<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Extrapolation to Calculate the Probability of a Double Spending Attack</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Nikolay</forename><surname>Poluyanenko</surname></persName>
							<affiliation key="aff0">
								<orgName type="institution">N. KarazinKharkiv National University</orgName>
								<address>
									<addrLine>Svobody sq., 4</addrLine>
									<postCode>61022</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">Simon Kuznets Kharkiv National University of Economics</orgName>
								<address>
									<addrLine>Nauky avenue 9а</addrLine>
									<postCode>61166</postCode>
									<settlement>Kharkiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Extrapolation to Calculate the Probability of a Double Spending Attack</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">266F634DBE2077815AED4FE4F6605E08</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-25T04:22+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>blockchain technology</term>
					<term>consensus protocols</term>
					<term>proof-ofwork</term>
					<term>double-spending attack</term>
					<term>polynomial interpolation</term>
					<term>binomial approximation</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>One of the important aspects of the efficiency of modern distributed networks built using blockchain technologies is the study of the security of consensus protocols. In particular, the most common cryptocurrencies and blockchain systems with probabilistic consensus protocols are subjects to so-called double-spending attack. The basis of such an attack is the use of the attacker's computing capabilities to form alternative blockchains. If the generated sequence is longer than the public chain of blocks, the attacker can present it as the proof of work and thus disrupt the correct functioning of the network. In this article we explore the probability of a successful double-spending attack, derive formulas for evaluating the corresponding events, consisting of the formation by the attacker of an alternative sequence of blocks. These formulas are extremely cumbersome and difficult to calculate. The paper proposes simplified analytical expressions to quickly assess the probability of a successful doublespending attack. For this we use the extrapolation of intermediate calculations using the Lagrange interpolation formulas, as well as binomial approximation. The simulation results show that the use of simplified expressions allows us to provide acceptable accuracy of calculations.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1">Introduction</head><p>Modern decentralized systems are a real alternative to the classical centralized approach in creating of complex information and telecommunication systems and networks <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref>. For example, it is advisable to use decentralization in complex systems of corporate relations, in the provision of state and administrative functions, to build independent cryptocurrencies, as well as to create secure registers, cadastres, etc. <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b2">[3]</ref>. These and many other aspects show the clear advantage of decentralized systems built on blockchain technology <ref type="bibr" target="#b4">[5,</ref><ref type="bibr" target="#b5">6]</ref>. At the same time, for the most developed and studied blockchain networks with probabilistic consensus protocols, there is a risk of a double-spending attack. The essence of the attack is to use the features of consensus building protocols. For example, in the proof-of-work protocols, each record in the protected registry (each block of records) can be made only by the participant who was the first to solve the exhaustive task of finding the preimage of the cryptographic hash function. The block chain stores all the important records, and each following record (block of records) is connected with the previous ones through a one-way hash function. This is a reliable and safe way to save critical data, protect it from falsification, alteration, intentional or accidental modification. At the same time, an attacker who has sufficient computing resources may try to form an alternative chain of blocks (with other records in previous blocks). This will give him the opportunity to disrupt the proper functioning of the blockchain network, for example, by spending the same assets twice (cryptocurrencies, tokens, etc.). The probability of such unauthorized interference is extremely small (with the small computing capabilities of an individual attacker it is almost impossible). However, when building a critical information infrastructure, an extremely important aspect is the assessment of various risks and threats to information security, including the probabilities of successful implementation of various attacks. Therefore, assessing the security of blockchain systems and, in particular, assessing the likelihood of a successful implementation of a double-spending attack in systems with probabilistic consensus protocols, is an urgent and practically important scientific task.