Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin

In Bitcoin network, the distributed storage of multiple copies of the block chain opens up possibilities for doublespending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. While Bitcoin has inherent security mechanism to prevent double-spending at...

Full description

Saved in:
Bibliographic Details
Main Authors: YU, Xingjie, THANG, Shiwen Michael, LI, Yingjiu, DENG, Robert H.
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2019
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/4526
https://ink.library.smu.edu.sg/context/sis_research/article/5529/viewcontent/Collusion_Attacks_2019_av.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English
id sg-smu-ink.sis_research-5529
record_format dspace
spelling sg-smu-ink.sis_research-55292020-04-06T10:07:27Z Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin YU, Xingjie THANG, Shiwen Michael LI, Yingjiu DENG, Robert H. In Bitcoin network, the distributed storage of multiple copies of the block chain opens up possibilities for doublespending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. While Bitcoin has inherent security mechanism to prevent double-spending attacks, it requires a certain amount of time to detect the doublespending attacks after the transaction has been initiated. Therefore, it is impractical to protect the payees from suffering in double-spending attacks in fast payment scenarios where the time between the exchange of currency and goods or services is shorten to few seconds. Although we cannot prevent double-spending attacks immediately for fast payments, decentralized non-equivocation contracts have been proposed to penalize the malicious payer after the attacks have been detected. The basic idea of these contracts is that the payer locks some coins in a deposit when he initiates a transaction with the payee. If the payer double-spends, a cryptographic primitive called accountable assertions can be used to reveal his Bitcoin credentials for the deposit. Thus, the malicious payer could be penalized by the loss of deposit coins. However, such decentralized nonequivocation contracts are subjected to collusion attacks where the payer colludes with the beneficiary of the depoist and transfers the Bitcoin deposit back to himself when he double-spends, resulting in no penalties. On the other hand, even if the beneficiary behaves honestly, the victim payee cannot get any compensation directly from the deposit in the original design. To prevent such collusion attacks, we design fair time-locked deposits for Bitcoin transactions to defend against doublespending. The fair deposits ensure that the payer will be penalized by the loss of his deposit coins if he double-spends and the victim payee's loss will be compensated within a locked time period. We start with the protocols of making a deposit for one transaction. In particular, for the transaction with single input and output and the transaction with multiple inputs and outputs, we provide different designs of the deposits. We analyze the performance of deposits made for one transaction and show how the fair deposits work efficiently in Bitcoin. We also provide protocols of making a deposit for multiple transactions, which can reduce the burdens of a honest payer. In the end, we extend the fair deposits to non-equivocation contracts for other distributed systems. 2019-06-01T07:00:00Z text application/pdf https://ink.library.smu.edu.sg/sis_research/4526 info:doi/10.3233/JCS-191274 https://ink.library.smu.edu.sg/context/sis_research/article/5529/viewcontent/Collusion_Attacks_2019_av.pdf http://creativecommons.org/licenses/by-nc-nd/4.0/ Research Collection School Of Computing and Information Systems eng Institutional Knowledge at Singapore Management University Time-locked Collusion attacks Bitcoin Fair deposit Double-spending Finance and Financial Management Information Security
institution Singapore Management University
building SMU Libraries
continent Asia
country Singapore
Singapore
content_provider SMU Libraries
collection InK@SMU
language English
topic Time-locked
Collusion attacks
Bitcoin
Fair deposit
Double-spending
Finance and Financial Management
Information Security
spellingShingle Time-locked
Collusion attacks
Bitcoin
Fair deposit
Double-spending
Finance and Financial Management
Information Security
YU, Xingjie
THANG, Shiwen Michael
LI, Yingjiu
DENG, Robert H.
Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin
description In Bitcoin network, the distributed storage of multiple copies of the block chain opens up possibilities for doublespending, i.e., a payer issues two separate transactions to two different payees transferring the same coins. While Bitcoin has inherent security mechanism to prevent double-spending attacks, it requires a certain amount of time to detect the doublespending attacks after the transaction has been initiated. Therefore, it is impractical to protect the payees from suffering in double-spending attacks in fast payment scenarios where the time between the exchange of currency and goods or services is shorten to few seconds. Although we cannot prevent double-spending attacks immediately for fast payments, decentralized non-equivocation contracts have been proposed to penalize the malicious payer after the attacks have been detected. The basic idea of these contracts is that the payer locks some coins in a deposit when he initiates a transaction with the payee. If the payer double-spends, a cryptographic primitive called accountable assertions can be used to reveal his Bitcoin credentials for the deposit. Thus, the malicious payer could be penalized by the loss of deposit coins. However, such decentralized nonequivocation contracts are subjected to collusion attacks where the payer colludes with the beneficiary of the depoist and transfers the Bitcoin deposit back to himself when he double-spends, resulting in no penalties. On the other hand, even if the beneficiary behaves honestly, the victim payee cannot get any compensation directly from the deposit in the original design. To prevent such collusion attacks, we design fair time-locked deposits for Bitcoin transactions to defend against doublespending. The fair deposits ensure that the payer will be penalized by the loss of his deposit coins if he double-spends and the victim payee's loss will be compensated within a locked time period. We start with the protocols of making a deposit for one transaction. In particular, for the transaction with single input and output and the transaction with multiple inputs and outputs, we provide different designs of the deposits. We analyze the performance of deposits made for one transaction and show how the fair deposits work efficiently in Bitcoin. We also provide protocols of making a deposit for multiple transactions, which can reduce the burdens of a honest payer. In the end, we extend the fair deposits to non-equivocation contracts for other distributed systems.
format text
author YU, Xingjie
THANG, Shiwen Michael
LI, Yingjiu
DENG, Robert H.
author_facet YU, Xingjie
THANG, Shiwen Michael
LI, Yingjiu
DENG, Robert H.
author_sort YU, Xingjie
title Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin
title_short Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin
title_full Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin
title_fullStr Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin
title_full_unstemmed Collusion attacks and fair time-locked deposits for fast-payment transactions in Bitcoin
title_sort collusion attacks and fair time-locked deposits for fast-payment transactions in bitcoin
publisher Institutional Knowledge at Singapore Management University
publishDate 2019
url https://ink.library.smu.edu.sg/sis_research/4526
https://ink.library.smu.edu.sg/context/sis_research/article/5529/viewcontent/Collusion_Attacks_2019_av.pdf
_version_ 1770574884495163392