[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

The Arwen Trading Protocols

  • Conference paper
  • First Online:
Financial Cryptography and Data Security (FC 2020)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 12059))

Included in the following conference series:

Abstract

The Arwen Trading Protocols are layer-two blockchain protocols for traders to securely trade cryptocurrencies at a centralized exchange, without ceding custody of their coins to the exchange. Before trading begins, traders deposit their coins in an on-blockchain escrow where the agent of escrow is the blockchain itself. Each trade is backed by the coins locked in escrow. Each trade is fast, because it happens off-blockchain, and secure, because atomic swaps prevent even a hacked exchange from taking custody of a trader’s coins. Arwen is designed to work even with the “lowest common denominator” of blockchains—namely Bitcoin-derived coins without SegWit support. As a result, Arwen supports essentially all “Bitcoin-derived” coins e.g., BTC, LTC, BCH, ZEC, as well as Ethereum. Our protocols support Limit and RFQ order types, we implemented our RFQ protocol and it is available for use at arwen.io.

Major contributions to the design of these protocols were made by James Dalessandro, Ezequiel Gomes Perez, Haydn Kennedy, Yuval Marcus, Chet Powers, Omar Sagga, Aleksander Skjolsvik and Scott Sigel.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
£29.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
GBP 19.95
Price includes VAT (United Kingdom)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
GBP 71.50
Price includes VAT (United Kingdom)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
GBP 89.99
Price includes VAT (United Kingdom)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    github.com/cwcrypto/arwen-eth-contracts github.com/cwcrypto/arwen-btc-scripts.

References

  1. Etherdelta. https://etherdelta.com/

  2. KuCoin: Download arwen to trade on KuCoin directly from your wallet. https://www.kucoin.com/page/arwen

  3. Lightning daemon (LND). https://github.com/lightningnetwork/lnd

  4. Raiden network. https://raiden.network/

  5. Sparkswap. https://sparkswap.com/

  6. Komodo. White paper, 3 June 2018

    Google Scholar 

  7. Baldwin, C.: Bitcoin worth \$72 million stolen from Bitfinex exchange in Hong Kong. Reuters, 3 August 2016

    Google Scholar 

  8. Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better—how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_29

    Chapter  Google Scholar 

  9. Bloomberg. CoincheckHack: How to Steal \$500 Million in Cryptocurrency. Fortune, 31 January 2018

  10. Buterin, V.: Bitfloor Hacked, \$250,000 Missing. Bitcoin Magazine, 5 September 2012

  11. Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3–18. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21741-3_1

    Chapter  Google Scholar 

  12. DeMartino, I.: Mintpal hacked ‘considerable amount’ of vericoin stolen. Cointelegraph, 13 July 2014

    Google Scholar 

  13. Eskandari, S., Moosavi, S., Clark, J.: SoK: transparent dishonesty: front-running attacks on blockchain. In: Bracciali, A., Clark, J., Pintore, F., Rønne, P.B., Sala, M. (eds.) FC 2019. LNCS, vol. 11599, pp. 170–189. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43725-1_13

    Chapter  Google Scholar 

  14. Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 3–16. ACM (2016)

    Google Scholar 

  15. Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 473–489. ACM (2017)

    Google Scholar 

  16. Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)

    Google Scholar 

  17. Heilman, E., Lipmann, S., Goldberg, S.: The arwen trade protocols (full version). IACR Cryptology ePrint Archive (2020)

    Google Scholar 

  18. Higgins, S.: Details of 5 Million Bitstamp Hack Revealed. Coindesk, 1 July 2015

  19. Higgins, S.: Cryptsy threatens bankruptcy, claims millions lost in bitcoin heist. Coindesk, 15 January 2016

    Google Scholar 

  20. Higgins, S.: Bitcoin exchange youbit to declare bankruptcy after hack. Coindesk, 19 December 2017

    Google Scholar 

  21. Khalil, R., Gervais, A.: NOCUST-A Non-Custodial 2nd-Layer Financial Intermediary. IACR Cryptology ePrint Archive (2018)

