Payment Channel Networks for Blockchain-based Cryptocurrencies: - - PowerPoint PPT Presentation

payment channel networks for blockchain based
SMART_READER_LITE
LIVE PREVIEW

Payment Channel Networks for Blockchain-based Cryptocurrencies: - - PowerPoint PPT Presentation

Payment Channel Networks for Blockchain-based Cryptocurrencies: Why, What and How? Guoliang Xue Arizona State University Outlines The Whys for cryptocurrency and PCN The What for PCN The Hows for PCN From W to


slide-1
SLIDE 1

Payment Channel Networks for Blockchain-based Cryptocurrencies: Why, What and How?

Guoliang Xue Arizona State University

slide-2
SLIDE 2

Outlines

2

The “Why”s for cryptocurrency and PCN The “What” for PCN The “How”s for PCN From “W” to “C”: Conclusions

slide-3
SLIDE 3

A Little Bit of History of Money

3 9000 BC

Bartering

2000 BC

Cowry Shells

1000 BC

Metallic Money

1000 AC

Paper Money

2008

Cryptocurrencies

Fig 1: https://urbantips.wordpress.com/2012/04/03/im-bringing-back-the-barter-system/ Fig 2: https://www.moneymuseum.com/en/coins/lead-currencies?&id=884 Others are noncommercially reusable based on Google Images

slide-4
SLIDE 4

Why is money evolving?

4 9000 BC

Bartering

2000 BC

Cowry Shells

1000 BC

Metallic Money

1000 AC

Paper Money

2008

Cryptocurrencies

Fig 1: https://urbantips.wordpress.com/2012/04/03/im-bringing-back-the-barter-system/ Fig 2: https://www.moneymuseum.com/en/coins/lead-currencies?&id=884 Others are noncommercially reusable based on Google Images

Convenient and Durable (storage, transport) Durable, Rare, Unforgeable Convenient and Flexible Cost-efficient Convenient, Inflation-resistant, Secure, Unforgeable, …

slide-5
SLIDE 5

Why digital cash / cryptocurrencies?

  • Modern assets have already been digitized
  • Online accounts, credit cards, online stocks / futures / options, …
  • Need fast & convenient & inexpensive way for global payment
  • Traditional bank settlement: typically 1-3 days, transaction fees
  • Universal accessibility / 7/24 finance
  • Fear of inflation
  • Fear of loss due to market crash / government manipulation / freezing /

human error / forged paper bills / identity theft / …

  • Anonymity / untraceability

5

slide-6
SLIDE 6

Cryptocurrency = Crypto + Currency

Components:

  • Transaction / scripting protocol
  • How transactions are broadcast and stored.
  • How scripts / smart contracts are programmed.
  • Consensus algorithm
  • Achieve global consensus on the set of accepted transactions.
  • Incentive mechanism
  • How to (economically) encourage active and honest validation.

6

A digital asset designed to work as a medium of exchange that uses cryptography (blockchain) to secure its transactions. [Wikipedia]

slide-7
SLIDE 7

Example: Bitcoin

A chain of blocks, each has a set of transactions and a header with:

  • Hash of the previous block, a timestamp,
  • Merkle root of all associated (validated) transactions, and
  • A Proof-of-Work, i.e., the nonce.
  • Proof-of-Work (Consensus): Hash( block_hdr ) <= 0x0000xxxxxxxxxxxx
  • Cannot be solved efficiently.
  • The only way is exhaustive search, in other words, mining!
  • Difficulty (RHS) can be tuned based on history generation rate, s.t., ~10 min per block.
  • Incentive: each block grants miner block reward (bitcoins), and each

associated transaction gives (optional) tips (transaction fees).

7

slide-8
SLIDE 8

Limitations of Cryptocurrencies

  • However, why are we still not using cryptocurrencies today?
  • Complaint 1: Bitcoin transfer is too slow!
  • ~10 min per block 6 confirmations (blocks) = ~ 1 hour settlement.
  • Complaint 2: Bitcoin has a high transaction fee!
  • Peak fee at around $55 per transaction (to confirm in 6 blocks)1.
  • Complaint 3: Bitcoin does not scale!
  • Block size: max 1MB
  • Tx size: ~ 250 Byte
  • 4000 tx / 10 min => 7 tx per sec (tps), globally!
  • Comparison: VISA supports 45,000 peak tps.

