber, Zvi
    INFORMATION, 2020, 11 (02)