Blockchain security based on cryptography: a review
- URL: http://arxiv.org/abs/2508.01280v1
- Date: Sat, 02 Aug 2025 09:24:37 GMT
- Title: Blockchain security based on cryptography: a review
- Authors: Wenwen Zhou, Dongyang Lyu, Xiaoqi Li,
- Abstract summary: This paper aims to analyse the attacks on blockchain from the perspective of cryptography.<n>Based on the six-layer architecture of the blockchain, the attacks on the data layer, the network layer, the consensus layer, the contract layer, the incentive layer and the application layer are analysed.<n>The methods to mitigate or resist the attacks are proposed.
- Score: 0.8225825738565354
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: As an emerging service framework built by combining cryptography, P2P network, consensus mechanism and innovative contract technology, blockchain has been widely used in digital finance, data sharing, message traceability and electronic evidence preservation because of its decentralised, non-tamperable and transaction traceability. However, with the complex and changeable application scenarios of blockchain technology and the continuous enhancement of blockchain attack technology, the security of the blockchain system has been seriously threatened, dramatically affecting the development and application of blockchain technology. This paper aims to analyse the attacks on blockchain from the perspective of cryptography. Firstly, from the cryptography technology in the blockchain, the principle of hash functions, digital signatures, and other technologies, as well as their role in the blockchain, are introduced. Then, based on the six-layer architecture of the blockchain, the attacks on the data layer, the network layer, the consensus layer, the contract layer, the incentive layer and the application layer are analysed, and the methods to mitigate or resist the attacks are proposed. Secondly, the attack principles of 51% attack, Double-Spending attack, Reentrancy attack, Replay attack, Sybil attack and Timestamp Tampering attack were analysed, and the mitigation or defence solutions for these six attacks were designed. Finally, the core problems to be solved in blockchain technology are summarised, and the future development of blockchain security technology is projected.
Related papers
- DoS Attacks and Defense Technologies in Blockchain Systems: A Hierarchical Analysis [0.8225825738565354]
This paper categorizes and organizes existing Denial of Service (DoS) attacks.<n>It focuses on explaining the principles and methods of contract layer and consensus layer DoS attacks.<n>It comprehensively analyzes and compares commonly used detection methods and defense technologies.
arXiv Detail & Related papers (2025-07-30T12:29:34Z) - Enhancing Blockchain Cross Chain Interoperability: A Comprehensive Survey [39.613235136790244]
We systematically analyze over 150 high impact sources from academic journals, digital libraries, and grey literature.<n>We offer a classification of interoperability approaches including Atomic Swaps, Sidechains, Light Clients, and so on, which represent the most comprehensive overview to date.<n>Our findings aim to support researchers, policymakers, and industry leaders in harnessing the transformative potential of blockchain interoperability to address current challenges and drive forward a cohesive multi-chain ecosystem.
arXiv Detail & Related papers (2025-05-08T04:24:50Z) - A Multi-Layered Security Analysis of Blockchain Systems: From Attack Vectors to Defense and System Hardening [1.0683698080190929]
The application of Bitcoin enables people to understand blockchain technology gradually.<n>With the initial application of blockchain technology on the Internet, the security of blockchain technology has also been widely concerned.<n>This paper first analyzes the security threats faced by the application digital currency trading platform of the blockchain system.<n>Then analyzes the security problems of smart contract closely related to blockchain 2.0, and then analyzes and studies the security threats of blockchain public chain, consensus mechanism, and P2P.
arXiv Detail & Related papers (2025-04-12T11:23:47Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - A Novel Classification of Attacks on Blockchain Layers: Vulnerabilities, Attacks, Mitigations, and Research Directions [0.8540657305162735]
This survey proposes a novel classification of blockchain attacks and an in-depth investigation of blockchain data security.
We reveal the deep dynamics of these security concerns by closely investigating the fundamental causes of attacks at various blockchain tiers.
We also discuss the implications of quantum computing in blockchain and the weaknesses in the current technology that can be exploited in the future.
arXiv Detail & Related papers (2024-04-28T06:40:50Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Architectural Design for Secure Smart Contract Development [0.0]
Several attacks on blockchain infrastructures have resulted in hundreds of millions of dollars lost and sensitive information compromised.
I identify common software vulnerabilities and attacks on blockchain infrastructures.
I propose a model for ensuring a stronger security standard for future systems leveraging smart contracts.
arXiv Detail & Related papers (2024-01-03T18:59:17Z) - SoK: Security of Cross-chain Bridges: Attack Surfaces, Defenses, and Open Problems [43.80265187232706]
Cross-chain bridges are used to facilitate token and data exchanges across blockchains.
Although bridges are becoming increasingly popular, they are still in their infancy and have been attacked multiple times recently.
This paper analyzes the security landscape of cross-chain bridges in a holistic manner.
arXiv Detail & Related papers (2023-12-19T20:13:21Z) - Protecting the Decentralized Future: An Exploration of Common Blockchain
Attacks and their Countermeasures [1.1499361198674167]
Rising number of security threats have attracted cybercriminals as a target.
This research aims to offer a thorough analysis of mitigating blockchain attacks.
The study also highlights how crucial it is to take into account the particular needs of every blockchain application.
arXiv Detail & Related papers (2023-06-20T20:56:06Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.