Simulation of transaction malleability attack for blockchain-based e-Voting

Abstract Blockchain has been adopted to address significant challenges, such as trust in diverse domains, including voting, logistics and finance. However, transaction malleability has been identified as a threat for blockchain, which can potentially lead to an inconsistent state that can result in further attacks such as double-spending. In this context, this paper is focused on investigating the feasibility of transaction malleability within a typical blockchain application aiming to identify scenarios that may lead to a successful transaction malleability attack. Our objective in doing so is to highlight conditions which cause such attack to facilitate the development of protection mechanisms for them. Specifically, this paper presents a successful simulation of transaction malleability attack within the context of blockchain-based electronic voting. The evaluation has identified the impact of parameters, such as network delay and block generation rate in achieving a successful transaction malleability attack, which highlights future directions of research.

[1]  Khaled Salah,et al.  Monetization of IoT data using smart contracts , 2019, IET Networks.

[2]  Feng Hao,et al.  A Fair and Robust Voting System by Broadcast , 2012, Electronic Voting.

[3]  Marcin Andrychowicz,et al.  On the Malleability of Bitcoin Transactions , 2015, Financial Cryptography Workshops.

[4]  Iuon-Chang Lin,et al.  A Survey of Blockchain Security Issues and Challenges , 2017, Int. J. Netw. Secur..

[5]  Nancy A. Lynch,et al.  Impossibility of distributed consensus with one faulty process , 1983, PODS '83.

[6]  Feng Hao,et al.  Anonymous voting by two-round public discussion , 2010, IET Inf. Secur..

[7]  Feng Hao,et al.  Every Vote Counts: Ensuring Integrity in Large-Scale Electronic Voting , 2014, EVT/WOTE.

[8]  Matthew Green,et al.  Zerocoin: Anonymous Distributed E-Cash from Bitcoin , 2013, 2013 IEEE Symposium on Security and Privacy.

[9]  Holger Paul Keeler,et al.  Bitcoin blockchain dynamics: The selfish-mine strategy in the presence of propagation delay , 2015, Perform. Evaluation.

[10]  T.-H. Hubert Chan,et al.  How to Vote Privately Using Bitcoin , 2015, ICICS.

[11]  Heekuck Oh,et al.  A Solution towards Eliminating Transaction Malleability in Bitcoin , 2018, J. Inf. Process. Syst..

[12]  Aggelos Kiayias,et al.  Self-tallying Elections and Perfect Ballot Secrecy , 2002, Public Key Cryptography.

[13]  Christian Decker,et al.  Bitcoin Transaction Malleability and MtGox , 2014, ESORICS.

[14]  Khaled Salah,et al.  Blockchain for AI: Review and Open Research Challenges , 2019, IEEE Access.

[15]  Khaled Salah,et al.  IoT security: Review, blockchain solutions, and open challenges , 2017, Future Gener. Comput. Syst..

[16]  Maged Hamada Ibrahim SecureCoin: A Robust Secure and Efficient Protocol for Anonymous Bitcoin Ecosystem , 2017, Int. J. Netw. Secur..

[17]  Jon Crowcroft,et al.  Trustworthy Electronic Voting Using Adjusted Blockchain Technology , 2019, IEEE Access.

[18]  Muhammad Mubashir Khan,et al.  Secure Digital Voting System Based on Blockchain Technology , 2018, Int. J. Electron. Gov. Res..

[19]  Meni Rosenfeld,et al.  Analysis of Hashrate-Based Double Spending , 2014, ArXiv.

[20]  Khaled Salah,et al.  Decentralized document version control using ethereum blockchain and IPFS , 2019, Comput. Electr. Eng..

[21]  David Chaum,et al.  Secret-ballot receipts: True voter-verifiable elections , 2004, IEEE Security & Privacy Magazine.