</p><p>In this article, we consider consensus protocols with probabilistic completion (such as proof-of-work), and assess the probability of a successful double-spending attack. For this, we use the model of independent players (as in our previous works <ref type="bibr" target="#b3">[4]</ref>). This model differs from the gambler's ruin model adopted in <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b2">3]</ref> by both the number of elementary outcomes and general expressions for assessing the probability of a successful attack. To simplify computational calculations, we use polynomial interpolation, as well as binomial coefficients to extrapolate intermediate calculations. The results of numerical simulation show that simplified formulas can significantly reduce computational costs and obtain approximate estimates with acceptable accuracy of calculations. These results can be used to calculate the security indicators of blockchain networks with probabilistic consensus protocols.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2">The probabilities of forming a chain of blocks under the same initial conditions</head><p>To obtain the formula for the probability of a successful double-spending attack, let us consider the following possible probabilities and combinations in which the attacker succeeds:</p><p>1. Success is not possible on the first attempt (</p><formula xml:id="formula_0">1 0 0 1 t N j k       </formula><p>). The attacker may form no more than one block in one attempt, and in order to succeed, he needs to wait for the generation of the block by the honest network and extend the chain of blocks to one more. Thus, the attacker needs to form at least two blocks. The probability of success of the attacker is defined as:</p><formula xml:id="formula_1">1, 0, 0 0 N j k PI     2.</formula><p>The attacker may succeed on the second attempt ( 0 1 2 t N     ) if he managed to form on both attempts per block, and the honest network will form only one block (no matter on the first or second attempt).The total probability of this event:</p><formula xml:id="formula_2">          2 1, 0, 1 1 1 2 1 N j k PI p p qq p p qq p p q                   3. On the third attempt ( 0 2 3 t N     ).</formula><p>If the honest network forms a block on the first or second attempt, then the second block should be formed by the attacker only on the third attempt, otherwise (if the second block is formed on the second attempt) there is a previous case (as for</p><formula xml:id="formula_3">1, 0, 1 N j k PI    ).</formula><p>If the honest network forms the second block on the third attempt, there are no restrictions on the formation of blocks for the attacker. The total probability of the event will be calculated similarly to the events described above. Thus, the total probability will be:</p><formula xml:id="formula_4">        2 1 1 2 1, 0, 2 2 1 1 2 3 2 1 2 1 1 3 1 . N j k PI p p q q p p q q q                           4.</formula><p>On the fourth attempt ( 0 3 4 t N     ) similar to the situation described in the previous paragraph, the total probability for the attacker to succeed will be equal to:</p><formula xml:id="formula_5">          3 2 1 2 1, 0, 3 3 2 1 1 2 3 4 3 1 3 1 1 6 1 4 1 . N j k PI p p q q p p q q q q q                               5.</formula><p>On the t -th attempt ( 0 t N k    ) the probability of success of the attacker is equal to:</p><formula xml:id="formula_6">        1 1, 0, 1 1 2 2 0 1 1 1 1 1 1 1 1 0 1 k N j k k k k k PI p p k k k q q q q q q                                                    </formula><p>Carrying out similar constructions and summing all the 0,1, 2, k   , we find the probability of a successful double-spending attack, provided that the honest network is formed of no more than 1 N  blocks:</p><formula xml:id="formula_7">        1 2 1, 0 1 1 0 1 1 1 1 1 1 1 1 . 0 1 k k N j k k k PI p p k q q k k q q q q                                                             Let us consider the case when 2, 0 N j   .</formula><p>If 0 k  , as well as in the previous case, success is impossible. If 1 k  and, therefore, 0 1 3 t N     , the probability of success of the attacker is equal to:</p><formula xml:id="formula_8">  2 3 2, 0, 1 3 1 . N j k PI p p q         If 2 k  ( 4 t  ), the probability of successful attack is equal to:         2 2 3 2, 0, 2 2 2 3 4 3 1 3 1 3 1 4 1 . N j k PI p p q q p p q q q                              If 3 k  ( 5 t </formula><p>), the probability of success of the attacker is equal to:</p><formula xml:id="formula_9">          3 2 2 3 2, 0, 3 3 2 1 2 3 4 5 6 1 6 1 4 1 10 1 5 1 1 . N j k PI p p q q p p q q q q q                                  </formula><p>The above results allow us to obtain expressions for arbitrary values of N and k :</p><formula xml:id="formula_10">      2 1 1 , 0 1 0 1 1 1 1 1 1 . 1 k k N N N N j k N t i i i t PI p p q q N t t q q N i                                                            Let us consider the case for 1, 1 N j   . If 0 k  attacker's success is impossible If 1 k  the probability of success of the attacker is equal to:     1, 1, 1 1 N j k PI p p p q q q           . If 2 k  ( 4 t  ) the probability of the attacker's success is equal to:       2 2 3 1, 1, 2 1 1 3 2 2 . N j k PI p p q q                 If 3 k  ( 5</formula><p>t  ) the probability for the attacer to succeed is equal to:</p><formula xml:id="formula_11">    1 1 1, 1, 3 1 1 1 1 2 2 3 . 1 2 1 2 1 2 k k N j N j N j k PI p p q q k t k t k t                                                                       </formula><p>Thus, summarizing the results for arbitrary initial values, we obtain the probability of a successful double-spending attack ( PI ) on blockchain systems using the consensus algorithm Proof of Work based on a hash function (without the attacker's advantage in one pre-formed block):</p><formula xml:id="formula_12">                      2 1 1 1 0 1 1 1 1 1 1 1 1 1 1 1 1 1 , k k N N k N t i i i k k N j N j p j k t PI p p q q N t t q q N i p q sum p q                                                                                     <label>( 1 )</label></formula><p>where</p><formula xml:id="formula_13">t N j k    ;   ( ) ( 1 ) ( ) 2 3 1 2 1 2 1 1 1 1 1 N j N j N j k k t t p q ip ip ip ip ip ip ip sum sum                                           ;           ( )<label>( 1 ) ( ) ( 1 )</label></formula><p>( 2 )</p><formula xml:id="formula_14">2 3 2 1 2 1 ( 1) ( ) 1 1 2 1 1 1 1 m a x 1 , m a x 1 , max 1, 1 . N j N j N j j j j j j q t j t j k k t t iq iq iq iq iq iq iq ip iq iq ip iq iq ip sum                                                                          </formula><p>Although the expression (1) provides an accurate quantitative result on the probability of successful double-spending attacks, it also has limitations on its use, which is related to the polynomial complexity of computational calculations. In this paper, we propose using an approximate formula to calculate the probability of a successful attack. For this, simplified expressions based on polynomial interpolation can be used. In addition, we explore other approximation methods, including using binomial coefficients. However, given the limited number of calculated coefficients of p sum , the expres- sion (1) gives a good match with the experimental data (setting up the computational experiment is given in <ref type="bibr" target="#b3">[4]</ref>) when the probabilities q and p significantly (twice or more) differ from each other. However, there is no need to calculate the large number of values in the sum by j , that allows to be limited to some small pre-calculated set of values of p sum . Also, at , 0,2 q p  the blocks will be formed with a relatively high probability, that makes it possible to significantly reduce the sum by k . In addition, for smaller values N , the sum p sum grows more slowly, making it possible to calculate p sum for more values j and k . However, in order to improve the accuracy of the calculation (increasing the calculated coefficients j and k ), it is possible to extrapolate the values of p sum using polynomial approximation. Thus, for 1 j  the value p sum is very well approximated (within known values of k ) and extrapolated (beyond calculated values of k ) by a polynomial: </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Extrapolation of the sum in the formula of calculation of the probability of success of the attacker</head><formula xml:id="formula_15">4 3 2 0,125 0, 4167 0,375 0 ( 1, 1, ) ,0833 p sum k k k k k N j           ,</formula><formula xml:id="formula_16">p k k k k s m j k k k u N                </formula><p>Extrapolation is also well done by j , and the value of k is fixed. As established experimentally, it is desirable to use the Lagrangian interpolation polynomial for computational methods (see, for example, <ref type="bibr" target="#b6">[7]</ref> or <ref type="bibr" target="#b7">[8]</ref>). The essence of which is as follows. We know some values of p sum at the first values of i x (we assume i</p><p>x to be i k or i j ), where 1, 2, , i n   , and n is the number of points by which the Lagrangian polynomial is constructed (in our case, for 1 N  , n must be chosen as 3 2 n j    for extrapolations by k and as 2 1 n k    for extrapolations by j ), then we can extrapolate p sum by Lagrange interpolation polynomial: 0 0, ( )</p><formula xml:id="formula_17">n n s p p i i s i s s i x x sum sum x x x                    .</formula><p>The results of the extrapolation of value of p sum are illustrated in Figure <ref type="figure" target="#fig_0">1</ref>, which shows a graph of the dependence of precisely calculated values of p sum (solid line) by formula (1) and its approximation and extrapolation (dashed line).</p><p>Extrapolation using a polynomial gives a very good accuracy, but with increasing k ( j ) increases the number of first values of p sum that must be known and whose values are taken into account in the Lagrangian interpolation polynomial. Given that we are aware of a rather limited number of p sum (for example, in Table <ref type="table" target="#tab_2">2</ref> for 7 k  this is only for 15 j  ) polynomial extrapolation will also have some limits. The next extrapolation method we have applied is binomial extrapolation, that is, extrapolation using binomial coefficients of the form</p><formula xml:id="formula_18">2 1 i p N j k sum d N j            </formula><p>where d -some coefficient 0 1 d   , which is selected experimentally. Binomial extrapolation gives much less precision than polynomial, but better than neglecting additives in general. This is especially noticeable when q p  and a significant number of coefficients j and k must be considered. Thus, the results obtained can significantly reduce the complexity of the calculations when calculating the probability of a successful double-spending attack. In particular, to calculate the probabilities by the formula (1), it is necessary to calculate an infinite number of sums p sum , each of which in turn is formed by summing a large number of terms. We were able to simplify these intermediate sums by introducing interpolation polynomial equations. By extrapolating the sums to a larger data range, we can replace complex and cumbersome calculations with simple and convenient calculations based on interpolation polynomials. The simulation results show that the values calculated in this way almost 100% repeat the results obtained by exact expressions using formula (1). These results can be useful for assessing the security of blockchain networks with probabilistic consensus building <ref type="bibr" target="#b8">[9]</ref><ref type="bibr" target="#b9">[10]</ref><ref type="bibr" target="#b10">[11]</ref>. In particular, practical recommendations for constructing asset transfer protocols in decentralized systems can be justified through restrictions on the probability of corresponding risks. For example, given the restrictions on the admissible probability of loss of an asset as a result of a double-spending attack, our formulas allow us to calculate the minimum number of confirmed transactions (length of a chain of blocks) and these calculations can be performed very quickly even in the conditions of a rapid change in the share of controlled computing resources. These and other studies are our promising areas of further work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">Conclusions</head><p>This paper address in detail one of the main vulnerabilities of blockchain systems built by consensus with probabilistic completeness -the double-spending attack.</p><p>Basing on the model of "independent players", we have obtained the analytical expression of the probability of a successful double-spending attack on a blockchain system which uses the consensus algorithm Proof of Work (PoW) based on a hash function depending on the number of confirmations used and the number of attempts and hash rate of both the honest network and the attacker.