8

1. https://bitinfocharts.com/comparison/bitcoin-transactionfees.html

slide-9
SLIDE 9

Existing Scalability Solutions

  • On-chain solutions:
  • Increase block size
  • Directly increasing scalability
  • Centralization, less incentive, limited improvement, hard fork
  • Sharding: horizontal partitioning
  • Scalability improvement
  • Expensive cross-shard comm., protocol complexity, lower per-shard security, hard fork
  • Proof-of-Stake (or other lightweight consensus)
  • Low energy footprint/cost, highly scalable, fast txs, negates 51% attacks
  • Monopoly problem (centralization), poor stay poor, hard fork
  • Off-chain solutions:
  • Segwit: moving bulky signature data to parallel chain
  • Scalability improvement
  • Sidechain security (lack of incentive), protocol complexity, hard fork
  • Pegged sidechains / parallel chains / Plasma (tree of chains)
  • Great scalability improvement, bridging different chains
  • Lower per-chain security, need inter-chain comms.
  • Payment Channel Network (PCN)

9

slide-10
SLIDE 10

The Blockchain Scalability Trilemma

10

1A blockchain system can satisfy at most two of the following three properties:

  • Decentralization: each participant only has access to O(c) resources.
  • Scalability: system is able to process Ω(n) > O(c) transactions.
  • Security: secure against attackers with up to O(n) resources.

1. https://github.com/ethereum/wiki/wiki/Sharding-FAQ

Not proved yet!

slide-11
SLIDE 11

Why PCN will prevail?

  • Reason 1: PCN is almost totally off-chain.
  • Can circumvent the scalability trilemma to some extent.
  • Eliminates most on-chain operations by taking transactions off-chain.
  • Does not require hard-fork (thus leaving the whole community as a whole).
  • Reason 2: PCN has almost the same security as the main chain.
  • Follows the same security assumptions from the main chain.
  • Blockchain used as arbitration to prevent dishonest behaviors.
  • Does not reduce main chain security.
  • Reason 3: PCN drastically reduces settlement time and transaction fee.
  • Local settlement, no costly global consensus required.
  • Reason 4: PCN can support cross-chain atomic swaps1.
  • Some potential problems:
  • Fund locking, possible centralization (not known yet), always-on requirement.

11

1. https://lightning.network/

slide-12
SLIDE 12

PCN is (Almost) Production-Ready

  • Two leading forerunners in the industry
  • Bitcoin Lightning Network1:
  • Alpha release in Jan, 2017; currently in Beta.
  • Jan 20, 2018: first known purchase through the Lightning Network
  • Development efforts from multiple different groups
  • Mar 20, 2018: first DDoS attack, taking ~200 nodes offline.
  • Current status3: 2111 nodes, 7351 channels, network capacity 18.569 BTC ($178k)
  • Ethereum Raiden Network / uRaiden:
  • uRaiden launched on Ethereum mainnet in Nov, 2017.
  • Currently only supports unidirectional channels and single-hop payments.
  • Yet it gives rise to new challenges that shall be tackled!
  • Payment Routing
  • Privacy and Security / DoS-resistance
  • Economics

12

1. https://en.wikipedia.org/wiki/Lightning_Network 2. https://www.cointelligence.com/content/first-purchase-via-bitcoins-lightning- network-just-happened/ 3. https://1ml.com/ as of May 3, 2018

quick, easy, painless, and most importantly: instantaneous and fee-free!2

More on these later…

slide-13
SLIDE 13

Outlines

13

The “Why”s for cryptocurrency and PCN The “What” for PCN The “How”s for PCN From “W” to “C”: Conclusions

slide-14
SLIDE 14

Precursor: Credit Network

  • Built upon credit channels among banks and corporations.
  • Originates in economics, extended to make payments w/ blockchain.
  • How it works:
  • Users specify trusted peers and amounts
  • A payment is a path of trust from sender to recipient

14

Trust

slide-15
SLIDE 15

Precursor: Credit Network

  • Built upon credit channels among banks and corporations.
  • Originates in economics, extended to make payments w/ blockchain.
  • What if trust is violated?

15

Trust Loss

Local loss: one link’s default will not spread loss to other nodes.

slide-16
SLIDE 16

Removing Trust from CN

  • CN is most suitable for bank-bank or bank-user scenarios.
  • Low fees, fast settlements
  • Need of trust and resolution of local losses (nothing-at-stake)
  • Cannot scale to global P2P payment scenario
  • Locked fund (stake)
  • Multi-signature smart contracts
  • Blockchain

16

I do not trust anyone! I cannot afford any loss! Decreasing Time-Locks

  • r

Revocable Sequence Maturity Contract (RSMC) Remove Trust

Credit Channel Payment Channel

slide-17
SLIDE 17

Payment Channel via Decreasing Time-Lock

17

Bob Alice 1 BTC 0.5 BTC Alice and Bob Multi-sig Channel 1.5 BTC

nLockTime = 30 days Signed by Alice

Alice Return Addr 1 BTC

nLockTime = 30 days Signed by Bob

Alice 0.6 BTC Bob 0.9 BTC

Tx: Alice -> Bob (0.4 BTC)

nLockTime = 29 days Signed by Alice

Bob Return Addr 0.5 BTC Alice 0.9 BTC Bob 0.6 BTC

nLockTime = 28 days Signed by Bob

Tx: Bob -> Alice (0.3 BTC)

slide-18
SLIDE 18

Payment Game with Decreasing Time-Lock

  • If both Alice and Bob play honestly:
  • Initial funds distributed via on-chain transaction (Channel Opening).
  • Each time of a payment, both parties sign to update balance

(generate new Commitment transaction pairs).

  • At/Near time of expiration (smallest nLockTime), both parties publish

newest transactions to blockchain (Channel Closing).

  • If Bob wants to hack (steal Alice’s fund):
  • Bob publishes an old transaction where he has higher fund.
  • Alice sees Bob’s misbehavior, and immediately publishes the newest

transaction signed by Bob.

  • Since Alice’s transaction has earlier nLockTime, it will become valid

before Bob’s transaction, hence invalidating Bob’s transaction.

18

slide-19
SLIDE 19

RSMC

  • Issue with Decreasing Time-Lock:
  • Each payment decreases channel expiration time.
  • No punishment of misbehavior.
  • Revocable Sequence Maturity Contract (RSMC):
  • Each Commitment transaction comes with an unsigned Remedy

transaction that grants all funds to counterparty.

  • Commitment has a sequence requirement of 1000; Remedy has 0.
  • Remedy needs signature of both parties to work.
  • Each new Commitment invalidates previous Commitments by both

parties handing signing keys for previous Remedys to the other.

  • When old Commitment is published by one party, it will be invalidated

by the other party publishing the corresponding Remedy.

  • Does not reduce channel expiration.
  • Punishment of misbehavior by granting all funds to counterparty.

19

slide-20
SLIDE 20

The Multi-hop Problem & HTLC

  • Trust issue in multi-hop scenario
  • Solution: Hash Timelock Contract (HTLC)
  • Hash Lock
  • Time Lock

20

1 BTC Alice Dave Bob Carol 1 BTC 1 BTC 1 BTC Let me just keep this…

slide-21
SLIDE 21

The Multi-hop Problem & HTLC

  • Trust issue in multi-hop scenario
  • Hash Lock contract:

∗ Each node cannot spend payment without giving R that generates H.

  • 1. Dave generates random R and hash H = H(R), and send H to Alice.
  • 2. Alice sends payment and H, requesting for R; each node forwards.
  • 3. Dave replies R upon receiving payment; each node forwards.

21

Alice Dave Bob Carol H R

H

1 BTC

H

1 BTC

H

1 BTC

R R R

H

slide-22
SLIDE 22

The Multi-hop Problem & HTLC

  • Trust issue in multi-hop scenario
  • Issue: Dave can wait until some previous channel to expire.
  • Time Lock contract:
  • Refund w/ decreasing nLockTime per hop, ensuring no defaulters.
  • Not providing R within nLockTime refunds to transferor
  • HTLC (Hashed Timelock Contract) = Hash Lock + Time Lock

22

Alice Dave Bob Carol H R

H

1 BTC

H

1 BTC

H

1 BTC

R R R

H

n L

  • c

k T i m e = 2 d a y s nLockTime = 15 days nLockTime = 10 days

slide-23
SLIDE 23

Payment Channel Network

  • A network of users and RSMC+HTLC-guaranteed channels.

