
Open access
Date
2013Type
- Report
ETH Bibliography
yes
Altmetrics
Abstract
In this article, we discuss a possible exploit in Bitcoin that arises from the simultaneous adoption of client versions 0.8.1 and 0.8.2 (or 0.8.3) in the network. In version 0.8.2, Bitcoin clients no longer accept transactions with non-strict signature encoding. As we show, this incompatibility with prior client versions can potentially lead to a double-spending attack in a fast payment setting in Bitcoin. The attack can only work when merchants operate on any client version prior to 0.8.2. Our aim is therefore to raise the awareness of merchants to adopt version 0.8.2 (or 0.8.3) if they are willing to accept fast payments [1]. Show more
Permanent link
https://doi.org/10.3929/ethz-a-009900750Publication status
publishedJournal / series
Technical Report / ETH Zurich, Department of Computer ScienceVolume
Publisher
ETH, Department of Computer Science, Institute of Information SecuritySubject
ELEKTRONISCHER HANDEL + ELEKTRONISCHER MARKT + DIGITAL ECONOMY; DATA SECURITY + DATA PROTECTION (OPERATING SYSTEMS); DATA COMMUNICATIONS (COMPUTER SYSTEMS); DATENKOMMUNIKATION (COMPUTERSYSTEME); ELECTRONIC COMMERCE + ELECTRONIC MARKETS + DIGITAL ECONOMY; BITCOIN (MONETARY SYSTEM); BITCOIN (GELDWESEN); DATENSICHERHEIT + DATENSCHUTZ (BETRIEBSSYSTEME)Organisational unit
02150 - Dep. Informatik / Dep. of Computer Science
More
Show all metadata
ETH Bibliography
yes
Altmetrics