2021
DOI: 10.3390/s21196408
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus

Abstract: Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends on the network parameters and the number of confirmation blocks. These results can be used to define how many confirmation blocks a vendor should wait after a correspondent transaction before sending goods or services.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…The work in [8] investigates the security of the general model of PoS (Proof of Stake) protocol in the blockchain environment against double-spend attack. Double spend attack is realized on blockchain environment when coins are transferred by attackers to their own accounts during transaction for goods and services, at the same time an alternative chain is created longer enough to guarantee acceptance among honest miners.…”
Section: Iot Application and Methodologies For Improvementmentioning
confidence: 99%
“…The work in [8] investigates the security of the general model of PoS (Proof of Stake) protocol in the blockchain environment against double-spend attack. Double spend attack is realized on blockchain environment when coins are transferred by attackers to their own accounts during transaction for goods and services, at the same time an alternative chain is created longer enough to guarantee acceptance among honest miners.…”
Section: Iot Application and Methodologies For Improvementmentioning
confidence: 99%
“…Compared to the classic case of DSA, in the control point attack, everything follows the same assumptions as described in [3], but the opponent can catch up in a limited number of slots. In order to prove new statements and formulas, it is necessary to introduce next notations.…”
Section: Double Spend Attack With Time Limitationsmentioning
confidence: 99%
“…The common vulnerabilities of a smart contract are reentrancy vulnerability, replay attack, access restriction, and timestamp dependency. Many viewpoints, such as confidentiality, data integrity, availability, authorization, and non-repudiation, have been put forward in the security analysis [27][28][29][30][31].…”
Section: Security Analysismentioning
confidence: 99%