Bitcoin and Blockchain: Security and Privacy

04/25/2019
by   Ehab Zaghloul, et al.
0

A cryptocurrency is a decentralized digital currency that is designed for secure and private asset transfer and storage. As a currency, it should be difficult to counterfeit and double-spend. In this paper, we review and analyze the major security and privacy issues of Bitcoin. In particular, we focus on its underlying foundation, blockchain technology. First, we present a comprehensive background of Bitcoin and the preliminary on security. Second, the major security threats and countermeasures of Bitcoin are investigated. We analyze the risk of double-spending attacks, evaluate the probability of success in performing the attacks and derive the profitability for the attacker to perform such attacks. Third, we analyze the underlying Bitcoin peer-to-peer network security risks and Bitcoin storage security. We compare three types of Bitcoin wallets in terms of security, type of services and their trade-offs. Finally, we discuss the security and privacy features of alternative cryptocurrencies and present an overview of emerging technologies today. Our results can help Bitcoin users to determine a trade-off between the risk of double-spending attempts and the transaction time delay or confidence before accepting transactions. These results can also assist miners to develop suitable strategies to get involved in the mining process and maximize their profits.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
05/25/2018

An evaluation of the security of the Bitcoin Peer-to- Peer Network

Bitcoin is a decentralised digital currency that relies on cryptography ...
research
11/16/2018

All roads lead to Rome: Many ways to double spend your cryptocurrency

In 2008, Satoshi Nakamoto proposed an electronic cash system (bitcoin) t...
research
07/02/2020

Proofs of Useless Work – Positive and Negative Results for Wasteless Mining Systems

Many blockchain systems today, including Bitcoin, rely on Proof of Work ...
research
05/24/2020

Custody Protocols Using Bitcoin Vaults

A bitcoin covenant is a mechanism to enforce conditions on future bitcoi...
research
07/01/2020

Cross-Layer Deanonymization Methods in the Lightning Protocol

Payment channel networks (PCNs) have emerged as a promising alternative ...
research
05/16/2021

Analysis of Bitcoin Vulnerability to Bribery Attacks Launched Through Large Transactions

Bitcoin uses blockchain technology to maintain transactions order and pr...
research
02/19/2019

Extending the Anonymity of Zcash

Although Bitcoin in its original whitepaper stated that it offers anonym...

Please sign up or login with your details

Forgot password? Click here to reset