23

Fig: Hosp, Julian, “Three Technical Requirements to Connect Blockchains Without a Token,” https://blog.tenx.tech/three-technical-requirements-to-connect-blockchains- without-a-token-98d693084849

slide-24
SLIDE 24

Benefits of PCN

  • Risk-free
  • Fund security ensured by crypto protocols / smart contracts.
  • No trust placed on anyone (except for performance issues).
  • (Almost) have the same security as the blockchain itself.
  • No coin loss unless blockchain 51% attacks; DoS.
  • Off-chain transactions (blockchain scalability)
  • The only operations involving blockchain are Open, Close and Dispute.
  • Fast settlement
  • Local settlement without global confirmations; support for real-time apps.
  • Low fees
  • Low cost of transactions; support for micropayments.
  • Cross-chain/currency compatibility
  • Intermediate nodes play as exchanges; P2P exchanging.

24

slide-25
SLIDE 25

Outlines

25

The “Why”s for cryptocurrency and PCN The “What” for PCN The “How”s for PCN From “W” to “C”: Conclusions

slide-26
SLIDE 26

PCN Challenges Overview

  • PCN is still in its infancy
  • Payment Routing
  • Finding paths for payments
  • Privacy and Security (other than risk-freeness)
  • Privacy-preservation can be harder than blockchain
  • DDoS or routing blockage attacks
  • Economics
  • Incentivization: PCN as an investment vehicle

26

slide-27
SLIDE 27

Problem 1: Routing

  • Finding a path/multiple paths from sender to recipient, s.t.:
  • A successful HTLC can be established on any path.
  • Meaning the expiration time of each channel needs to be satisfied.
  • Sufficient balance presents in the joint of all paths.
  • Other requirements:
  • Real-time: user-specified payment deadline
  • Exchange: go through specific exchange nodes

27

Alice Dave Bob Carol

n L

  • c

k T i m e = 2 d a y s nLockTime = 15 days nLockTime = 10 days E x p r = 3 d a y s B a l = 1 . 5 B T C Expr = 10 days Bal = 1 BTC Expr = 20 days Bal = 0.8 BTC

1 BTC

slide-28
SLIDE 28

Formulating the Routing Problem

  • For payment (s, t, val, st, dl) in PCN G = (V, E).
  • be: channel balance (directional).
  • de, de1, de2: total, forward and backward delay of a channel.
  • pe+: downstream segment of path p from edge e.
  • expr(e): channel expiration time.

28

find (s, t)-path set P and balances vp s.t. X

p∈P vp ≥ val;

X

p∈P :e∈p vp ≤ be,

∀e ∈ E; X

e∈p de ≤ dl − st,

∀p ∈ P; X

e∈p d1 e +

X

e∈p+

ε d2

e ≤ expr(ε) − st,

∀p ∈ P, ∀ε ∈ p.

<latexit sha1_base64="HhbKLhi04NUgDSGk9Q17Du+3ZV0=">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</latexit><latexit sha1_base64="HhbKLhi04NUgDSGk9Q17Du+3ZV0=">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</latexit><latexit sha1_base64="HhbKLhi04NUgDSGk9Q17Du+3ZV0=">ADwXicjVLbtNAEN3YXEq4pfDIy4gIlNLWcvLC7YGKi8RjkAitFKfWej1Jl67Xy+46amT5J3mCv2GdmBJSWjGSpaMzc87MjidRghsbhj9bn/t+o2bW7fat+/cvXe/s/3gi8kLzXDEcpHro4QaFziyHIr8EhpFki8DA5fVfnD+eoDc/lZ7tQOMnoTPIpZ9Q6Kt5u/YgSnHFZUsFn8lnVjiye2XLKZVoBPI2+FTSFntmzO6vEvqL2BAxaqIYrBqhMIaGCSoYGqnmsAKo8TGBDf74RKbIpkLnFr4lJBxCUMK6g10QxhTsVrJ72y+hXgEqhGJhCSGPeg0UxzTYVoaj5c7nZuksa4NEkF7IOxm0ZN1/8xOu47q91L8se7cTSnGpXhIpd19aBpjGdK9ZyO1fNsXdOrClWHYJ6SjT38y7nTDIFwGXAT9BnRJE8O48z1Kc1ZkKC0T1JhxP1R2UlJtORPoLqMwqCg7pTMcOyhphmZSLk+wgieOScHN5j5pYcmuK0qaGbPIEleZuQsym7ma/FduXNjpi0nJpSosSrZqNC0E2Bzqe4aUa2RWLBygTHM3K7ATqimz7urbgn9zSdfBKNB8DIPw26B2+bWyR+Qx6ZE+eU4OyEcyJCPCvDcetL/f+V1/5elXqtRrNQ/JX+OUvwKYyWA=</latexit>
slide-29
SLIDE 29

Is Routing Hard?

