Vulnerability of Finitely-long Blockchains in Securing Data

AI-generated keywords: Blockchain technology Data security Finitely-long blockchains Double-spending attacks 51% attacks

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Authors Yiming Jiang and Jiangfan Zhang focus on the vulnerability of finitely-long blockchains in securing data exchanges within decentralized systems
  • The study introduces a general model for finitely-long blockchains and assesses their susceptibility to double-spending attacks
  • A formula is developed to calculate the probability of successfully executing a double-spending attack on a finitely-long blockchain, serving as an indicator of security breaches
  • Finitely-long blockchains are found to be less vulnerable to double-spending attacks compared to infinitely-long ones
  • They also exhibit greater resilience against 51% attacks that can disrupt or compromise blockchain networks
  • The research provides valuable insights into the security implications of using finitely-long blockchains for data protection and exchange, paving the way for enhanced strategies to safeguard decentralized systems
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Yiming Jiang, Jiangfan Zhang

13 pages. 8 figures. This work has been submitted to the IEEE

Abstract: Recently, blockchain has been applied in various fields to secure data exchanges and storage in decentralized systems. In a blockchain application where the task of the application which makes use of the data stored in a blockchain has to be accomplished by a time instant, the employed blockchain is essentially finitely-long. In this paper, we consider a general finitely-long blockchain model which is generalized from most existing works on finitely-long blockchain applications, and take the first step towards characterizing the vulnerability of finitely-long blockchains in securing data against double-spending attacks. For the first time, we develop a general closed-form expression for the probability of success in launching a double-spending attack on a finitely-long blockchain. This probability essentially characterizes the vulnerability of finitely-long blockchains. Then, we prove that the probability of success in launching a double-spending attack on a finitely-long blockchain is no greater than that on an infinitely-long blockchain, which implies that finitely-long blockchains are less vulnerable to double-spending attacks than infinitely-long blockchains. Moreover, we show that unlike infinitely-long blockchains which can be surely paralyzed by a 51% attack, finitely-long blockchains are more resistant to 51% attacks.

Submitted to arXiv on 19 Apr. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2304.09965v1

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In their paper titled "Vulnerability of Finitely-long Blockchains in Securing Data," authors Yiming Jiang and Jiangfan Zhang explore the application of blockchain technology in securing data exchanges and storage within decentralized systems. Specifically, they focus on finitely-long blockchains used for time-sensitive tasks. The study introduces a general model for these blockchains, building upon existing research. The primary objective is to assess their vulnerability to double-spending attacks, a common threat in blockchain systems. For the first time, the authors develop a formula to calculate the probability of successfully executing such an attack on a finitely-long blockchain. This metric serves as an indicator of susceptibility to security breaches. Interestingly, the research reveals that finitely-long blockchains are less vulnerable to double-spending attacks compared to infinitely-long ones. The analysis also shows that they have greater resilience against 51% attacks which can disrupt or compromise blockchain networks. Overall, this study provides valuable insights into the security implications of using finitely-long blockchains for data protection and exchange in various applications. By highlighting their vulnerabilities and strengths compared to infinitely-long blockchains, it paves the way for enhanced strategies to safeguard decentralized systems against malicious activities like double-spending attacks.
Created on 29 May. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.