scholarly journals Profitable Double-Spending Attacks

2020 ◽  
Vol 10 (23) ◽  
pp. 8477 ◽  
Author(s):  
Jehyuk Jang ◽  
Heung-No Lee

Our aim in this paper is to investigate the profitability of double-spending (DS) attacks that manipulate an a priori mined transaction in a blockchain. It was well understood that a successful DS attack is established when the proportion of computing power an attacker possesses is higher than that of the honest network. What is not yet well understood is how threatening a DS attack with less than 50% computing power used can be. Namely, DS attacks at any proportion can be a threat as long as the chance to make a good profit exists. Profit is obtained when the revenue from making a successful DS attack is greater than the cost of carrying out one. We have developed a novel probability theory for calculating a finitetime attack probability. This can be used to size up attack resources needed to obtain the profit. The results enable us to derive a sufficient and necessary condition on the value of a transaction targeted by a DS attack. Our result is quite surprising: we theoretically show how a DS attack at any proportion of computing power can be made profitable. Given one’s transaction value, the results can also be used to assess the risk of a DS attack. An example of profitable DS attack against BitcoinCash is provided.

Author(s):  
Anastasiya V. Mironova ◽  
Igor’ V. Liskin ◽  
Irina I. Afonina

Neglect of soils leads to their degradation, worsens useful properties, and reduces fertility and productivity. (Research purpose) The research purpose is in conducting a comparative analysis of technologies for treating degraded soils, taking into account the economic feasibility of their restoration in non-black-soil regions of Russia. (Materials and methods) The article shows the main technological scheme of restoration of degraded soils. Authors have identified the main groups of land that are located in non-black-soil regions of Russia. (Results and discussion) The article presents the need for equipment, economic and labor costs for the restoration of each type of land in the non-black-soil regions of Russia. Authors took into account that the salary of machine operators depends on the time of direct execution of the task. It was found that the restoration of virgin and fallow lands was the most preferable from the economic, energy-saving and environmental points of view. The article shows that the restoration of pasture areas exceeds the cost of processing virgin lands, but the number of necessary machine and tractor units is comparable to work on virgin lands. Authors recommend to develop the soils with woody and shrubby vegetation in the first place, starting with land occupied by young plants. It is necessary to take into account the criteria for the fertility of the soil layer. It was found that soils with a small excess of moisture have small cost of its development, while on heavily swampy soils the cost of work on their development is many times higher than the cost of restoring other types of land. (Conclusion) The article shows that the restoration of neglected land is a necessary condition for improving the provision of human needs for food and a number of industrial goods. First of all, it is necessary to develop land that requires minimal investment of economic and labor costs.


2020 ◽  
Vol 18 (1) ◽  
pp. 353-377 ◽  
Author(s):  
Zhien Li ◽  
Chao Wang

Abstract In this study, we obtain the scalar and matrix exponential functions through a series of quaternion-valued functions on time scales. A sufficient and necessary condition is established to guarantee that the induced matrix is real-valued for the complex adjoint matrix of a quaternion matrix. Moreover, the Cauchy matrices and Liouville formulas for the quaternion homogeneous and nonhomogeneous impulsive dynamic equations are given and proved. Based on it, the existence, uniqueness, and expressions of their solutions are also obtained, including their scalar and matrix forms. Since the quaternion algebra is noncommutative, many concepts and properties of the non-quaternion impulsive dynamic equations are ineffective, we provide several examples and counterexamples on various time scales to illustrate the effectiveness of our results.


2021 ◽  
Vol 2021 (1) ◽  
Author(s):  
Qiong Meng ◽  
Zhen Jin ◽  
Guirong Liu

AbstractThis paper studies the linear fractional-order delay differential equation $$ {}^{C}D^{\alpha }_{-}x(t)-px(t-\tau )= 0, $$ D − α C x ( t ) − p x ( t − τ ) = 0 , where $0<\alpha =\frac{\text{odd integer}}{\text{odd integer}}<1$ 0 < α = odd integer odd integer < 1 , $p, \tau >0$ p , τ > 0 , ${}^{C}D_{-}^{\alpha }x(t)=-\Gamma ^{-1}(1-\alpha )\int _{t}^{\infty }(s-t)^{- \alpha }x'(s)\,ds$ D − α C x ( t ) = − Γ − 1 ( 1 − α ) ∫ t ∞ ( s − t ) − α x ′ ( s ) d s . We obtain the conclusion that $$ p^{1/\alpha } \tau >\alpha /e $$ p 1 / α τ > α / e is a sufficient and necessary condition of the oscillations for all solutions of Eq. (*). At the same time, some sufficient conditions are obtained for the oscillations of multiple delays linear fractional differential equation. Several examples are given to illustrate our theorems.


