Proceedings of the 2nd ACM Conference on Advances in Financial Technologies 2020
DOI: 10.1145/3419614.3423262
|View full text |Cite
|
Sign up to set email alerts
|

Counting Down Thunder

Abstract: The Lightning Network is a scaling solution for Bitcoin that promises to enable rapid and private payment processing. In Lightning, multihop payments are secured by utilizing Hashed Time-Locked Contracts (HTLCs) and encrypted on the network layer by an onion routing scheme to avoid information leakage to intermediate nodes. In this work, we however show that the privacy guarantees of the Lightning Network may be subverted by an on-path adversary conducting timing attacks on the HTLC state negotiation messages.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
15
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(15 citation statements)
references
References 31 publications
(28 reference statements)
0
15
0
Order By: Relevance
“…There exist multiple LN client implementations, such as LND [31], c-lightning [6] and eclair [16], with LND being the most widely used (more than 90% of clients [28], [45], [37]). In all these implementations, senders find paths to recipients using the Dijkstra algorithm mentioned above.…”
Section: Lightning Network (Ln)mentioning
confidence: 99%
See 2 more Smart Citations
“…There exist multiple LN client implementations, such as LND [31], c-lightning [6] and eclair [16], with LND being the most widely used (more than 90% of clients [28], [45], [37]). In all these implementations, senders find paths to recipients using the Dijkstra algorithm mentioned above.…”
Section: Lightning Network (Ln)mentioning
confidence: 99%
“…LN, however, has multiple client implementations (LND, c-lightning, and eclair) with variations in how they construct paths [52], [29]. For our analysis, we used LND's implementation, as the majority of the nodes in the LN (> 90%) use it [45], [37]. The routing algorithms of the other implementations can be easily incorporated by modifying the weight function before calculating the best paths using Dijkstra.…”
Section: Implementation Detailsmentioning
confidence: 99%
See 1 more Smart Citation
“…Current research on the Lightning Network focuses on three aspects: topological properties [15,19,20,[23][24][25][26][27][28], security [9,14,[29][30][31][32][33][34][35], and routing methods [11,12,17,[36][37][38][39]. Although all the above studies are very important aspects of Lightning Network, they are strictly dependent on the underlying topological network.…”
Section: Related Workmentioning
confidence: 99%
“…In terms of the connection of nodes, Bertucci et al [26] investigated that the competition between nodes followed the Bertrand model 5 and pointed out that the centralized network structure must not be the optimal network structure. Rincon et al [33] classified the connections between nodes in the network into three types and evaluated the contribution of different kinds of connections to the network structure. Avarikioti et al [6] analyzed the impact of different charging mechanisms of nodes on the robustness and connectivity of the network.…”
Section: Related Workmentioning
confidence: 99%