skip to main content
10.1145/2382196.2382292acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Double-spending fast payments in bitcoin

Published:16 October 2012Publication History

ABSTRACT

Bitcoin is a decentralized payment system that relies on Proof-of-Work (PoW) to verify payments. Nowadays, Bitcoin is increasingly used in a number of fast payment scenarios, where the time between the exchange of currency and goods is short (in the order of few seconds). While the Bitcoin payment verification scheme is designed to prevent double-spending, our results show that the system requires tens of minutes to verify a transaction and is therefore inappropriate for fast payments. An example of this use of Bitcoin was recently reported in the media: Bitcoins were used as a form of \emph{fast} payment in a local fast-food restaurant. Until now, the security of fast Bitcoin payments has not been studied. In this paper, we analyze the security of using Bitcoin for fast payments. We show that, unless appropriate detection techniques are integrated in the current Bitcoin implementation, double-spending attacks on fast payments succeed with overwhelming probability and can be mounted at low cost. We further show that the measures recommended by Bitcoin developers for the use of Bitcoin in fast payments are not always effective in detecting double-spending; we show that if those recommendations are integrated in future Bitcoin implementations, double-spending attacks on Bitcoin will still be possible. Finally, we propose and implement a modification to the existing Bitcoin implementation that ensures the detection of double-spending attacks against fast payments.

