Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
- URL: http://arxiv.org/abs/2011.14341v2
- Date: Thu, 9 May 2024 17:25:34 GMT
- Title: Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
- Authors: Lukas Aumayr, Esra Ceylan, Yannik Kopyciok, Matteo Maffei, Pedro Moreno-Sanchez, Iosif Salem, Stefan Schmid,
- Abstract summary: We present an integer linear program (ILP) to compute the globally optimal VC setup strategy in terms of transaction costs, security, and privacy.
Our results confirm on real-world data that our greedy strategy minimizes costs while protecting against security and privacy threats of on-path adversaries.
- Score: 26.409701991849506
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Payment channel networks (PCNs) are among the most promising solutions to the scalability issues in permissionless blockchains, by allowing parties to pay each other off-chain through a path of payment channels (PCs). However, routing transactions comes at a cost which is proportional to the number of intermediaries, since each charges a fee for the routing service. Furthermore, analogous to other networks, malicious intermediaries in the payment path can lead to security and privacy threats. Virtual channels (VCs), i.e., bridges over PC paths, mitigate the above PCN issues, as an intermediary participates only once to set up the VC and is then excluded from every future VC transaction. However, similar to PCs, creating a VC has a cost that must be paid out of the bridged PCs' balance. Currently, we are missing guidelines to where and how many VCs to set up. Ideally, VCs should minimize transaction costs while mitigating security and privacy threats from on-path adversaries. In this work, we address for the first time the VC setup problem, formalizing it as an optimization problem. We present an integer linear program (ILP) to compute the globally optimal VC setup strategy in terms of transaction costs, security, and privacy. We then accompany the computationally heavy ILP with a fast local greedy algorithm. Our model and algorithms can be used with any on-path adversary, given that its strategy can be expressed as a set of corrupted nodes that is estimated by the honest nodes. We conduct an evaluation of the greedy algorithm over a snapshot of the Lightning Network (LN), the largest Bitcoin-based PCN. Our results confirm on real-world data that our greedy strategy minimizes costs while protecting against security and privacy threats of on-path adversaries. These findings may serve the LN community as guidelines for the deployment of VCs.
Related papers
- Blockchain-Enabled Routing for Zero-Trust Low-Altitude Intelligent Networks [77.17664010626726]
We focus on the routing with multiple UAV clusters in low-altitude intelligent networks (LAINs)<n>To minimize the damage caused by potential threats, we present the zero-trust architecture with the software-defined perimeter and blockchain techniques.<n>We show that the proposed framework reduces the average E2E delay by 59% and improves the TSR by 29% on average compared to benchmarks.
arXiv Detail & Related papers (2026-02-27T04:30:35Z) - Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection [15.381969851183527]
We consider an input sequence of transactions over $p$ parties.<n>Each transaction consists of a transaction size, source, and target, and can be either accepted or rejected.<n>We output a decision for each transaction in the sequence to minimise the cost of creating and augmenting channels.
arXiv Detail & Related papers (2025-08-20T08:34:20Z) - RACED: Routing in Payment Channel Networks Using Distributed Hash Tables [0.9558392439655012]
Off-chain financial mechanisms such as payment channel networks (PCNs) help users process transactions of varying amounts, including micro-payment transactions, without writing each transaction to the blockchain.
We propose RACED, a routing protocol that leverages the idea of Distributed Hash Tables (DHTs) to route transactions in PCNs in a fast and secure way.
Our experiments on real-world transaction datasets show that RACED gives an average transaction success ratio of 98.74%, an average pathfinding time of 31.242 seconds, which is $1.65*103$, $1.8*103$, and $4
arXiv Detail & Related papers (2023-11-29T14:31:15Z) - Blink: Link Local Differential Privacy in Graph Neural Networks via
Bayesian Estimation [79.64626707978418]
We propose using link local differential privacy over decentralized nodes to train graph neural networks.
Our approach spends the privacy budget separately on links and degrees of the graph for the server to better denoise the graph topology.
Our approach outperforms existing methods in terms of accuracy under varying privacy budgets.
arXiv Detail & Related papers (2023-09-06T17:53:31Z) - PTTS: Zero-Knowledge Proof-based Private Token Transfer System on Ethereum Blockchain and its Network Flow Based Balance Range Privacy Attack Analysis [0.0]
We propose a Private Token Transfer System (PTTS) for the public blockchain.
