Route discovery in private payment channel networks
Download
No fulltext has been uploaded. References only!
Conference Paper
| Published
| English
Scopus indexed
Author
Avarikioti, Zeta;
Bastankhah, Mahsa;
Maddah-Ali, Mohammad Ali;
Pietrzak, Krzysztof ZISTA
;
Svoboda, JakubISTA
;
Yeo, Michelle XISTA 



Department
Series Title
LNCS
Abstract
In this work, we explore route discovery in private payment channel networks. We first determine what “ideal" privacy for a routing protocol means in this setting. We observe that protocols achieving this strong privacy definition exist by leveraging Multi-Party Computation but they are inherently inefficient as they must involve the entire network. We then present protocols with weaker privacy guarantees but much better efficiency (involving only a small fraction of the nodes). The core idea is that both sender and receiver gossip a message which propagates through the network, and the moment any node in the network receives both messages, a path is found. In our first protocol the message is always sent to all neighbouring nodes with a delay proportional to the fees of that edge. In our second protocol the message is only sent to one neighbour chosen randomly with a probability proportional to its degree. We additionally propose a more realistic notion of privacy in order to measure the privacy leakage of our protocols in practice. Our realistic notion of privacy challenges an adversary that join the network with a fixed budget to create channels to guess the sender and receiver of a transaction upon receiving messages from our protocols. Simulations of our protocols on the Lightning network topology (for random transactions and uniform fees) show that 1) forming edges with high degree nodes is a more effective attack strategy for the adversary, 2) there is a tradeoff between the number of nodes involved in our protocols (privacy) and the optimality of the discovered path, and 3) our protocols involve a very small fraction of the network on average.
Publishing Year
Date Published
2025-04-01
Proceedings Title
Computer Security. ESORICS 2024 International Workshops
Publisher
Springer Nature
Acknowledgement
This work was supported in part by the ERC CoG 863818 (ForM-SMArt), Austrian Science Fund (FWF) 10.55776/COE12, and MOE-T2EP20122-0014 (Data-Driven Distributed Algorithms) grants.
Volume
15263
Page
207-223
Conference
ESORICS: European Symposium on Research in Computer Security
Conference Location
Bydgoszcz, Poland
Conference Date
2024-09-16 – 2024-09-20
ISBN
ISSN
eISSN
IST-REx-ID