References

  1. Bitcoin -- Wikipedia, Available from https://en.bitcoin.it/wiki/Introduction.Google ScholarGoogle Scholar
  2. Trade - Bitcoin, Available from https://en.bitcoin.it/wiki/Trade.Google ScholarGoogle Scholar
  3. Bitcoin Charts, Available from http://bitcoincharts.com/.Google ScholarGoogle Scholar
  4. Bitcoin ATM, Available from http://bitcoinatm.com/.Google ScholarGoogle Scholar
  5. CNN: Bitcoin's uncertain future as currency, Available from http://www.youtube.com/watch?v=75VaRGdzMM0.Google ScholarGoogle Scholar
  6. FAQ - Bitcoin, Available from https://en.bitcoin.it/wiki/FAQ.Google ScholarGoogle Scholar
  7. Double Spending Fast Payments in Bitcoin , Available from http://www.syssec.ethz.ch/research/Bitcoin.Google ScholarGoogle Scholar
  8. Bitcoin Block 80000, Available from http://blockexplorer.com/b/80000.Google ScholarGoogle Scholar
  9. Protocol Rules -- Bitcoin, Available from https://en.bitcoin.it/wiki/Protocol_rules.Google ScholarGoogle Scholar
  10. Protocol Specifications -- Bitcoin, Available from https://en.bitcoin.it/wiki/Protocol_specification.Google ScholarGoogle Scholar
  11. Difficulty -- Bitcoin, Available from https://en.bitcoin.it/wiki/Difficulty.Google ScholarGoogle Scholar
  12. Block hashing algorithm -- Bitcoin, Availabe from https://en.bitcoin.it/wiki/Block_hashing_algorithm.Google ScholarGoogle Scholar
  13. Myths - Bitcoin, Available from https://en.bitcoin.it/wiki/Myths#Point_of_sale_with_bitcoins_isn.27t_po%ssible_because_of_the_10_minute_wait_for_confirmation.Google ScholarGoogle Scholar
  14. Casascius Bitcoin POS system, Available from https://en.bitcoin.it/wiki/Casascius_Bitcoin_POS_system.Google ScholarGoogle Scholar
  15. Satoshi Client Node Connectivity, Available from https://en.bitcoin.it/wiki/Satoshi_Client_Node_Connectivity.Google ScholarGoogle Scholar
  16. Bitcoin Block Explorer, Available from http://blockexplorer.com/.Google ScholarGoogle Scholar
  17. The Finney Attack, Available from https://en.bitcoin.it/wiki/Weaknesses#The_.22Finney.22_attack.Google ScholarGoogle Scholar
  18. Comparison of Mining Pools, Available from https://en.bitcoin.it/wiki/Comparison_of_mining_pools.Google ScholarGoogle Scholar
  19. Comparison of Mining Hardware, Available from https://en.bitcoin.it/wiki/Mining_hardware_comparison.Google ScholarGoogle Scholar
  20. Bitcoin Gateway, A Peer-to-peer Bitcoin Vault and Payment Network, 2011. Available from http://arimaa.com/bitcoin/.Google ScholarGoogle Scholar
  21. Bitcoin: Tempering the Digital Ring of Gyges or Implausible Pecuniary Privacy, 2011. Available from http://ssrn.com/abstract=1937769 or doi:10.2139/ssrn.1937769.Google ScholarGoogle Scholar
  22. Satoshi Nakamoto. Bitcoin: A Peer-to-Peer Electronic Cash System, 2009.Google ScholarGoogle Scholar
  23. Androulaki, E., Raykova, M., Stavrou, A., and Bellovin, S. M. PAR: Payment for Anonymous Routing. In Proceedings of PETS (2008). Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Asokan, N., Janson, P., Steiner, M., and Waidner, M. State of the Art in Electronic Payment Systems. IEEE Computer (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Babaioff, M., Dobzinski, S., Oren, S., and Zohar, A. On Bitcoin and Red Balloons. CoRR (2011).Google ScholarGoogle Scholar
  26. Barber, S., Boyen, X., Shi, E., and Uzun, E. Bitter to Better - How to Make Bitcoin a Better Currency. In Proceedings of Financial Cryptography and Data Security (2012).Google ScholarGoogle ScholarCross RefCross Ref
  27. Belenkiy, M., Chase, M., Erway, C., Jannotti, J., Küpçü, A., Lysyanskaya, A., and Rachlin, E. Making P2P Accountable without Losing Privacy. In Proceedings of WPES (2007). Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Bellare, M., Garay, J., Hauser, R., Krawczyk, H., Steiner, M., Herzberg, A., Tsudik, G., van Herreweghen, E., and Waidner, M. Design, Implementation and Deployment of the iKP Secure Electronic Payment System. IEEE Journal on Selected Areas in Communications (2000). Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Camenisch, J., Hohenberger, S., and Lysyanskaya, A. Compact E-Cash. In Proceedings of Advances in Cryptology - EUROCRYPT (2005). Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Chaum, D., Fiat, A., and Naor, M. Untraceable electronic cash. In Proceedings on Advances in Cryptology - CRYPTO (1990). Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Clark, J., and Essex, A. (Short Paper) CommitCoin: Carbon Dating Commitments with Bitcoin. In Proceedings of Financial Cryptography and Data Security (2012).Google ScholarGoogle ScholarCross RefCross Ref
  32. Everaere, P., Simplot-Ryl, I., and Traore, I. Double Spending Protection for E-Cash Based on Risk Management. In Proceedings of Information Security Conference (2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Karame, G., Francillon, A., andvCapkun, S. Pay as you Browse: Microcomputations as Micropayments in Web-based Services. In Proceedings of WWW (2011). Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Krawczyk, H. Blinding of Credit Card Numbers in the SET Protocol. In Proceedings of the International Conference on Financial Cryptography (1999). Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Reid, F., and Harrigan, M. An Analysis of Anonymity in the Bitcoin System. CoRR (2011).Google ScholarGoogle Scholar
  36. Rivest, R. Peppercoin Micropayments. In Proceedings of Financial Cryptography (2004).Google ScholarGoogle Scholar
  37. Yang, B., and Garcia-Molina, H. PPay: micropayments for peer-to-peer systems. In Proceedings of the ACM Conference on Computer and Communication Security (2003). Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Double-spending fast payments in bitcoin

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '12: Proceedings of the 2012 ACM conference on Computer and communications security
      October 2012
      1088 pages
      ISBN:9781450316514
      DOI:10.1145/2382196

      Copyright © 2012 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 16 October 2012

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader