Double-spending prevention for Bitcoin zero-confirmation transactions

被引:1
|
作者
Cristina Pérez-Solà
Sergi Delgado-Segura
Guillermo Navarro-Arribas
Jordi Herrera-Joancomartí
机构
[1] Universitat Autònoma de Barcelona,Department of Information Engineering and Communications
[2] CYBERCAT-Center for Cybersecurity Research of Catalonia,undefined
关键词
Double-spending; Bitcoin; Cryptocurrency; Blockchain; ECDSA; 68M14;
D O I
暂无
中图分类号
学科分类号
摘要
Zero-confirmation transactions, i.e. transactions that have been broadcast but are still pending to be included in the blockchain, have gained attention in order to enable fast payments in Bitcoin, shortening the time for performing payments. Fast payments are desirable in certain scenarios, for instance, when buying in vending machines, fast food restaurants, or withdrawing from an ATM. Despite being quickly propagated through the network, zero-confirmation transactions are not protected against double-spending attacks, since the double-spending protection Bitcoin offers relies on the blockchain and, by definition, such transactions are not yet included in it. In this paper, we propose a double-spending prevention mechanism for Bitcoin zero-confirmation transactions. Our proposal is based on exploiting the flexibility of the Bitcoin scripting language together with a well-known vulnerability of the ECDSA signature scheme to discourage attackers from performing such an attack.
引用
收藏
页码:451 / 463
页数:12
相关论文
共 45 条
  • [31] Occupation mechanism for eliminating double-spending attacks on trusted transaction blockchain
    Zhang, Yu Yan
    Huang, Meng Yan
    Zhang, Xu
    2021 THE 3RD INTERNATIONAL CONFERENCE ON BLOCKCHAIN TECHNOLOGY, ICBCT 2021, 2021, : 14 - 19
  • [32] RETRACTED: Countering Double-Spending in Next-Generation Blockchains (Retracted Article)
    Saad, Muhammad
    Mohaisen, Aziz
    Kamhoua, Charles
    Kwait, Kevin
    Njilla, Laurent
    2018 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2018,
  • [33] An Off-line Mobile Payment Protocol Providing Double-spending Detection
    Tso, Raylin
    Lin, Chen-Yi
    2017 31ST IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (IEEE WAINA 2017), 2017, : 570 - 575
  • [34] Opportunistic Algorithmic Double-Spending: How I Learned to Stop Worrying and Love the Fork
    Stifter, Nicholas
    Judmayer, Aljosha
    Schindler, Philipp
    Weippl, Edgar
    COMPUTER SECURITY - ESORICS 2022, PT I, 2022, 13554 : 46 - 66
  • [35] Distributed Double Spending Prevention
    Hoepman, Jaap-Henk
    SECURITY PROTOCOLS, 2010, 5964 : 152 - 165
  • [36] PSPAB: Privacy-preserving average procurement bidding system with double-spending checking
    Li, Li
    Liu, Jiayong
    Jia, Peng
    Zheng, Rongfeng
    PLOS ONE, 2020, 15 (10):
  • [37] Personalized Difficulty Adjustment for Countering the Double-Spending Attack in Proof-of-Work Consensus Protocols
    Chou, Chi-Ning
    Lin, Yu-Jing
    Tu, I-Ping
    Liao, Shih-wei
    IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, : 1456 - 1462
  • [38] Evaluation of Hash Rate-based Double-Spending based on Proof-of-Work Blockchain
    Suliyanti, Widya Nita
    Sari, Riri Fitri
    2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY CONVERGENCE (ICTC): ICT CONVERGENCE LEADING THE AUTONOMOUS FUTURE, 2019, : 169 - 174
  • [39] Blockchain-based multi-malicious double-spending attack blacklist management model
    JunLu Wang
    Qiang Liu
    Baoyan Song
    The Journal of Supercomputing, 2022, 78 : 14726 - 14755
  • [40] Blockchain-based multi-malicious double-spending attack blacklist management model
    Wang, JunLu
    Liu, Qiang
    Song, Baoyan
    JOURNAL OF SUPERCOMPUTING, 2022, 78 (12): : 14726 - 14755