Incentivizing Double-Spend Collusion in Bitcoin

نویسندگان

  • Kevin Liao
  • Jonathan Katz
چکیده

Bitcoin’s core innovation is its solution to double-spending, called Nakamoto consensus. This provides a probabilistic guarantee that transactions will not be reversed or redirected, provided that it is improbable for an attacker to obtain a majority of mining power in the network. While this may be true in the traditional sense, this assumption becomes tenuous when miners are assumed to be rational and hence venal. Accordingly, we present the whale attack, in which a minority attacker increases her chances of double-spending by incentivizing miners to subvert the consensus protocol and to collude via whale transactions, or transactions carrying anomalously large fees. We analyze the expected cost to carry out the attack, and simulate the attack under realistic system parameters. Our results show that double-spend attacks, conventionally thought to be impractical for minority attackers, can actually be financially feasible and worthwhile under the whale attack. Perhaps more importantly, this work demonstrates that rationality should not underestimated when evaluating Bitcoin’s security.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Double-spend Attack Models with Time Advantange for Bitcoin

Bitcoin is a digital currency in which the need for a trusted third party is voided. Instead, this digital currency is based on the concept of ‘proof of work’ allowing users to execute payments by digitally signing their transactions. Since electronic files can be duplicated, fraudulent transactions in the form of double-spend attacks – where users spend the same money at least twice – can happ...

متن کامل

Double spend races

We correct the double spend race analysis given in Nakamoto’s foundational Bitcoin article and give a closed-form formula for the probability of success of a double spend attack using the Regularized Incomplete Beta Function. We give the first proof of the exponential decay on the number of confirmations and find an asymptotic formula. Larger number of confirmations are necessary compared to th...

متن کامل

Satoshi Risk Tables

We present Bitcoin Security Tables computing the probability of success p(z, q, t) of a double spend attack by an attacker controlling a share q of the hashrate after z confirmations in time t.

متن کامل

A Faster Bitcoin Network

Bitcoin is an electronic currency based on a peer-to-peer network for the propagation and verification of the transactions. Nowadays, cashless transactions are becoming increasingly popular and bitcoin could be an established currency for such transactions. Its distributed nature, though, and more specifically the delay overhead in transaction verification, not only makes the use of bitcoin ine...

متن کامل

Digital Forensic Implications of Collusion Attacks on the Lightning Network

The limited size of a block in the Bitcoin blockchain produces a scaling bottleneck. The transaction scalability problem can be addressed by performing smaller transactions off-chain and periodically reporting the results to the Bitcoin blockchain. One such solution is the Lightning Network. Bitcoin is employed by lawful users and criminals. This requires crimes against lawful users as well as ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2017