{"metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00233041","sets":["1164:4088:11480:11520"]},"path":["11520"],"owner":"44499","recid":"233041","title":["半減期がある状況での二重支払い攻撃の経済合理性"],"pubdate":{"attribute_name":"公開日","attribute_value":"2024-03-05"},"_buckets":{"deposit":"ec8d5458-fc1a-447d-b703-24eab05743ab"},"_deposit":{"id":"233041","pid":{"type":"depid","value":"233041","revision_id":0},"owners":[44499],"status":"published","created_by":44499},"item_title":"半減期がある状況での二重支払い攻撃の経済合理性","author_link":["632076","632079","632078","632080","632075","632077"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"半減期がある状況での二重支払い攻撃の経済合理性"},{"subitem_title":"The More Halving Advances, the More Rational Double Spending Attack is","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"IA-D","subitem_subject_scheme":"Other"}]},"item_type_id":"4","publish_date":"2024-03-05","item_4_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"京都大学"},{"subitem_text_value":"東京工業大学"},{"subitem_text_value":"京都大学"}]},"item_4_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Kyoto University","subitem_text_language":"en"},{"subitem_text_value":"Tokyo Institute of Technology","subitem_text_language":"en"},{"subitem_text_value":"Kyoto University","subitem_text_language":"en"}]},"item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/233041/files/IPSJ-IOT24064021.pdf","label":"IPSJ-IOT24064021.pdf"},"format":"application/pdf","billing":["billing_file"],"filename":"IPSJ-IOT24064021.pdf","filesize":[{"value":"973.0 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"0","billingrole":"43"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_login","version_id":"3e8ebbb1-83fe-4eb6-be81-99b50c5ccd05","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2024 by the Institute of Electronics, Information and Communication Engineers This SIG report is only available to those in membership of the SIG."}]},"item_4_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"中井, 大志"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"櫻井, 晶"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"首藤, 一幸"}],"nameIdentifiers":[{}]}]},"item_4_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Taishi, Nakai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Akira, Sakurai","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Kazuyuki, Shudo","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_4_source_id_9":{"attribute_name":"書誌レコードID","attribute_value_mlt":[{"subitem_source_identifier":"AA12326962","subitem_source_identifier_type":"NCID"}]},"item_4_textarea_12":{"attribute_name":"Notice","attribute_value_mlt":[{"subitem_textarea_value":"SIG Technical Reports are nonrefereed and hence may later appear in any journals, conferences, symposia, etc."}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_18gh","resourcetype":"technical report"}]},"item_4_source_id_11":{"attribute_name":"ISSN","attribute_value_mlt":[{"subitem_source_identifier":"2188-8787","subitem_source_identifier_type":"ISSN"}]},"item_4_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"多くのブロックチェーンには,マイナーがブロックをマイニングするごとに得られる報酬が一定期間ごとに半分になっていく半減期というイベントがある.今後半減期の進行に伴い,1 ブロックあたりの新規に発行される暗号通貨の報酬が減っていくため,正直にマイニングするよりも二重支払い攻撃をしたほうが高い収益が得られる可能性がある.二重支払い攻撃とは,一度メインチェーンに含まれたトランザクションを攻撃者がより長いチェーンを作成して上書きし,トランザクションを再利用する攻撃である.この攻撃はブロックチェーンというアイデアが初めて登場したサトシ・ナカモトのビットコイン論文でも紹介されたが,いまだ半減期に伴う二重支払い攻撃の分析は定量的に十分になされていない.本研究では,シミュレータを用いて,複数のパラメータを様々に設定し,半減期に伴う二重支払い攻撃の収益を計算する.結果,20 年後には 10% のハッシュレート割合以上で通常のビットコインのマイニングをするより,二重支払い攻撃をするほうが収益性が高い状況の存在が判明した.これはビットコインの成立を揺るがす問題である.さらに本研究では,この状況が起きる原因を分析し,二重支払い攻撃に使ったトランザクションで購入した財の再販価格比率が二重支払い攻撃の経済的合理性に大きな影響を及ぼしていることを明らかにした.","subitem_description_type":"Other"}]},"item_4_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"Many blockchains feature an event known as a ”halving,” where the reward obtained by miners for mining a block is halved at regular intervals. As halving progresses, the reward for newly issued cryptocurrency per block will decrease, potentially making double-spending attacks more profitable than mining honestly. A double spending attack involves an attacker creating a longer chain to overwrite a transaction that has been included in the main chain, thereby reusing the transaction. This attack was introduced in the Bitcoin paper by Satoshi Nakamoto, the originator of the blockchain concept. However, there has not been sufficient quantitative analysis of double-spending attacks following a halving. This study employs a simulator to calculate the profits from double spending attacks under various parameters in the context of halving. The results show that, 20 years from now, conducting a double spending attack could be more profitable than regular Bitcoin mining if the attacker controls more than 10% of the hash rate. This poses a significant challenge to the foundation of Bitcoin. Furthermore, this research analyzes the causes of this situation and reveals that the resale value ratio of the goods purchased with the transactions used in the double spending attack has a significant impact on the economic rationality of the attacks.","subitem_description_type":"Other"}]},"item_4_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"7","bibliographic_titles":[{"bibliographic_title":"研究報告インターネットと運用技術(IOT)"}],"bibliographicPageStart":"1","bibliographicIssueDates":{"bibliographicIssueDate":"2024-03-05","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"21","bibliographicVolumeNumber":"2024-IOT-64"}]},"relation_version_is_last":true,"weko_creator_id":"44499"},"id":233041,"updated":"2025-01-19T10:14:03.271520+00:00","links":{},"created":"2025-01-19T01:34:15.260569+00:00"}