Skip to main content

Showing 1–4 of 4 results for author: Bahack, L

Searching in archive cs. Search in all archives.
.
  1. arXiv:2209.11202  [pdf

    cs.CC math.CO

    Solving the General Case of Rank-3 Maker-Breaker Games in Polynomial Time

    Authors: Lear Bahack

    Abstract: A rank-3 Maker-Breaker game is played on a hypergraph in which all hyperedges are sets of at most 3 vertices. The two players of the game, called Maker and Breaker, move alternately. On his turn, maker chooses a vertex to be withdrawn from all hyperedges, while Breaker on her turn chooses a vertex and delete all the hyperedges containing that vertex. Maker wins when by the end of his turn some hyp… ▽ More

    Submitted 22 September, 2022; originally announced September 2022.

  2. arXiv:2206.09476  [pdf

    cs.CC math.CO

    The Game of Tumbleweed is PSPACE-complete

    Authors: Lear Bahack

    Abstract: Tumbleweed is a popular two-player perfect-information new territorial game played at the prestigious Mind Sport Olympiad. We define a generalized version of the game, where the board size is arbitrary and so is the possible number of neutral stones. Our result: the complexity of deciding for a given configuration which of the players has a winning strategy is PSPACE-complete. The proof is by a… ▽ More

    Submitted 19 June, 2022; originally announced June 2022.

  3. arXiv:1402.1718  [pdf, other

    cs.CR cs.CE cs.SI

    On Subversive Miner Strategies and Block Withholding Attack in Bitcoin Digital Currency

    Authors: Nicolas T. Courtois, Lear Bahack

    Abstract: Bitcoin is a "crypto currency", a decentralized electronic payment scheme based on cryptography. Bitcoin economy grows at an incredibly fast rate and is now worth some 10 billions of dollars. Bitcoin mining is an activity which consists of creating (minting) the new coins which are later put into circulation. Miners spend electricity on solving cryptographic puzzles and they are also gatekeepers w… ▽ More

    Submitted 2 December, 2014; v1 submitted 28 January, 2014; originally announced February 2014.

    Comments: not published elsewhere

    ACM Class: D.4.6; K.4.1; K.4.4

  4. arXiv:1312.7013  [pdf, ps, other

    cs.CR

    Theoretical Bitcoin Attacks with less than Half of the Computational Power (draft)

    Authors: Lear Bahack

    Abstract: A widespread security claim of the Bitcoin system, presented in the original Bitcoin white-paper, states that the security of the system is guaranteed as long as there is no attacker in possession of half or more of the total computational power used to maintain the system. This claim, however, is proved based on theoretically flawed assumptions. In the paper we analyze two kinds of attacks base… ▽ More

    Submitted 25 December, 2013; originally announced December 2013.