Shorting attack: Predatory, destructive short selling on Proof-of-Stake cryptocurrencies

被引:1
|
作者
Lee, Suhyeon [1 ]
Kim, Seungjoo [1 ]
机构
[1] Korea Univ, Sch Cybersecur, ICSP Inst Cyber Secur & Privacy, Seoul, South Korea
来源
关键词
blockchain; Proof-of-Stake; security; short selling; MARKET;
D O I
10.1002/cpe.6585
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Bitcoin introduced blockchain which is the transparent and decentralized way of recording the lists of digital currency transactions. Bitcoin's blockchain uses Proof-of-Work as a Sybil control mechanism. However, PoW wastes energy since it uses hash computing competitions to find a block. Hence, various alternative mechanisms have been proposed. Among them, Proof-of-Stake, which is based on the deposit, has been spotlighted. As opposed to Proof-of-Work, Proof-of-Stake requires nodes to have a certain amount of tokens (stake) in order to qualify to validate blocks. The "one-sentence philosophy" of proof of stake is not "security comes from burning energy," but rather "security comes from putting up economic value-at-loss." In this article, contrary to popular belief, we point out that this value-at-loss can be hedged by short selling or other financial products. We propose a "shorting attack," which makes a profit by massive short selling and sabotage to a Proof-of-Stake-based cryptocurrency. The shorting attack implies that the security of Proof-of-Stake-based cryptocurrency can be vulnerable by a low stake ratio.
引用
收藏
页数:14
相关论文
共 7 条
  • [1] Compounding of Wealth in Proof-of-Stake Cryptocurrencies
    Fanti, Giulia
    Kogan, Leonid
    Oh, Sewoong
    Ruan, Kathleen
    Viswanath, Pramod
    Wang, Gerui
    FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2019, 2019, 11598 : 42 - 61
  • [2] Balancing Participation and Decentralization in Proof-of-Stake Cryptocurrencies
    Kiayias, Aggelos
    Koutsoupias, Elias
    Marmolejo-Cossio, Francisco
    Stouka, Aikaterini-Panagiota
    ALGORITHMIC GAME THEORY, SAGT 2024, 2024, 15156 : 333 - 350
  • [3] Virtual ASICs: Generalized Proof-of-Stake Mining in Cryptocurrencies
    Ganesh, Chaya
    Orlandi, Claudio
    Tschudi, Daniel
    Zohar, Aviv
    DATA PRIVACY MANAGEMENT, CRYPTOCURRENCIES AND BLOCKCHAIN TECHNOLOGY, ESORICS 2021, 2022, 13140 : 173 - 191
  • [4] A novel approach to alleviate wealth compounding in proof-of-stake cryptocurrencies
    Naderi, Zahra
    Shariatpanahi, Seyed Pooya
    Bahrak, Behnam
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2024, 17 (03) : 1322 - 1334
  • [5] Blockchain Technologies: Probability of Double-Spend Attack on a Proof-of-Stake Consensus
    Karpinski, Mikolaj
    Kovalchuk, Lyudmila
    Kochan, Roman
    Oliynykov, Roman
    Rodinko, Mariia
    Wieclaw, Lukasz
    SENSORS, 2021, 21 (19)
  • [6] Multivariable Based Checkpoints to Mitigate the Long Range Attack in Proof-of-Stake Based Blockchains
    AlMallohi, Ibrahim Ahmed I.
    Alotaibi, Ahmed Saad M.
    Alghafees, Rahaf
    Azam, Farzana
    Khan, Zeeshan Shafi
    2019 THE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPILATION, COMPUTING AND COMMUNICATIONS (HP3C 2019), 2019, : 118 - 122
  • [7] Distributed Hybrid Double-Spending Attack Prevention Mechanism for Proof-of-Work and Proof-of-Stake Blockchain Consensuses
    Akbar, Nur Arifin
    Muneer, Amgad
    ElHakim, Narmine
    Fati, Suliman Mohamed
    FUTURE INTERNET, 2021, 13 (11)