Cross-Layer Deanonymization Methods in the Lightning Protocol

@inproceedings{Romiti2021CrossLayerDM,
  title={Cross-Layer Deanonymization Methods in the Lightning Protocol},
  author={Matteo Romiti and Friedhelm Victor and Pedro A. Moreno-Sanchez and Bernhard Haslhofer and Matteo Maffei},
  booktitle={Financial Cryptography},
  year={2021}
}
Payment channel networks (PCNs) have emerged as a promising alternative to mitigate the scalability issues inherent to cryptocurrencies like Bitcoin and are often assumed to improve privacy, as payments are not stored on chain. However, a systematic analysis of possible deanonymization attacks is still missing. In this paper, we focus on the Bitcoin Lightning Network (LN), which is the most widespread implementation of PCNs to date. We present clustering heuristics that group Bitcoin addresses… Expand
Fundamental Properties of the Layer Below a Payment Channel Network (Extended Version)
TLDR
This work uncouple payment channel networks from blockchains and looks at them as first-class citizens and shows that the stronger property provided by blockchains allows for optimizations that can be used to reduce the time for locking collateral during payments over multiple hops in a payment channel network. Expand
An Empirical Analysis of Privacy in the Lightning Network
TLDR
This paper presents three main attacks that exploit publicly available information about the network topology and its active nodes and channels in order to learn information that is designed to be kept secret, such as how many coins a node has available to spend or who the sender and recipient are in a payment routed through the network. Expand
Analysis and Probing of Parallel Channels in the Lightning Network
TLDR
This work proposes a new model of the LN that accounts for parallel and unidirectional channels, which has not been done in prior work, and implements the first probing-focused LN simulator and suggests several countermeasures against general probing. Expand
GraphSense: A General-Purpose Cryptoasset Analytics Platform
TLDR
By providing a growing set of open-source components, GraphSense could ultimately become an instrument for scientific investigations in academia and a possible response to emerging compliance and regulation challenges for businesses and organizations dealing with cryptoassets. Expand

References

SHOWING 1-10 OF 28 REFERENCES
SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies
TLDR
This work relates several existing off-chain channel methods, also known as payment and state channels, channel network constructions methods, and other components as channel and network management protocols, e.g., routing nodes to a taxonomy for all the components of the Layer-2. Expand
An Empirical Analysis of Privacy in the Lightning Network
TLDR
This paper presents three main attacks that exploit publicly available information about the network topology and its active nodes and channels in order to learn information that is designed to be kept secret, such as how many coins a node has available to spend or who the sender and recipient are in a payment routed through the network. Expand
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
TLDR
This work formally defines anonymous multi-hop locks (AMHLs), a novel cryptographic primitive that serves as a cornerstone for the design of secure and privacy-preserving PCNs and proposes a construction based on ECDSA signatures that does not require scripts, thus solving a prominent open problem in the field. Expand
Topological Analysis of Bitcoin's Lightning Network
TLDR
This paper quantifies the structural properties of LN and argues that LN's current topological properties can be ameliorated in order to improve the security of Ln, enabling it to reach its true potential. Expand
Address Clustering Heuristics for Ethereum
TLDR
This paper shows how addresses can be clustered in Ethereum, yielding entities that are likely in control of multiple addresses, and proposes heuristics that exploit patterns related to deposit addresses, multiple participation in airdrops and token authorization mechanisms. Expand
The evolving topology of the Lightning Network: Centralization, efficiency, robustness, synchronization, and anonymity
TLDR
This work analyses the evolution of the LN during its first year of existence to assess its impact over some of the core fundamentals of Bitcoin, such as: node centralization, resilience against attacks and disruptions, anonymity of users, autonomous coordination of its members. Expand
Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks
TLDR
This paper analyze the Lightning Network's PCN topology and investigates its resilience towards random failures and targeted attacks, and develops a series of strategies for targeted attacks and introduces metrics that allow us to quantify the adversary's advantage. Expand
An Analysis of Anonymity in the Bitcoin System
TLDR
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity. Expand
Concurrency and Privacy with Payment-Channel Networks
TLDR
This work lays the foundations for privacy and concurrency in PCNs, presenting a formal definition in the Universal Composability framework as well as practical and provably secure solutions. Expand
A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems
TLDR
This survey presents guidelines for designing an anonymity/privacy improvement and discusses future research directions, and examines the studies in the literature/Web in two major categories: analyses of anonymity and privacy in Bitcoin and extensions and alternatives to Bitcoin, which improve anonymity and Privacy. Expand
...
1
2
3
...