</p><p>The adopted model of "independent players" and the resulting formula (1) eliminates the significant disadvantages inherent in other work in this field, namely:</p><p> the race between two participants of the network does not have to be endless, it is enough to be limited by some fixed number of attempts;  uses a more adequate, in the authors' view, model of "independent players", which includes a space of four elementary events, instead of two, used in the model of "gambler's ruin";  the probability of forming a block with the honest network and the attacker are independent quantities that are directly determined by the capacities possessed by the participants, and the mentionedprobabilities are independent on each other, that is, the requirement 1 p q   is optional;  it is calculated the probability for the attacker to be ahead of the honest network, and not only the probability of catching up with it, that is, when the attacker does not have an advantagein one pre-formed block.</p><p>The quantitative values obtained by the expression (1) of the probability of a successful attack for different opportunities of the attacker (the probability of forming a block), the different number of formed blocks after which the agreement is considered confirmed, the different duration of the race (the number of blocks during which the attacker continues to catch up the network) are given. To simplify the numerical calculations, it is proposed to use polynomial approximation. In particular, the intermediate sums in formula (1) were able to be approximated by Lagrange interpolation polynomials. In addition, we used binomial extrapolation. However, the simulation results show that polynomial interpolation provides greater accuracy. The formulas obtained make it possible to quickly assess the probability of a successful doublespending attack using these simplified formulas.</p><p>This study can be useful for modeling and evaluating the effectiveness of blockchain networks, as well as in other practically important applications <ref type="bibr" target="#b11">[12]</ref><ref type="bibr" target="#b12">[13]</ref><ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Fig. 1 .</head><label>1</label><figDesc>Fig. 1. Dependencies of values of</figDesc><graphic coords="9,143.04,371.04,309.60,200.64" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 .</head><label>1</label><figDesc>Values of</figDesc><table><row><cell cols="4">The value of sums (</cell><cell cols="4">p sum and</cell><cell>q sum ) is increasing very fast and even at</cell><cell>j </cell><cell>10</cell><cell>and</cell></row><row><cell>k </cell><cell>15</cell><cell cols="6">the calculation becomes a very difficult task. For example, if</cell><cell>j </cell><cell>20</cell><cell>and</cell></row><row><cell cols="3">7 k  the sum</cell><cell cols="2">p sum </cell><cell cols="3">16 570 275 123</cell><cell>(this value was calculated by the computer for</cell></row><row><cell cols="8">several hours). On the other hand, these sums for each value N could be calculated</cell></row><row><cell cols="8">once and used for different probabilities. Tables 1, 2, as an example, provide calcu-</cell></row><row><cell cols="3">lated values of</cell><cell cols="3">p sum for</cell><cell>N </cell><cell>1, 5</cell><cell>and some values of j and k .</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>p sum in the expression(1) for</cell><cell>N </cell><cell>1</cell></row><row><cell>j</cell><cell>k</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>1</cell><cell></cell><cell>2</cell><cell></cell><cell></cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell></row><row><cell cols="2">1 1</cell><cell></cell><cell>7</cell><cell></cell><cell></cell><cell>25</cell><cell>65</cell><cell>140</cell><cell>266</cell><cell>462</cell></row><row><cell cols="2">2 1</cell><cell></cell><cell>11</cell><cell></cell><cell></cell><cell>58</cell><cell>210</cell><cell>602</cell><cell>1470</cell><cell>3192</cell></row><row><cell cols="2">3 1</cell><cell></cell><cell>16</cell><cell></cell><cell></cell><cell>117</cell><cell>563</cell><cell>2073</cell><cell>6327</cell><cell>16797</cell></row><row><cell cols="2">4 1</cell><cell></cell><cell>22</cell><cell></cell><cell></cell><cell>213</cell><cell>1314</cell><cell>6041</cell><cell>22528</cell><cell>71775</cell></row><row><cell cols="2">5 