SoK: Layer-Two Blockchain Protocols

被引:148
作者
Gudgeon, Lewis [1 ]
Moreno-Sanchez, Pedro [2 ]
Roos, Stefanie [3 ]
McCorry, Patrick [4 ]
Gervais, Arthur [1 ,5 ,6 ]
机构
[1] Imperial Coll London, London, England
[2] TU Wien, Vienna, Austria
[3] Delft Univ Technol, Delft, Netherlands
[4] PISA Res, London, England
[5] Lucerne Univ Appl Sci & Arts, Luzern, Switzerland
[6] Liquid Network, Zurich, Switzerland
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020 | 2020年 / 12059卷
基金
英国工程与自然科学研究理事会; 奥地利科学基金会;
关键词
Applied cryptography; Blockchain applications; Layer-two blockchain protocols; Blockchain scaling; Cryptocurrency adoption;
D O I
10.1007/978-3-030-51280-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of (layer-one) blockchains, avoid disseminating every transaction to the whole network by exchanging authenticated transactions off-chain. Instead, they utilize the expensive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and protocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated synchronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work.
引用
收藏
页码:201 / 226
页数:26
相关论文
共 115 条
[61]  
Kalodner H, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1353
[62]  
Kappos G, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P463
[63]   Misbehavior in Bitcoin: A Study of Double-Spending and Accountability [J].
Karame, Ghassan O. ;
Androulaki, Elli ;
Roeschlin, Marc ;
Gervais, Arthur ;
Capkun, Srdjan .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (01) :1-32
[64]  
Kelbert F., 2017, ARXIV PREPRINT ARXIV
[65]   Outpost: A Responsive Lightweight Watchtower [J].
Khabbazian, Majid ;
Nadahalli, Tejaswi ;
Wattenhofer, Roger .
AFT'19: PROCEEDINGS OF THE 1ST ACM CONFERENCE ON ADVANCES IN FINANCIAL TECHNOLOGIES, 2019, :31-40
[66]  
Khalil R., 2018, NOCUST A SECURELY SC
[67]   REVIVE: Rebalancing Off-Blockchain Payment Networks [J].
Khalil, Rami ;
Gervais, Arthur .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :439-453
[68]   Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol [J].
Kiayias, Aggelos ;
Russell, Alexander ;
David, Bernardo ;
Oliynykov, Roman .
ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I, 2017, 10401 :357-388
[69]  
Klarman Uri, 2018, bloXroute: A scalable trustless blockchain distribution network whitepaper, V2018
[70]   OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding [J].
Kokoris-Kogias, Eleftherios ;
Jovanovic, Philipp ;
Gasser, Linus ;
Gailly, Nicolas ;
Syta, Ewa ;
Ford, Bryan .
2018 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP), 2018, :583-598