Two double-spend attack strategies on a proof-of-stake consensus are considered. For each strategy, the probability of its success is obtained, which depends on the network parameters and the number of confirmation blocks. These results can be used to define how many confirmation blocks a vendor should wait after a correspondent transaction before sending goods or services.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC8512294PMC
http://dx.doi.org/10.3390/s21196408DOI Listing

Publication Analysis

Top Keywords

double-spend attack
8
proof-of-stake consensus
8
confirmation blocks
8
blockchain technologies
4
technologies probability
4
probability double-spend
4
attack proof-of-stake
4
consensus double-spend
4
attack strategies
4
strategies proof-of-stake
4

Similar Publications

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!