Coordinate Routing in the Lightning Network

Total Page:16

File Type:pdf, Size:1020Kb

Coordinate Routing in the Lightning Network Coordinate Routing in the Lightning Network Shivanand C Kohalli Student Number: 4751116 Coordinate Routing in the Lightning Network Master’s Thesis in Embedded Systems Distributed Systems group Faculty of Electrical Engineering, Mathematics, and Computer Science Delft University of Technology Shivanand C Kohalli 23rd September 2019 Author Shivanand C Kohalli Title Coordinate Routing in the Lightning Network MSc presentation Sep 30, 2019 Graduation Committee Dr.ir.J.A. Pouwelse Delft University of Technology Dr. S. Roos Delft University of Technology Dr. M. Nasri Delft University of Technology Abstract Blockchains such as the Bitcoin facilitate the online transaction between users without an intermediate financial institution and can serve as a global currency. However, at the moment, blockchain solutions are suffering from low transaction throughput and high delays. For instance, the bitcoin network processes at most 7 transactions per second. Blockchain second layer solutions aim to solve this transaction scaling problem with the idea of creating off-chain transactions using payment channels. For a payment channel, the blockchain network is only required to initialize and terminate the channels. Otherwise, they can finalize transactions between pairs of users instantly without using the blockchain network. The Light- ning Network is one such payment channel solution that creates an overlay network on top of the blockchain and routes payments across users. Currently, the Light- ning network uses source routing to route payments from a source to a destination. However, source routing does not scale to large networks. In this thesis, we begin by establishing the requirements for routing in the Light- ning Network. Next, we analyze generic payment routing algorithms based on the set requirements and understand their limitations. Further, we design a routing al- gorithm for the Lightning Network that builds upon the key ideas found in the pre- vious work. We, in particular, provide design solutions for computing transaction fees and communicating errors in a privacy-preserving manner. These problems were not addressed in any earlier works. Finally, we implement our algorithm in an active Lightning Network codebase. We evaluate it with regard to security, pri- vacy, and performance requirements and also compare the same with the existing solution. 2 Acknowledgments I would like to thank my supervisor, Stefanie, for providing a wonderful opportun- ity to work on this research topic. Thank you, for steering me in the right directions when I faced obstacles, for all the weekly meetings and the valuable feedback. I also want to thank Oguzhan for the cryptography discussions we had. I made many good friends in Delft during my studies, would like to specially thank Amitabh, Umeer and Bhavya for being a source of motivation when needed. I would like to express my heartfelt gratitude to my parents, for providing uncondi- tional support to all my decisions and believing in me. This dream would not have been possible without them. While I was pursuing my Masters in Netherlands, I lost a dear one, my grandpa (Ajja), back in my hometown. Ajja, you have always been an inspiration to me, I will always try to inculcate the values learned from you. This work is dedicated to you. Shivanand C Kohalli Delft, The Netherlands 23rd September 2019 3 4 Contents Preface 3 List of Figures 1 1 Introduction 3 1.1 Blockchain . .3 1.2 Payment Channels . .4 1.2.1 Lightning Network . .5 1.3 Motivation . .6 1.4 Problem statement and research objectives . .6 1.5 Contributions . .7 1.6 Thesis Outline . .8 2 Background 9 2.1 Bitcoin . .9 2.2 Lightning Network . 10 2.2.1 Multi-hop payments . 11 2.3 Routing in the Lightning Network . 12 2.4 Gossip protocol . 12 2.4.1 Node discovery . 12 2.4.2 Channel discovery . 13 2.5 Onion Encryption . 15 2.5.1 Encryption/Decryption scheme . 16 2.5.2 Onion packet construction . 18 2.5.3 Encrypting Errors . 22 3 Requirement Formalization 23 3.1 Characteristics of the Lightning network . 23 3.2 Requirement for routing . 23 4 Literature review 25 4.1 Spider . 25 4.2 Flash . 26 4.3 Flare . 27 5 4.4 Ant . 28 4.5 SilentWhisphers . 28 4.6 SpeedyMurmurs . 29 5 Routing in SpeedyMurmurs 31 5.1 Gathering Fee and CLTV . 32 5.1.1 Security Goals . 32 5.1.2 Adversary Model . 33 5.1.3 Design . 33 5.1.4 Design analysis with respect to security goals . 39 5.2 Forwarding payments . 41 5.2.1 Comparison with the Lightning network . 42 5.3 Returning Error Messages . 43 5.3.1 Security Goals . 43 5.3.2 Design . 43 5.3.3 Design analysis with respect to security goals . 48 5.3.4 Comparison with Lightning network . 50 5.4 Root Election and Spanning Tree construction . 