Learn Before
Relation

Implementation of a double-spending attack in Proof-of-Stake

  • An attacker purchases a physical good with a number of native coins
  • A merchant transfers possession of the physical good after waiting for a certain number of blocks to be linked to the transaction
  • Once the attacker receives the physical good, they create a new branch without the transaction
  • For the attack to succeed, the new branch must become as long as the initial branch

0

1

Updated 2021-11-18

Tags

Cryptoeconomics

Economics

Social Science

Empirical Science

Science