1</cell><cell></cell><cell>29</cell><cell></cell><cell></cell><cell>359</cell><cell>2761</cell><cell>15495</cell><cell>69305</cell><cell>260923</cell></row><row><cell cols="2">6 1</cell><cell></cell><cell>37</cell><cell></cell><cell></cell><cell>570</cell><cell>5345</cell><cell>35950</cell><cell>189909</cell><cell>833918</cell></row><row><cell cols="2">7 1</cell><cell></cell><cell>46</cell><cell></cell><cell></cell><cell>863</cell><cell>9690</cell><cell>76927</cell><cell>473768</cell><cell>2399565</cell></row><row><cell cols="2">8 1</cell><cell></cell><cell>56</cell><cell></cell><cell></cell><cell>1257</cell><cell>16648</cell><cell>154007</cell><cell>1093596</cell><cell>6327475</cell></row><row><cell cols="2">9 1</cell><cell></cell><cell>67</cell><cell></cell><cell></cell><cell>1773</cell><cell>27349</cell><cell>291592</cell><cell>2364642</cell><cell>15498742</cell></row><row><cell cols="2">10 1</cell><cell></cell><cell>79</cell><cell></cell><cell></cell><cell>2434</cell><cell>43256</cell><cell>526520</cell><cell>4835606</cell><cell>35639160</cell></row><row><cell cols="2">11 1</cell><cell></cell><cell>92</cell><cell></cell><cell></cell><cell>3265</cell><cell>66225</cell><cell>912695</cell><cell>9423549</cell><cell>77586723</cell></row><row><cell cols="2">12 1</cell><cell></cell><cell>106</cell><cell></cell><cell></cell><cell>4293</cell><cell>98570</cell><cell>1526907</cell><cell>17608428 161007165</cell></row><row><cell cols="2">13 1</cell><cell></cell><cell>121</cell><cell></cell><cell></cell><cell>5547</cell><cell>143133</cell><cell>2476031</cell><cell>31706737 320288355</cell></row><row><cell cols="2">14 1</cell><cell></cell><cell>137</cell><cell></cell><cell></cell><cell>7058</cell><cell>203359</cell><cell>3905808</cell><cell>55248173 613629478</cell></row><row><cell cols="2">15 1</cell><cell></cell><cell>154</cell><cell></cell><cell></cell><cell>8859</cell><cell>283376</cell><cell>6011425</cell><cell>93484314 1136709035</cell></row><row><cell cols="2">16 1</cell><cell></cell><cell>172</cell><cell></cell><cell></cell><cell cols="2">10985</cell><cell>388080</cell><cell>9050125</cell><cell>154064036 2042783757</cell></row><row><cell cols="2">17 1</cell><cell></cell><cell>191</cell><cell></cell><cell></cell><cell cols="2">13473</cell><cell>523225</cell><cell>13356092 247916850 3571657702</cell></row><row><cell cols="2">18 1</cell><cell></cell><cell>211</cell><cell></cell><cell></cell><cell cols="2">16362</cell><cell>695518</cell><cell>19357870 390392550 6090688552</cell></row><row><cell cols="2">19 1</cell><cell></cell><cell>232</cell><cell></cell><cell></cell><cell cols="2">19693</cell><cell>912719</cell><cell>27598589 602713571 10151890353</cell></row><row><cell cols="2">20 1</cell><cell></cell><cell>254</cell><cell></cell><cell></cell><cell cols="2">23509</cell><cell>1183746</cell><cell>38759285 913805304 16570275123</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_2"><head>Table 2 .</head><label>2</label><figDesc>Values of</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="3">p sum in the expression (1) for</cell><cell>5 N  .</cell></row><row><cell>j</cell><cell>k</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell></cell><cell>1</cell><cell>2</cell><cell>3</cell><cell>4</cell><cell>5</cell><cell>6</cell><cell>7</cell></row><row><cell cols="2">1 1</cell><cell>43</cell><cell>631</cell><cell>5335</cell><cell>31795</cell><cell cols="2">148219</cell><cell>575107</cell></row><row><cell cols="2">2 1</cell><cell>51</cell><cell>900</cell><cell>9100</cell><cell>64215</cell><cell cols="2">350709</cell><cell>1578214</cell></row><row><cell cols="2">3 1</cell><cell>60</cell><cell>1265</cell><cell>15185</cell><cell>125925</cell><cell cols="2">799834</cell><cell>4145505</cell></row><row><cell cols="2">4 1</cell><cell>70</cell><cell>1745</cell><cell>24600</cell><cell>237279</cell><cell cols="2">1736315</cell><cell>10277050</cell></row><row><cell cols="2">5 1</cell><cell>81</cell><cell>2361</cell><cell>38661</cell><cell>429387</cell><cell cols="2">3587388</cell><cell>24053848</cell></row><row><cell cols="2">6 1</cell><cell>93</cell><cell>3136</cell><cell>59045</cell><cell>748230</cell><cell cols="2">7079128</cell><cell>53381664</cell></row><row><cell cols="2">7 1</cell><cell>106</cell><cell>4095</cell><cell>87850</cell><cell>1259860</cell><cell cols="2">13400268</cell><cell>112900788</cell></row><row><cell cols="2">8 1</cell><cell>120</cell><cell>5265</cell><cell>127660</cell><cell>2056860</cell><cell cols="2">24434838</cell><cell>228674250</cell></row><row><cell cols="2">9 