2021 ◽  
Vol 13 (10) ◽  
pp. 5445
Author(s):  
Muyun Sun ◽  
Jigan Wang ◽  
Ting Wen

Creativity is the key to obtaining and maintaining competitiveness of modern organizations, and it has attracted much attention from academic circles and management practices. Shared leadership is believed to effectively influence team output. However, research on the impact of individual creativity is still in its infancy. This study adopts the qualitative comparative analysis method, taking 1584 individuals as the research objects, underpinned by a questionnaire-based survey. It investigates the influence of the team’s shared leadership network elements and organizational environmental factors on the individual creativity. We have found that there are six combination of conditions of shared leadership and organizational environmental factors constituting sufficient combination of conditions to increase or decrease individual creativity. Moreover, we have noticed that the low network density of shared leadership is a sufficient and necessary condition of reducing individual creativity. Our results also provide management suggestions for practical activities during the team management.


2019 ◽  
Vol 5 (1) ◽  
Author(s):  
Ming-Xing Luo

Abstract Nonlocal game as a witness of the nonlocality of entanglement is of fundamental importance in various fields. The well-known nonlocal games or equivalent linear Bell inequalities are only useful for Bell networks consisting of single entanglement. Our goal in this paper is to propose a unified method for constructing cooperating games in network scenarios. We propose an efficient method to construct multipartite nonlocal games from any graphs. The main idea is the graph representation of entanglement-based quantum networks. We further specify these graphic games with quantum advantages by providing a simple sufficient and necessary condition. The graphic games imply a linear Bell testing of the nonlocality of general quantum networks consisting of EPR states. It also allows generating new instances going beyond CHSH game. These results have interesting applications in quantum networks, Bell theory, computational complexity, and theoretical computer science.


Author(s):  
Dongwei Li ◽  
Jinsong Leng ◽  
Tingzhu Huang

In this paper, we give some new characterizations of g-frames, g-Bessel sequences and g-Riesz bases from their topological properties. By using the Gram matrix associated with the g-Bessel sequence, we present a sufficient and necessary condition under which the sequence is a g-Bessel sequence (or g-Riesz basis). Finally, we consider the excess of a g-frame and obtain some new results.


Author(s):  
XIANG LI ◽  
BAODING LIU

Possibility measures and credibility measures are widely used in fuzzy set theory. Compared with possibility measures, the advantage of credibility measures is the self-duality property. This paper gives a relation between possibility measures and credibility measures, and proves a sufficient and necessary condition for credibility measures. Finally, the credibility extension theorem is shown.


2021 ◽  
Author(s):  
Mircea-Adrian Digulescu

It has long been known that cryptographic schemes offering provably unbreakable security exist, namely the One Time Pad (OTP). The OTP, however, comes at the cost of a very long secret key - as long as the plain-text itself. In this paper we propose an encryption scheme which we (boldly) claim offers the same level of security as the OTP, while allowing for much shorter keys, of size polylogarithmic in the computing power available to the adversary. The Scheme requires a large sequence of truly random words, of length polynomial in the both plain-text size and the logarithm of the computing power the adversary has. We claim that it ensures such an attacker cannot discern the cipher output from random data, except with small probability. We also show how it can be adapted to allow for several plain-texts to be encrypted in the same cipher output, with almost independent keys. Also, we describe how it can be used in lieu of a One Way Function.


2017 ◽  
Vol 13 (8) ◽  
pp. 155014771772629 ◽  
Author(s):  
Wen-Lu Zou ◽  
Gun Li

In this study, a new formation behavior problem for second-order multi-agent systems with time delay is investigated in the presence of antagonistic interactions. We first proposed a formation behavior protocol with time delay for each agent in the antagonistic network. Then, by a frequency-domain analysis, a sufficient and necessary condition is derived to guarantee the consensus stability of the multi-agent system. It is shown that the agents in the same group form their own desired formation while keeping a desired relative position with other groups. Finally, numerical simulations are provided to illustrate the obtained results.


2013 ◽  
Vol 278-280 ◽  
pp. 1687-1691
Author(s):  
Tong Qiang Jiang ◽  
Jia Wei He ◽  
Yan Ping Gao

The consensus problems of two situations for singular multi-agent systems with fixed topology are discussed: directed graph without spanning tree and the disconnected undirected graph. A sufficient and necessary condition is obtained by applying the stability theory and the system is reachable asymptotically. But for normal systems, this can’t occur in upper two situations. Finally a simulation example is provided to verify the effectiveness of our theoretical result.


Sign in / Sign up

Export Citation Format

Share Document