ABSTRACT
Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be faked. Recently cryptocurrency is widely used for transactions. Therefore, preserving its integrity and security is important. The technology underlying the digital currency is the Blockchain, as applied to Fawkescoin. But for securing the transaction, fawkescoin has a disadvantage when the fork occurs because it can provide opportunity to conduct double spending attack. To overcome this problem, Merkle tree proposed by applying DSA digital signatures. The application of DSA on Merkle tree is used to verify data without knowing the contents of the data. Based on the experiment results and analysis, the security of the proposed method can prevent fawkescoin against double spending attack on transactions when forking occurs than the previous method.
- Okupski, K. (2016). Bitcoin Developer Reference.Google Scholar
- Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., & Needam, R. (1998). A New Family of Authentication Protocols.Google Scholar
- Bonneau, J., & Miller, A. (2014). Fawkescoin: A cryptocurrency without public-key cryptography. Security Protocols XXII.Google Scholar
- Castor, A. (2017, May 16). A Short Guide to Bitcoin Forks. Retrieved from Coindesk: https://www.coindesk.com/short-guide-bitcoin-forks-explained/Google Scholar
- Pérez-Solá, C., Delgado-Segura, S., Navarro-Arribas, G., & Herrera-Joancomartí, J. (2017). Double-spending Prevention for Bitcoin Zero-confirmation Transaction. IACR Cryptology ePrint Archive.Google Scholar
- Schneier, B. (1996). Applied Cryptography, Second Edition: Protocols, Algorithm, and Source Code in C. John Wiley and Sons, Inc. Google ScholarDigital Library
- Hoffstein, J., Pipher, J., & Silverman, J. H. (2000). An Introduction to Mathematical Cryptography.Google Scholar
- Ederov, B. (2007). Merkle Tree Traversal Techniques.Google Scholar
- Rosenfeld, M. (2012). Analysis of Hashrate-based Double-spending.Google Scholar
- Rogaway, P., & Shrimpton, T. (2014). Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Fast Software Encryption(FSE 2004).Google Scholar
Index Terms
- Strengthening fawkescoin against double spending attack using merkle tree
Recommendations
Double-spending fast payments in bitcoin
CCS '12: Proceedings of the 2012 ACM conference on Computer and communications securityBitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to verify payments. Nowadays, Bitcoin is increasingly used in a number of fast payment scenarios, where the time between the exchange of currency and goods is short (in the ...
Double-spending prevention for Bitcoin zero-confirmation transactions
Zero-confirmation transactions, i.e. transactions that have been broadcast but are still pending to be included in the blockchain, have gained attention in order to enable fast payments in Bitcoin, shortening the time for performing payments. Fast ...
Comments