Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал: http://repository.hneu.edu.ua/handle/123456789/23230
Повний запис метаданих
Поле DCЗначенняМова
dc.contributor.authorPoluyanenko N.-
dc.contributor.authorKuznetsov A.-
dc.contributor.authorLazareva E.-
dc.contributor.authorMarakushin A. I.-
dc.date.accessioned2020-06-23T11:43:31Z-
dc.date.available2020-06-23T11:43:31Z-
dc.date.issued2020-
dc.identifier.citationPoluyanenko N. Extrapolation to calculate the probability of a double spending attack [Electronic resource] / N. Poluyanenko, A. Kuznetsov, E. Lazareva, A. Marakushyn // Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), April 27-May 1. - Zaporizhzhia, 2020. - PP. 610-620. - Available from : https://dblp.org/db/conf/cmis/cmis2020.html .ru_RU
dc.identifier.urihttp://repository.hneu.edu.ua/handle/123456789/23230-
dc.description.abstractOne of the important aspects of the efficiency of modern distributed networks built using blockchain technologies is the study of the security of consensus protocols. In particular, the most common cryptocurrencies and blockchain systems with probabilistic consensus protocols are subjects to so-called double-spending attack. The basis of such an attack is the use of the attacker's computing capabilities to form alternative blockchains. If the generated sequence is longer than the public chain of blocks, the attacker can present it as the proof of work and thus disrupt the correct functioning of the network. In this article we explore the probability of a successful double-spending attack, derive formulas for evaluating the corresponding events, consisting of the formation by the attacker of an alternative sequence of blocks. These formulas are extremely cumbersome and difficult to calculate. The paper proposes simplified analytical expressions to quickly assess the probability of a successful doublespending attack. For this we use the extrapolation of intermediate calculations using the Lagrange interpolation formulas, as well as binomial approximation. The simulation results show that the use of simplified expressions allows us to provide acceptable accuracy of calculations.ru_RU
dc.language.isoenru_RU
dc.subjectblockchain technologyru_RU
dc.subjectconsensus protocolsru_RU
dc.subjectproof-ofworkru_RU
dc.subjectdouble-spending attackru_RU
dc.subjectpolynomial interpolationru_RU
dc.subjectbinomial approximationru_RU
dc.titleExtrapolation to calculate the probability of a double spending attackru_RU
dc.typeArticleru_RU
Розташовується у зібраннях:Статті (ЗСЖБЖ)

Файли цього матеріалу:
Файл Опис РозмірФормат 
Маракушин_А.I..pdf420,93 kBAdobe PDFПереглянути/відкрити


Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.