  22. Kraken. How long do digital assets/cryptocurrency deposits take?

  23. Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. In: Network and Distributed System Security Symposium (NDSS) (2019)

  24. Maxwell, G.: CoinSwap:Transaction graph disjoint trustless trading. Bitcoin-talk (2013)

  25. McCorry, P., Bakshi, S., Bentov, I., Miller, A., Meiklejohn, S.: Pisa: arbitration outsourcing for state channels. IACR Cryptology ePrint Archive (2018)

    Google Scholar 

  26. McCorry, P., Heilman, E., Miller, A.: Atomically trading with roger: gambling on the success of a hardfork. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) ESORICS/DPM/CBT -2017. LNCS, vol. 10436, pp. 334–353. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0_19

    Chapter  Google Scholar 

  27. Morris, D.Z.: BitGrailCryptocurrency Exchange Claims \$195 Million Lost to Hackers. Coindesk, 11 February 2018

  28. Möser, M., Eyal, I., Gün Sirer, E.: Bitcoin covenants. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 126–141. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_9

    Chapter  Google Scholar 

  29. Narula, N.: The Importance of Layer 2, 27 May 2018

  30. Keep Network. tBTC A Decentralized Redeemable BTC-backed ERC-20 Token (2019)

  31. Pagnia, H., Gärtner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, TTUD-BS-1999-02, Darmstadt University of Technology (1999)

    Google Scholar 

  32. Poelstra, A.: Scriptless Scripts (2018)

  33. Poon, J., Buterin, V.: Plasma: scalable autonomous smart contracts (2017)

    Google Scholar 

  34. Poon, J., Dryja, T.: The bitcoin lightning network (2016)

    Google Scholar 

  35. Prestwich, J.: Summa.One: Cross-chain Auctions via Bitcoin Double Spends (2018)

  36. Rizzo, P.: Poloniex Loses 12.3% of its Bitcoins in Latest Bitcoin Exchange Hack. Coindesk, 5 March 2014

  37. Russell, J.: Korean crypto exchange coinrail loses over \$40m in tokens following a hack. Techcrunch, 10 June 2018

    Google Scholar 

  38. Spilman, J.: [bitcoin-development] anti dos for tx replacement, 20 April 2013

    Google Scholar 

  39. Teutsch, J., Reitwießner, C.: A scalable verification solution for blockchains (2017)

  40. TierNolan. Re: Alt chains and atomic transfers. Bitcoin-talk, 21 May 2013

  41. Warren, W.: Front-running, Griefing and the Perils of Virtual Settlement (2017)

  42. Wikipedia. Mt. Gox

  43. Zamyatin, A., Harz, D., Lind, J., Panayiotou, P., Gervais, A., Knottenbelt, W.: XCLAIM: trustless, interoperable, cryptocurrency-backed assets. In: IEEE Security and Privacy. IEEE (2019)

    Google Scholar 

  44. Zhao, W.: Crypto exchange zaif hacked in \$60 million bitcoin theft. Coindesk, 20 September 2018

    Google Scholar 

Download references

Acknowledgements

The authors would like to thank Underscore VC, Digital Garage, Notation, United Bitcoiners, Highland Capital Partners, and the Cybersecurity Factory for their support of Arwen. We also acknowledge Patrick McCorry, Ben Jones, David Vorick and our anonymous reviewers for their valuable feedback.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ethan Heilman .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 International Financial Cryptography Association

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Heilman, E., Lipmann, S., Goldberg, S. (2020). The Arwen Trading Protocols. In: Bonneau, J., Heninger, N. (eds) Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science(), vol 12059. Springer, Cham. https://doi.org/10.1007/978-3-030-51280-4_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-51280-4_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-51279-8

  • Online ISBN: 978-3-030-51280-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics