Probability of a successful attack of double costs on a blockchain system with a probabilistic consensus protocol

Authors

  • М.О. Полуяненко
  • О.О. Кузнецов

DOI:

https://doi.org/10.30837/rt.2020.1.200.13

Keywords:

decentralized system, blockchain technology, consensus protocol, independent player model, double waste attack

Abstract

Most traditional information systems are built on a centralized hierarchical principle. In such systems, there is a single decision-making center, to which other nodes are subordinate, therefore, they must certainly perceive and follow centralized instructions. In addition, the presence of a decision center causes additional threats, since to disrupt the operation of the entire system it is enough to destroy or compromise the main node. Decentralized systems are more stable and secure, especially in a situation of complete distrust of each other. They are more reliable for storing important information, such as digital assets, registries, inventories and the like. That is why blockchain technologies for building decentralized systems are becoming increasingly popular and widespread. However, when deploying decentralized systems, the task of coordinating the state of various network nodes arises. This is especially true when the nodes operate in a mode of complete distrust of each other, that is, if situations are possible where the proportion of nodes is controlled by intruders. This problem is solved using consensus protocols, that is, such rules and algorithms that, when executed, achieve the same state for most nodes of a decentralized system. This article discusses probabilistic consensus protocols, that is, when the occurrence of a certain state is a random event. Coordination of system states is possible in various ways, including possible false cases that are imposed by attackers. For example, attackers can double their electronic assets by spending them twice. Of course, if most nodes are controlled by intruders, the system will not work properly. But even with a smaller share of resources, attackers can also with a certain probability impose a false state of the system and thus implement a double-spend attack. The article discusses various situations and possible states of the system, analytically deriving formulas for calculating the probability of a successful double spending attack on a blockchain system with a probabilistic consensus protocol. When conducting research, the model of independent players was used, which, unlike the well-known works, takes into account the complete set of elementary events and system states. Based on the results obtained, recommendations are given on the safe functioning of a decentralized system.

References

Hackernoon: Two Ways to Double-Spend https://medium.com/hackernoon/bitcoin-core-bug-cve-2018-17144-an-analysis-f80d9d373362.

BitcoinCore: CVE-2018-17144 Full Disclosure https://bitcoincore.org/en/2018/09/20/notice/.

Hackernoon: Two Ways to Double-Spend https://medium.com/hackernoon/bitcoin-core-bug-cve-2018-17144-an-analysis-f80d9d373362.

Zaghloul, E., Li, T., Mutka, M.W., & Ren, J. (2019). Bitcoin and Blockchain: Security and Privacy. ArXiv, abs/1904.11435.

Rosenfeld M. Analysis of hashrate-based double-spending / Meni Rosenfeld, 2014. 13 с.

Gervais A., Ritzdorf H., Karame G. O., & Čapkun S. (2015). Tampering with the delivery of blocks and transactions in Bitcoin. In CCS 2015 – Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (Vol. 2015-October, pp. 692-705). Association for Computing Machinery. https://doi.org/10.1145/2810103.2813655.

Zaghloul E., Li T., Mutka M.W., & Ren J. (2019). Bitcoin and Blockchain: Security and Privacy. ArXiv, abs/1904.11435.

BitcoinWiki: Double-spending https://ru.bitcoinwiki.org/wiki/Double-spending.

Ширяев А. Н. Вероятность : в 2-х кн. ; 4-е изд., перераб. и доп. Москва : МЦНМО, 2007.

Полуяненко Н.А., Кузнецов А.А. Моделирование атаки двойной траты на протокол консен-суса «proof of work» // Радиотехника. 2019. № 198. С. 146–161. DOI: 10.30837/rt.2019.3.198.11.

Nakamoto S. Bitcoin: A Peer-to-Peer Electronic Cash System / Satoshi Nakamoto, 2009. 9 с.

How to Cite

Полуяненко, М., & Кузнецов, О. (2020). Probability of a successful attack of double costs on a blockchain system with a probabilistic consensus protocol. Radiotekhnika, 1(200), 153–161. https://doi.org/10.30837/rt.2020.1.200.13

Issue

Section

Articles