Towards Secure Decentralized Applications and Consensus Protocols in Blockchains (on Selfish Mining, Undercutting Attacks, DAG-Based Blockchains, E-Voting, Cryptocurrency Wallets, Secure-Logging, and CBDC)
- URL: http://arxiv.org/abs/2512.13213v1
- Date: Mon, 15 Dec 2025 11:26:43 GMT
- Title: Towards Secure Decentralized Applications and Consensus Protocols in Blockchains (on Selfish Mining, Undercutting Attacks, DAG-Based Blockchains, E-Voting, Cryptocurrency Wallets, Secure-Logging, and CBDC)
- Authors: Ivan Homoliak,
- Abstract summary: We study consensus security in single-chain Proof-of-Work blockchains, including resistance to selfish mining, undercutting, and greedy transaction selection.<n>We advance e-voting with a practical boardroom voting protocol, extend it to a scalable version for millions of participants while preserving security and privacy.<n>Finally, we improve secure logging using blockchains and trusted computing through a centralized ledger that guarantees non-equivocation, integrity, and censorship evidence.
- Score: 0.5584060970507507
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: With the rise of cryptocurrencies, many new applications built on decentralized blockchains have emerged. Blockchains are full-stack distributed systems where multiple sub-systems interact. While many deployed blockchains and decentralized applications need better scalability and performance, security is also critical. Due to their complexity, assessing blockchain and DAPP security requires a more holistic view than for traditional distributed or centralized systems. In this thesis, we summarize our contributions to blockchain and decentralized application security. We propose a security reference architecture to support standardized vulnerability and threat analysis. We study consensus security in single-chain Proof-of-Work blockchains, including resistance to selfish mining, undercutting, and greedy transaction selection, as well as related issues in DAG-based systems. We contribute to wallet security with a new classification of authentication schemes and a two-factor method based on One-Time Passwords. We advance e-voting with a practical boardroom voting protocol, extend it to a scalable version for millions of participants while preserving security and privacy, and introduce a repetitive voting framework that enables vote changes between elections while avoiding peak-end effects. Finally, we improve secure logging using blockchains and trusted computing through a centralized ledger that guarantees non-equivocation, integrity, and censorship evidence, then build on it to propose an interoperability protocol for central bank digital currencies that ensures atomic transfers.
Related papers
- DoS Attacks and Defense Technologies in Blockchain Systems: A Hierarchical Analysis [0.8225825738565354]
This paper categorizes and organizes existing Denial of Service (DoS) attacks.<n>It focuses on explaining the principles and methods of contract layer and consensus layer DoS attacks.<n>It comprehensively analyzes and compares commonly used detection methods and defense technologies.
arXiv Detail & Related papers (2025-07-30T12:29:34Z) - Novel Blockchain-based Protocols for Electronic Voting and Auctions [0.0]
We consider several decentralized protocols to be built on blockchains, specifically using smart contracts on smart contracts.<n>We proposed a new approach called Blind Vote, which is untraceable, secure, efficient, secrecy-preserving, and fully on-chain electronic voting protocol.<n>On the other hand, we propose a new family of algorithms for private, trustless auctions that protect bidder identities and bid values.
arXiv Detail & Related papers (2025-07-04T02:26:04Z) - Comparative Analysis of Blockchain Systems [1.2529669932138894]
Data is distributed and stored across multiple nodes, maintained by all nodes, ensuring data integrity, undeniability, and security.<n>This paper will analyze the architecture of blockchain systems at each layer, focusing on the principles and technologies of blockchain platforms such as Bitcoin, Hyperledger Fabric.
arXiv Detail & Related papers (2025-05-13T15:13:37Z) - Phantom Events: Demystifying the Issues of Log Forgery in Blockchain [31.570414211726888]
We present the first in-depth security analysis of transaction log forgery in EVM-based blockchains.<n>We propose a tool designed to detect event forgery vulnerabilities in smart contracts.<n>We have successfully identified real-world instances for all five types of attacks across multiple decentralized applications.
arXiv Detail & Related papers (2025-02-19T08:07:26Z) - Blockchain-Based Secure Vehicle Auction System with Smart Contracts [0.0]
We analyze the security of blockchain technology to illustrate its advantages and justify its use.<n>We design a new system for storing and trading vehicle information based on the blockchain and smart contract technology.
arXiv Detail & Related papers (2025-01-08T21:07:25Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.<n>Our measurements from the Aptos mainnet show that the optimistic approach reduces latency overhead by 71%.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - Blockchains for Internet of Things: Fundamentals, Applications, and Challenges [38.29453164670072]
Not every blockchain system is suitable for specific IoT applications.
Public blockchains are not suitable for storing sensitive data.
We explore the blockchain's application in three pivotal IoT areas: edge AI, communications, and healthcare.
arXiv Detail & Related papers (2024-05-08T04:25:57Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Blockchain-based decentralized voting system security Perspective: Safe
and secure for digital voting system [0.0]
This paper approach any unique identification the Card number or an OTP will be generated then user can utilise the voting system to cast his/her vote.
If any transaction carried out on a block chain-based system would be settled in a matter of seconds while still being safe, verifiable, and transparent.
arXiv Detail & Related papers (2023-03-11T04:52:46Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.