SoK: Layer-Two Blockchain Protocols

被引:131
作者
Gudgeon, Lewis [1 ]
Moreno-Sanchez, Pedro [2 ]
Roos, Stefanie [3 ]
McCorry, Patrick [4 ]
Gervais, Arthur [1 ,5 ,6 ]
机构
[1] Imperial Coll London, London, England
[2] TU Wien, Vienna, Austria
[3] Delft Univ Technol, Delft, Netherlands
[4] PISA Res, London, England
[5] Lucerne Univ Appl Sci & Arts, Luzern, Switzerland
[6] Liquid Network, Zurich, Switzerland
来源
FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, FC 2020 | 2020年 / 12059卷
基金
奥地利科学基金会; 英国工程与自然科学研究理事会;
关键词
Applied cryptography; Blockchain applications; Layer-two blockchain protocols; Blockchain scaling; Cryptocurrency adoption;
D O I
10.1007/978-3-030-51280-4_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Blockchains have the potential to revolutionize markets and services. However, they currently exhibit high latencies and fail to handle transaction loads comparable to those managed by traditional financial systems. Layer-two protocols, built on top of (layer-one) blockchains, avoid disseminating every transaction to the whole network by exchanging authenticated transactions off-chain. Instead, they utilize the expensive and low-rate blockchain only as a recourse for disputes. The promise of layer-two protocols is to complete off-chain transactions in sub-seconds rather than minutes or hours while retaining asset security, reducing fees and allowing blockchains to scale. We systematize the evolution of layer-two protocols over the period from the inception of cryptocurrencies in 2009 until today, structuring the multifaceted body of research on layer-two transactions. Categorizing the research into payment and state channels, commit-chains and protocols for refereed delegation, we provide a comparison of the protocols and their properties. We provide a systematization of the associated synchronization and routing protocols along with their privacy and security aspects. This Systematization of Knowledge (SoK) clears the layer-two fog, highlights the potential of layer-two solutions and identifies their unsolved challenges, indicating propitious avenues of future work.
引用
收藏
页码:201 / 226
页数:26
相关论文
共 115 条
  • [61] Hinteregger A., 2018, ABS181202808 CORR
  • [62] Intel, 2019, Intel Software Guard Extensions | Intel Software
  • [63] Joleman J., 2018, COUNTERFACTUAL GEN S
  • [64] Kalodner H, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P1353
  • [65] Kappos G, 2018, PROCEEDINGS OF THE 27TH USENIX SECURITY SYMPOSIUM, P463
  • [66] Misbehavior in Bitcoin: A Study of Double-Spending and Accountability
    Karame, Ghassan O.
    Androulaki, Elli
    Roeschlin, Marc
    Gervais, Arthur
    Capkun, Srdjan
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2015, 18 (01) : 1 - 32
  • [67] Kelbert F., 2017, ARXIV PREPRINT ARXIV
  • [68] Outpost: A Responsive Lightweight Watchtower
    Khabbazian, Majid
    Nadahalli, Tejaswi
    Wattenhofer, Roger
    [J]. AFT'19: PROCEEDINGS OF THE 1ST ACM CONFERENCE ON ADVANCES IN FINANCIAL TECHNOLOGIES, 2019, : 31 - 40
  • [69] Khalil R., 2018, NOCUST A SECURELY SC
  • [70] REVIVE: Rebalancing Off-Blockchain Payment Networks
    Khalil, Rami
    Gervais, Arthur
    [J]. CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, : 439 - 453