Abstract
The Arwen Trading Protocols are layer-two blockchain protocols for traders to securely trade cryptocurrencies at a centralized exchange, without ceding custody of their coins to the exchange. Before trading begins, traders deposit their coins in an on-blockchain escrow where the agent of escrow is the blockchain itself. Each trade is backed by the coins locked in escrow. Each trade is fast, because it happens off-blockchain, and secure, because atomic swaps prevent even a hacked exchange from taking custody of a trader’s coins. Arwen is designed to work even with the “lowest common denominator” of blockchains—namely Bitcoin-derived coins without SegWit support. As a result, Arwen supports essentially all “Bitcoin-derived” coins e.g., BTC, LTC, BCH, ZEC, as well as Ethereum. Our protocols support Limit and RFQ order types, we implemented our RFQ protocol and it is available for use at arwen.io.
Major contributions to the design of these protocols were made by James Dalessandro, Ezequiel Gomes Perez, Haydn Kennedy, Yuval Marcus, Chet Powers, Omar Sagga, Aleksander Skjolsvik and Scott Sigel.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Etherdelta. https://etherdelta.com/
KuCoin: Download arwen to trade on KuCoin directly from your wallet. https://www.kucoin.com/page/arwen
Lightning daemon (LND). https://github.com/lightningnetwork/lnd
Raiden network. https://raiden.network/
Sparkswap. https://sparkswap.com/
Komodo. White paper, 3 June 2018
Baldwin, C.: Bitcoin worth \$72 million stolen from Bitfinex exchange in Hong Kong. Reuters, 3 August 2016
Barber, S., Boyen, X., Shi, E., Uzun, E.: Bitter to better—how to make bitcoin a better currency. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 399–414. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_29
Bloomberg. CoincheckHack: How to Steal \$500 Million in Cryptocurrency. Fortune, 31 January 2018
Buterin, V.: Bitfloor Hacked, \$250,000 Missing. Bitcoin Magazine, 5 September 2012
Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3–18. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21741-3_1
DeMartino, I.: Mintpal hacked ‘considerable amount’ of vericoin stolen. Cointelegraph, 13 July 2014
Eskandari, S., Moosavi, S., Clark, J.: SoK: transparent dishonesty: front-running attacks on blockchain. In: Bracciali, A., Clark, J., Pintore, F., Rønne, P.B., Sala, M. (eds.) FC 2019. LNCS, vol. 11599, pp. 170–189. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-43725-1_13
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 3–16. ACM (2016)
Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 473–489. ACM (2017)
Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)
Heilman, E., Lipmann, S., Goldberg, S.: The arwen trade protocols (full version). IACR Cryptology ePrint Archive (2020)
Higgins, S.: Details of 5 Million Bitstamp Hack Revealed. Coindesk, 1 July 2015
Higgins, S.: Cryptsy threatens bankruptcy, claims millions lost in bitcoin heist. Coindesk, 15 January 2016
Higgins, S.: Bitcoin exchange youbit to declare bankruptcy after hack. Coindesk, 19 December 2017
Khalil, R., Gervais, A.: NOCUST-A Non-Custodial 2nd-Layer Financial Intermediary. IACR Cryptology ePrint Archive (2018)
Kraken. How long do digital assets/cryptocurrency deposits take?
Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. In: Network and Distributed System Security Symposium (NDSS) (2019)
Maxwell, G.: CoinSwap:Transaction graph disjoint trustless trading. Bitcoin-talk (2013)
McCorry, P., Bakshi, S., Bentov, I., Miller, A., Meiklejohn, S.: Pisa: arbitration outsourcing for state channels. IACR Cryptology ePrint Archive (2018)
McCorry, P., Heilman, E., Miller, A.: Atomically trading with roger: gambling on the success of a hardfork. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) ESORICS/DPM/CBT -2017. LNCS, vol. 10436, pp. 334–353. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0_19
Morris, D.Z.: BitGrailCryptocurrency Exchange Claims \$195 Million Lost to Hackers. Coindesk, 11 February 2018
Möser, M., Eyal, I., Gün Sirer, E.: Bitcoin covenants. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 126–141. Springer, Heidelberg (2016). https://doi.org/10.1007/978-3-662-53357-4_9
Narula, N.: The Importance of Layer 2, 27 May 2018
Keep Network. tBTC A Decentralized Redeemable BTC-backed ERC-20 Token (2019)
Pagnia, H., Gärtner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, TTUD-BS-1999-02, Darmstadt University of Technology (1999)
Poelstra, A.: Scriptless Scripts (2018)
Poon, J., Buterin, V.: Plasma: scalable autonomous smart contracts (2017)
Poon, J., Dryja, T.: The bitcoin lightning network (2016)
Prestwich, J.: Summa.One: Cross-chain Auctions via Bitcoin Double Spends (2018)
Rizzo, P.: Poloniex Loses 12.3% of its Bitcoins in Latest Bitcoin Exchange Hack. Coindesk, 5 March 2014
Russell, J.: Korean crypto exchange coinrail loses over \$40m in tokens following a hack. Techcrunch, 10 June 2018
Spilman, J.: [bitcoin-development] anti dos for tx replacement, 20 April 2013
Teutsch, J., Reitwießner, C.: A scalable verification solution for blockchains (2017)
TierNolan. Re: Alt chains and atomic transfers. Bitcoin-talk, 21 May 2013
Warren, W.: Front-running, Griefing and the Perils of Virtual Settlement (2017)
Wikipedia. Mt. Gox
Zamyatin, A., Harz, D., Lind, J., Panayiotou, P., Gervais, A., Knottenbelt, W.: XCLAIM: trustless, interoperable, cryptocurrency-backed assets. In: IEEE Security and Privacy. IEEE (2019)
Zhao, W.: Crypto exchange zaif hacked in \$60 million bitcoin theft. Coindesk, 20 September 2018
Acknowledgements
The authors would like to thank Underscore VC, Digital Garage, Notation, United Bitcoiners, Highland Capital Partners, and the Cybersecurity Factory for their support of Arwen. We also acknowledge Patrick McCorry, Ben Jones, David Vorick and our anonymous reviewers for their valuable feedback.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 International Financial Cryptography Association
About this paper
Cite this paper
Heilman, E., Lipmann, S., Goldberg, S. (2020). The Arwen Trading Protocols. In: Bonneau, J., Heninger, N. (eds) Financial Cryptography and Data Security. FC 2020. Lecture Notes in Computer Science(), vol 12059. Springer, Cham. https://doi.org/10.1007/978-3-030-51280-4_10
Download citation
DOI: https://doi.org/10.1007/978-3-030-51280-4_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-51279-8
Online ISBN: 978-3-030-51280-4
eBook Packages: Computer ScienceComputer Science (R0)