Correction: Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477
Text Correction
- 1.
- There was an error in the original publication [1]: “In a recentralized network, since most computing resources are concentrated on a small number of pools, it could be not difficult for them to conspire to alter the block content for their own benefits, if not aiming to double-spend, more probable.”
- 2.
- There was an error in the original publication: “Definition 2. For a given cut-time , the success of DS attack is declared if and only if there exists a DSA time at which and in Definition 1 has been achieved.”
- 3.
- There was an error in the original publication: “The sets for each are mutually exclusive as each of them represents the first satisfaction of the block confirmation condition exactly at the -th state.”
- 4.
- There was an error in the original publication: “From Equation (13), the PDF of requires the probabilities of two random events; one is the state progression time in Equation (5); and the other is the event that a given state index satisfies .”
- 5.
- There was an error in the original publication: “By taking infinite summations of in Lemma 1 for all indices , we can compute the probability that a DS attack will ever achieve the necessary conditions in Definition 1.”
- 6.
- There was an error in the original publication: “If there does not exist such an index , with the probability of , then .”
- 7.
- There was an error to Equation (19) in the original publication:
- 8.
- There was an error in the original publication: “The previous probabilistic analyses in [1,6] show that the success of DS attacks is not guaranteed when .”
- 9.
- There was an error in the original publication: “With regards to , if an attack succeeds, the revenue comes from , as it is double-spent, and for the number of blocks minded during the time duration , i.e., .”
- 10.
- There was an error to Equation (35) in the original publication:
- 11.
- There was an error in the original publication: “Specifically, under, it is required for the honest chain to have added blocks, while under their condition, it was the fraudulent chain to do so (see Section 3 of [16]).”
- 12.
- There was an error in the original publication: “Note that for , since the minimum number of states for an attack success is ; number of ’s state transitions for the block confirmation; and number of ’s state transitions for the success of PoW competition. Thus, for . □”
- 13.
- There was an error in the original publication: “Finally, substituting Equation (A3) and Equation (A4) into Equation (A2) results in Equation (15).”
- 14.
- There was an error in the original publication: “From Equation (19) and Equation (26), when , we obtain
- 15.
- There was an error in the original publication: “Attack success probability ()”
- 16.
- There was an error in the original publication: “Attack success probability ()”
Reference
- Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477. [Google Scholar] [CrossRef]
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jang, J.; Lee, H.-N. Correction: Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477. Appl. Sci. 2022, 12, 9233. https://doi.org/10.3390/app12189233
Jang J, Lee H-N. Correction: Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477. Applied Sciences. 2022; 12(18):9233. https://doi.org/10.3390/app12189233
Chicago/Turabian StyleJang, Jehyuk, and Heung-No Lee. 2022. "Correction: Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477" Applied Sciences 12, no. 18: 9233. https://doi.org/10.3390/app12189233
APA StyleJang, J., & Lee, H. -N. (2022). Correction: Jang, J.; Lee, H.-N. Profitable Double-Spending Attacks. Appl. Sci. 2020, 10, 8477. Applied Sciences, 12(18), 9233. https://doi.org/10.3390/app12189233