Golden logoGolden logo
Advanced Search
Double-spend attack (blockchain)

Double-spend attack (blockchain)

A double-spend attack is often considered the primary attack vector against blockchain based cryptocurrencies. It can be performed by sending a transaction to another user, then racing against the honest nodes to produce blocks without that transaction present, allowing the adversarial node to retain the initial funds.

All edits

Edits on 11 May, 2022
Katrina-Kay Pettitt"prospector:1507:627087"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (-1 properties)
Infobox
Related technology
Katrina-Kay Pettitt"prospector:1507:627086"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (-1 properties)
Infobox
Related technology
Katrina-Kay Pettitt"prospector:1507:627085"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (-1 properties)
Infobox
Katrina-Kay Pettitt"prospector:1507:627084"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (-1 properties)
Infobox
Katrina-Kay Pettitt"prospector:1507:627083"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (-1 properties)
Infobox
Related technology
Katrina-Kay Pettitt"prospector:1507:627082"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (-1 properties)
Infobox
Related technology
Katrina-Kay Pettitt"Edit from table cell"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (+1 properties)
Infobox
Related industries
Katrina-Kay Pettitt"Edit from table cell"
Katrina-Kay Pettitt edited on 11 May, 2022
Edits made to:
Infobox (+1 properties)
Infobox
Related industries
Edits on 22 Apr, 2022
Zajcev Igor
Zajcev Igor edited on 22 Apr, 2022
Edits on 20 Apr, 2022
Nika Nika
Nika Nika edited on 20 Apr, 2022
Edits made to:
Table (+2 rows) (+8 cells) (+237 characters)
Table

Title
Date
Link

What is Double Spending

April 28, 2014

What is Double Spending? Bitcoin Double Spending Problem Explained | Bitpanda Academy Lesson 4

April 20, 2021

Edits on 24 Feb, 2022
Aleksandr Kotenkov
Aleksandr Kotenkov edited on 24 Feb, 2022
Edits made to:
Infobox (+1 properties)
Infobox
Related technology
Aleksandr Kotenkov
Aleksandr Kotenkov edited on 24 Feb, 2022
Edits made to:
Infobox (+5 properties)
Infobox
Related technology
Edits on 3 Jan, 2019
Dawson Sewell
Dawson Sewell approved a suggestion from Golden's AI on 3 Jan, 2019
Edits made to:
Article (+15/-15 characters)
Article

There are a couple of ways that an attacker can try to double-spend their coins. One is to send a fake transaction logtransaction log to a merchant who would then validate an invalid transaction based on fraudulent data. The most prominent risk of double-spending is a 51% attack, which means that the malicious actor attempts to control a majority of the network's mining power in order to mine the longest chain, allowing them to exclude their initial transaction from the blockchain.

Edits on 26 Dec, 2018
Daniel Frumkin"Added more related topics"
Daniel Frumkin edited on 26 Dec, 2018
Edits made to:
Related Topics (+5 topics)
Related Topics
Daniel Frumkin"Wrote article, added links for further reading."
Daniel Frumkin edited on 26 Dec, 2018
Edits made to:
Article (+2454 characters)
Table (+2 rows) (+7 cells) (+222 characters)
Article

Double-spending is a problem unique to digital currencies in which a malicious actor attempts to spend the funds in their wallet and then exclude the outgoing transaction from the blockchain, enabling them to retain ownership of the funds that they spent.

There are a couple of ways that an attacker can try to double-spend their coins. One is to send a fake transaction log to a merchant who would then validate an invalid transaction based on fraudulent data. The most prominent risk of double-spending is a 51% attack, which means that the malicious actor attempts to control a majority of the network's mining power in order to mine the longest chain, allowing them to exclude their initial transaction from the blockchain.

The creator of Bitcoin, Satoshi Nakamoto, mentions double-spending several times in the Bitcoin whitepaper. Nakamoto describes the Bitcoin blockchain as a solution to the double-spending problem as a "peer-to-peer distributed timestamp server to generate computational proof of the chronological order of transactions." He goes on to say, "the system is secure as long as honest nodes collectively control more CPU power than any cooperating group of attacker nodes."

