New Research Targets a Big Worry for Some Blockchains: Double-Spent Transactions

A recent research paper outlines a possible way to detect and punish double-spending on a blockchain network.

AccessTimeIconJun 18, 2019 at 5:30 p.m. UTC
Updated Aug 18, 2021 at 1:08 p.m. UTC

Presented By Icon

Election 2024 coverage presented by

Stand with crypto

A trio of researchers say they've discovered a way to detect and punish dishonest blockchain participants, according to a paper published at the end of May.

“The (virtual) gold rush is on, and as in the Wild West of yore, the outlaws are ever present,” states the paper, entitled Polygraph: Accountable Byzantine Agreement.

  • Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
    13:18
    Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
  • Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
    05:10
    Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
  • The first video of the year 2024
    04:07
    The first video of the year 2024
  • The last regression video of the year 3.67.0
    40:07
    The last regression video of the year 3.67.0
  • The authors -- Vincent Gramoli and Pierre Civit of the University of Sydney, and Seth Gilbert of the National University of Singapore -- developed the Polygraph protocol, which automates accountability in blockchains to hold participants accountable for double spending, a notoriously knotty issue in cryptography.

    Though the double spend problem was supposedly solved by Satoshi’s white paper, published in 2008, the researchers discovered that disagreements caused by blockchain forks can lead to double spending if the resulting branches have conflicting transactions. 

    They cite a zombie case:

    “Byzantine nodes can override the General Polygraph Protocol by proposing directly two conflicting views to two different clients to then perform a double-spending attack. The coalition does not participate to the consensus in order to violate the liveness property…. Note that safety is also violated: When a client invokes the read() primitive, the coalition can answer arbitrary values, despite the non-termination of the legitimate consensus. The client is supposed to trust the coalition, like all the other clients who can forever receive a different output for the read() primitive. Hence, for t ≥ n − t0, the eventual prefix property is violated. This makes the blockchain vulnerable to a double-spending attack.”

    Real-world focus

    Yes, the paper is scholarly, but it also provides pragmatic solutions to real problems in current consensus mechanisms.

    The group considers the growing threat of centralization on blockchains, caused by the collectivizing of hashing power. Under traditional Byzantine protocol agreements, if one party amasses more than one-third of total mining output they gain decision making authority. As an aside, the authors note that the largest Bitcoin mining pool today controls approximately 19 percent of total hashing power.

    “We need a new sheriff in town to bring the guilty parties to justice. What if, instead of preventing bad behavior by a party that controls too much of the network power, we guarantee accountability,” write the authors.

    Much in the way we prevent crime in the real world, we can prevent bad blockchain behavior via “defense-in-depth” -- the basic Byzantine agreement protocol that prevents usurpation if the attacker has less than one-third of network control or if the network infrastructure is working to pass messages in time.

    “Byzantine agreement protocols act as the locks on the bank doors, preventing the gangs from making off with the loot,” they wrote.

    However, when these guarantees fail -- and the authors suggest they can and do -- the Polygraph protocol will intercept malicious behavior.

    The Polygraph’s basic algorithm is based on the Byzantine agreement protocol, but goes further in that proceeds through asynchronous rounds, or a vote that receives democratic input.

    “First, a reliable broadcaster is used to distribute the proposal values. Then, a second phase of communication is used to determine whether enough processes have converged on a single value. Finally the processes decide, if they can; and if not, they update their estimate in an attempt to converge on a single value.”

    When a town isn't big enough...

    If the process determines that someone is pursuing illegal actions, the consensus can vote them off the network.

    "Accountability has been overlooked in blockchains but it is actually key to security,” said Gramoli, who also serves as Red Belly Blockchain CEO. “The industry cannot accept blockchain to be a simple distributed system where valuable assets vanish as soon as a third of the participants form a coalition.”

    Red Belly Blockchain has been funded by the Australian Research Council and developed by researchers of the Concurrent Systems Research Group at the University of Sydney and Data61-CSIRO.

    Photo by Xiang Gao on Unsplash

    Disclosure

    Please note that our privacy policy, terms of use, cookies, and do not sell my personal information have been updated.

    CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. CoinDesk has adopted a set of principles aimed at ensuring the integrity, editorial independence and freedom from bias of its publications. CoinDesk is part of the Bullish group, which owns and invests in digital asset businesses and digital assets. CoinDesk employees, including journalists, may receive Bullish group equity-based compensation. Bullish was incubated by technology investor Block.one.


    Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.



    Read more about