Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Double-spend Transactions
Double-spend Detection
Satoshi Nakamoto
• Double spend solution by introducing network time, chain of hash as POW.
• Probability rate of double-spend attack by attacker
Xingjie et al.
• Detect double-spend using decentralized non equivocation contracts.
• Provides solution that fair deposit of bitcoins by sender will compensate receiver incase of sender make double-
spent
Karameet al. .
• Provides the accountability issues due to misbehavior of Bitcoin network.
• Provides a solution for accountability and privacy of bitcoin.
• Measure and analyse time for transaction confirmation through shifted geometric distribution.
DOUBLE SPEND DETECTION
Fig.4 shows current Bitcoin system transaction inclusion Figure 4: Bitcoin transaction inclusion process
process
Sender utxopool
Sender stxopool
Figure 6: Dual Payout based on Lost Agreement
Amount (DPL2A) process
BLOCK LEVEL
DOUBLE SPEND DETECTION IN INTRA
Figure 5: Cognizant Merkle construction
Uses Cognizant Merkle and B-tree index for identifying double-spend data
Based on outputindex and TH the original transaction is identified Figure 10: Authentic Contract Recognition based on
Trans_UTXO_Input (ACRT) architecture
AUTHENTIC CONTRACT RECOGNITION BASED ON
TRANS_UTXO_INPUT (ACRT)
transaction1:
sendername: <__main__.Blockchain instance at 0xb63099cc> transaction3:
transactionhash: sendername: <__main__.Blockchain instance at 0xb63099cc>
b4418f0b8d4ec73ec3aa2921ab72faccaad0d509f14c0f55019fda5599e6e250 transactionhash:
outputindex: 0 b4418f0b8d4ec73ec3aa2921ab72faccaad0d509f14c0f55019fda5599e6e250
value: 30.0 outputindex: 0
time1554706418.77 value: 30.0
usedflag: 1 time1554706418.77
usedcounter: 6 usedflag: 1
recipientname: <__main__.Blockchain instance at 0xb6309a0c> usedcounter: 6
recipientname: <__main__.Blockchain instance at 0xb630972c>
transaction2:
sendername: <__main__.Blockchain instance at 0xb63099cc>
transactionhash:
b4418f0b8d4ec73ec3aa2921ab72faccaad0d509f14c0f55019fda5599e6e250
outputindex: 0
value: 30.0
time1554706418.77
usedflag: 1
usedcounter: 6
recipientname: None
Figure 11: double-spent transaction list
ARCHITECTURAL FRAMEWORK FOR BITCOIN
DOUBLE SPENDING DETECTION AND
PREVENTION(F2DP)
Figure 12: Framework for Double Spend Detection and Prevention (F2DP)
CONCLUSION AND FUTURE WORK
Solution for double-spend by miners like 51% attack, vector 76 attack can be implemented
Mitigation for scalability issue is also considered using Cognizant Merkle
REFERENCES
Vasek Marie. "The age of cryptocurrency How Bitcoin and Digital Money are Challenging the Global Economic Order”,
Science, Vol. No. 348(6241), PP 1308-1309, 2015.
Vijayalakshmi, J., and A. Murugan. "Crypto coin overview of basic transaction." International Journal of Applied
Research on Information Technology and Computing Vol.No.8(2), PP 113-120, 2017.
Antonopoulos M. Andreas “Mastering Bitcoin: unlocking digital cryptocurrencies" O'Reilly Media, 2014.
Oliveira Samuel, Filipe Soares, Guilherme Flach, Marcelo Johann, and Ricardo Reis. "Building a bitcoin miner on an
FPGA." In South Symposium on Microelectronics, 2012.
Shahsavari Yahya, Kaiwen Zhang, and Chamseddine Talhi. "Performance modeling and analysis of the bitcoin inventory
protocol.” In International Conference on Decentralized Applications and Infrastructures (DAPPCON), IEEE, 2019.
Behind the biggest bitcoin heist in history: Inside the implosion of mt.gox,
“http://www.thedailybeast.com/articles/2016/05/19/behind-the-biggest-bitcoin-heist-in-history-inside-the-
implosion-of-mt-gox.html”, [online accessed 24-oct-2016]
REFERENCES
Li Xiaoqi, Peng Jiang, Ting Chen, Xiapu Luo, and Qiaoyan Wen. "A survey on the security of blockchain
systems.", Future Generation Computer Systems ,2017.
Definition of double-spend, “https://bitcoin.org/en/glossary/double-spend”, [online accessed 24-oct-2019]
Nakamoto, Satoshi, "Bitcoin: A peer-to-peer electronic cash system.", “https://bitcoin.org/bitcoin.pdf”, 2008.
Yu Xingjie, Michael Thang Shiwen, Yingjiu Li, and Robert Deng Huijie. "Fair deposits against double-spending for bitcoin
transactions." In IEEE Conference on Dependable and Secure Computing, PP 44-51, 2017.
Karame Ghassan O, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and SrdjanČapkun. "Misbehavior in bitcoin: A study
of double-spending and accountability." ACM Transactions on Information and System Security, Vol. No. 1(18),2015.
A. Murugan and J. Vijayalakshmi. “Discovering the Bitcoin Double Spend using Lost Agreement Amount.” International
Journal of Recent Technology and Engineering, Vol.No.8(3), PP 3764-3770,2019.
Askitis Nikolas, and Ranjan Sinha. "HAT-trie: a cache-conscious trie-based data structure for strings." In Proceedings of
the thirtieth Australasian conference on Computer science, Australian Computer Society, Vol. No 62, PP 97-105, 2007.
REFERENCES
Heinz Steffen, Justin Zobel, and Hugh Williams.” Burst-tries: a fast, efficient data structure for string keys”, ACM
Transactions on Information Systems, Vol. No. (2), PP 192-223, 2002.
Stackoverflow questions, “https://stackoverflow.com/questions/4070693/what-is-the-purpose-of-base-64-encoding-and-
why-it-used-in-http-basic-authentica” [online access date: 13- feb-2018]
Vijayalakshmi, J. and Murugan A. “Revamp Perception of Bitcoin Using Cognizant Merkle.” In Emerging Research in
Computing, Information, Communication and Applications, Springer, Singapore, PP 141-150,2019.
Murugan A. and Vijayalakshmi, J. “Detecting Multi-Block Double Spent Transaction based On B-tree Indexing”,
International Journal of Scientific and Technology Research (communicated)
A. Murugan and J. Vijayalakshmi. “Preventing the bitcoin Double Spend using Transaction Hash and Unspent Transaction
Output.” International Journal of Recent Technology and Engineering, Vol.No.8(3), PP 3771-3776,2019.
Vijayalakshmi, J. and Murugan A. “A Framework for Detecting and Preventing Double Spent Data in Inter and Intra Block
of Blockchain”, In International conference on Research and Development in Engineering and Technology, Management