For the proposed framework, zero-knowledge based protocol has been designed using Zokrates and integrated into our private token smart contract.
In the second part of the paper, we provide security and privacy analysis including the replay attack and the balance range privacy attack.
arXiv Detail & Related papers (2023-08-29T09:13:31Z) - Process Channels: A New Layer for Process Enactment Based on Blockchain State Channels [0.09208007322096533]
We propose to change the foundation of blockchain-based business process execution, from on-chain smart contracts to state channels.
State channels allow conducting most transactions off-chain while mostly retaining the core security properties offered by blockchain.
Our proposal, process channels, is a model-driven approach to enacting processes on state channels.
arXiv Detail & Related papers (2023-04-03T16:05:46Z) - Implementing Reinforcement Learning Datacenter Congestion Control in NVIDIA NICs [64.26714148634228]
congestion control (CC) algorithms become extremely difficult to design.
It is currently not possible to deploy AI models on network devices due to their limited computational capabilities.
We build a computationally-light solution based on a recent reinforcement learning CC algorithm.
arXiv Detail & Related papers (2022-07-05T20:42:24Z) - Multi-Agent Neural Rewriter for Vehicle Routing with Limited Disclosure
of Costs [65.23158435596518]
Solving the multi-vehicle routing problem as a team Markov game with partially observable costs.
Our multi-agent reinforcement learning approach, the so-called multi-agent Neural Rewriter, builds on the single-agent Neural Rewriter to solve the problem by iteratively rewriting solutions.
arXiv Detail & Related papers (2022-06-13T09:17:40Z) - More is Merrier: Relax the Non-Collusion Assumption in Multi-Server PIR [61.13962963550403]
A long line of research on secure computation has confirmed that anything that can be computed, can be computed securely using a set of non-colluding parties.<n>However, it remains highly susceptible to covert, undetectable collusion among computing parties.<n>This work stems from an observation that if the number of available computing parties is much higher than the number of parties required to perform a secure computation task, collusion attempts in privacy-preserving computations could be deterred.
arXiv Detail & Related papers (2022-01-19T17:29:39Z) - Safe Online Bid Optimization with Return-On-Investment and Budget
Constraints subject to Uncertainty [87.81197574939355]
We study the nature of both the optimization and learning problems.
We provide an algorithm, namely GCB, guaranteeing sublinear regret at the cost of a potentially linear number of constraints violations.
More interestingly, we provide an algorithm, namely GCB_safe(psi,phi), guaranteeing both sublinear pseudo-regret and safety w.h.p. at the cost of accepting tolerances psi and phi.
arXiv Detail & Related papers (2022-01-18T17:24:20Z) - Verifiable Coded Computing: Towards Fast, Secure and Private Distributed
Machine Learning [13.09925205966904]
Stragglers, Byzantine workers, and data privacy are the main bottlenecks in distributed cloud computing.
We propose Verifiable Coded Computing framework that decouples Byzantine node detection challenge from the straggler tolerance.
Our experiments show that VCC speeds up the conventional uncoded implementation of distributed logistic regression by $3.2times-6.9times$.
arXiv Detail & Related papers (2021-07-27T17:23:09Z) - Distributed Deep Learning Using Volunteer Computing-Like Paradigm [0.09668407688201358]
Training Deep Learning models with large number of parameters and/or large datasets can become prohibitive.
Current solutions, built predominantly for cluster computing systems, can still be an issue.
We design a distributed solution that can run DL training on a VC system by using a data parallel approach.
arXiv Detail & Related papers (2021-03-16T07:32:58Z) - Online Adversarial Attacks [57.448101834579624]
We formalize the online adversarial attack problem, emphasizing two key elements found in real-world use-cases.
We first rigorously analyze a deterministic variant of the online threat model.
We then propose algoname, a simple yet practical algorithm yielding a provably better competitive ratio for $k=2$ over the current best single threshold algorithm.
arXiv Detail & Related papers (2021-03-02T20:36:04Z) - Decentralized Multi-Agent Linear Bandits with Safety Constraints [31.67685495996986]
We study decentralized linear bandits, where a network of $N$ agents acts cooperatively to solve a linear bandit-optimization problem.
We propose DLUCB: a fully decentralized algorithm that minimizes the cumulative regret over the entire network.
We show that our ideas extend naturally to the emerging, albeit more challenging, setting of safe bandits.
arXiv Detail & Related papers (2020-12-01T07:33:00Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.