ABSTRACT
We obtained analytical expressions of upper estimates for success probability of a double spend attack on DAG-based consensus protocol SPECTRE, depending on network parameters. Using such estimates, it is possible to evaluate the number of confirmation blocks that is sufficient for prevention of such attacks.
- Xavier Boyen, Christopher Carr, and Thomas Haines. 2018. Graphchain: A blockchain-free scalable decentralised ledger. In Proceedings of the 2nd ACM Workshop on Blockchains, Cryptocurrencies, and Contracts. 21--33. Google ScholarDigital Library
- Cyril Grunspan and Ricardo Pérez-Marco. 2017. Double spend races. CoRR abs/1702.02867 (2017). http://arxiv.org/abs/1702.02867Google Scholar
- Lyudmila Kovalchuk, Dmytro Kaidalov, Andrii Nastenko, Mariia Rodinko, Oleksiy Shevtsov, and Roman Oliynykov. 2020. Decreasing security threshold against double spend attack in networks with slow synchronization. Computer Communications 154 (2020), 75--81.Google ScholarCross Ref
- Serguei Popov. 2016. The tangle. cit. on (2016), 131.Google Scholar
- Yonatan Sompolinsky, Yoad Lewenberg, and Aviv Zohar. 2016. SPECTRE: A Fast and Scalable Cryptocurrency Protocol. IACR Cryptology ePrint Archive 2016 (2016), 1159.Google Scholar
- Yonatan Sompolinsky and Aviv Zohar. 2018. Phantom. IACR Cryptology ePrint Archive, Report 2018/104 (2018).Google Scholar
Index Terms
- Upper bound probability of double spend attack on SPECTRE
Recommendations
Block Double-Submission Attack: Block Withholding Can Be Self-Destructive
AFT '22: Proceedings of the 4th ACM Conference on Advances in Financial TechnologiesProof-of-Work (PoW) is a Sybil control mechanism adopted in blockchain-based cryptocurrencies. It prevents the attempt of malicious actors to manipulate distributed ledgers. Bitcoin has successfully suppressed double-spending by accepting the longest ...
Security Implications of Blockchain Cloud with Analysis of Block Withholding Attack
CCGrid '17: Proceedings of the 17th IEEE/ACM International Symposium on Cluster, Cloud and Grid ComputingThe blockchain technology has emerged as an attractive solution to address performance and security issues in distributed systems. Blockchain's public and distributed peer-to-peer ledger capability benefits cloud computing services which require ...
A cross-process Spectre attack via cache on RISC-V processor with trusted execution environment
AbstractThe trust execution environment (TEE) provides a safe region, also known as a secret enclave, for executing private programs that need protection. This work proposed a cross-process exploitation scheme for conducting the cache side-channel attack,...
Graphical abstractDisplay Omitted
Highlights- Replicate cache side-channel attack variants on an FPGA with the RISC-V processor’s configuration.
- Implement a cross-process side-channel attack via cache scenario for the first time on the RISC-V platform.
- Experiment with cache ...
Comments