Leveraging the Verifier's Dilemma to Double Spend in Bitcoin

Conference Paper (2023)
Authors

Tong Cao (Kunyao Academy)

Jérémie Decouchant (TU Delft - Data-Intensive Systems)

Jiangshan Yu (Monash University)

Research Group
Data-Intensive Systems
To reference this document use:
https://doi.org/10.1007/978-3-031-47751-5_9
More Info
expand_more
Publication Year
2023
Language
English
Research Group
Data-Intensive Systems
Pages (from-to)
149-165
ISBN (print)
978-3-031-47750-8
ISBN (electronic)
978-3-031-47751-5
DOI:
https://doi.org/10.1007/978-3-031-47751-5_9
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

We describe and analyze perishing mining, a novel blockwithholding mining strategy that lures profit-driven miners away from doing useful work on the public chain by releasing block headers from a privately maintained chain. We then introduce the dual private chain (DPC) attack, where an adversary that aims at double spending increases its success rate by intermittently dedicating part of its hash power to perishing mining. We detail the DPC attack's Markov decision process, evaluate its double spending success rate using Monte Carlo simulations. We show that the DPC attack lowers Bitcoin's security bound in the presence of profit-driven miners that do not wait to validate the transactions of a block before mining on it.

Files

978-3-031-47751-5_9.pdf
(pdf | 0.706 Mb)
- Embargo expired in 27-05-2025