Blockchain technologies: Probability of double-spend attack on a proof-of-stake consensus

M Karpinski, L Kovalchuk, R Kochan, R Oliynykov… - Sensors, 2021 - mdpi.com
Two double-spend attack strategies on a proof-of-stake consensus are considered. For each
strategy, the probability of its success is obtained, which depends on the network …

Why bitcoin will fail to scale?

N Malik, M Aseri, PV Singh… - Management …, 2022 - pubsonline.informs.org
Bitcoin falls dramatically short of the scale provided by banks for payments. Currently, its
ledger grows by the addition of blocks of∼ 2,000 transactions every 10 minutes. Intuitively …

A novel consensus algorithm based on segmented DAG and BP neural network for consortium blockchain

X Deng, K Li, Z Wang, H Liu - Security and Communication …, 2022 - Wiley Online Library
Currently, because of the excellent properties of decentralization, hard tamperability, and
traceability, blockchain is widely used in WSN and IoT applications. In particular, consortium …

Probability models of distributed proof generation for zk-SNARK-based blockchains

Y Bespalov, A Garoffolo, L Kovalchuk, H Nelasa… - Mathematics, 2021 - mdpi.com
The paper is devoted to the investigation of the distributed proof generation process, which
makes use of recursive zk-SNARKs. Such distributed proof generation, where recursive zk …

Calibrating the performance and security of blockchains via information propagation delays: revisiting an old approach with a new perspective

J Fechner, B Chandrasekaran, MX Makkes - Proceedings of the 37th …, 2022 - dl.acm.org
Miners of a blockchain exchange information about blocks and transactions with one
another via a peer-to-peer (P2P) network. The speed at which they learn of new blocks and …

Blockchain-based multi-malicious double-spending attack blacklist management model

JL Wang, Q Liu, B Song - The Journal of Supercomputing, 2022 - Springer
In recent years, blockchain security issues have attracted widespread attention. Especially in
terms of computing power security, when nodes have sufficient computing power, they can …

[PDF][PDF] Decentralized electronic voting system based on blockchain technology developing principals.

K Isirova, A Kiian, M Rodinko, A Kuznetsov - CMIS, 2020 - ceur-ws.org
Electronic trust services are becoming an integral part of the information space. With the
reliable implementation of basic services as an electronic signature and electronic …

Comparative analysis of consensus algorithms using a directed acyclic graph instead of a blockchain, and the construction of security estimates of spectre protocol …

L Kovalchuk, R Oliynykov, Y Bespalov… - … Security Technologies in …, 2022 - Springer
In recent years, the possibility of moving from a blockchain to a more general structure,
which has additional capabilities, but remains resistant to major attacks, has been very …

Achieving Security in Proof-of-Proof Protocol with Non-Zero Synchronization Time

L Kovalchuk, V Kostanda, O Marukhnenko… - Mathematics, 2022 - mdpi.com
Among the most significant problems that almost any blockchain faces are the problems of
increasing its throughput (ie, the number of transactions per unit of time) and the problem of …

[PDF][PDF] Probability of double spend attack for network with non-zero synchronization time

L Kovalchuk, D Kaidalov, A Nastenko… - Proceedings of the …, 2021 - konferencia.unideb.hu
Introduction. In this paper, we obtained for the first time mathematically substantiated
formulas for probability of a double spend attack on blockchain that is based upon Proof-of …