2016
DOI: 10.1016/j.entcs.2016.12.006
|View full text |Cite
|
Sign up to set email alerts
|

Double-spend Attack Models with Time Advantange for Bitcoin

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
69
1
1

Year Published

2019
2019
2022
2022

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 89 publications
(75 citation statements)
references
References 1 publication
2
69
1
1
Order By: Relevance
“…Since this requires to spend enough electricity, time, and/or machine rental, such a situation is hardly ever expected to happen. Third, the standard protocol forces any malicious worker to confront the computational power of the whole network, assumed to have mostly honest nodes, into a race that is very hard to win [15]. Algorithm 1 presents a definition of the above-mentioned standard protocol assumed to be followed for each worker in a blockchain system.…”
Section: Definitionmentioning
confidence: 99%
See 1 more Smart Citation
“…Since this requires to spend enough electricity, time, and/or machine rental, such a situation is hardly ever expected to happen. Third, the standard protocol forces any malicious worker to confront the computational power of the whole network, assumed to have mostly honest nodes, into a race that is very hard to win [15]. Algorithm 1 presents a definition of the above-mentioned standard protocol assumed to be followed for each worker in a blockchain system.…”
Section: Definitionmentioning
confidence: 99%
“…A blockchain is a distributed hierarchical data structure of blocks that cannot be altered retroactively without alteration of all subsequent blocks, which requires consensus of the network majority. It was invented to serve as the public transaction ledger of the cryptocurrency Bitcoin in 2008 [13], in which the need for a trusted third party is avoided: instead, this digital currency is based on the concept of 'proof of work' allowing users to execute payments by digitally signing their transactions using hashes through a distributed time-stamping service [15]. Because of its resistance to modifications, decentralized consensus, and proved robustness for supporting cryptocurrency transactions, this technology is seen to have great potential for new uses in other domains, including financial services [7,17], distributed data models [3], markets [16], government systems [9,14], healthcare [8,1,11], IoT [10], and video games [12].…”
Section: Introductionmentioning
confidence: 99%
“…If a miner follows the protocols, it should append the last mined block to the longest chain. However, there can be several alternative chains that can be symptoms of a double spending attack [10,12,13]. A double spending attack is a situation where a miner wants to spend multiple times a certain amount of bitcoin.…”
Section: Blockchain Bitcoin and Feesmentioning
confidence: 99%
“…In this paper we consider an approach for protecting against double-spending [17] even if combined with a Sybil attack, without the need for a global ledger consensus. In this paper, we did not consider other forms of attacks, such as eclipse attacks [18], routing attacks [19], attacks based on time advantage [20], incentive attacks [21] and quantum computing attacks [22]. Relevant surveys of other attack types are [23,24].…”
Section: Introductionmentioning
confidence: 99%