skip to main content
10.1145/3309074.3309105acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiccspConference Proceedingsconference-collections
research-article

Strengthening fawkescoin against double spending attack using merkle tree

Published:19 January 2019Publication History

ABSTRACT

Cryptocurrency is a digital currency with cryptographic security so that it is not easily to be faked. Recently cryptocurrency is widely used for transactions. Therefore, preserving its integrity and security is important. The technology underlying the digital currency is the Blockchain, as applied to Fawkescoin. But for securing the transaction, fawkescoin has a disadvantage when the fork occurs because it can provide opportunity to conduct double spending attack. To overcome this problem, Merkle tree proposed by applying DSA digital signatures. The application of DSA on Merkle tree is used to verify data without knowing the contents of the data. Based on the experiment results and analysis, the security of the proposed method can prevent fawkescoin against double spending attack on transactions when forking occurs than the previous method.

References

  1. Okupski, K. (2016). Bitcoin Developer Reference.Google ScholarGoogle Scholar
  2. Anderson, R., Bergadano, F., Crispo, B., Lee, J.-H., Manifavas, C., & Needam, R. (1998). A New Family of Authentication Protocols.Google ScholarGoogle Scholar
  3. Bonneau, J., & Miller, A. (2014). Fawkescoin: A cryptocurrency without public-key cryptography. Security Protocols XXII.Google ScholarGoogle Scholar
  4. Castor, A. (2017, May 16). A Short Guide to Bitcoin Forks. Retrieved from Coindesk: https://www.coindesk.com/short-guide-bitcoin-forks-explained/Google ScholarGoogle Scholar
  5. Pérez-Solá, C., Delgado-Segura, S., Navarro-Arribas, G., & Herrera-Joancomartí, J. (2017). Double-spending Prevention for Bitcoin Zero-confirmation Transaction. IACR Cryptology ePrint Archive.Google ScholarGoogle Scholar
  6. Schneier, B. (1996). Applied Cryptography, Second Edition: Protocols, Algorithm, and Source Code in C. John Wiley and Sons, Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hoffstein, J., Pipher, J., & Silverman, J. H. (2000). An Introduction to Mathematical Cryptography.Google ScholarGoogle Scholar
  8. Ederov, B. (2007). Merkle Tree Traversal Techniques.Google ScholarGoogle Scholar
  9. Rosenfeld, M. (2012). Analysis of Hashrate-based Double-spending.Google ScholarGoogle Scholar
  10. Rogaway, P., & Shrimpton, T. (2014). Cryptographic Hash-Function Basics: Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance. Fast Software Encryption(FSE 2004).Google ScholarGoogle Scholar

Index Terms

  1. Strengthening fawkescoin against double spending attack using merkle tree

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ICCSP '19: Proceedings of the 3rd International Conference on Cryptography, Security and Privacy
      January 2019
      303 pages
      ISBN:9781450366182
      DOI:10.1145/3309074

      Copyright © 2019 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 19 January 2019

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader