SSRN Id3090174
SSRN Id3090174
SSRN Id3090174
Problem and
Cryptocurrencies
6th January, 20211
Usman W. Chohan, MBA, PhD
1
Originally posted on 19th December, 2017 to SSRN
Background
Cryptocurrencies are considered a novel monetary instrument in that
they proceed from having resolved two fundamental mathematical
problems: the
byzantine generals problem(Lamport et al. 2019; Reischuk
1985; Driscoll et al. 2004), and the d
ouble spending problem
. Both of
these are significant achievements in terms of the design of a digital
currency. This paper examines the latter double spending problem in
greater detail. For the purposes of definition, the
double spending
problem
is a potential flaw in a cryptocurrency or other digital cash
scheme whereby the same single digital token can be spent more than
once, and this is possible because a digital token consists of a
digital file that can be duplicated or falsified.
Mechanism
Whenever transactions are recorded in a blockchain, once z
blocks have
been appended to the chain, attackers may try to regenerate a new
strand of the blockchain. Putting this mathematically, if the honest
chain is z blocks faster than an attack chain, and produces a new
block in the chain’s iteration in the next moment, then there is a
distance of +1 between 2 chains. However, if the attacker’s surrogate
chain produces the new block instead, then the distance of the two
chains is -1. In other words, there is a race between the attackers’
chain and the honest chain, and if the attackers’ surrogate chain
works at a more rapid pace than the existing blockchain, then since
Bitcoin protocol always selects the longest chain, the attackers will
be able to regain the coins that they had spent earlier.
Where:
2
A detailed breakdown of the derivation of the proof is available
here
:
DxChain (2018), A Deep Understanding of the Double-Spending Problem in
Bitcoin.
Medium.
Earlier Advances
However, as far back as 1993, Brands outlined a method for
cryptographic processes known as
restrictive blind signatures
, which
forms the backbone for the gamut of cryptocurrencies now available.
After contrasting the one-show blind signatures with the method of
wallets with observers, he postulated restrictive blind signatures “in
conjunction with the so-called representation problem in groups of
prime order” which would give rise “to highly efficient off-line cash
systems that can be extended at virtually no extra cost to wallets
with observers under the most stringent of privacy requirements. The
workload for the observer is so small that it can be performed by a
tamper-resistant smart card capable of performing the Schnorr
identification scheme” (Brands 1993).
Ferguson (1993) stressed that, instead of using many terms, each for a
single bit of the challenge, a better system would use a single term
for a large number of possible challenges, and so instead of using a
withdrawal protocol with cut-and-choose methodology as with earlier
systems, a better system would use a direct construction. Medvinsky et
al. (1993),while postulating electronic cash (“Netcash”), emphasized
the need for robust access protocols in such architecture. Krsul et
al. (1998) patented a method of electronic payments that would counter
the double spending problem by introducing “a method of generating
electronic monetary tokens”wherein the creation of every “electronic
token halves by a financial services provider and begins in response
to a request from a buyer to generate electronic monetary tokens to be
used with an identified seller.”
References
1. Brands, S. (1993, August). Untraceable off-line cash in wallet with
observers. InAnnual International Cryptology Conference(pp. 302-318).
Springer, Berlin,Heidelberg
2. Chatterjee, A., Pitroda, Y., & Parmar, M. (2020). Dynamic Role-Based
Access Control for Decentralized Applications. arXiv preprint
arXiv:2002.05547
.
3. Chatterjee, K., Goharshady, A. K., & Pourdamghani, A. (2019, May).
Probabilistic smart contracts: Secure randomness on the blockchain. In
2019 IEEE International Conference on Blockchain and Cryptocurrency
(ICBC)(pp. 403-412). IEEE.
4. Chatterjee, K., Goharshady, A. K., & Goharshady, E. K. (2019, April).
The treewidth of smart contracts. In Proceedings of the 34th ACM/SIGAPP
Symposium on Applied Computing(pp. 400-408).
5. Chodhury, N. (2019). Inside Blockchain, Bitcoin, and Cryptocurrencies.
CRC Press.
6. Chohan, U.W. (2019a). Cryptocurrencies and Inequality.
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3322329
7. Chohan, U.W. (2019b). Oversight and Regulation of Cryptocurrencies:
BitLicense.
8. Chohan, U.W. (2019c). Initial Coin Offerings (ICOs): Risks, Regulation,
and Accountability. Cryptocurrencies and Mechanisms of Exchange.
Springer.
9. Chohan, U.W. (2019d). Are Cryptocurrencies Truly Trustless?
Cryptocurrencies and Mechanisms of Exchange. Springer.
1. Chohan, U.W. (2019e). Are Stable Coins Stable?
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3326823
10.Chuen, D. L. K., Guo, L., & Wang, Y. (2017). Cryptocurrency: A new
investment op
portunity?. The Journal of Alternative Investments,
20
(3),
16-40.
11.Ciatto, G., Calegari, R., Mariani, S., Denti, E., & Omicini, A. (2018,
June). From the Blockchain to Logic Programming and Back: Research
Perspectives. In WOA(pp. 69-74).
12.Чахова, Д. А., & Кошелева, А. И. (2018). Проблемы и перспективы развития
блокчейн-туризма в регионах РФ (на примере Калужской области).
Региональная экономика и управление: электронный научный журнал,
(2018-53).
13. Decourt, R.F.; Chohan, U.W.; Perugini, M.L. (2017). “Bitcoin returns
and the Monday Effect.” Conference Proceedings of the 14th Convibra:
Administração (Brazil).November.
http://www.convibra.com.br/upload/paper/2017/33/2017_33_14675.pdf
14.Driscoll, K., Hall, B., Paulitsch, M., Zumsteg, P., & Sivencrona, H.
(2004, October). The real byzantine generals. In The 23rd Digital