Bitcoin Forum
September 23, 2025, 03:06:12 PM *
News: Latest Bitcoin Core release: 29.0 [Torrent]
 
  Home Help Search Login Register More  
  Show Posts
Pages: [1]
1  Other / Beginners & Help / Re: Distributed wallet attack using Bitcoin's own design on: January 06, 2014, 01:58:30 AM
Would it function as a viable altcoin?
2  Other / Beginners & Help / Re: Distributed wallet attack using Bitcoin's own design on: January 06, 2014, 01:17:23 AM
There are 2256 private key possibilities -- which is what's relevant. I'm not claiming successful collision is likely.
3  Other / Beginners & Help / Distributed wallet attack using Bitcoin's own design on: January 06, 2014, 01:02:00 AM
What if a new coin came to exist but its goal was to attack Bitcoin wallets?

Perhaps on some interval a bloom filter is created where the inputs are the top N least-recently-spent Bitcoin addresses with a substantial positive balance. Miners do work by creating a random ECDSA key pair. Then they convert the public key to the Bitcoin address format and test the filter for membership -- essentially a distributed brute-force attack.

Yes, the odds of brute-force cracking one of these keys are astronomically small. In the interest of improving the odds, maybe the design is modified to specifically attack brain wallets. The miner could choose to sweep the balance or not should they ever actually be successful but the by-product of this work could also serve as a new altcoin.

So, how would you tune difficulty and award these new altcoins themselves? The bloom filter could be made to only use some number of significant bits from the address space -- perhaps the first N bits. You get a mining reward if you find an address which tests positively in the filter but negatively in a filter containing addresses previously associated with a reward. The latter filter would use all address bits. Difficulty could be handled identically to Bitcoin. The block header would be signed with the private key associated with the address which satisfies the difficulty -- presumably the miner would check if this actually collides with one of the full addresses used to populate the bloom filter prior to broadcasting their new block.

Thoughts?
Pages: [1]
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!