ABSTRACT
Payment channel networks (PCNs) enhance the scalability of block-chains by allowing parties to conduct transactions off-chain, i.e, without broadcasting every transaction to all blockchain participants. To conduct transactions, a sender and a receiver can either establish a direct payment channel with a funding blockchain transaction or leverage existing channels in a multi-hop payment. The security of PCNs usually relies on the synchrony of the underlying blockchain, i.e., evidence of misbehavior needs to be published on the blockchain within a time limit. Alternative payment channel proposals that do not require blockchain synchrony rely on quorum certificates and use a committee to register the transactions of a channel. However, these proposals do not support multi-hop payments, a limitation we aim to overcome.
In this paper, we demonstrate that it is in fact impossible to design a multi-hop payment protocol with both network asynchrony and faulty channels, i.e., channels that may not correctly follow the protocol. We then detail two committee-based multi-hop payment protocols that respectively assume synchronous communications and possibly faulty channels, or asynchronous communication and correct channels. The first protocol relies on possibly faulty committees instead of the blockchain to resolve channel disputes, and enforces privacy properties within a synchronous network. The second one relies on committees that contain at most f faulty members out of 3f +1 and successively delegate to each other the role of eventually completing a multi-hop payment. We show that both protocols satisfy the security requirements of a multi-hop payment and compare their communication complexity and latency.
- 1ml.com. 2021. Real-Time Lightning Network Statistics. Available at: https://1ml.com/statistics.Google Scholar
- N. Asokan, Victor Shoup, and Michael Waidner. 1998. Asynchronous Protocols for Optimistic Fair Exchange. In S&P.Google Scholar
- Lukas Aumayr, Matteo Maffei, Oguzhan Ersoy, Andreas Erwig, Sebastian Faust, Siavash Riahi, Kristina Hostáková, and Pedro Moreno-Sanchez. 2021. Bitcoin-Compatible Virtual Channels. In IEEE S&P.Google Scholar
- Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2021. Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. In USENIX Security.Google Scholar
- Alex Auvolat, Davide Frey, Michel Raynal, and François Taïani. 2020. Money transfer made simple: a specification, a generic algorithm, and its proof. arXiv preprint arXiv:2006.12276 (2020).Google Scholar
- Georgia Avarikioti, Eleftherios Kokoris Kogias, Roger Wattenhofer, and Dionysis Zindros. 2021. Brick: Asynchronous Payment Channels. FC.Google Scholar
- Edward Bortnikov, Maxim Gurevich, Idit Keidar, Gabriel Kliot, and Alexander Shraer. 2009. Brahms: Byzantine resilient random membership sampling. Computer Networks 53, 13 (2009), 2340--2359.Google ScholarDigital Library
- Gabriel Bracha and Sam Toueg. 1985. Asynchronous consensus and broadcast protocols. JACM 32, 4 (1985), 824--840.Google ScholarDigital Library
- Ferdinand Brasser, Urs Müller, Alexandra Dmitrienko, Kari Kostiainen, Srdjan Capkun, and Ahmad-Reza Sadeghi. 2017. Software Grand Exposure: {SGX} Cache Attacks Are Practical. In WOOT.Google Scholar
- Miguel Castro, Barbara Liskov, et al. 1999. Practical byzantine fault tolerance. In OSDI, Vol. 99. 173--186.Google ScholarDigital Library
- Tushar Deepak Chandra, Vassos Hadzilacos, and Sam Toueg. 1996. The weakest failure detector for solving consensus. JACM 43, 4 (1996), 685--722.Google ScholarDigital Library
- Pierre Civit, Seth Gilbert, and Vincent Gramoli. 2021. Polygraph: Accountable byzantine agreement. In 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS). IEEE, 403--413.Google ScholarCross Ref
- Daniel Collins, Rachid Guerraoui, Jovan Komatovic, Petr Kuznetsov, Matteo Monti, Matej Pavlovic, Yvonne-Anne Pignolet, Dragos-Adrian Seredinschi, Andrei Tonkikh, and Athanasios Xygkis. 2020. Online payments by merely broadcasting messages. In 2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 26--38.Google ScholarCross Ref
- George Danezis and Ian Goldberg. 2009. Sphinx: A compact and provably secure mix format. In S&P.Google Scholar
