Price manipulation in the Bitcoin ecosystem - ScienceDirect

An Analysis of Attacks on Blockchain Consensus

Date: 2016-11-20
Author(s): George Bissias, Brian Neil Levine, A. Pinar Ozisik, Gavin Andresen

Link to Paper

We present and validate a novel mathematical model of the blockchain mining process and use it to conduct an economic evaluation of the double-spend attack, which is fundamental to all blockchain systems. Our analysis focuses on the value of transactions that can be secured under a conventional double-spend attack, both with and without a concurrent eclipse attack. Our model quantifies the importance of several factors that determine the attack's success, including confirmation depth, attacker mining power, and any confirmation deadline set by the merchant. In general, the security of a transaction against a double-spend attack increases roughly logarithmically with the depth of the block, made easier by the increasing sum of coin turned-over (between individuals) in the blocks, but more difficult by the increasing proof of work required. In recent blockchain data, we observed a median block turnover value of 6 BTC. Based on this value, a merchant requiring a single confirmation is protected against only attackers that can increase the current mining power by 1% or less. However, similar analysis shows that a merchant that requires a much longer 72 confirmations (~12 hours) will eliminate all potential profit for any double-spend attacker adding mining power less than 40% of the current mining power.

  1. Back, A., Corallo, M., Dashjr, L., Mark, F., Maxwell, G., Miller, A., Poelstra, A., Timón, J., Wuille, P.: Enabling Blockchain Innovations with Pegged Sidechains. (October 2014)
  2. Bissias, G., Ozisik, A.P., Levine, B.N., Liberatore, M.: Sybil-Resistant Mixing for Bitcoin. In: Proc. ACM Workshop on Privacy in the Electronic Society (November 2014),
  3. Confirmation. (February 2015)
  4. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J., Felten, E.: Sok: Research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE S&P. pp. 104–121 (May 2015),
  5. Bonneau, J.: How long does it take for a bitcoin transaction to be confirmed? (November 2015)
  6. Croman, K., et al.: On Scaling Decentralized Blockchains . In: Workshop on Bitcoin and Blockchain Research (Feb 2016)
  7. Douceur, J.: The Sybil Attack. In: Proc. Intl Wkshp on Peer-to-Peer Systems (IPTPS) (Mar 2002)
  8. Ethereum Homestead Documentation.
  9. Eyal, I., Sirer, E.G.: Majority Is Not Enough: Bitcoin Mining Is Vulnerable. Financial Cryptography pp. 436–454 (2014),
  10. Fischer, M., Lynch, N., Paterson, M.: Impossibility of distributed consensus with one faulty process. JACM 32(2), 374–382 (1985)
  11. Gervais, A., O. Karame, G., Wust, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the Security and Performance of Proof of Work Blockchains. (2016)
  12. Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: An untrusted bitcoin-compatible anonymous payment hub. Cryptology ePrint Archive, Report 2016/575 (2016),
  13. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse Attacks on Bitcoin’s Peer-to-peer Network. In: USENIX Security (2015)
  14. Litecoin.
  15. Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G., Savage, S.: A Fistful of Bitcoins: Characterizing Payments Among Men with No Names. In: Proc. ACM IMC. pp. 127–140 (2013),
  16. Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System. (May 2009)
  17. Pagnia, H., Vogt, H., Gaertner, F.: Fair Exchange. The Computer Journal, vol. 46, num. 1, p. 55, 2003. 46(1), 55–78 (2003)
  18. Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. (November 2015)
  19. Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Proc. Financial Crypto. pp. 6–24 (Apr 2013),
  20. Rosenfeld, M.: Analysis of hashrate-based double-spending. (December 2012)
  21. Sapirshtein, A., Sompolinsky, Y., Zohar, A.: Optimal Selfish Mining Strategies in Bitcoin. (July 2015)
  22. Sasson, E.B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., Virza, M.: Zerocash: Decentralized anonymous payments from bitcoin. In: IEEE S&P. pp. 459–474 (2014),
  23. Sompolinsky, Y., Zohar, A.: Secure high-rate transaction processing in Bitcoin. Financial Cryptography and Data Security (2015),
  24. Sompolinsky, Y., Zohar, A.: Bitcoin’s Security Model Revisited. (May 2016)
  25. Tschorsch, F., Scheuermann, B.: Bitcoin and beyond: A technical survey on decentralized digital currencies. IEEE Communications Surveys Tutorials PP(99), 1–1 (2016)
submitted by dj-gutz to myrXiv [link] [comments]

What is Shamir Backup? What is Litecoin  Re-upload The Fiat-Shamir Transform - Ron Rothblum IOHK  Consensus protocols - efficiency Bitcoin Q&A: Threshold signatures and Shamir secret sharing

Ron and Shamir's research, by contrast, analyzes transaction history to answer questions about how typical account holders use the Bitcoin system and how they acquire and spend the digital coin. Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir} Abstract. The Bitcoin scheme is a rare example of a large scale global Later in 2013, the Israeli scientists Dorit Ron and Adi Shamir highlighted Silk Road-connected Ross William Ulbricht as the conceivable individual behind the spread. The two specialists put together their doubts concerning an examination of the system of bitcoin exchanges. These charges were challenged and Ron and Shamir later withdrew their case. The fall was nearly as precipitous: the Mt. Gox exchange folded due to insolvency in early 2014 and it has taken more than three years for bitcoin to match this rise. 1.1. Why does Bitcoin manipulation matter? As this paper will show, the first time Bitcoin reached an exchange rate of more than $1,000, the rise was likely driven by manipulation. It's worth noting how Shamir's paper said there were multiple steps involved between what the paper assumed was the "Founder" and DPR: these steps could have just as easily included a transfer to a big exchange, and from that exchange to the Silk Road by a totally unrelated user.

[index] [8311] [22296] [16902] [9067] [16928] [2479] [1517] [17073] [28475] [6633]

What is Shamir Backup?

Leading cryptographers at the conference included Whitfield Diffie, pioneer of the public key cryptography that made Bitcoin possible, and Ron Rivest, Adi Shamir, and Leonard Adleman, who came up ... Here's a quick explanation on how #Litecoin works just in case your new to #Cryptocurrency / #Altcoins ! Get Free Tickets To The 2020 #BlockchainSummit In October & Take Part In The #TimDraper ... The 9th BIU Winter School on Cryptography - Zero Knowledge, which was held on February 18-21, 2019. 3 HOURS of Gentle Night RAIN, Rain Sounds for Relaxing Sleep, insomnia, Meditation, Study,PTSD. Rain - Duration: 3:01:36. The Relaxed Guy Recommended for you From RSA Conference 2015, Cryptography Panel. Watch in 360 the inside of a nuclear reactor from the size of an atom with virtual reality - Duration: 3:42. EDF in the UK Recommended for you. 360°

Flag Counter