50 5.4.1 Spanning tree algorithm . 51 5.4.2 Coordinate gossip . 52 6 System Setup 53 6.1 General Network Architecture . 54 6.1.1 Lightning Node . 54 6.1.2 Bitcoin Full Node . 56 6.1.3 Lightning Client . 56 6.2 Emulation Network Architecture . 57 6.2.1 Bootstrapping the emulation network . 57 6.3 Integration in the LND . 59 7 Evaluations and Results 61 7.1 Performance Metrics . 61 7.2 Parameters . 62 7.3 Execution environment . 63 7.4 Results and Discussion . 65 7.4.1 Success Ratio . 65 7.4.2 Success Volume . 65 7.4.3 Path Length and Delays . 66 7.4.4 Network stabilization . 66 7.4.5 Transaction overhead . 67 7.4.6 Stabilization overhead . 68 6 8 Conclusion and Future Work 71 8.1 Conclusion . 71 8.2 Future Work . 72 7 8 List of Figures 1.1 Growth in the Lightning network [18] . .5 2.1 An example of a multi-hop payment . 11 2.2 ECIES scheme encryption process . 17 4.1 Example of neighbouring and beacon nodes in Flare . 27 4.2 Example of a route between two nodes in SilentWhisphers . 29 4.3 Example of the assignment of network embedding in SpeedyMur- murs . 30 5.1 Intermediate node public keys that must be hidden from sender and the recipient . 33 5.2 Sender acquiring the total amount to be paid on a route . 38 5.3 Key distribution in a non-adversarial scenario . 46 5.4 Key distribution in an adversarial scenario . 47 5.5 Ephemeral key distribution during the upstream traversal of message 48 5.6 Ephemeral key distribution during the downstream traversal of mes- sage . 48 6.1 Architecture of components interacting in Lightning . 54 6.2 Emulation Network Setup . 58 7.1 Channel topology for 50 nodes . 64 7.2 Success ratio of SpeedyMurmurs and Source routing . 65 7.3 Success volume ratio between SpeedyMurmurs and Source routing 66 7.4 Average path length and transaction delays for 50 node network . 67 7.5 Average path length and transaction delays for 100 node network . 67 7.6 Number of MegaBytes transferred for the network stabilization . 67 7.7 Number of MegaBytes transferred for all the transactions . 68 7.8 Number of KiloBytes transferred during the network stabilization 69 1 2 Chapter 1 Introduction 1.1 Blockchain Blockchain is a technology which promises to revolutionize the current payments system. In the past decade, many prominent blockchain protocols like Bitcoin [49], Ethereum [61] and Ripple [23] have come into existence. People have already started to use this technology for their financial needs. In the month of July 2019, the Bitcoin network witnessed at least 270,000 transactions per day [2] and its net market cap as an asset class was worth over $200 Billion. The blockchain can be described as a decentralized, immutable public record of transactions. Every transaction in a blockchain network is broadcast to all the participating nodes in the network. The nodes validate this transaction and add it to a pool of transactions called a block. At the core of any blockchain protocol, a consensus algorithm decides the next block that will be added to the blockchain. Subsequently, the next block will be linked to the previous record of blocks forming a virtual chain of blocks, hence the name blockchain. Anyone can read and verify the correctness of the data on the blockchain but cannot tamper or delete it. Such an architecture has a vital implication that even untrusted entities can directly interact with each other without requiring the presence of a trusted intermediary. These properties are relevant to financial institutions, banks and even common people who would want to avoid the middleman costs for different operations. In spite of the attractive properties the blockchain provides, there are still some hurdles to overcome for widespread adoption of this technology. Performance of the blockchains is one such factor that requires significant improvements. For instance, the bitcoin blockchain currently can handle around 7 transactions per second [28]. On the contrary, Visa which facilitates electronic fund transfers all over the world can processes around 1700 transactions per second on an aver- age [20]. This is not only pertaining to Bitcoin, but a general issue of block- chains [38]. This is an important bottleneck that needs to be resolved for block- chains to be considered viable mechanisms for day-to-day payments. According to recent works, the solutions to reduce the bottleneck in blockchains 3 can be classified into two general approaches namely: 1. Layer-one solutions: These solutions focus on improving the core com- ponents of the blockchain. This maybe dealing with the consensus proto- cols [49, 26, 43, 24], modifying the block sizes or sharding [44, 37]. 2. Layer-two solutions: Also called as off-chain solutions, are built on top of the blockchain network, but still rely on the securities of the underlying blockchain.
Recommended publications
  • The Lightning Network 25 January 2018
    The Lightning Network 25 January 2018 BitMEX Research Filtering out the hype with unbiased, evidence-based reports on the crypto-coin ecosystem. BitMEX Research is also active on Twitter and Reddit. research.bitmex.com (Source: Flickr) Abstract Previous reports: In this piece, we explain the motivation behind the creation of the Mining Incentives, Part 3: Short Term vs. Long Term Lightning Network and why its scaling characteristics are superior to what (17/01/2018) we have today, potentially resulting in a transformational improvement. A Complete History of Bitcoin’s Consensus Forks We describe some of the basic technical building blocks that make (28/12/2017) Lightning possible. We then examine some of its limitations, including the Bitcoin Gold: Investment Flow downsides of inferior security compared to transacting on-chain and why Data (21/12/2017) this makes Lightning potentially unsuitable for larger-value payments. Public Companies with Exposure to the Crypto Space (13/12/2017) Update: Bitcoin Cash Investment Flow Data (01/12/2017) Research – The Lightning Network 25 January 2018 1 The motivation behind the Lightning Network Blockchain-based payment systems typically work in a “broadcast to everyone” mode, in that when one makes a payment, one needs to broadcast the transaction to all participants in the network. Nodes in such a system must: • Store the transaction indefinitely, • Verify the transaction, and • Relay the transaction. Miners, meanwhile, are required to engage in an energy-intensive competitive process to determine if the transaction makes it into the ledger, just in case a conflicting transaction occurs. There isn’t even special treatment for the recipient of the payment.
    [Show full text]
  • The Lightning Network - Deconstructed and Evaluated
    The Lightning Network - Deconstructed and Evaluated Anti-Money Laundering (AML) and Anti-Terrorist Financing (ATF) professionals, especially those working in the blockchain and cryptocurrency environment, may have heard of the second layer evolution of Bitcoin's blockchain - the Lightning Network, (LN). This exciting new and rapidly deploying technology offers innovative solutions to solve issues around the speed of transaction times using bitcoin currently, but expandable to other tokens. Potentially however, this technology raises regulatory concerns as it arguably makes, (based on current technical limitations), bitcoin transactions truly anonymous and untraceable, as opposed to its current status, where every single bitcoin can be traced all the way back to its coinbase transaction1 on the public blockchain. This article will break down the Lightning Network - analyzing how it works and how it compares to Bitcoin’s current system, the need for the technology, its money laundering (ML) and terrorist financing (TF) risks, and some thoughts on potential regulatory applications. Refresher on Blockchain Before diving into the Lightning Network, a brief refresher on how the blockchain works - specifically the Bitcoin blockchain (referred to as just “Bitcoin” with a capital “B” herein) - is required. For readers with no knowledge or those wishing to learn more about Bitcoin, Mastering Bitcoin by Andreas Antonopoulos2 is a must read, and for those wishing to make their knowledge official, the Cryptocurrency Certification Consortium, (C4) offers the Certified Bitcoin Professional (CBP) designation.3 Put simply, the blockchain is a growing list of records that can be visualized as a series of blocks linked by chains. Each block contains specific information - in Bitcoin’s case, a list of transactions and their data, which includes the time, date, amount, and the counterparties4 of each transaction.
    [Show full text]
  • Time-Dilation Attacks on the Lightning Network
    Time-Dilation Attacks on the Lightning Network Antoine Riard Gleb Naumenko [email protected] [email protected] ABSTRACT Per time-dilation attacks, a malicious actor slows down block deliv- Lightning Network (LN) is a widely-used network of payment ery to the victim and then finalizes an expired state of the Lightning channels enabling faster and cheaper Bitcoin transactions. In this channel on-chain, before a victim can notice. paper, we outline three ways an attacker can steal funds from For a non-infrastructure attacker eclipsing full nodes is difficult, honest LN users. The attacks require dilating the time for victims to but definitely not impossible, as demonstrated by prior work[19, become aware of new blocks by eclipsing (isolating) victims from 30, 37]. Since full nodes in the LN are often used by hubs (or big the network and delaying block delivery. While our focus is on service providers), we will show that an attacker may justify the the LN, time-dilation attacks may be relevant to any second-layer high attack cost by stealing their aggregate liquidity during one protocol that relies on a timely reaction. short (several hours) Eclipse attack. According to our measurements, it is currently possible to steal At the same time, we will demonstrate that Eclipse attacks are the total channel capacity by keeping a node eclipsed for as little as 2 easier to carry out against the many LN users whose wallets rely on hours. Since trust-minimized Bitcoin light clients currently connect light client protocols to obtain information from the Bitcoin network, to a very limited number of random nodes, running just 500 Sybil and light client implementations are currently more vulnerable to nodes allows an attacker to Eclipse 47% of newly deployed light Eclipse attacks then full nodes.
    [Show full text]
  • Bitcoin 2.0 – New Technologies and New Legal Impacts
    October 16, 16, 2018 October RamdeRakesh – ProteumLLC Capital, –MinneJacob Lewis Bockius& Morgan, LLP ANDNEWIMPACTS LEGAL NEWTECHNOLOGIES BITCOIN2.0– © 2018 Morgan, Lewis & Bockius LLP Agenda • Introduction - A Brief Refresher on Bitcoin • Second Layer Solutions: – Lightning Network – Applicability of AML Laws – Extraterritoriality – Taxation – Potential Strategies • Digital Governance Strategies – Dash – Taxing and Spending – Ethereum and the DAO – EOS – On-Chain Dispute Ressolution • Business Assets on the Blockchain – Rakesh Ramde, Proteum Capital, LLC 2 INTRODUCTION AND REFRESHER ON BLOCKCHAIN A Blockchain Is: 1. A database, 2. that is distributed (not centralized), 3. whose data elements are immutable (unalterable), and 4. that is encrypted “At its simplest level, a blockchain is nothing much more than a fancy kind of database” - Blythe Masters, Digital Assets 4 Bitcoin Distributed Payment System • All participants (A-I) have sight of all transactions on A B the blockchain (and their C entire history) • Payments pass directly I between users, here A to F, D but are verified by other users (here, D, G, and I) • New transactions are H E broadcast to “miners” • When verified, the G F transaction is added to the (Bank of England Quarterly Bulletin 2014 Q3) blockchain history 5 Advantages and Disadvantages Advantages: Disadvantages: • Accessibility • Slow transaction rate / (potentially) high cost • Redundancy • High Energy Cost • Passive access • Lack of Privacy 6 SECOND LAYER SOLUTIONS – A DISCUSSION OF LIGHTNING NETWORK Second Layer Solutions • Developers need a way to scale if Bitcoin is to have widespread adoption. One so-called “second layer” solution is “Lightning Network.” 8 Lightning Network • In Lightning, two peers make a single transaction on the blockchain, each locking some amount of bitcoin in a “channel.” • The two parties can then trade back and forth so long as the net balance never exceeds the channel balance.
