2018
DOI: 10.1142/s021902491850053x
|View full text |Cite
|
Sign up to set email alerts
|

Double Spend Races

Abstract: We correct the double spend race analysis given in Nakamoto's foundational Bitcoin article and give a closed-form formula for the probability of success of a double spend attack using the Regularized Incomplete Beta Function. We give a proof of the exponential decay on the number of confirmations, often cited in the literature, and find an asymptotic formula. Larger number of confirmations are necessary compared to those given by Nakamoto. We also compute the probability conditional to the known validation tim… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

5
80
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 53 publications
(87 citation statements)
references
References 3 publications
5
80
0
2
Order By: Relevance
“…Rosenfeld observes in [4] that the negative binomial variable seems to be a better approximation. We proved in [3] that this was indeed the case and we could find the exact formula for the double spend probability after z confirmations (z is the classical notation used by Nakamoto for the number of confirmations). where I x (a, b) is the incomplete regularized beta function…”
Section: Arxiv:200300001v1 [Mathho] 2 Mar 2020mentioning
confidence: 78%
See 2 more Smart Citations
“…Rosenfeld observes in [4] that the negative binomial variable seems to be a better approximation. We proved in [3] that this was indeed the case and we could find the exact formula for the double spend probability after z confirmations (z is the classical notation used by Nakamoto for the number of confirmations). where I x (a, b) is the incomplete regularized beta function…”
Section: Arxiv:200300001v1 [Mathho] 2 Mar 2020mentioning
confidence: 78%
“…(1−λ) 3 We can plot the parameter regions where each startegy is the best one ( Figure 3). The Catalan numbers appear naturally in the computations.…”
Section: Mining Profitabilitymentioning
confidence: 99%
See 1 more Smart Citation
“…For the transaction-oriented cyber services built upon permissionless blokchains, the designer of cyber-insurance also faces the similar issues. Nevertheless, recent studies on the mechanisms of doublespending attacks [25], [26], [27] have shed light upon the possible approaches in analytically assessing the risks of this fundamental threat on the blockchain systems. For example, in [25], the authors proposed a new protocol which requires the consensus nodes, i.e., block miners, to confirm transactions only if the inputs of the transactions have not been spent, hence preventing users from double-spending their funds.…”
Section: Related Workmentioning
confidence: 99%
“…For example, in [25], the authors proposed a new protocol which requires the consensus nodes, i.e., block miners, to confirm transactions only if the inputs of the transactions have not been spent, hence preventing users from double-spending their funds. Based on the characteristics of intentional forking in double-spending attacks, the authors in [26], [27] introduced the methods to estimate the probability of successful double-spending attacks by analyzing the investments in computing resource of both the blockchain maintainers and attackers. With these studies, it is now possible to estimate the probability of successful double spending and evaluate the potential risks transferred to the cyber-insurers.…”
Section: Related Workmentioning
confidence: 99%