IJCNIS Vol. 11, No. 6, 8 Jun. 2019
Cover page and Table of Contents: PDF (size: 610KB)
Full Text (PDF, 610KB), PP.22-28
Views: 0 Downloads: 0
Bitcoin, cryptocurrency, networks, second layer protocols, micropayments, payment channels, privacy
One of the most important problems of modern cryptocurrency networks is the problem of scaling: advanced cryptocurrencies like Bitcoin can handle around 5 transactions per second. One of the most promising solutions to this problem are second layer payment protocols: payment networks implemented on top of base cryptocurrency network layer, based on the idea of delaying publication of intermediate transactions and using base network only as a finalization layer. Such networks consist of entities that interact with the cryptocurrency system via a payment channel protocol, and can send, receive and forward payments. This paper describes a formal actor-based model of payment channel network and uses it to formulate a modified payment protocol that can be executed in the network without requiring any information about its topology and thus can hide information about financial relations between nodes.
Zhengbing Hu, Ivan Dychka, Mykola Onai, Yuri Zhykin, "Blind Payment Protocol for Payment Channel Networks", International Journal of Computer Network and Information Security(IJCNIS), Vol.11, No.6, pp.22-28, 2019.DOI:10.5815/ijcnis.2019.06.03
[1]S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008. [Online]. Available: http: / / bitcoin . org / bitcoin.pdf.
[2]E. Lombrozo, J. Lau, and P. Wuille, Bip 141: Segre- gated witness (consensus layer), 2015. [Online]. Avail- able: https://github.com/bitcoin/bips/blob/master/bip- 0141.mediawiki.
[3]J. Lau, Bip 114: Merkelized abstract syntax tree, 2016. [Online]. Available: https://github.com/bitcoin/bips/ blob/master/bip-0114.mediawiki.
[4]J. Poon and T. Dryja, The bitcoin lightning network: Scalable off-chain instant payments, 2016. [Online]. Available: https://lightning.network/lightning-network- paper.pdf.
[5]M. Green and I. Miers, Bolt: Anonymous payment channels for decentralized currencie, 2016. [Online]. Available: https://eprint.iacr.org/2016/701.pdf.
[6]C. Decker, R. Russel, and O. Osuntokun, Eltoo: A simple laye2 protocol for bitcoin, 2018. [Online]. Available: https://blockstream.com/eltoo.pdf.
[7]J. Postel, “Internet protocol,” RFC Editor, STD 5, 1981. [Online]. Available: http://www.rfc-editor.org/ rfc/rfc791.txt.
[8]G. Danezis and I. Goldberg, Sphinx: A compact and provably secure mix format, 2009.
[9]R. Russel, Bolt #4: Onion routing protocol, 2017. [On- line]. Available: https://github.com/lightningnetwork/ lightning-rfc/blob/master/04-onion-routing.md.
[10]F. Baker, “Requirements for ip version 4 routers,” RFC Editor, RFC 1812, 1995. [Online]. Available: http://www.rfc-editor.org/rfc/rfc1812.txt.
[11]R. Dingledine, N. Mathewson, and P. Syverson, Tor: The second-generation onion router, 2004. [Online]. Available: http://dl.acm.org/citation.cfm?id=1251375. 1251396.
[12]Osuntokun, C. Fromknecht, and J. T. Halseth, Lnd, 2019. [Online]. Available: https://github.com/ lightningnetwork/lnd.