    [Show full text]
  • Knowledge Discovery in Cryptocurrency Transactions
    Knowledge Discovery in Cryptocurrency Transactions: A Survey Xiao Fan Liua,∗, Xin-Jian Jiangb, Si-Hao Liub, Chi Kong Tsec aDepartment of Media and Communication, City University of Hong Kong, Hong Kong SAR, China bSchool of Computer Science and Engineering, Southeast University, Nanjing, China cDepartment of Electrical Engineering, City University of Hong Kong, Hong Kong SAR, China Abstract Cryptocurrencies gain trust in users by publicly disclosing the full creation and transaction history. In return, the transaction history faithfully records the whole spectrum of cryptocurrency user behaviors. This article analyzes and summarizes the existing research on knowledge discovery in the cryptocurrency transactions using data mining techniques. Specifically, we classify the exist- ing research into three aspects, i.e., transaction tracings and blockchain address linking, the analyses of collective user behaviors, and the study of individual user behaviors. For each aspect, we present the problems, summarize the methodolo- gies, and discuss major findings in the literature. Furthermore, an enumeration of transaction data parsing and visualization tools and services is also provided. Finally, we outline several future directions in this research area, such as the current rapid development of Decentralized Finance (De-Fi) and digital fiat money. Keywords: cryptocurrency, Bitcoin, Ethereum, transaction analysis, data mining, complex network Contents arXiv:2010.01031v1 [cs.CR] 2 Oct 2020 1 Introduction 2 2 Preliminaries 4 2.1 Thecryptocurrencyeconomy . 4 2.2 DataModels ............................. 5 3 Traceability and Linkability Issues 8 3.1 Tracingcryptocurrencytransactions . 8 ∗Corresponding author Email address: [email protected] (Xiao Fan Liu) Preprint submitted to Elsevier October 5, 2020 3.2 Counter-tracingmeasures . 9 3.3 Taint analysis techniques .
    [Show full text]
  • Battlement: a Quorum Based Design for Lightning Network Key Management
    Battlement: A Quorum Based Design for Lightning Network Key Management Omer Shlomovits ZenGo X Abstract The lightning network is a payment channel network on top of bitcoin. It defines a set of protocols and specifications for securely establishing channels between lightning nodes and transmit payments between them without touching the Bitcoin blockchain. From a cryptographic stand point, a channel can be seen as a collection of two-party protocols, drawing their security from the orchestration of private keys. In this work we therefore treat channels as a key management problem. We model the adversary as an outsider attacker that gains either full or partial access to the different types of keys during the different stages of a channel life cycle. In the context of the lightning network, a watchtower is a semi-trusted, always online third party. The watchtower gets a limited permission from a party to act on its behalf in the scenario where the counter party is trying to cheat while the party is offline. We build our key management solution based on the watchtower concept: we require a quorum of watchtowers, called a Battlement, to which a user delegates key management responsibilities. Under a threshold assumption, we show how our design eliminates the existing attack surface for attackers. We additionally show how a Battlement can mitigate a bribing attack existing in current lightning network design. 1 Introduction Battlement: A battlement in defensive architecture, such as that of city walls or castles, comprises a parapet, in which gaps or indentations, which are often rectangular, occur at intervals to allow for the launch of arrows or other projectiles from within the defences1 The lightning network [13] is an instantiation of a payment channel network [9] compatible with the bitcoin blockchain.
    [Show full text]
  • Ride the Lightning: Turning Bitcoin Into Money
    Ride the Lightning: Turning Bitcoin into Money Anantha Divakaruni∗ Peter Zimmermany June 1, 2020 Click here for latest version Abstract We show that recent technological innovations have improved the efficiency of Bit- coin as a means of payment. We find a robust and significant association between reduced blockchain congestion since the beginning of the 2018, and adoption of the Lightning Network, a means of netting payments off the blockchain. This im- provement cannot be explained by other factors, such as changes in speculative demand for Bitcoin. Our findings have implications for the design of central bank digital currencies. We show that the Lightning Network has become increasingly centralised, with payments channelled through relatively few intermediaries. We conclude that improved functioning of Bitcoin is positive for welfare, and may re- duce the environmental footprint of Bitcoin mining. JEL classification: D4, E42, G10, O33. Keywords: Bitcoin, blockchain, cryptocurrency, Lightning Network, SegWit, networks, money. ∗University of Bergen. E-mail: [email protected]. yFederal Reserve Bank of Cleveland. This paper does not necessarily reflect the views of the Fed- eral Reserve System. E-mail: [email protected]. 1 1 Introduction The intended purpose of Bitcoin is to serve as a means of payment outside of the control of centralised monetary authorities, and to maintain privacy for users (Nakamoto 2008). Since its introduction in 2008, it has grown immensely in value, but still sees relatively little use as a means of payment (Thakor 2019). One important reason is that blockchain technology imposes capacity constraints on handling transactions. Bitcoin can handle an average of only seven transactions per second across the entire system.
