Vulnerability of Finitely-long Blockchains in Securing Data

Yiming Jiang,Jiangfan Zhang
2023-04-20
Abstract:Recently, blockchain has been applied in various fields to secure data exchanges and storage in decentralized systems. In a blockchain application where the task of the application which makes use of the data stored in a blockchain has to be accomplished by a time instant, the employed blockchain is essentially finitely-long. In this paper, we consider a general finitely-long blockchain model which is generalized from most existing works on finitely-long blockchain applications, and take the first step towards characterizing the vulnerability of finitely-long blockchains in securing data against double-spending attacks. For the first time, we develop a general closed-form expression for the probability of success in launching a double-spending attack on a finitely-long blockchain. This probability essentially characterizes the vulnerability of finitely-long blockchains. Then, we prove that the probability of success in launching a double-spending attack on a finitely-long blockchain is no greater than that on an infinitely-long blockchain, which implies that finitely-long blockchains are less vulnerable to double-spending attacks than infinitely-long blockchains. Moreover, we show that unlike infinitely-long blockchains which can be surely paralyzed by a 51% attack, finitely-long blockchains are more resistant to 51% attacks.
Cryptography and Security
What problem does this paper attempt to address?
The paper primarily focuses on the vulnerability of finite-length blockchains in preventing Double-Spending Attacks (DSA). Specifically: 1. **Research Background**: Blockchain technology, due to its decentralized and secure design, has been widely applied in various fields such as finance and smart grids. However, traditional research mainly focuses on infinite-length blockchains, neglecting the fact that in some application scenarios, the actual length of the blockchain is finite. 2. **Problem Statement**: The paper points out that for application scenarios that need to complete tasks before a specific time point (such as smart grid monitoring, electronic voting systems, etc.), the blockchain used can actually be considered of finite length. Therefore, the security of these finite-length blockchains against double-spending attacks has not been fully studied. 3. **Core Contributions**: - The paper is the first to propose a general finite-length blockchain model and analyze the success probability of double-spending attacks based on this model. - It provides a closed-form expression to describe the success probability of launching a double-spending attack on a finite-length blockchain and proves that this probability is lower than the corresponding probability on an infinite-length blockchain, indicating that finite-length blockchains are more secure against such attacks. - The study also finds that, compared to infinite-length blockchains, even if an attacker possesses more than 50% of the computing power (i.e., the so-called 51% attack), they cannot completely compromise the security of a finite-length blockchain. In summary, this paper fills the gap in the security assessment of finite-length blockchains against double-spending attacks, providing theoretical basis and technical support for applications in related fields.