Redirigiendo al acceso original de articulo en 17 segundos...
ARTÍCULO
TITULO

Estimates of Fork-attack effectiveness on blockchain protocol

?.?. Cherepniov    

Resumen

We consider protocol of secure construction and storage of data base, named ?blockchain?. This protocol may be considered as some development of control sums and electronic signature schemes on the case when all participants of the set guarantees consistency of the data in the same manner. We construct a formal model of blockchain algorithm. We propose, that so called ?long chain condition? is a necessary part of the considered blokchain protocol. We also propose, that when user finds an error, the corresponding block reject with all blocks after it in blockchain tree. For this model we obtained some probability estimates of the events, like error correcting of blocks. We obtain the estimate of mean value of speed of blockchain growth. We demonstrate that modification of these estimates, when some fixed quantity of ?adversaries? provide bad blocks may be minimize by ?honest? users.  We show that ?honest? users may protect against Fork-attack by choosing security parameters, like number of checked blocks in one step. To the other hand in this case, speed of growth of blockchain tree may become negative, and our protocol fall down. We present quantitative bounds.

 Artículos similares

       
 
Nathan Eskue    
This paper provides a detailed review of a digital thread for composite aerospace components. The current state of the digital thread continues to progress and at an ever-accelerating rate due to advancements in supporting technologies such as AI, data c... ver más
Revista: Aerospace

 
Vyas O?Neill and Ben Soh    
The Internet of Things (IoT) is growing rapidly in various domains, including smart city applications. In many cases, IoT data in smart city applications have time constraints in which they are relevant and acceptable to the task at hand?a window of vali... ver más
Revista: Algorithms

 
Bahareh Lashkari and Petr Musilek    
With the widespread adoption of blockchain platforms across various decentralized applications, the smart contract?s vulnerabilities are continuously growing and evolving. Consequently, a failure to optimize conventional vulnerability analysis methods re... ver más
Revista: Information

 
Yongbo Jiang, Juncheng Lu and Tao Feng    
Searchable encryption is a keyword-based ciphertext retrieval scheme, which can selectively retrieve encrypted documents on encrypted cloud data. Most existing searchable encryption schemes focus only on exact keyword searches and cannot return data of i... ver más
Revista: Information

 
Hamed Taherdoost    
It is undeniable that the adoption of blockchain- and artificial intelligence (AI)-based paradigms is proceeding at lightning speed. Both paradigms provide something new to the market, but the degree of novelty and complexity of each is different. In the... ver más
Revista: Applied Sciences