1</cell><cell>135</cell><cell>6675</cell><cell>181615</cell><cell>3266253</cell><cell cols="2">43084995</cell><cell>445514295</cell></row><row><cell cols="2">10 1</cell><cell>151</cell><cell>8356</cell><cell>253486</cell><cell>5059063</cell><cell cols="2">73710049</cell><cell>838128214</cell></row><row><cell cols="2">11 1</cell><cell>168</cell><cell>10341</cell><cell>347755</cell><cell>7661745</cell><cell cols="2">122712954 1527675457</cell></row><row><cell cols="2">12 1</cell><cell>186</cell><cell>12665</cell><cell>469700</cell><cell>11369715</cell><cell cols="2">199311469 2705845884</cell></row><row><cell cols="2">13 1</cell><cell>205</cell><cell>15365</cell><cell>625485</cell><cell>16563225</cell><cell cols="2">316537844 4669213780</cell></row><row><cell cols="2">14 1</cell><cell>225</cell><cell>18480</cell><cell>822255</cell><cell>23725842</cell><cell cols="2">492518292 7867415920</cell></row><row><cell cols="2">15 1</cell><cell>246</cell><cell>22051</cell><cell>1068236</cell><cell>33465804</cell><cell cols="2">752091712 12969669012</cell></row><row><cell cols="2">16 1</cell><cell>268</cell><cell>26121</cell><cell>1372840</cell><cell>46540540</cell><cell cols="2">1128836172</cell></row><row><cell cols="2">17 1</cell><cell>291</cell><cell>30735</cell><cell>1746775</cell><cell>63884655</cell><cell cols="2">1667581587</cell></row><row><cell cols="2">18 1</cell><cell>315</cell><cell>35940</cell><cell>2202160</cell><cell>86641695</cell><cell cols="2">2427497877</cell></row><row><cell cols="2">19 1</cell><cell>340</cell><cell>41785</cell><cell>2752645</cell><cell cols="3">116200021 3485859706</cell></row><row><cell cols="2">20 1</cell><cell>366</cell><cell>48321</cell><cell>3413536</cell><cell cols="3">154233135 4942601727</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Zaghloul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">W</forename><surname>Mutka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ren</surname></persName>
		</author>
		<idno>ArXiv, abs/1904.11435</idno>
		<title level="m">Bitcoin and Blockchain: Security and Privacy</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title level="m" type="main">Bitcoin: A Peer-to-Peer Electronic Cash System</title>
		<author>
			<persName><forename type="first">S</forename><surname>Nakamoto</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Rosenfeld</surname></persName>
		</author>
		<title level="m">Analysis of hashrate-based double-spending</title>
				<imprint>
			<date type="published" when="2014">2014</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Simulation of double spend attack on the &quot;Proof of Work&quot; consensus protocol</title>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">A</forename><surname>Poluyanenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<idno type="DOI">10.30837/rt.2019.3.198.11</idno>
	</analytic>
	<monogr>
		<title level="j">Radiotekhnika</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="page" from="146" to="161" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
	<note>in Russian)</note>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">E</forename><surname>Zaghloul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">W</forename><surname>Mutka</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Ren</surname></persName>
		</author>
		<title level="m">Bitcoin and Blockchain: Security and Privacy</title>
				<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<title level="m" type="main">An Explanation of Nakamoto&apos;s Analysis of Double-spend Attacks</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">P</forename><surname>Ozisik</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">N</forename><surname>Levine</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<title level="m" type="main">Fundamentals of numerical methods</title>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">I</forename><surname>Turchak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">V</forename><surname>Plotnikov</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page">304</biblScope>
			<pubPlace>Moscow, Fizmat</pubPlace>
		</imprint>
	</monogr>
	<note>in Russian)</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<idno type="DOI">10.3840/001276</idno>
		<ptr target="http://dx.doi.org/10.3840/001276" />
		<title level="m">Interpolating Polynomial</title>
				<imprint>
			<date type="published" when="2007">2007</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Pilkington</surname></persName>
		</author>