- Christian Decker and Roger Wattenhofer. 2015. A fast and scalable payment network with bitcoin duplex micropayment channels. In SSS.Google Scholar
- Jérémie Decouchant, David Kozhaya, Vincent Rahli, and Jiangshan Yu. 2022. DAMYSUS: streamlined BFT consensus leveraging trusted components. In EuroSys. 1--16.Google Scholar
- Thaddeus Dryja and Scaling Bitcoin Milano. 2016. Unlinkable outsourced channel monitoring. Scaling Bitcoin Milan (2016).Google Scholar
- Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Julia Hesse, and Kristina Hostáková. 2019. Multi-party Virtual State Channels. In Eurocrypt.Google Scholar
- Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2019. Perun: Virtual Payment Hubs over Cryptocurrencies. In IEEE S&P.Google Scholar
- Lisa Eckey, Sebastian Faust, Kristina Hostáková, and Stefanie Roos. 2020. Splitting Payments Locally While Routing Interdimensionally. Cryptol. ePrint Arch. (2020).Google Scholar
- Michael J Fischer, Nancy A Lynch, and Michael S Paterson. 1985. Impossibility of distributed consensus with one faulty process. JACM 32, 2 (1985), 374--382.Google ScholarDigital Library
- David Galindo, Jia Liu, Mihair Ordean, and Jin-Mann Wong. 2021. Fully Distributed Verifiable Random Functions and their Application to Decentralised Random Beacons. In EuroS&P.Google Scholar
- Juan Garay, Aggelos Kiayias, and Nikos Leonardos. 2015. The bitcoin backbone protocol: Analysis and applications. In Annual international conference on the theory and applications of cryptographic techniques. 281--310.Google ScholarCross Ref
- Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling Byzantine Agreements for Cryptocurrencies. In SOSP.Google ScholarDigital Library
- Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2020. Sok: Layer-two blockchain protocols. In FC.Google Scholar
- Rachid Guerraoui, Petr Kuznetsov, Matteo Monti, Matej Pavlovič, and Dragos-Adrian Seredinschi. 2019. The consensus number of a cryptocurrency. In Proceedings of the 2019 ACM Symposium on Principles of Distributed Computing. 307--316.Google ScholarDigital Library
- Saurabh Gupta. 2016. A non-consensus based decentralized financial transaction processing model with support for efficient auditing. Arizona State University.Google Scholar
- Abdelatif Hafid, Abdelhakim Senhaji Hafid, and Mustapha Samih. 2019. New Mathematical Model to Analyze Security of Sharding-Based Blockchain Protocols. IEEE Access 7 (2019), 185447--185457.Google ScholarCross Ref
- Jona Harris and Aviv Zohar. 2020. Flood & loot: A systemic attack on the lightning network. In ACM AFT.Google Scholar
- Aggelos Kiayias, Alexander Russell, Bernardo David, and Roman Oliynykov. 2017. Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol. In Crypto.Google Scholar
- Eleftherios Kokoris Kogias, Dahlia Malkhi, and Alexander Spiegelman. 2020. Asynchronous Distributed Key Generation for Computationally-Secure Randomness, Consensus, and Threshold Signatures.. In CCS.Google Scholar
- David Kozhaya, Jérémie Decouchant, and Paulo Esteves-Verissimo. 2018. RT-ByzCast: Byzantine-resilient real-time reliable broadcast. IEEE Trans. Comput. 68, 3 (2018), 440--454.Google ScholarDigital Library
- David Kozhaya, Jérémie Decouchant, Vincent Rahli, and Paulo Esteves-Verissimo. 2021. PISTIS: An Event-Triggered Real-Time Byzantine-Resilient Protocol Suite. IEEE Transactions on Parallel and Distributed Systems 32, 9 (2021), 2277--2290.Google ScholarCross Ref
- Satwik Prabhu Kumble, Dick Epema, and Stefanie Roos. 2021. How Lightning's Routing Diminishes its Anonymity. In ARES.Google Scholar
- Joshua Lind, Oded Naor, Ittay Eyal, Florian Kelbert, Emin Gün Sirer, and Peter R. Pietzuch. 2019. Teechain: a secure payment network with asynchronous blockchain access. In SOSP.Google Scholar
- Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and Privacy with Payment-Channel Networks. In CCS.Google Scholar
- Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, and Matteo Maffei. 2019. Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. In NDSS.Google Scholar
- Andrew Miller, Iddo Bentov, Surya Bakshi, Ranjit Kumaresan, and Patrick McCorry. 2019. Sprites and State Channels: Payment Networks that Go Faster Than Lightning. In FC.Google Scholar
