Corpus ID: 220845750

JugglingSwap: Scriptless Atomic Cross-Chain Swaps

  title={JugglingSwap: Scriptless Atomic Cross-Chain Swaps},
  author={Omer Shlomovits and Oded Leiba},
The blockchain space is changing constantly. New chains are being implemented frequently with different use cases in mind. As more and more types of crypto assets are getting real world value there is an increasing need for blockchain interoperability. Exchange services today are still dominated by central parties which require custody of funds. This trust imposes costs and security risks as frequent breaches testify. Atomic cross-chain swaps (ACCS) allow mutual distrusting parties to securely… Expand

Figures from this paper

Battlement: A Quorum Based Design for Lightning Network Key Management
The lightning network is a payment channel network on top of bitcoin. It defines a set of protocols and specifications for securely establishing channels between lightning nodes and transmit paymentsExpand
A Survey on Blockchain Interoperability: Past, Present, and Future Trends
A literature review on blockchain interoperability is conducted, by collecting 262 papers, and 70 grey literature documents, constituting a corpus of 332 documents, showing that Blockchain interoperability has a much broader spectrum than cryptocurrencies. Expand


The Arwen Trading Protocols
The Arwen Trading Protocols are layer-two blockchain protocols for traders to securely trade cryptocurrencies at a centralized exchange, without ceding custody of their coins to the exchange, and are designed to work even with the “lowest common denominator” of blockchains. Expand
Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability
This work formally defines anonymous multi-hop locks (AMHLs), a novel cryptographic primitive that serves as a cornerstone for the design of secure and privacy-preserving PCNs and proposes a construction based on ECDSA signatures that does not require scripts, thus solving a prominent open problem in the field. Expand
Flash Boys 2.0: Frontrunning, Transaction Reordering, and Consensus Instability in Decentralized Exchanges
This work highlights the large, complex risks created by transaction-ordering dependencies in smart contracts and the ways in which traditional forms of financial-market exploitation are adapting to and penetrating blockchain economies. Expand
Atomic Cross-Chain Swaps
This work gives an atomic cross-chain swap protocol for D, using a form of hashed timelock contracts, where the vertexes in L generate the hashlocked secrets and it is shown that no such protocol is possible if D is not strongly connected, orIf D is strongly connected but L is not a feedback vertex set. Expand
Tesseract: Real-Time Cryptocurrency Exchange Using Trusted Hardware
Tesseract achieves a best-of-both-worlds design by using a trusted execution environment and supports not only real-time cross-chain cryptocurrency trades, but also secure tokenization of assets pegged to cryptocurrencies. Expand
Escrow Protocols for Cryptocurrencies: How to Buy Physical Goods Using Bitcoin
This work formalizes the escrow problem and presents a suite of schemes with improved security and privacy properties that are compatible with Bitcoin and similar blockchain-based cryptocurrencies. Expand
Compact Multi-Signatures for Smaller Blockchains
The paper gives new constructions that are derived from Schnorr signatures and from BLS signatures that provide new functionality and are designed to reduce the size of the Bitcoin blockchain, but are useful in many other settings where multi-signatures are needed. Expand
Fast Secure Multiparty ECDSA with Practical Distributed Key Generation and Applications to Cryptocurrency Custody
This paper presents the first truly practical full threshold ECDSA signing protocol that has both fast signing and fast key distribution, which solves a years-old open problem, and opens the door to practical uses of threshold E CDSA signing that are in demand today. Expand
Fast Secure Two-Party ECDSA Signing
This paper considers the specific case of two parties (and thus no honest majority) and construct a protocol that is approximately two orders of magnitude faster than the previous best and is proven secure under standard assumptions using a game-based definition. Expand
How to Use Bitcoin to Play Decentralized Poker
This work formalize, generalize, and construct multiparty protocols for the primitive secure cash distribution with penalties, which is dropout-tolerant in the sense that any party that drops out during the protocol is forced to pay a monetary penalty to all other parties. Expand