2020
DOI: 10.1016/j.comcom.2020.01.079
|View full text |Cite
|
Sign up to set email alerts
|

Decreasing security threshold against double spend attack in networks with slow synchronization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
17
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1
1

Relationship

3
5

Authors

Journals

citations
Cited by 11 publications
(17 citation statements)
references
References 3 publications
0
17
0
Order By: Relevance
“…The work [9] generalized the results obtained in [8]. In this work, for the first time (in model with continuous time, without simplified assumptions about discrete timeslots), the author obtained and strictly proved the expression that gives the value of double-spend attack probability in dependence on network parameters, including network synchronization time.…”
Section: Related Workmentioning
confidence: 56%
See 2 more Smart Citations
“…The work [9] generalized the results obtained in [8]. In this work, for the first time (in model with continuous time, without simplified assumptions about discrete timeslots), the author obtained and strictly proved the expression that gives the value of double-spend attack probability in dependence on network parameters, including network synchronization time.…”
Section: Related Workmentioning
confidence: 56%
“…However, in PoW, the synchronization time plays a very important role. As shown in [9,27], the security threshold (the minimal adversary ratio that can implement the attack with probability 1 despite the number of confirmation blocks) decreases when the synchronization time increases, and in the case of a large synchronization time, even an adversary with a minority hashrate can implement the attack with probability 1).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We also emphasize that it is essential to consider block synchronization time or time delay for block sharing in security analysis. The importance of this parameter was shown in many works, mainly [12][13][14][15]. Notably, it was shown that if the adversary is well synchronized and honest miners are not, the security threshold (the minimal ratio of adversary, which can attack the blockchain with probability 1 despite the number of confirmation blocks) decreases dramatically.…”
Section: Introductionmentioning
confidence: 99%
“…Generally speaking, SCs may use an arbitrary consensus protocol with proved securitytaking into account conditions in which its security was proved [7][8][9][10]. In what follows we will consider only SCs based on Latus Consensus Protocol [11], which isa hybrid PoS based on Ouroboros Praos [12], with additional binding to a PoW mainchain (MC).…”
Section: Introductionmentioning
confidence: 99%