Honest nodes are nodes which validate transactions according to the protocol rules. One of the critical rules in terms of double-spend attacks is that the first transaction involving specific coins moving from a specific address is valid, while all subsequent transactions attempting to move the same coins from that address are invalid.

History of Double-Spend Attacks

Double-spends are a possible attack vector against every decentralized blockchain-based cryptocurrency.

There has not been a successful large-scale double-spend attack against Bitcoin to date, but there have been reports of some smaller-scale successes. One double-spend was reported by the spender himself in a bitcointalk thread in 2013, in which the user was able to double-spend $9800 worth of Bitcoin through a payment service provider called OKPAY. However, he did not have malicious intent and returned the funds to the OKPAY.

In May 2018, an unknown party with access to substantial amounts of hashpower was able to 51% attack Bitcoin Gold in order to pull of successful double-spend attacks against exchanges, worth approximately $17.5 million in total.

Another cyrptocurrency, ZenCash, was the target of a successful 51% attack with multiple double-spend transactions in June 2018.

Table

Title
Author
Link
Type

Bitcoin: A Peer-to-Peer Electronic Cash System

Satoshi Nakamoto

Web

ZenCash's Statement on Double Spend Transactions

ZenCash Team

Edits on 7 Aug, 2018
Golden AI"Linkify text links in standard tables"
Golden AI edited on 7 Aug, 2018
Edits made to:
Table (+36/-36 characters)
Table

Author
Title
Link
Type

A. Pinar Ozisik, Brian Neil Levine

An Explanation of Nakamoto’sAnalysis of Double-spend Attacks

https://arxiv.org/pdf/1701.03977.pdfhttps://arxiv.org/pdf/1701.03977.pdf

Academic paper

Edits on 5 Jun, 2018
Tianchang He
Tianchang He edited on 5 Jun, 2018
Edits made to:
Table (+5/-5 characters)
Table

Author
Title
Link
Type

A. Pinar Ozisik, Brian Neil Levine

An Explanation of Nakamoto’sAnalysis of Double-spend Attacks

https://arxiv.org/pdf/1701.03977.pdf

Academic Paperpaper

Edits on 1 Jun, 2018
Golden AI"Merging standard tables"
Golden AI edited on 1 Jun, 2018
Edits made to:
Table (-1 rows) (-3 cells) (-130 characters)
Table (+1 rows) (+4 cells) (+144 characters)
Table

Author
Title
Link

A. Pinar Ozisik, Brian Neil Levine

An Explanation of Nakamoto’sAnalysis of Double-spend Attacks

https://arxiv.org/pdf/1701.03977.pdf

Table

Author
Title
Link
Type

A. Pinar Ozisik, Brian Neil Levine

An Explanation of Nakamoto’sAnalysis of Double-spend Attacks

https://arxiv.org/pdf/1701.03977.pdf

Academic Paper

Edits on 5 Dec, 2017
Alex Dean"article creation"
Alex Dean edited on 5 Dec, 2017
Edits made to:
Description (+321 characters)
Article
Table (+1 rows)
Categories (+1 topics)
Related Topics (+3 topics)
Topic thumbnail

Double-spend attack Double-spend attack (blockchain)

A double-spend attack is often considered the primary attack vector against blockchain based cryptocurrencies. It can be performed by sending a transaction to another user, then racing against the honest nodes to produce blocks without that transaction present, allowing the adversarial node to retain the initial funds.

Article

Table

Author
Title
Link

A. Pinar Ozisik, Brian Neil Levine

An Explanation of Nakamoto’sAnalysis of Double-spend Attacks

https://arxiv.org/pdf/1701.03977.pdf

Categories
Related Topics
Alex Dean"Initial topic creation"
Alex Dean created this topic on 5 Dec, 2017
Edits made to:
Topic thumbnail

 Double-spend attack

A double-spend attack is often considered the primary attack vector against blockchain based cryptocurrencies. It can be performed by sending a transaction to another user, then racing against the honest nodes to produce blocks without that transaction present, allowing the adversarial node to retain the initial funds.

Golden logo
By using this site, you agree to our Terms of Service.