Будь ласка, використовуйте цей ідентифікатор, щоб цитувати або посилатися на цей матеріал:
http://repository.hneu.edu.ua/handle/123456789/23230
Повний запис метаданих
Поле DC | Значення | Мова |
---|---|---|
dc.contributor.author | Poluyanenko N. | - |
dc.contributor.author | Kuznetsov A. | - |
dc.contributor.author | Lazareva E. | - |
dc.contributor.author | Marakushin A. I. | - |
dc.date.accessioned | 2020-06-23T11:43:31Z | - |
dc.date.available | 2020-06-23T11:43:31Z | - |
dc.date.issued | 2020 | - |
dc.identifier.citation | Poluyanenko N. Extrapolation to calculate the probability of a double spending attack [Electronic resource] / N. Poluyanenko, A. Kuznetsov, E. Lazareva, A. Marakushyn // Proceedings of The Third International Workshop on Computer Modeling and Intelligent Systems (CMIS-2020), April 27-May 1. - Zaporizhzhia, 2020. - PP. 610-620. - Available from : https://dblp.org/db/conf/cmis/cmis2020.html . | ru_RU |
dc.identifier.uri | http://repository.hneu.edu.ua/handle/123456789/23230 | - |
dc.description.abstract | One of the important aspects of the efficiency of modern distributed networks built using blockchain technologies is the study of the security of consensus protocols. In particular, the most common cryptocurrencies and blockchain systems with probabilistic consensus protocols are subjects to so-called double-spending attack. The basis of such an attack is the use of the attacker's computing capabilities to form alternative blockchains. If the generated sequence is longer than the public chain of blocks, the attacker can present it as the proof of work and thus disrupt the correct functioning of the network. In this article we explore the probability of a successful double-spending attack, derive formulas for evaluating the corresponding events, consisting of the formation by the attacker of an alternative sequence of blocks. These formulas are extremely cumbersome and difficult to calculate. The paper proposes simplified analytical expressions to quickly assess the probability of a successful doublespending attack. For this we use the extrapolation of intermediate calculations using the Lagrange interpolation formulas, as well as binomial approximation. The simulation results show that the use of simplified expressions allows us to provide acceptable accuracy of calculations. | ru_RU |
dc.language.iso | en | ru_RU |
dc.subject | blockchain technology | ru_RU |
dc.subject | consensus protocols | ru_RU |
dc.subject | proof-ofwork | ru_RU |
dc.subject | double-spending attack | ru_RU |
dc.subject | polynomial interpolation | ru_RU |
dc.subject | binomial approximation | ru_RU |
dc.title | Extrapolation to calculate the probability of a double spending attack | ru_RU |
dc.type | Article | ru_RU |
Розташовується у зібраннях: | Статті (ЗСЖБЖ) |
Файли цього матеріалу:
Файл | Опис | Розмір | Формат | |
---|---|---|---|---|
Маракушин_А.I..pdf | 420,93 kB | Adobe PDF | Переглянути/відкрити |
Усі матеріали в архіві електронних ресурсів захищені авторським правом, всі права збережені.