		<idno type="DOI">10.4337/9781784717766.00019</idno>
		<ptr target="http://dx.doi.org/10.4337/9781784717766.00019" />
		<title level="m">Blockchain technology: principles and applications</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Probabilistic Blockchains: A Blockchain Paradigm for Collaborative Decision-Making</title>
		<author>
			<persName><forename type="first">T</forename><surname>Salman</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Jain</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Gupta</surname></persName>
		</author>
		<idno type="DOI">10.1109/UEMCON.2018.8796512</idno>
	</analytic>
	<monogr>
		<title level="m">9th IEEE Annual Ubiquitous Computing, Electronics &amp; Mobile Communication Conference (UEMCON)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2018">2018. 2018</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">A Probabilistic Analysis on Crypto-Currencies Based on Blockchain</title>
		<author>
			<persName><forename type="first">M</forename><surname>Bhat</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Vijayal</surname></persName>
		</author>
		<idno type="DOI">10.1109/ICNGCIS.2017.37</idno>
	</analytic>
	<monogr>
		<title level="m">2017 International Conference on Next Generation Computing and Information Systems (ICNGCIS)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2017">2017</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Performance of Hash Algorithms on GPUs for Use in Blockchain</title>
		<author>
			<persName><forename type="first">A</forename><surname>Kuznetsov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Shekhanin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Kolhatin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Kovalchuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Babenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Perevozova</surname></persName>
		</author>
		<idno type="DOI">10.1109/ATIT49449.2019.9030442</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE International Conference on Advanced Trends in Information Theory (ATIT)</title>
				<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2019">2019. 2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Modelling instruments in risk management</title>
		<author>
			<persName><forename type="first">S</forename><surname>Bondarenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Liliya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Oksana</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Inna</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Civil Engineering and Technology</title>
		<imprint>
			<biblScope unit="volume">10</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="1561" to="1568" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">On the convergence of fourier means and interpolation means</title>
		<author>
			<persName><forename type="first">K</forename><surname>Runovski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Schmeisser</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Computational Analysis and Applications</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="211" to="227" />
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Numerical-analytic method for finding solutions of systems with distributed parameters and integral condition</title>
		<author>
			<persName><forename type="first">B</forename><forename type="middle">P</forename><surname>Tkach</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">B</forename><surname>Urmancheva</surname></persName>
		</author>
		<idno type="DOI">10.1007/s11072-009-0064-6</idno>
	</analytic>
	<monogr>
		<title level="j">Nonlinear Oscillations</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="page" from="113" to="122" />
			<date type="published" when="2009">2009</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Controlled Markov Fields with Finite State Space on Graphs</title>
		<author>
			<persName><forename type="first">R</forename><forename type="middle">K</forename><surname>Chornei</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">M</forename><surname>Daduna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Knopov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename></persName>
		</author>
		<idno type="DOI">10.1080/15326340500294520</idno>
	</analytic>
	<monogr>
		<title level="j">Stochastic Models</title>
		<imprint>
			<biblScope unit="volume">21</biblScope>
			<biblScope unit="page" from="847" to="874" />
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
