ABSTRACT
One of the fundamental challenges that hinder further adaption of decentralized cryptocurrencies is scalability. Because current cryptocurrencies require that all transactions are processed and stored on a distributed ledger -- the so-called blockchain -- transaction throughput is inherently limited. An important proposal to significantly improve scalability are off-chain protocols, where the massive amount of transactions is executed without requiring the costly interaction with the blockchain. Examples of off-chain protocols include payment channels and networks, which are currently deployed by popular cryptocurrencies such as Bitcoin and Ethereum. A further extension of payment networks envisioned for cryptocurrencies are so-called state channel networks. In contrast to payment networks that only support off-chain payments between users, state channel networks allow execution of arbitrary complex smart contracts. The main contribution of this work is to give the first full specification for general state channel networks. Moreover, we provide formal security definitions and prove the security of our construction against powerful adversaries. An additional benefit of our construction is the use of channel virtualization, which further reduces latency and costs in complex channel networks.
Supplemental Material
- Ian Allison. 2016. Ethereum's Vitalik Buterin explains how state channels address privacy and scalability. (July 2016).Google Scholar
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. 2014. Secure Multiparty Computations on Bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Berkeley, CA, USA, 443--458. Google ScholarDigital Library
- Iddo Bentov and Ranjit Kumaresan. 2014. How to Use Bitcoin to Design Fair Protocols. In Advances in Cryptology -- CRYPTO 2014, Part II (Lecture Notes in Computer Science), Juan A. Garay and Rosario Gennaro (Eds.), Vol. 8617. Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 421--439.Google ScholarCross Ref
- Iddo Bentov, Ranjit Kumaresan, and Andrew Miller. 2017. Instantaneous Decentralized Poker. In Advances in Cryptology -- ASIACRYPT 2017, Tsuyoshi Takagi and Thomas Peyrin (Eds.). Springer International Publishing, Cham, 410--440.Google ScholarCross Ref
- Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, Las Vegas, NV, USA, 136--145. Google ScholarDigital Library
- Ran Canetti, Yevgeniy Dodis, Rafael Pass, and Shabsi Walfish. 2007. Universally Composable Security with Global Setup. In TCC 2007: 4th Theory of Cryptography Conference (Lecture Notes in Computer Science), Salil P. Vadhan (Ed.), Vol. 4392. Springer, Heidelberg, Germany, Amsterdam, The Netherlands, 61--85. Google ScholarDigital Library
- Christian Decker and Roger Wattenhofer. 2015. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels .Springer International Publishing, Cham, 3--18.Google Scholar
- Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. Perun: Virtual Payment Hubs over Cryptographic Currencies. (2017), bibinfonumpages635 pages. http://eprint.iacr.org/2017/635 conference version accepted to the 40th IEEE Symposium on Security and Privacy (IEEE S&P) 2019.Google Scholar
- Stefan Dziembowski, Sebastian Faust, and Kristina Hostakova. 2018. Foundations of State Channel Networks. Cryptology ePrint Archive, Report 2018/320. (2018). https://eprint.iacr.org/2018/320 Full version of this paper.Google Scholar
- Oded Goldreich. 2006. Foundations of Cryptography: Volume 1 .Cambridge University Press, New York, NY, USA. Google ScholarDigital Library
- Dennis Hofheinz and Joern Mueller-Quade. 2004. A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer. Cryptology ePrint Archive, Report 2004/016. (2004). http://eprint.iacr.org/2004/016.Google Scholar
- Yael Tauman Kalai, Yehuda Lindell, and Manoj Prabhakaran. 2007. Concurrent Composition of Secure Protocols in the Timing Model. Journal of Cryptology, Vol. 20, 4 (Oct. 2007), 431--492. Google ScholarDigital Library
- Jonathan Katz and Yehuda Lindell. 2007. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) .Chapman & Hall/CRC. Google ScholarDigital Library
- Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas. 2013. Universally Composable Synchronous Computation. In TCC 2013: 10th Theory of Cryptography Conference (Lecture Notes in Computer Science), Amit Sahai (Ed.), Vol. 7785. Springer, Heidelberg, Germany, Tokyo, Japan, 477--498. Google ScholarDigital Library
- Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing Off-Blockchain Payment Networks. In ACM CCS 17: 24th Conference on Computer and Communications Security, Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu (Eds.). ACM Press, Dallas, TX, USA, 439--453. Google ScholarDigital Library
- Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter R. Pietzuch, and Emin Gü n Sirer. 2017. Teechain: Scalable Blockchain Payments using Trusted Execution Environments. CoRR, Vol. abs/1707.05454 (2017). arxiv: 1707.05454 http://arxiv.org/abs/1707.05454Google Scholar
- Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and Privacy with Payment-Channel Networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017. 455--471. Google ScholarDigital Library
- Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, and Sarah Meiklejohn. 2018. Pisa: Arbitration Outsourcing for State Channels. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 582. https://eprint.iacr.org/2018/582Google Scholar
- Silvio Micali and Ronald L. Rivest. 2002. Micropayments Revisited. In Topics in Cryptology -- CT-RSA 2002 (Lecture Notes in Computer Science), Bart Preneel (Ed.), Vol. 2271. Springer, Heidelberg, Germany, San Jose, CA, USA, 149--163. Google ScholarDigital Library
- Andrew Miller, Iddo Bentov, Ranjit Kumaresan, and Patrick McCorry. 2017. Sprites: Payment Channels that Go Faster than Lightning. CoRR, Vol. abs/1702.05812 (2017). http://arxiv.org/abs/1702.05812Google Scholar
- Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. (2009). http://bitcoin.org/bitcoin.pdf.Google Scholar
- Jesper Buus Nielsen. 2003. On Protocol Security in the Cryptographic Model. (2003).Google Scholar
- Olaoluwa Osuntokun. 2018. Hardening Lightning. BPASE. (2018). https://cyber.stanford.edu/sites/default/files/hardening_lightning_updated.pdfGoogle Scholar
- Rafael Pass and Abhi Shelat. 2015. Micropayments for Decentralized Currencies. In ACM CCS 15: 22nd Conference on Computer and Communications Security, Indrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, Denver, CO, USA, 207--218. Google ScholarDigital Library
- Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. (Jan. 2016). Draft version 0.5.9.2, available at https://lightning.network/lightning-network-paper.pdf.Google Scholar
- Ronald L. Rivest. 1997. Electronic Lottery Tickets as Micropayments. In FC'97: 1st International Conference on Financial Cryptography (Lecture Notes in Computer Science), Rafael Hirschfeld (Ed.), Vol. 1318. Springer, Heidelberg, Germany, Anguilla, British West Indies, 307--314. Google ScholarDigital Library
- Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2017. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR, Vol. abs/1709.05748 (2017). arxiv: 1709.05748 http://arxiv.org/abs/1709.05748Google Scholar
- David Siegel. 2016. Understanding The DAO Attack. (Jun 2016). CoinDesk, http://www.coindesk.com/understanding-dao-hack-journalists/.Google Scholar
- David Wheeler. 1997. Transactions Using Bets. In Proceedings of the International Workshop on Security Protocols. Springer-Verlag, London, UK, UK, 89--92. http://dl.acm.org/citation.cfm?id=647214.720381 Google ScholarDigital Library
- Gavin Wood. 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger. (2014). http://gavwood.com/paper.pdf.Google Scholar
Index Terms
- General State Channel Networks
Recommendations
The Bitcoin Backbone Protocol: Analysis and Applications
Bitcoin is the first and most popular decentralized cryptocurrency to date. In this work, we extract and analyze the core of the Bitcoin protocol, which we term the Bitcoin backbone, and prove three of its fundamental properties which we call Common ...
Student Research Abstract: SplitChain: Blockchain with fully decentralized dynamic sharding resilient to fast adaptive adversaries
SAC '23: Proceedings of the 38th ACM/SIGAPP Symposium on Applied ComputingOver the past few years, blockchains have captured the public's interest with the promise of pseudo-anonymous decentralized exchange infrastructures. However, their potential is hindered by various technical issues, such as their ability to scale with ...
Proof-of-Stake Longest Chain Protocols: Security vs Predictability
ConsensusDay '22: Proceedings of the 2022 ACM Workshop on Developments in ConsensusThe Nakamoto longest chain protocol is remarkably simple and has been proven to provide security against any adversary with less than 50% of the total hashing power. Proof-of-stake (PoS) protocols are an energy efficient alternative; however existing ...
Comments