skip to main content
10.1145/3243734.3243856acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

General State Channel Networks

Published:15 October 2018Publication History

ABSTRACT

One of the fundamental challenges that hinder further adaption of decentralized cryptocurrencies is scalability. Because current cryptocurrencies require that all transactions are processed and stored on a distributed ledger -- the so-called blockchain -- transaction throughput is inherently limited. An important proposal to significantly improve scalability are off-chain protocols, where the massive amount of transactions is executed without requiring the costly interaction with the blockchain. Examples of off-chain protocols include payment channels and networks, which are currently deployed by popular cryptocurrencies such as Bitcoin and Ethereum. A further extension of payment networks envisioned for cryptocurrencies are so-called state channel networks. In contrast to payment networks that only support off-chain payments between users, state channel networks allow execution of arbitrary complex smart contracts. The main contribution of this work is to give the first full specification for general state channel networks. Moreover, we provide formal security definitions and prove the security of our construction against powerful adversaries. An additional benefit of our construction is the use of channel virtualization, which further reduces latency and costs in complex channel networks.

Skip Supplemental Material Section

Supplemental Material

p949-hostakova.mp4

mp4

410.5 MB

References

  1. Ian Allison. 2016. Ethereum's Vitalik Buterin explains how state channels address privacy and scalability. (July 2016).Google ScholarGoogle Scholar
  2. Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, and Lukasz Mazurek. 2014. Secure Multiparty Computations on Bitcoin. In 2014 IEEE Symposium on Security and Privacy. IEEE Computer Society Press, Berkeley, CA, USA, 443--458. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Iddo Bentov and Ranjit Kumaresan. 2014. How to Use Bitcoin to Design Fair Protocols. In Advances in Cryptology -- CRYPTO 2014, Part II (Lecture Notes in Computer Science), Juan A. Garay and Rosario Gennaro (Eds.), Vol. 8617. Springer, Heidelberg, Germany, Santa Barbara, CA, USA, 421--439.Google ScholarGoogle ScholarCross RefCross Ref
  4. Iddo Bentov, Ranjit Kumaresan, and Andrew Miller. 2017. Instantaneous Decentralized Poker. In Advances in Cryptology -- ASIACRYPT 2017, Tsuyoshi Takagi and Thomas Peyrin (Eds.). Springer International Publishing, Cham, 410--440.Google ScholarGoogle ScholarCross RefCross Ref
  5. Ran Canetti. 2001. Universally Composable Security: A New Paradigm for Cryptographic Protocols. In 42nd Annual Symposium on Foundations of Computer Science. IEEE Computer Society Press, Las Vegas, NV, USA, 136--145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Ran Canetti, Yevgeniy Dodis, Rafael Pass, and Shabsi Walfish. 2007. Universally Composable Security with Global Setup. In TCC 2007: 4th Theory of Cryptography Conference (Lecture Notes in Computer Science), Salil P. Vadhan (Ed.), Vol. 4392. Springer, Heidelberg, Germany, Amsterdam, The Netherlands, 61--85. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Christian Decker and Roger Wattenhofer. 2015. A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels .Springer International Publishing, Cham, 3--18.Google ScholarGoogle Scholar
  8. Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. Perun: Virtual Payment Hubs over Cryptographic Currencies. (2017), bibinfonumpages635 pages. http://eprint.iacr.org/2017/635 conference version accepted to the 40th IEEE Symposium on Security and Privacy (IEEE S&P) 2019.Google ScholarGoogle Scholar
  9. Stefan Dziembowski, Sebastian Faust, and Kristina Hostakova. 2018. Foundations of State Channel Networks. Cryptology ePrint Archive, Report 2018/320. (2018). https://eprint.iacr.org/2018/320 Full version of this paper.Google ScholarGoogle Scholar
  10. Oded Goldreich. 2006. Foundations of Cryptography: Volume 1 .Cambridge University Press, New York, NY, USA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Dennis Hofheinz and Joern Mueller-Quade. 2004. A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer. Cryptology ePrint Archive, Report 2004/016. (2004). http://eprint.iacr.org/2004/016.Google ScholarGoogle Scholar
