Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network
Abstract
References
Index Terms
- Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network
Recommendations
Securing Lightning Channels against Rational Miners
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPayment channel networks (e.g., the Lightning Network in Bitcoin) constitute one of the most popular scalability solutions for blockchains. Their safety relies on parties being online to detect fraud attempts on-chain and being able to timely react by ...
Cerberus Channels: Incentivizing Watchtowers for Bitcoin
Financial Cryptography and Data SecurityAbstractBitcoin and similar blockchain systems have a limited transaction throughput because each transaction must be processed by all parties, on-chain. Payment channels relieve the blockchain by allowing parties to execute transactions off-chain while ...
Suborn Channels: Incentives Against Timelock Bribes
Financial Cryptography and Data SecurityAbstractAs the Bitcoin mining landscape becomes more competitive, analyzing potential attacks under the assumption of rational miners becomes increasingly relevant. In the rational setting, blockchain users can bribe miners to reap an unfair benefit. ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chairs:
- Bo Luo,
- Xiaojing Liao,
- Jun Xu,
- Program Chairs:
- Engin Kirda,
- David Lie
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Badges
Author Tags
Qualifiers
- Research-article
Funding Sources
- National Sciecne Foundation
Conference
Acceptance Rates
Upcoming Conference
- Sponsor:
- sigsac
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 112Total Downloads
- Downloads (Last 12 months)112
- Downloads (Last 6 weeks)112
Other Metrics
Citations
View Options
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in