Analytical modeling of the attack of double costs on a blockchain system with a probabilistic consensus protocol
DOI:
https://doi.org/10.30837/rt.2020.1.200.12Keywords:
decentralized system, blockchain technology, consensus protocol model of independent players, attack double costsAbstract
To build safe and reliable distributed decentralized systems using blockchain technology, a continuous chain of blocks is created, the unauthorized modification of which is not allowed by the applied cryptographic mechanisms. This is achieved by using unidirectional, collision resistant and search prototypes of cryptographic functions whose hash values from previous blocks are included in subsequent blocks. As a result, an unauthorized change in at least one bit of data in the previous blocks will be immediately detected. However, in the case of distributed storage of information, there is an additional requirement of synchronization of individual chains of blocks that are stored by various nodes. These and other issues are resolved by applying consensus building mechanisms, through which, after a certain sequence of actions, a continuous sequence of blocks (blockchain chain) becomes the same on all nodes of a decentralized network. This work examines one of the main vulnerabilities of blockchain systems built by consensus with probabilistic completion, namely, a double-spend attack. Based on the model of “independent players”, an analytical expression is obtained for calculating the probability of an attacker's successful double-spending attack. The quantitative values of the probability of a successful attack are given for various abilities of an attacker, a different number of generated blocks and a different race duration. Using computer simulation, the calculated values are experimentally verified. All empirical estimates were obtained with high accuracy (relative error not higher than 1%) and reliability (confidence level of at least 99%). To confirm the adequacy of the results obtained, a comparison of empirical results with theoretical calculations is given.References
Zaghloul E., Li T., Mutka M.W. & Ren, J. (2019). Bitcoin and Blockchain: Security and Privacy. ArXiv, abs/1904.11435
Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System / Satoshi Nakamoto, 2009. 9 с.
Rosenfeld M. Analysis of hashrate-based double-spending / Meni Rosenfeld, 2014. 13 с.
Полуяненко Н.А., Кузнецов А.А. Моделирование атаки двойной траты на протокол консенсуса «proof of work» // Радиотехника. 2019. № 198. С. 146–161. DOI: 10.30837/rt.2019.3.198.11
Zaghloul E., Li T., Mutka M.W. & Ren J. (2019). Bitcoin and Blockchain: Security and Privacy. ArXiv, abs/1904.11435
A. Pinar Ozisik, Brian Neil Levine. An Explanation of Nakamoto's Analysis of Double-spend Attacks https://arxiv.org/pdf/1701.03977.pdf
Турчак Л.И., Плотников П.В. Основы численных методов : учеб. пособие ; 2-е изд., перераб. и доп. Москва : Физматлит, 2003. 304 с.
Archer, Branden and Weisstein, Eric W. Lagrange Interpolating Polynomial. From MathWorld-A Wolfram Web Resource. http://mathworld.wolfram.com/LagrangeInterpolatingPolynomial.html.
Downloads
How to Cite
Issue
Section
License
Authors who publish with this journal agree to the following terms:
1. Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
2. Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
3. Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).