- Ayelet Mizrahi and Aviv Zohar. 2020. Congestion attacks in payment channel networks. arXiv preprint arXiv:2002.06564 (2020).Google Scholar
- Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2018. Silentwhispers: Enforcing security and privacy in decentralized credit networks. In NDSS.Google Scholar
- Achour Mostéfaoui, Hamouma Moumen, and Michel Raynal. 2015. Signature-free asynchronous binary Byzantine consensus with t< n/3, O (n2) messages, and O (1) expected time. JACM 62, 4 (2015), 1--21.Google ScholarDigital Library
- Oded Naor and Idit Keidar. 2022. On Payment Channels in Asynchronous Money Transfer Systems. CoRR abs/2202.06693 (2022).Google Scholar
- Raiden Network. 2022. Raiden network. Retrieved 31/01/2022 from https://raiden.network/Google Scholar
- Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, and Christian Decker. 2020. Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. arXiv preprint arXiv:2003.00003 (2020).Google Scholar
- Henning Pagnia and Felix C Gärtner. 1999. On the impossibility of fair exchange without a trusted third party. Technical Report. TU Darmstadt.Google Scholar
- Rafael Pass, Lior Seeman, and Abhi Shelat. 2017. Analysis of the Blockchain Protocol in Asynchronous Networks. In Eurocrypt.Google Scholar
- Jordan Pearson. 2015. WikiLeaks Is Now a Target In the Massive Spam Attack on Bitcoin. Available at: https://www.vice.com/en/article/ezvw7z/wikileaks-is-now-a-target-in-the-massive-spam-attack-on-bitcoin.Google Scholar
- Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: Scalable off-chain instant payments.Google Scholar
- Michael K Reiter. 1994. Secure agreement protocols: Reliable and atomic group multicast in Rampart. In CCS.Google Scholar
- Wenhao Wang, Guoxing Chen, Xiaorui Pan, Yinqian Zhang, XiaoFeng Wang, Vincent Bindschaedler, Haixu Tang, and Carl A Gunter. 2017. Leaky cauldron on the dark land: Understanding memory side-channel hazards in SGX. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 2421--2434.Google ScholarDigital Library
- Maofan Yin, Dahlia Malkhi, Michael K Reiter, Guy Golan Gueta, and Ittai Abraham. 2019. HotStuff: BFT consensus with linearity and responsiveness. In PODC.Google ScholarDigital Library
- Joseph Young. 2017. Analyst: Suspicious Bitcoin Mempool Activity, Transaction Fees Spike to 16. Available at: https://cointelegraph.com/news/analyst-suspicious-bitcoin-mempool-activity-transaction-fees-spike-to-16.Google Scholar
- Jiangshan Yu, David Kozhaya, Jérémie Decouchant, and Paulo Esteves-Verissimo. 2019. Repucoin: Your reputation is your power. IEEE Trans. Comput. 68, 8 (2019), 1225--1237.Google ScholarDigital Library
- Alexei Zamyatin, Mustafa Al-Bassam, Dionysis Zindros, Eleftherios Kokoris-Kogias, Pedro Moreno-Sanchez, Aggelos Kiayias, and William J Knottenbelt. 2019. SoK: communication across distributed ledgers. Cryptology ePrint Archive (2019).Google Scholar
Index Terms
- SyncPCN/PSyncPCN: Payment Channel Networks without Blockchain Synchrony
Recommendations
Concurrency and Privacy with Payment-Channel Networks
CCS '17: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications SecurityPermissionless blockchains protocols such as Bitcoin are inherently limited in transaction throughput and latency. Current efforts to address this key issue focus on off-chain payment channels that can be combined in a Payment-Channel Network (PCN) to ...
A Flexible Instant Payment System Based on Blockchain
Information Security and PrivacyAbstractImproving the throughput of blockchain systems such as Bitcoin and Ethereum has been an important research problem. Off-chain payments are one of the most promising technologies to tackle this challenge. Once a payment channel, however, is ...
Payment Trees: Low Collateral Payments for Payment Channel Networks
Financial Cryptography and Data SecurityAbstractThe security of blockchain based decentralized ledgers relies on consensus protocols executed between mutually distrustful parties. Such protocols incur delays which severely limit the throughput of such ledgers. Payment and state channels enable ...
Comments