SoK: Layer-Two Blockchain Protocols

被引:131
作者
Gudgeon, Lewis [1 ]
Moreno-Sanchez, Pedro [2 ]
Roos, Stefanie [3 ]
McCorry, Patrick [4 ]
Gervais, Arthur [1 ,5 ,6 ]
机构
[1] Imperial Coll London, London, England
[2] TU Wien, Vienna, Austria
[3] Delft Univ Technol, Delft, Netherlands
[4] PISA Res, London, England
[5] Lucerne Univ Appl Sci & Arts, Luzern, Switzerland
[6] Liquid Network, Zurich, Switzerland
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020 | 2020年 / 12059卷
基金
奥地利科学基金会; 英国工程与自然科学研究理事会;
关键词
Applied cryptography; Blockchain applications; Layer-two blockchain protocols; Blockchain scaling; Cryptocurrency adoption;
D O I
10.1007/978-3-030-51280-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of (layer-one) blockchains, avoid disseminating every transaction to the whole network by exchanging authenticated transactions off-chain. Instead, they utilize the expensive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and protocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated synchronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work.
引用
收藏
页码:201 / 226
页数:26
相关论文
共 115 条
  • [101] Prihodko P., 2016, Flare: An Approach to Routing in Lightning Network
  • [102] Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks
    Rohrer, Elias
    Malliaris, Julian
    Tschorsch, Florian
    [J]. 2019 4TH IEEE EUROPEAN SYMPOSIUM ON SECURITY AND PRIVACY WORKSHOPS (EUROS&PW), 2019, : 347 - 356
  • [103] Roos S., 2018, SETTLING PAYMENTS FA
  • [104] Routing Cryptocurrency with the Spider Network
    Sivaraman, Vibhaalakshmi
    Venkatakrishnan, Shaileshh Bojja
    Alizadeh, Mohammad
    Fanti, Giulia
    Viswanath, Pramod
    [J]. HOTNETS-XVII: PROCEEDINGS OF THE 2018 ACM WORKSHOP ON HOT TOPICS IN NETWORKS, 2018, : 29 - 35
  • [105] Sompolinsky Y., 2016, IACR Cryptol. ePrint Arch., V2016, P1159
  • [106] Sompolinsky Y., 2013, IACR Cryptology ePrint Archive 2013, V2013
  • [107] Sunshine C. A., 1977, ACM SIGCOMM Comput. Commun. Rev., V7, P29, DOI [10.1145/1024853.1024855, DOI 10.1145/1024853.1024855]
  • [108] Tairi E., 2019, IACR CRYPTOLOGY EPRI
  • [109] Teutsch Jason., SCALABLE VERIFICATIO
  • [110] VISA, 2015, VIS INC GLANC