DiFastBit: Transaction Differentiation Scheme to Avoid Double-Spending for Fast Bitcoin Payments

被引:0
作者
Melo, David [1 ]
Pomares-Hernandez, Saul Eduardo [1 ]
Rodriguez-Henriquez, Lil Maria [1 ,2 ]
Perez-Sansalvador, Julio Cesar [1 ,2 ]
机构
[1] Inst Nacl Astrofis Opt & Electr, Santa Maria Tonantzintla 72840, Puebla, Mexico
[2] CONAHCYT, Investigadoras Investigadores Mexico, Ave Insurgentes 1582, Mexico City 03940, Mexico
关键词
bitcoin; double-spending; fast payments; cryptocurrency; mempool; distributed systems; transaction confirmation; Karame's requirements; Lamport's happened-before relation;
D O I
10.3390/math12162484
中图分类号
O1 [数学];
学科分类号
0701 ; 070101 ;
摘要
Bitcoin is a payment system that generates a decentralized digital currency without ensuring temporal constraints in its transactions; therefore, it is vulnerable to double-spending attacks. Karame has proposed a formalization for a successful double-spending attack based on meeting three requirements. This focuses on fast payment scenarios where the product is delivered immediately after the payment is announced in the mempool, without waiting for transaction confirmation. This scenario is key in Bitcoin to increase the probability of a successful double-spending attack. Different approaches have been proposed to mitigate these attacks by addressing one or more of Karame's three requirements. These include the following: flooding every transaction without restrictions, introducing listeners/observers, avoiding isolation by blocking incoming connections, penalizing malicious users by revealing their identity, and using machine learning and bio-inspired techniques. However, to our knowledge, no proposal deterministically avoids double-spending attacks in fast payment scenarios. In this paper, we introduce DiFastBit: a distributed transaction differentiation scheme that shields Bitcoin from double-spending attacks in fast payment scenarios. To achieve this, we modeled Bitcoin from a distributed perspective of events and processes, reformulated Karame's requirements based on Lamport's happened-before relation (HBR), and introduced a new theorem that consolidates the reformulated requirements and establishes the necessary conditions for a successful attack on fast Bitcoin payments. Finally, we introduce the specifications for DiFastBit, formally prove its correctness, and analyze DiFastBit's confirmation time.
引用
收藏
页数:33
相关论文
共 42 条
  • [21] Kang Changhoon, 2023, 2023 24st Asia-Pacific Network Operations and Management Symposium (APNOMS), P160
  • [22] Karame G., Paper 2012/248 2012 248
  • [23] Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
    Karame, Ghassan O.
    Androulaki, Elli
    Roeschlin, Marc
    Gervais, Arthur
    Capkun, Srdjan
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (01) : 1 - 32
  • [24] EFFECT OF BITCOIN FEE ON TRANSACTION-CONFIRMATION PROCESS
    Kasahara, Shoji
    Kawahara, Jun
    [J]. JOURNAL OF INDUSTRIAL AND MANAGEMENT OPTIMIZATION, 2019, 15 (01) : 365 - 386
  • [25] TIME, CLOCKS, AND ORDERING OF EVENTS IN A DISTRIBUTED SYSTEM
    LAMPORT, L
    [J]. COMMUNICATIONS OF THE ACM, 1978, 21 (07) : 558 - 565
  • [26] Lamport Leslie, 2019, P CONC WORKS LESL LA, P197
  • [27] A novel GSP auction mechanism for ranking Bitcoin transactions in blockchain mining
    Li, Juanjuan
    Yuan, Yong
    Wang, Fei-Yue
    [J]. DECISION SUPPORT SYSTEMS, 2019, 124
  • [28] Double-Spending Detection for Fast Bitcoin Payment Based on Artificial Immune
    Liu, Zhengjun
    Zhao, Hui
    Chen, Wen
    Cao, Xiaochun
    Peng, Haipeng
    Yang, Jin
    Yang, Tao
    Lin, Ping
    [J]. THEORETICAL COMPUTER SCIENCE, NCTCS 2017, 2017, 768 : 133 - 143
  • [29] Simple Schnorr multi-signatures with applications to Bitcoin
    Maxwell, Gregory
    Poelstra, Andrew
    Seurin, Yannick
    Wuille, Pieter
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2019, 87 (09) : 2139 - 2164
  • [30] Melo D., 2022, SSRN Electron. J, DOI [10.2139/ssrn.4755464, DOI 10.2139/SSRN.4755464]