Research Article
PyRos: A State Channel-Based Access Control System for a Public Blockchain Network
Table 1
Probability of success of a double-spending attack based on the attacker’s hash rate (y-axis) and the number of confirmations (x-axis).
| q (%) | 1 (%) | 2 (%) | 3 (%) | 4 (%) | 5 (%) | 6 (%) | 7 (%) |
| 2 | 4 | 0.237 | 0.016 | 0.001 | 0 | 0 | 0 | 10 | 20 | 5.6 | 1.712 | 0.546 | 0.178 | 0.059 | 0.02 | 20 | 40 | 20.8 | 11.584 | 6.669 | 3.916 | 2.331 | 1.401 | 30 | 60 | 43.2 | 32.616 | 25.207 | 19.762 | 15.645 | 12.475 | 40 | 80 | 70.4 | 63.488 | 57.958 | 53.314 | 49.3 | 45.769 | 50 | 100 | 100 | 100 | 100 | 100 | 100 | 100 |
|
|