Is Bitcoin Future as Secure asWe Think? Analysis of Bitcoin Vulnerability to Bribery Attacks Launched through Large Transactions

被引:1
作者
Ebrahimpour, Ghader [1 ]
Haghighi, Mohammad Sayad [1 ]
机构
[1] Univ Tehran, Sch Elect & Comp Engn, Tehran 1439957131, Iran
基金
美国国家科学基金会;
关键词
Bitcoin; blockchain; bribery attack; markov chain; double-spending; differential evolution; security;
D O I
10.1145/3641546
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Bitcoin uses blockchain technology to maintain transactions order and provides probabilistic guarantees to prevent double-spending, assuming that an attacker's computational power does not exceed 50% of the network power. In this article, we design a novel bribery attack and show that this guarantee can be hugely undermined. Miners are assumed to be rational in this setup, and they are given incentives that are dynamically calculated. In this attack, the adversary misuses the Bitcoin protocol to bribe miners and maximize their gained advantage. We will reformulate the bribery attack to propose a general mathematical foundation upon which we build multiple strategies. We show that, unlike Whale Attack, these strategies are practical, especially in the future when halvings lower the mining rewards. In the so-called "guaranteed variable-rate bribing with commitment" strategy, through optimization by Differential Evolution (DE), we show how double-spending is possible in the Bitcoin ecosystem for any transaction whose value is above 218.9BTC, and this comes with 100% success rate. A slight reduction in the success probability, e.g., by 10%, brings the threshold down to 165BTC. If the rationality assumption holds, then this shows how vulnerable blockchain-based systems like Bitcoin are. We suggest a soft fork on Bitcoin to fix this issue at the end.
引用
收藏
页数:22
相关论文
共 51 条
  • [41] Teli Tawseef Ahmed, 2021, ICICNIS 2020
  • [42] Tran Quang, 2019, HIGHLIGHTS PRACTICAL, P121
  • [43] Trolin M, 2005, LECT NOTES COMPUT SC, V3797, P347
  • [44] Evaluating Upgradable Smart Contract
    Van Cuong Bui
    Wen, Sheng
    Yu, Jiangshan
    Xia, Xin
    Haghighi, Mohammad Sayad
    Xiang, Yang
    [J]. 2021 IEEE INTERNATIONAL CONFERENCE ON BLOCKCHAIN (BLOCKCHAIN 2021), 2021, : 252 - 256
  • [45] Vyas Chinmay A., 2014, NAT C CUM WORKSH BIO
  • [46] BSM-ether: Bribery selfish mining in blockchain-based healthcare systems
    Wang, Yilei
    Wang, Zhaojie
    Zhao, Minghao
    Han, Xueyang
    Zhou, Huiyu
    Wang, Xiaoying
    Koe, Arthur Sandor Voundi
    [J]. INFORMATION SCIENCES, 2022, 601 : 1 - 17
  • [47] Wang Zhaojie, 2021, DATA MINING BIG DATA, P1
  • [48] Temporary Censorship Attacks in the Presence of Rational Miners
    Winzer, Fredrik
    Herd, Benjamin
    Faust, Sebastian
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, : 357 - 366
  • [49] IPBSM: An optimal bribery selfish mining in the presence of intelligent and pure attackers
    Yang, Guoyu
    Wang, Yilei
    Wang, Zhaojie
    Tian, Youliang
    Yu, Xiaomei
    Li, Shouzhe
    [J]. INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2020, 35 (11) : 1735 - 1748
  • [50] Evaluating Fork after Withholding (FAW) Attack in Bitcoin
    Yang, Runkai
    Chang, Xiaolin
    Misic, Jelena
    Misic, Vojislav
    Zhu, Haoran
    [J]. PROCEEDINGS OF THE 19TH ACM INTERNATIONAL CONFERENCE ON COMPUTING FRONTIERS 2022 (CF 2022), 2022, : 67 - 74