  12. Yael Tauman Kalai, Yehuda Lindell, and Manoj Prabhakaran. 2007. Concurrent Composition of Secure Protocols in the Timing Model. Journal of Cryptology, Vol. 20, 4 (Oct. 2007), 431--492. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Jonathan Katz and Yehuda Lindell. 2007. Introduction to Modern Cryptography (Chapman & Hall/Crc Cryptography and Network Security Series) .Chapman & Hall/CRC. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas. 2013. Universally Composable Synchronous Computation. In TCC 2013: 10th Theory of Cryptography Conference (Lecture Notes in Computer Science), Amit Sahai (Ed.), Vol. 7785. Springer, Heidelberg, Germany, Tokyo, Japan, 477--498. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing Off-Blockchain Payment Networks. In ACM CCS 17: 24th Conference on Computer and Communications Security, Bhavani M. Thuraisingham, David Evans, Tal Malkin, and Dongyan Xu (Eds.). ACM Press, Dallas, TX, USA, 439--453. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Joshua Lind, Ittay Eyal, Florian Kelbert, Oded Naor, Peter R. Pietzuch, and Emin Gü n Sirer. 2017. Teechain: Scalable Blockchain Payments using Trusted Execution Environments. CoRR, Vol. abs/1707.05454 (2017). arxiv: 1707.05454 http://arxiv.org/abs/1707.05454Google ScholarGoogle Scholar
  17. Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and Privacy with Payment-Channel Networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017. 455--471. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Patrick McCorry, Surya Bakshi, Iddo Bentov, Andrew Miller, and Sarah Meiklejohn. 2018. Pisa: Arbitration Outsourcing for State Channels. IACR Cryptology ePrint Archive, Vol. 2018 (2018), 582. https://eprint.iacr.org/2018/582Google ScholarGoogle Scholar
  19. Silvio Micali and Ronald L. Rivest. 2002. Micropayments Revisited. In Topics in Cryptology -- CT-RSA 2002 (Lecture Notes in Computer Science), Bart Preneel (Ed.), Vol. 2271. Springer, Heidelberg, Germany, San Jose, CA, USA, 149--163. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Andrew Miller, Iddo Bentov, Ranjit Kumaresan, and Patrick McCorry. 2017. Sprites: Payment Channels that Go Faster than Lightning. CoRR, Vol. abs/1702.05812 (2017). http://arxiv.org/abs/1702.05812Google ScholarGoogle Scholar
  21. Satoshi Nakamoto. 2009. Bitcoin: A Peer-to-Peer Electronic Cash System. (2009). http://bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  22. Jesper Buus Nielsen. 2003. On Protocol Security in the Cryptographic Model. (2003).Google ScholarGoogle Scholar
  23. Olaoluwa Osuntokun. 2018. Hardening Lightning. BPASE. (2018). https://cyber.stanford.edu/sites/default/files/hardening_lightning_updated.pdfGoogle ScholarGoogle Scholar
  24. Rafael Pass and Abhi Shelat. 2015. Micropayments for Decentralized Currencies. In ACM CCS 15: 22nd Conference on Computer and Communications Security, Indrajit Ray, Ninghui Li, and Christopher Kruegel: (Eds.). ACM Press, Denver, CO, USA, 207--218. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. (Jan. 2016). Draft version 0.5.9.2, available at https://lightning.network/lightning-network-paper.pdf.Google ScholarGoogle Scholar
  26. Ronald L. Rivest. 1997. Electronic Lottery Tickets as Micropayments. In FC'97: 1st International Conference on Financial Cryptography (Lecture Notes in Computer Science), Rafael Hirschfeld (Ed.), Vol. 1318. Springer, Heidelberg, Germany, Anguilla, British West Indies, 307--314. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2017. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. CoRR, Vol. abs/1709.05748 (2017). arxiv: 1709.05748 http://arxiv.org/abs/1709.05748Google ScholarGoogle Scholar
  28. David Siegel. 2016. Understanding The DAO Attack. (Jun 2016). CoinDesk, http://www.coindesk.com/understanding-dao-hack-journalists/.Google ScholarGoogle Scholar
  29. David Wheeler. 1997. Transactions Using Bets. In Proceedings of the International Workshop on Security Protocols. Springer-Verlag, London, UK, UK, 89--92. http://dl.acm.org/citation.cfm?id=647214.720381 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Gavin Wood. 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger. (2014). http://gavwood.com/paper.pdf.Google ScholarGoogle Scholar

Index Terms

  1. General State Channel Networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CCS '18: Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security
      October 2018
      2359 pages
      ISBN:9781450356930
      DOI:10.1145/3243734

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 October 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CCS '18 Paper Acceptance Rate134of809submissions,17%Overall Acceptance Rate1,261of6,999submissions,18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader