In this article I'm going to provide a brief review of protection methods against replay attacks, arising from signature malleability of elliptic curve cryptography.
Problem
Most cryptocurrencies are based on public-key cryptography. Each owner transfers coins to the next one digitally signing the transactionTx
containing the public key of the next owner.Thus everyone can verify that the sender wants to send her coins to the recipient, but a problem arises - how to prevent the inclusion of transactin Tx
in the blockchain twice?
Without such a protection an unscrupulous recipient may repeat Tx
as long as the sender has enough coins at his balance, making it impossible to reuse the same address for more then 1 transaction.
In particular the adversary can withdraw some coins from an exchange and repeat this transaction until there are no coins left on exchange (such attacks have already been…
In this article I'm going to provide a brief review of protection methods against replay attacks, arising from signature malleability of elliptic curve cryptography.
Problem
Most cryptocurrencies are based on public-key cryptography. Each owner transfers coins to the next one digitally signing the transactionTx
containing the public key of the next owner.Thus everyone can verify that the sender wants to send her coins to the recipient, but a problem arises - how to prevent the inclusion of transactin Tx
in the blockchain twice?
Without such a protection an unscrupulous recipient may repeat Tx
as long as the sender has enough coins at his balance, making it impossible to reuse the same address for more then 1 transaction.
In particular the adversary can withdraw some coins from an exchange and repeat this transaction until there are no coins left on exchange (such attacks have already been…
最新の記事
Understanding Cardano: introducing the Cardano Blueprint 筆者: Neil Burgess
20 June 2025
IOR outlines a research framework for SPOs 筆者: Fergie Miller
19 June 2025
多様性とモジュラー設計に向かうCardanoノードの進化 筆者: Olga Hryniuk
6 June 2025