    [Show full text]
  • The Lightning Network Jagger S
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by AIS Electronic Library (AISeL) Association for Information Systems AIS Electronic Library (AISeL) International Conference on Information Resources CONF-IRM 2019 Proceedings Management (CONF-IRM) 5-2019 The potential effect off-chain instant payments will have on cryptocurrency scalability issues – The Lightning Network Jagger S. Bellagarda The University of Pretoria, [email protected] Follow this and additional works at: https://aisel.aisnet.org/confirm2019 Recommended Citation Bellagarda, Jagger S., "The potential effect off-chain instant payments will have on cryptocurrency scalability issues – The Lightning Network" (2019). CONF-IRM 2019 Proceedings. 2. https://aisel.aisnet.org/confirm2019/2 This material is brought to you by the International Conference on Information Resources Management (CONF-IRM) at AIS Electronic Library (AISeL). It has been accepted for inclusion in CONF-IRM 2019 Proceedings by an authorized administrator of AIS Electronic Library (AISeL). For more information, please contact [email protected]. The potential effect off-chain instant payments will have on cryptocurrency scalability issues – The Lightning Network Jagger S. Bellagarda The University of Pretoria [email protected] Abstract The rapid increase in popularity regarding cryptocurrency and specifically Bitcoin has been unprecedented over the past number of years. However, scalability has become a major barrier keeping it from gaining wide spread mass adoption. The purpose of this paper will be to investigate the potential effect off-chain instant payments will have on cryptocurrency scalability issues, with a focus on the Lightning Network. This will be achieved by means of a quantitative study through the process of testing various factors associated with the Lightning Network against another potential scalability solution, increasing block size limit.
    [Show full text]
  • Blockchain for Dummies Documentation
    Blockchain for Dummies Documentation Nguyen Tran Ho Thanh Son Jul 03, 2018 Contents 1 Contents 3 1.1 Blockchain and Bitcoin.........................................3 1.1.1 What is a blockchain?......................................3 1.1.2 What is the difference between Bitcoin and Blockchain?...................3 1.1.3 What is Bitcoin?........................................3 1.1.4 How Bitcoin works?......................................4 1.1.4.1 Transactions......................................4 1.1.4.2 Independent Verification of Transactions.......................5 1.1.4.3 Aggregation of Verified Transactions.........................5 1.1.4.4 Constructing a Block Header.............................6 1.1.4.5 Mining of a Block...................................7 1.1.4.6 Finding the Puzzle- Why is it hard?..........................7 1.1.4.7 Difficulty Representation...............................7 1.1.4.8 Successfully Mining the Block............................8 1.1.4.9 Independent Confirmation of Each Block.......................8 1.1.4.10 Assembling and Selecting Chains of Blocks.....................8 1.1.4.11 Miners Reward....................................9 1.1.4.12 Several Branches...................................9 1.1.4.13 What if Someone tries to Hack the System?..................... 11 1.1.5 Bitcoin’s network in one infographic.............................. 13 1.2 Frequently Asked Questions....................................... 14 1.2.1 Questions............................................ 14 1.2.1.1 Who is in control of Bitcoin?............................. 14 1.2.1.2 How does one acquire bitcoins?............................ 14 1.2.1.3 What does “synchronizing” mean and why does it take so long?........... 15 1.2.1.4 What is a consensus algorithm and why is it useful in blockchain?......... 15 1.2.1.5 What is the difference between a public and private/consortium blockchains?...
