RACED: Routing in Payment Channel Networks Using Distributed Hash Tables
- URL: http://arxiv.org/abs/2311.17668v1
- Date: Wed, 29 Nov 2023 14:31:15 GMT
- Title: RACED: Routing in Payment Channel Networks Using Distributed Hash Tables
- Authors: Kartick Kolachala, Mohammed Ababneh, Roopa Vishwanathan,
- Abstract summary: Off-chain financial mechanisms such as payment channel networks (PCNs) help users process transactions of varying amounts, including micro-payment transactions, without writing each transaction to the blockchain.
We propose RACED, a routing protocol that leverages the idea of Distributed Hash Tables (DHTs) to route transactions in PCNs in a fast and secure way.
Our experiments on real-world transaction datasets show that RACED gives an average transaction success ratio of 98.74%, an average pathfinding time of 31.242 seconds, which is $1.65*103$, $1.8*103$, and $4
- Score: 0.9558392439655012
- License: http://creativecommons.org/licenses/by-nc-nd/4.0/
- Abstract: The Bitcoin scalability problem has led to the development of off-chain financial mechanisms such as payment channel networks (PCNs) which help users process transactions of varying amounts, including micro-payment transactions, without writing each transaction to the blockchain. Since PCNs only allow path-based transactions, effective, secure routing protocols that find a path between a sender and receiver are fundamental to PCN operations. In this paper, we propose RACED, a routing protocol that leverages the idea of Distributed Hash Tables (DHTs) to route transactions in PCNs in a fast and secure way. Our experiments on real-world transaction datasets show that RACED gives an average transaction success ratio of 98.74%, an average pathfinding time of 31.242 seconds, which is $1.65*10^3$, $1.8*10^3$, and $4*10^2$ times faster than three other recent routing protocols that offer comparable security/privacy properties. We rigorously analyze and prove the security of RACED in the Universal Composability framework.
Related papers
- Obfuscation as an Effective Signal for Prioritizing Cross-Chain Smart Contract Audits: Large-Scale Measurement and Risk Profiling [42.77773046319942]
HOBFNET is a fast surrogate of OBFPROBE, enabling million-scale cross-chain scoring.<n>We observe systematic score drift, motivating within-chain percentile queues.<n>Cross-chain reuse is tail-enriched and directionally biased from smaller to larger ecosystems.
arXiv Detail & Related papers (2026-01-24T08:05:39Z) - ConneX: Automatically Resolving Transaction Opacity of Cross-Chain Bridges for Security Analysis [24.725668502966585]
ConneX is an automated system designed to accurately identify corresponding transaction pairs across both ends of cross-chain bridges.<n>Its successful application in tracing illicit funds underscores its practical utility for enhancing cross-chain security and transparency.
arXiv Detail & Related papers (2025-11-03T09:44:02Z) - Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection [15.381969851183527]
We consider an input sequence of transactions over $p$ parties.<n>Each transaction consists of a transaction size, source, and target, and can be either accepted or rejected.<n>We output a decision for each transaction in the sequence to minimise the cost of creating and augmenting channels.
arXiv Detail & Related papers (2025-08-20T08:34:20Z) - AlDBaran: Towards Blazingly Fast State Commitments for Blockchains [52.39305978984572]
AlDBaran is an authenticated data structure capable of handling state updates efficiently at a network throughput of 50 Gbps.<n>AlDBaran provides support for historical state proofs, which facilitates a wide array of novel applications.<n>On consumer-level portable hardware, it achieves approximately 8 million updates/s in an in-memory setting and 5 million updates/s with snapshots at sub-second intervals.
arXiv Detail & Related papers (2025-08-14T09:52:15Z) - Efficient Blockchain-based Steganography via Backcalculating Generative Adversarial Network [105.47203971578871]
We propose a generic blockchain-based steganography framework (GBSF)<n>The sender generates the required fields such as amount and fees, where the additional covert data is embedded to enhance the channel capacity.<n>Based on GBSF, we design a reversible generative adversarial network (R-GAN)<n>We propose R-GAN with Counter-intuitive data preprocessing and Custom activation functions, namely CCR-GAN.
arXiv Detail & Related papers (2025-06-19T04:43:41Z) - Zaptos: Towards Optimal Blockchain Latency [52.30047458198369]
We introduce Zaptos, a parallel pipelined architecture designed to minimize end-to-end latency.
Zaptos achieves a throughput of 20,000 transactions per second with sub-second latency.
arXiv Detail & Related papers (2025-01-18T00:22:22Z) - AsyncSC: An Asynchronous Sidechain for Multi-Domain Data Exchange in Internet of Things [38.94331838546716]
Current state-of-the-art (SOTA) schemes for IoT multi-domain data exchange are constrained by the need for synchronous networks.
In this paper, we propose AsyncSC, a novel asynchronous sidechain construction.
Results show that AsyncSC outperforms SOTA schemes, improving throughput by an average of 1.21 to 3.96 times, reducing transaction latency by 59.76% to 83.61%, and maintaining comparable resource overhead.
arXiv Detail & Related papers (2024-12-17T09:43:37Z) - MAP the Blockchain World: A Trustless and Scalable Blockchain Interoperability Protocol for Cross-chain Applications [18.33587076597966]
interoperability protocols enable cross-chain asset transfers or data retrievals between isolated chains.
Existing protocols either face severe scalability issues due to high on-chain and off-chain costs, or suffer from trust concerns because of centralized designs.
We propose textttMAP, a trustless blockchain interoperability protocol that relays cross-chain transactions across heterogeneous chains with high scalability.
arXiv Detail & Related papers (2024-11-01T07:43:11Z) - An Exposition of Pathfinding Strategies Within Lightning Network Clients [4.926283917321645]
The Lightning Network is a peer-to-peer network designed to address Bitcoin's scalability challenges.
This paper explores differences within pathfinding strategies used by prominent Lightning Network node implementations.
We evaluate efficacy of different pathfinding strategies across metrics such as success rate, fees, path length, and timelock.
arXiv Detail & Related papers (2024-10-17T17:21:45Z) - CONNECTOR: Enhancing the Traceability of Decentralized Bridge Applications via Automatic Cross-chain Transaction Association [25.765477747143432]
Cross-chain transaction association identifies and matches unique transactions executed by bridge DApps.
We present CONNECTOR, an automated cross-chain transaction association analysis method based on bridge smart contracts.
We conduct real-world experiments on different types of bridges to demonstrate the effectiveness of CONNECTOR.
arXiv Detail & Related papers (2024-09-08T00:52:06Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - FairRelay: Fair and Cost-Efficient Peer-to-Peer Content Delivery through Payment Channel Networks [10.578446948967061]
Peer-to-Peer (P2P) content delivery offers a decentralized alternative to traditional centralized Content Delivery Networks (CDNs)
A significant challenge in P2P content delivery remains: the fair compensation of relayers for their bandwidth contributions.
Existing solutions employ blockchains for payment settlements, however, they are not practical due to high on-chain costs and over-simplified network assumptions.
We introduce FairRelay, a fair and cost-efficient protocol that ensures all participants get fair payoff in complex content delivery network settings.
arXiv Detail & Related papers (2024-05-05T15:33:02Z) - Sequencer Level Security [2.756899615600916]
We introduce the Sequencer Level Security (SLS) protocol, an enhancement to sequencing protocols of rollups.
We describe the mechanics of the protocol for both the transactions submitted to the rollup mempool, as well as transactions originating from Layer one.
We implement a prototype of the SLS protocol, Zircuit, which is built on top of Geth and the OP stack.
arXiv Detail & Related papers (2024-05-03T02:47:40Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - Evaluation of Test-Time Adaptation Under Computational Time Constraints [80.40939405129102]
Test Time Adaptation (TTA) methods leverage unlabeled data at test time to adapt to distribution shifts.
Current evaluation protocols overlook the effect of this extra cost, affecting their real-world applicability.
We propose a more realistic evaluation protocol for TTA methods, where data is received in an online fashion from a constant-speed data stream.
arXiv Detail & Related papers (2023-04-10T18:01:47Z) - Communication-Efficient Adam-Type Algorithms for Distributed Data Mining [93.50424502011626]
We propose a class of novel distributed Adam-type algorithms (emphi.e., SketchedAMSGrad) utilizing sketching.
Our new algorithm achieves a fast convergence rate of $O(frac1sqrtnT + frac1(k/d)2 T)$ with the communication cost of $O(k log(d))$ at each iteration.
arXiv Detail & Related papers (2022-10-14T01:42:05Z) - Beta-CROWN: Efficient Bound Propagation with Per-neuron Split
Constraints for Complete and Incomplete Neural Network Verification [151.62491805851107]
We develop $beta$-CROWN, a bound propagation based verifier that can fully encode per-neuron splits.
$beta$-CROWN is close to three orders of magnitude faster than LP-based BaB methods for robustness verification.
By terminating BaB early, our method can also be used for incomplete verification.
arXiv Detail & Related papers (2021-03-11T11:56:54Z) - RouTEE: A Secure Payment Network Routing Hub using Trusted Execution Environments [2.302414737400893]
RouTEE is a secure payment routing hub that is fully feasible without the hub's deposit.
Unlike existing payment networks, RouTEE provides high balance liquidity.
Details about payments are concealed from hosts by leveraging trusted execution environments.
arXiv Detail & Related papers (2020-12-08T07:34:39Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.