Proceedings of the 2012 ACM Conference on Computer and Communications Security 2012
DOI: 10.1145/2382196.2382292
|View full text |Cite
|
Sign up to set email alerts
|

Double-spending fast payments in bitcoin

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
207
0
6

Year Published

2013
2013
2022
2022

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 458 publications
(214 citation statements)
references
References 10 publications
1
207
0
6
Order By: Relevance
“…In [7], Babaioff et al address the lack of incentives for Bitcoin users to include recently announced transactions in a block, while in [4], Syed et al propose a user-friendly technique for managing Bitcoin wallets. In [14], Karame et al thoroughly investigate double-spending attacks in Bitcoin and show that double-spending fast payments in Bitcoin can be performed in spite of the measures recommended by Bitcoin developers. Clark et al [11] propose the use of the Bitcoin PoW to construct verifiable commitment schemes.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In [7], Babaioff et al address the lack of incentives for Bitcoin users to include recently announced transactions in a block, while in [4], Syed et al propose a user-friendly technique for managing Bitcoin wallets. In [14], Karame et al thoroughly investigate double-spending attacks in Bitcoin and show that double-spending fast payments in Bitcoin can be performed in spite of the measures recommended by Bitcoin developers. Clark et al [11] propose the use of the Bitcoin PoW to construct verifiable commitment schemes.…”
Section: Related Workmentioning
confidence: 99%
“…While malformed transactions and double-spending attempts [14] can be indeed witnessed in the genuine Bitcoin system, we believe that malicious behavior in Bitcoin is orthogonal to our privacy investigationwhich explains the reason why we did not model such a misbehavior in our simulator. Moreover, our simulator relies on a variant greedy algorithm that closely approximates the genuine algorithm used in Bitcoin.…”
Section: B Bitcoin Block Explorermentioning
confidence: 99%
See 1 more Smart Citation
“…It was shown that the attack is successful whenever the number of confirmations of a dishonest transaction is greater than the number of confirmations of the honest one. In [19] the authors exploit non-confirmed transactions to implement double spending attacks on fast payments, and [26] shows how such attacks coupled with high computational resources can have a higher success rate. Apart from the attacks that target transactions, privacy has also been targeted.…”
Section: Introductionmentioning
confidence: 99%
“…Alike assaults tin can be forestalled when the assault board crowds the exchange in reserve mode till square affirmation. The twofold spending issue can be tended to through such a system (Figure 3.9.1) [38]. 5.…”
mentioning
confidence: 99%