    [Show full text]
  • Decentralized Anonymous Payments
    Decentralized Anonymous Payments by Ian Miers A dissertation submitted to The Johns Hopkins University in conformity with the requirements for the degree of Doctor of Philosophy. Baltimore, Maryland August, 2017 © Ian Miers 2017 All rights reserved Abstract Decentralized payment systems such as Bitcoin record monetary transactions between pseudonyms in an append-only ledger known as a blockchain. Because the ledger is public, permanent, and readable by anyone, a user's privacy depends solely on the difficulty of linking pseudonymous transactions either to each other or to real identities. Both academic work and commercial services have shown that such linking is, in fact, very easy. Anyone at any point in the future can download a user's transaction history and analyze it. In this work, we propose and implement privacy preserving coins, payments, and payment channels that can be built atop a ledger. In particular we propose: Zerocoin A blockchain based protocol for breaking the link between a transaction that receives non-anonymous funds and the subsequent transaction that spends it. Zerocash The successor to Zerocoin, a blockchain based payment system supporting anonymous payments of arbitrary hidden value to other parties. While payments are recorded publicly in the blockchain, they reveal almost nothing else: the ii ABSTRACT recipient learns only the amount paid but not the source and anyone else learns only that a payment of some value to someone took place. Bolt A payment channel protocol that allows two parties to anonymously and se- curely make many unlinkable payments while only posting two messages to the blockchain. This protocol provides for instant payments while providing drastically improved scalability as every transaction is no longer recorded in the blockchain.
    [Show full text]
  • Lightning Network Summary
    The Bitcoin Lightning Network http://lightning.network The Lightning Network is a decentralized system for instant, high-volume micropayments that removes the risk of delegating custody of funds to trusted third parties. Bitcoin, the world's most widely used and valuable Alice digital currency, allows anyone to send value without a trusted intermediary or depository. Bitcoin contains an advanced scripting system allowing users to program instructions for funds. There are, however, some Bob drawbacks to bitcoin's decentralized design. Transactions confirmed on the bitcoin blockchain take up to one hour before they are irrevesible. Micropayments, or payments less than a few cents, are inconsistently confirmed, and fees render such transactions unviable on the network today. The Lightning Network solves these problems. It is one of the first implementations of a multi-party Smart Contract (programmable money) using bitcoin's built-in scripting. The Lightning Network is leading technological development in multiparty financial computations with bitcoin. Instant Payments. Bitcoin aggregates transactions into blocks spaced ten minutes apart. Payments are widely regarded as secure on bitcoin after confirmation of six blocks, or about one hour. On the Lightning Network, payments don't need block confirmations, and are instant and atomic. Lightning can be used at retail point-of-sale terminals, with user device-to-device transactions, or anywhere instant payments are needed. Micropayments. New markets can be opened with the possibility of micropayments. Lightning enables one to send funds down to 0.00000001 bitcoin without custodial risk. The bitcoin blockchain currently enforces a minimum output size many hundreds of times higher, and a fixed per-transaction fee which makes micropayments impractical.
    [Show full text]
  • Dissertation Docteur De L'université Du Luxembourg
    PhD-FSTM-2020-45 The Faculty of Sciences, Technology and Medicine DISSERTATION Defence held on 17/09/2020 in Esch-sur-Alzette to obtain the degree of DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE by Sergei TIKHOMIROV Born on 29 May 1991 in Moscow (USSR) SECURITY AND PRIVACY OF BLOCKCHAIN PROTOCOLS AND APPLICATIONS Dissertation defence committee Dr Alex Biryukov, dissertation supervisor Professor, Université du Luxembourg Dr Matteo Maffei Professor, TU Wien Dr Volker Müller, Chairman Associate Professor, Université du Luxembourg Dr Patrick McCorry CEO, PISA Research Dr Andrew Miller, Vice Chairman Assistant Professor, University of Illinois, Urbana-Champaign iii “Imagine there was a base metal as scarce as gold but with the following properties: – boring grey in colour – not a good conductor of electricity – not particularly strong, but not ductile or easily malleable either – not useful for any practical or ornamental purpose and one special, magical property: can be transported over a communications channel.” Satoshi Nakamoto v UNIVERSITY OF LUXEMBOURG Abstract Faculty of Science, Technology and Medicine Department of Computer Science Doctor of Philosophy Security and Privacy of Blockchain Protocols and Applications by Sergei TIKHOMIROV Bitcoin is the first digital currency without a trusted third party. This revolution- ary protocol allows mutually distrusting participants to agree on a single common history of transactions. Bitcoin nodes pack transactions into blocks and link those in a chain (the blockchain). Hash-based proof-of-work ensures that the blockchain is computationally infeasible to modify. Bitcoin has spawned a new area of research at the intersection of computer sci- ence and economics. Multiple alternative cryptocurrencies and blockchain projects aim to address Bitcoin’s limitations.
    [Show full text]