Vulnerability of Finitely-long Blockchains in Securing Data

04/19/2023
by   Yiming Jiang, et al.
0

Recently, blockchain has been applied in various fields to secure data exchanges and storage in decentralized systems. In a blockchain application where the task of the application which makes use of the data stored in a blockchain has to be accomplished by a time instant, the employed blockchain is essentially finitely-long. In this paper, we consider a general finitely-long blockchain model which is generalized from most existing works on finitely-long blockchain applications, and take the first step towards characterizing the vulnerability of finitely-long blockchains in securing data against double-spending attacks. For the first time, we develop a general closed-form expression for the probability of success in launching a double-spending attack on a finitely-long blockchain. This probability essentially characterizes the vulnerability of finitely-long blockchains. Then, we prove that the probability of success in launching a double-spending attack on a finitely-long blockchain is no greater than that on an infinitely-long blockchain, which implies that finitely-long blockchains are less vulnerable to double-spending attacks than infinitely-long blockchains. Moreover, we show that unlike infinitely-long blockchains which can be surely paralyzed by a 51 blockchains are more resistant to 51

READ FULL TEXT

page 1

page 4

page 7

research
09/08/2021

BMS: Secure Decentralized Reconfiguration for Blockchain and BFT Systems

Reconfiguration of long-lived blockchain and Byzantine fault-tolerant (B...
research
07/21/2020

Blockchain Is Dead, Long Live Blockchain! Accountable State Machine Replication for Longlasting Blockchain

The long-standing impossibility of reaching agreement restricts the life...
research
06/27/2021

Capacity Analysis of Public Blockchain

As distributed ledgers, blockchains run consensus protocols which trade ...
research
03/05/2019

Profitable Double-Spending Attacks

Our aim in this paper is to investigate the profitability of double-spen...
research
01/22/2022

Long-term Data Sharing under Exclusivity Attacks

The quality of learning generally improves with the scale and diversity ...
research
05/14/2018

Double-Spending Risk Quantification in Private, Consortium and Public Ethereum Blockchains

Recently, several works conjectured the vulnerabilities of mainstream bl...
research
08/12/2023

"Zero Cost” Majority Attacks on Permissionless Blockchains

The core premise of permissionless blockchains is their reliable and sec...

Please sign up or login with your details

Forgot password? Click here to reset