论文标题
面对对手,优化虚拟支付渠道建立
Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries
论文作者
论文摘要
支付渠道网络(PCN)是无许可区块链中可扩展性问题的最有希望的解决方案之一,允许各方通过付款渠道(PC)互相支付链接。但是,路由交易的成本与中介人数量成正比,因为每个中介都收取路由服务费用。此外,与其他网络相似,支付路径中的恶意中介可能会导致安全和隐私威胁。虚拟通道(VCS),即PC路径上的桥接,减轻上述PCN问题,因为中介只参与一次设置VC,然后将以后的每个VC交易排除在外。但是,与PC类似,创建VC的成本必须从桥接PC的余额中支付。目前,我们缺少指导到何处和要设置多少个VC的准则。理想情况下,VC应最大程度地减少交易成本,同时减轻对手的安全性和隐私威胁。 在这项工作中,我们首次解决VC设置问题,将其形式化为优化问题。我们提出了一个整数线性程序(ILP),以在交易成本,安全性和隐私方面计算全球最佳的VC设置策略。然后,我们使用快速的本地贪婪算法陪同计算重的ILP。我们的模型和算法可以与任何路面对手一起使用,因为它的策略可以表达为诚实节点估计的一组损坏的节点。我们对基于比特币最大的PCN的快照(LN)的快照进行了对贪婪算法的评估。我们的结果证实了现实世界中的数据,我们的贪婪策略可以最大程度地减少成本,同时保护对手的安全和隐私威胁。这些发现可以为LN社区作为VC部署的指南。
Payment channel networks (PCNs) are among the most promising solutions to the scalability issues in permissionless blockchains, by allowing parties to pay each other off-chain through a path of payment channels (PCs). However, routing transactions comes at a cost which is proportional to the number of intermediaries, since each charges a fee for the routing service. Furthermore, analogous to other networks, malicious intermediaries in the payment path can lead to security and privacy threats. Virtual channels (VCs), i.e., bridges over PC paths, mitigate the above PCN issues, as an intermediary participates only once to set up the VC and is then excluded from every future VC transaction. However, similar to PCs, creating a VC has a cost that must be paid out of the bridged PCs' balance. Currently, we are missing guidelines to where and how many VCs to set up. Ideally, VCs should minimize transaction costs while mitigating security and privacy threats from on-path adversaries. In this work, we address for the first time the VC setup problem, formalizing it as an optimization problem. We present an integer linear program (ILP) to compute the globally optimal VC setup strategy in terms of transaction costs, security, and privacy. We then accompany the computationally heavy ILP with a fast local greedy algorithm. Our model and algorithms can be used with any on-path adversary, given that its strategy can be expressed as a set of corrupted nodes that is estimated by the honest nodes. We conduct an evaluation of the greedy algorithm over a snapshot of the Lightning Network (LN), the largest Bitcoin-based PCN. Our results confirm on real-world data that our greedy strategy minimizes costs while protecting against security and privacy threats of on-path adversaries. These findings may serve the LN community as guidelines for the deployment of VCs.