  • Theory: the problem is NP-hard if multiple paths allowed.
  • Multi-Path routing with Bandwidth and Delay constraints (MPBD)
  • - Proved to be NP-hard [Misra2009b]
  • Practice:
  • Fully-distributed algorithm needed
  • No cryptocurrency user would trust any central authority, even for

routing!

  • Dynamic network environment
  • Each transaction changes channel balances!
  • Unpredictable load across the network!
  • Nodes may join/leave, or go offline/online at any time!
  • Concurrency issue
  • Non-blockingness required for simultaneous payments!
  • Goodput, efficiency, reliability, privacy, DoS-resiliency, …

29

slide-30
SLIDE 30

States-of-the-Art Routing

  • In practice:
  • Bitcoin Lightning network: BGP-like protocol1
  • Non-adaptive, no privacy, best-effort and no concurrency
  • Ethereum Raiden network: best-effort guessing2
  • Not exactly routing…
  • In development:
  • Max-flow / Push-Relabel [Rohrer2017]
  • High goodput, concurrent
  • High overhead, does not scale, HTLC-agnostic
  • Prefix routing + landmark routing [Moreno-sanchez2015, Malavolta2017a, Roos2018]
  • Privacy-preserving, concurrent
  • Semi-distributed, non-adaptive, limited paths, HTLC-agnostic
  • Hybrid proactive + reactive routing with beacons [Prihodko2016]
  • Best-effort, privacy-agnostic

30

  • 1. https://bitcoin.stackexchange.com/questions/43687/how-are-paths-found-in-

lightning-network

  • 2. http://raiden-network.readthedocs.io/en/stable/spec.html#transfer-routing
slide-31
SLIDE 31

A Search-based Routing Algorithm /1

  • Ford-Fulkerson augmenting path algorithm
  • Issue:
  • Not distributed.
  • Augmenting path is delay-agnostic.
  • Does not support multiple simultaneous routing requests.

31

slide-32
SLIDE 32

A Search-based Routing Algorithm /2

  • Ford-Fulkerson augmenting path algorithm
  • Issues:
  • Not distributed.
  • Augmenting path is delay-agnostic.
  • Does not support multiple simultaneous routing requests.
  • Solutions:
  • Distributed BFS for augmenting path finding.
  • Delay-feasible augmenting path only.
  • Probe-and-Reservation: balance reservation and locking at the time
  • f routing.

32

slide-33
SLIDE 33

Algorithm 1: CoinExpress: Algorithm Overview

1 Initialize empty flow f and residual graph Gf = G; 2 while b(f) < a do 3

Sender: for each neighbor channel e, send probe (R, β, δ, p) where β = min{val, bf

e}, δ = d1 e, p = (e); 4

Intm.: upon probe, update and send to each neighbor e where β = min{β, bf

e}, δ = δ + d1 e, p = p + (e); 5

Recip.: select probe with max β and send back conf (R, β, δ, p);

6

Intm.: upon conf, find next hop e and last hop elast in p, first let δ = δ + d2

e, then check: 1) bf e ≥ β, and 2) δ ≤ min{expr(e), dl} − st;

if both checks pass then reserve β on e, and send conf to elast; else reply cancel along p to cancel all reservations on p;

7

Sender: upon conf, record path p and β and update f and Gf

e; 8

Recip.: upon cancel, select a new probe and repeat from Line 5;

<latexit sha1_base64="g8iq2/1gotWg2kKifHdt2pK1DM=">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</latexit><latexit sha1_base64="g8iq2/1gotWg2kKifHdt2pK1DM=">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</latexit><latexit sha1_base64="g8iq2/1gotWg2kKifHdt2pK1DM=">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</latexit>

A Search-based Routing Algorithm /3

33 Forward balance probing phase Backward checking and balance reservation phase Cancel and retry

slide-34
SLIDE 34

A Search-based Routing Algorithm /4

  • Residual flow update
  • If there is a single flow:
  • Concurrency issue: another flow may steal the reserved flow.
  • If f(v,u) > 0, another flow along (u,v) may use it, which is not guaranteed

if later on the current flow cancels f(v,u) via another augmenting path.

  • Balance locking: each node keeps per-flow state fR(u,v).
  • Each node can only use its own residual flow on the reverse direction.

34

bf

u,v(R) = bu,v −

X

R0

fR0(u, v) + fR(v, u)

<latexit sha1_base64="dpF7tnpoUzUq9KTb0LbfrlcdcU=">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</latexit><latexit sha1_base64="dpF7tnpoUzUq9KTb0LbfrlcdcU=">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</latexit><latexit sha1_base64="dpF7tnpoUzUq9KTb0LbfrlcdcU=">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</latexit>

bf

u,v = bu,v − f(u, v) + f(v, u)

<latexit sha1_base64="zJdO0EUuRW/JS4uMhCmcpI3wJyY=">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</latexit><latexit sha1_base64="zJdO0EUuRW/JS4uMhCmcpI3wJyY=">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</latexit><latexit sha1_base64="zJdO0EUuRW/JS4uMhCmcpI3wJyY=">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</latexit>
slide-35
SLIDE 35

A Search-based Routing Algorithm /5

  • Some simulation results

35

CnExp-W: CoinExpress with widest path selection CnExp-S: CoinExpress with shortest path selection PR-D: Push-Relabel with delay-based path pruning [Rohrer2017] PR-A: Push-Relabel without delay (infeasible paths) [Rohrer2017] WP: Single widest path | SP: Single shortest path

slide-36
SLIDE 36

Some Other Good Directions on Routing

  • QoS routing
  • Similarities: time & bandwidth constraints
  • Existing work: approximation [Xue2008, Misra2009b], distributed [Chen1999]
  • Challenges: adaptivity, concurrency, QoS privacy
  • Routing in WSN/MANET, P2P routing
  • Similarities: distributed & dynamic
  • Existing work: reactive [Johnson1996, Perkins2003], proactive [Rowstron2001],
  • pportunistic [Biswas2005]
  • Challenges: balance adaptivity, QoS, concurrency, privacy
  • Bandwidth provisioning / traffic steering
  • Similarities: bandwidth sharing and guarantee
  • Existing work: centralized algorithms [Duan2003]
  • Challenges: distributed and adaptive algorithm design, QoS, privacy

36

slide-37
SLIDE 37

Problem 2: Privacy and Security

  • Sensitive information:
  • Identities: sender, recipient
  • Locations: sender, recipient, intermediate (path)
  • Relations: sender-recipient, sender/recipient-transaction,
  • Content: value, start / deadline
  • States / Side-channels: balance, load / queuing delay, path
  • Is protecting privacy hard?
  • Much of the information is needed in the payment process
  • Value, balance, path (next-hops)
  • Compared to on-chain solutions:
  • On-chain: protects source/target/amount, but not time [Ben-Sasson2014];

incurs global overhead (discouraging verification, lowers overall security)

  • PCN: network structural exposes more information; local overhead

37

slide-38
SLIDE 38

Possible Approaches: Routing

  • Onion Routing [Osuntokun2017]
  • Layered encryption that reveals only next hop at each node.
  • Long studied, well adopted, but vulnerable to certain attacks.
  • GPA: global passive adversary
  • Byzantine: arbitrary subset of malicious nodes
  • Mix-Nets
  • Mixing nodes permute groups of messages before forwarding.
  • Protects against GPA and Byzantine;
  • Large overhead, long latency.
  • Due to the need for waiting or

generation for mix messages.

  • Verifiable permutation.

38

Fig 1: Wikipedia, https://en.wikipedia.org/wiki/Onion_routing Fig 2: A. M. Piotrowska, J. Hayes, T. Elahi, K. U. Leuven, S. Meiser, G. Danezis, A. M. Piotrowska, J. Hayes, S. Meiser, and G. Danezis, “The Loopix Anonymity System,” in Proc. USENIX Security, 2017.

slide-39
SLIDE 39

Possible Approaches: Payment

  • Multi-hop HTLC [Malavolta2017]
  • Sender-receiver anonymity, (off-path) value privacy
  • Negative result: trade-off between concurrency & privacy
  • Not really, if we can solve concurrency through routing!
  • Similar to Onion Routing and Sphinx [Danezis2009]: once we obtain a

circuit, anonymous communications become easy…

  • More efforts needed to provide better privacy:
  • GPA / Byzantine
  • Sender, recipient
  • On-path value
  • Time

39

slide-40
SLIDE 40

PCN Security

  • PCN security assumptions:
  • Blockchain is secure and accessible (for dispute)
  • Local node is securely functional (secure storage and computation)
  • Possible security breaches:
  • Any attack that applies to the blockchain itself
  • 51% attacks, large-scale routing attacks (network partition), DoS, …
  • Network attacks
  • Blockchain accessibility: blocks disputing
  • Blocking communication between users / DoS: cause loss to honest users
  • Breaching network traffic security
  • Possible solutions:
  • Secure & anonymous communications between nodes
  • Reliable network traffic routing
  • Group paying: multi-party channels
  • As long as one node is live, the payment goes on
  • Requires intensive work on multi-party smart contracts and overhead

40

slide-41
SLIDE 41

Problem 3: The Economics Perspective

  • Why do people use PCN?
  • I want fast payment from/to someone in the network…
  • I want to invest and expand my retirement account…
  • In Bitcoin/Ethereum/…, if you want to invest:
  • Coin speculation… you may be leek-cut ()
  • Run a miner node and collect tips/gas/…
  • In PCN:
  • Open up a channel with some congested node and put your money.
  • Or you can open up multiple to bridge multiple congested nodes.
  • Wait until channel expires, then collect your fees.
  • A light client is sufficient.

41

slide-42
SLIDE 42

More on PCN Investment

  • A fairly risk-free investment
  • Fully self-involved.
  • Your fund is safely protected by crypto (and your network)!
  • You need minimal resources other than your investment
  • An all-time running PC, a reliable network, and a few megabytes
  • Bitcoin miner node: expensive GPU/ASIC, 167 GB space (growing)
  • No risk of market manipulation and/or bank bankruptcy.
  • A few notes for possible investors
  • Secure your wallet J
  • Keep the machine and network running at all times

42

slide-43
SLIDE 43

How PCN Economics Work?

  • Perspective 1: strategic investment
  • Based on loads, node decides investment strategy
  • Select channel peers that yield the best gains
  • Best allocation of investment among channels
  • Normal node / Exchange node
  • Investment based on empirical data / past returns
  • Group investment
  • Perspective 2: incentive mechanism
  • User strategy: decide values and select routes with minimum fees.
  • Node strategy: decide fees and select requests with maximum gains.
  • Possible models:
  • Stochastic game: user demands are unknown
  • Stackelberg game: network decides mechanism, user follows
  • Auction: single/double auction, user selection and payment decision

43

slide-44
SLIDE 44

Outlines

44

The “Why”s for cryptocurrency and PCN The “What” for PCN The “How”s for PCN From “W” to “C”: Conclusions

slide-45
SLIDE 45

Will cryptocurrencies/PCN survive?

  • We’ve heard a lot of buzzes.
  • But, they solve real-world problems!
  • Blooming research and development efforts.
  • Blockchain on Google Scholar:

45

  • Bitcoin is a hype.
  • Too much bubble.
  • Mining wastes energy.
  • There is no value in Bitcoin.
  • They won’t work when

quantum computer comes.

  • Lightning network will not work.
  • It will become centralized.
  • No one would open a channel.
  • Routing is hard.
  • Why not use XRP/RSK/sidechain…
  • When the bubble comes down.
  • Centralization / manipulability.
  • Inflation.
  • Traceability.
  • Insecurity.
  • Fast and cheap micropayments.
  • Blockchain scalability.
  • Inter-currency exchange.

2015 2016 2017 1000+ 3000+ 8000+

slide-46
SLIDE 46

Conclusions

  • Why we need PCN?
  • Blockchain scalability, high fee, high settlement latency.
  • Existing solutions compromises security for scalability.
  • What is PCN?
  • Network of smart contract-based trustless payment channels.
  • Security ensured by cryptographic methods.
  • Almost the same level of security as blockchain itself.
  • How PCN could evolve?
  • Distributed adaptive routing.
  • Privacy preserving routing and payment.
  • Economics to encourage participation / increase performance.
  • A lot of interesting and challenges problems ahead!

46

slide-47
SLIDE 47

Thank you very much!

Q&A?

47

slide-48
SLIDE 48

References /1

  • [Ben-Sasson2014] E. Ben Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, and M. Virza,

“Zerocash: Decentralized Anonymous Payments from Bitcoin,” in Proc. IEEE S&P, 2014, pp. 459–474.

