SoK: Layer-Two Blockchain Protocols

被引:148
作者
Gudgeon, Lewis [1 ]
Moreno-Sanchez, Pedro [2 ]
Roos, Stefanie [3 ]
McCorry, Patrick [4 ]
Gervais, Arthur [1 ,5 ,6 ]
机构
[1] Imperial Coll London, London, England
[2] TU Wien, Vienna, Austria
[3] Delft Univ Technol, Delft, Netherlands
[4] PISA Res, London, England
[5] Lucerne Univ Appl Sci & Arts, Luzern, Switzerland
[6] Liquid Network, Zurich, Switzerland
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020 | 2020年 / 12059卷
基金
英国工程与自然科学研究理事会; 奥地利科学基金会;
关键词
Applied cryptography; Blockchain applications; Layer-two blockchain protocols; Blockchain scaling; Cryptocurrency adoption;
D O I
10.1007/978-3-030-51280-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of (layer-one) blockchains, avoid disseminating every transaction to the whole network by exchanging authenticated transactions off-chain. Instead, they utilize the expensive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and protocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated synchronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work.
引用
收藏
页码:201 / 226
页数:26
相关论文
共 115 条
[101]  
Prihodko P., 2016, FLARE APPROACH ROUTI, P144
[102]   Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks [J].
Rohrer, Elias ;
Malliaris, Julian ;
Tschorsch, Florian .
2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, :347-356
[103]  
Roos S., 2018, SETTLING PAYMENTS FA
[104]   Routing Cryptocurrency with the Spider Network [J].
Sivaraman, Vibhaalakshmi ;
Venkatakrishnan, Shaileshh Bojja ;
Alizadeh, Mohammad ;
Fanti, Giulia ;
Viswanath, Pramod .
HOTNETS-XVII: PROCEEDINGS OF THE 2018 ACM WORKSHOP ON HOT TOPICS IN NETWORKS, 2018, :29-35
[105]  
Sompolinsky Y., 2016, IACR CRYPTOL, V2016, P1159
[106]  
Sompolinsky Y., 2013, CRYPTOLOGY EPRINT AR, V2013, P881
[107]  
Sunshine Carl A, 1977, Comput. Commun. Rev., V7, P29, DOI DOI 10.1145/1024853.1024855
[108]  
Tairi E., 2019, Report 2019/589
[109]  
Teutsch Jason., SCALABLE VERIFICATIO
[110]  
VISA, 2015, VIS INC GLANC