  • [Biswas2005] S. Z. Biswas, “Opportunistic Routing in Multi-Hop Wireless Networks,” MSc Thesis, 2005.
  • [Chen1999] S. Chen and K. Nahrstedt, “Distributed quality-of-service routing in ad hoc networks,” IEEE J. Sel.

Areas Commun., vol. 17, no. 8, pp. 1488–1505, 1999.

  • [Danezis2009] G. Danezis and I. Goldberg, “Sphinx: A Compact and Provably Secure Mix Format,” in Proc. IEEE

S&P, 2009, pp. 269–282.

  • [Duan2003] Z. Duan, Z.-L. Zhang, and Y. T. Hou, “Service overlay networks: slas, qos, and bandwidth

provisioning,” IEEE/ACM Trans. Netw., vol. 11, no. 6, pp. 870–883, Dec. 2003.

  • [Johnson1996] D. B. Johnson and D. A. Maltz, “Dynamic Source Routing in Ad Hoc Wireless Networks,” Mob.

Comput., vol. 353, pp. 153–181, 1996.

  • [Malavolta2017] G. Malavolta, P. Moreno-Sanchez, A. Kate, M. Maffei, and S. Ravi, “Concurrency and Privacy

with Payment-Channel Networks,” in Proc. ACM CCS, 2017, pp. 455–471.

  • [Malavolta2017a] G. Malavolta, P. Moreno-Sanchez, A. Kate, and M. Maffei, “SilentWhispers: Enforcing Security

and Privacy in Decentralized Credit Networks,” in Proc. ISOC NDSS, 2017.

  • [Misra2009b] S. Misra, G. Xue, and D. Yang, “Polynomial Time Approximations for Multi-Path Routing with

Bandwidth and Delay Constraints,” in Proc. IEEE INFOCOM, 2009, pp. 558–566.

  • [Moreno-sanchez2015] P. Moreno-Sanchez, A. Kate, M. Maffei, and K. Pecina, “Privacy Preserving Payments in

Credit Networks: Enabling trust with privacy in online marketplaces,” in Proc. ISOC NDSS, 2015, pp. 8–11.

48

slide-49
SLIDE 49

References /2

  • [Osuntokun2017] L. Osuntokun, “Security Analysis of the Lightning Network.” 2017.
  • [Perkins2003] C. Perkins, E. Belding-Royer, and S. Das, “Ad hoc on-demand distance vector (AODV) routing,”

IETF RFC 3561, 2003.

  • [Prihodko2016] P. Prihodko, S. Zhigulin, M. Sahno, and A. Ostrovskiy, “Flare: An Approach to Routing in

Lightning Network (White Paper),” 2016.

  • [Rohrer2017] E. Rohrer, J.-F. Laß, and F. Tschorsch, “Towards a Concurrent and Distributed Route Selection for

Payment Channel Networks,” in Proc. of Cryptocurrencies and Blockchain Technology (CBT), 2017, pp. 411– 419.

  • [Roos2018] S. Roos, P. Moreno-Sanchez, A. Kate, and I. Goldberg, “Settling Payments Fast and Private:

Efficient Decentralized Routing for Path-Based Transactions,” in Proc. ISOC NDSS, 2018.

  • [Rowstron2001] A. Rowstron and P. Druschel, “Pastry: Scalable, Decentralized Object Location, and Routing for

Large-Scale Peer-to-Peer Systems,” in Proc. IFIP/ACM Middleware, 2001, pp. 329–350.

  • [Xue2007] G. Xue, A. Sen, W. Zhang, J. Tang, and K. Thulasiraman, “Finding a Path Subject to Many Additive

QoS Constraints,” IEEE/ACM Trans. Netw., vol. 15, no. 1, pp. 201–211, Feb. 2007.

  • [Xue2008] G. Xue, W. Zhang, J. Tang, and K. Thulasiraman, “Polynomial Time Approximation Algorithms for

Multi-Constrained QoS Routing,” IEEE/ACM Trans. Netw., vol. 16, no. 3, pp. 656–669, Jun. 2008.

  • [Yu2018] R. Yu, G. Xue, V. T. Kilari, D. Yang, and J. Tang, “CoinExpress: A Fast Payment Routing Mechanism in

Blockchain-based Payment Channel Networks,” to appear in IEEE ICCCN, 2018.

49