Nothing Special   »   [go: up one dir, main page]

Skip to main content

Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks

  • Conference paper
  • First Online:
Provable Security (ProvSec 2019)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 11821))

Included in the following conference series:

Abstract

Payment channel networks (PCNs) have been proposed to address the low transaction throughput of the permissionless blockchain protocols. Though the PCNs allow users to have the unlimited number of transactions in the channel without interacting with blockchain, it leaks the entire payment paths to the public. To address the payment path leakage issue, we propose a Chameleon-hash based payment protocol, called Chameleon Hash Time-Lock Contract (CHTLC). Using Chameleon-hash function in a multi-layer fashion guarantees that no user can recover the payment path if at least one intermediate payment node is honest. For the same payment path, compared with Multi-hop Hash Time-Lock Contract (MHTLC) protocol of Malavolta et al. [1], CHTLC is 5 times faster in the payment data initialisation, and the communication bandwidth is reduced significantly from 17, 000 KB to just 7.7 KB.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    For instance, the sender pays the receiver 10 times through the channel, however, the sender may put the first transaction on the chain to invalid the rest of the transactions.

  2. 2.

    The money is locked within this time slot, if \(u_B\) fails to satisfy \(u_A\), the money is refunded to \(u_A\).

References

  1. Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455–471. ACM (2017)

    Google Scholar 

  2. Nakamoto, S., et al.: Bitcoin: a peer-to-peer electronic cash system (2008)

    Google Scholar 

  3. Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Proj. Yellow Pap. 151, 1–32 (2014)

    Google Scholar 

  4. Bitcoin transaction throughput. https://en.wikipedia.org/wiki/Bitcoin_scalability_problem. Accessed on 14 Feb

  5. Bitcoin lightning network. https://en.wikipedia.org/wiki/Lightning_network. Accessed on 14 Feb 2018

  6. Ghosh, A., Mahdian, M., Reeves, D.M., Pennock, D.M., Fugger, R.: Mechanism design on trust networks. In: Deng, X., Graham, F.C. (eds.) WINE 2007. LNCS, vol. 4858, pp. 257–268. Springer, Heidelberg (2007). https://doi.org/10.1007/978-3-540-77105-0_25

    Chapter  Google Scholar 

  7. Stellar protocol. www.stellar.org. Accessed on 14 Feb 2018

  8. Ripple network. https://ripple.com/. Accessed on 14 Feb 2018

  9. Fugger, R.: Money as IOUs in social trust networks & a proposal for a decentralized currency network protocol. Hypertext document, vol. 106 (2004). http://ripple.sourceforge.net

  10. Viswanath, B., Mondal, M., Gummadi, K.P., Mislove, A., Post, A.: Canal: scaling social network-based sybil tolerance schemes. In: Proceedings of the 7th ACM European Conference on Computer Systems, pp. 309–322. ACM (2012)

    Google Scholar 

  11. Miller, A., Bentov, I., Kumaresan, R., McCorry, P.: Sprites: payment channels that go faster than lightning. arXiv preprint arXiv:1702.05812 (2017)

  12. Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M.: SilentWhispers: enforcing security and privacy in credit networks. In: 24th Annual Network and Distributed System Security Symposium, NDSS (2017)

    Google Scholar 

  13. Moreno-Sanchez, P., Kate, A., Maffei, M., Pecina, K.: Privacy preserving payments in credit networks. In: Network and Distributed Security Symposium (2015)

    Google Scholar 

  14. Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: TumbleBit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)

    Google Scholar 

  15. Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3–18. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-21741-3_1

    Chapter  Google Scholar 

  16. Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016)

    Google Scholar 

  17. McCorry, P., Möser, M., Shahandasti, S.F., Hao, F.: Towards bitcoin payment networks. In: Liu, J.K.K., Steinfeld, R. (eds.) ACISP 2016. LNCS, vol. 9722, pp. 57–76. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-40253-6_4

    Chapter  Google Scholar 

  18. Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: off the chain transactions. Cryptology ePrint Archive, Report 2019/360 (2019). https://eprint.iacr.org/2019/360

  19. Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O’Reilly Media Inc., Sebastopol (2014)

    Google Scholar 

  20. Hashed timelock contracts. https://en.bitcoin.it/wiki/Hashed_Timelock_Contracts. Accessed 14 Feb 2018

  21. Tsuchiya, P.F.: The landmark hierarchy: a new hierarchy for routing in very large networks. In: ACM SIGCOMM Computer Communication Review, vol. 18, no. 4, pp. 35–42. ACM (1988)

    Google Scholar 

  22. Prihodko, P., Zhigulin, S., Sahno, M., Ostrovskiy, A., Osuntokun, O.: Flare: an approach to routing in lightning network. White Paper (2016)

    Google Scholar 

  23. Roos, S., Moreno-Sanchez, P., Kate, A., Goldberg, I.: Settling payments fast and private: efficient decentralized routing for path-based transactions. arXiv preprint arXiv:1709.05748 (2017)

  24. Krawczyk, H., Rabin, T.: Chameleon hashing and signatures. IACR Cryptol. ePrint Arch. 1998, 10 (1998)

    Google Scholar 

  25. Attiya, H., Welch, J.: Distributed Computing: Fundamentals, Simulations, and Advanced Topics, vol. 19. Wiley, Hoboken (2004)

    Book  Google Scholar 

  26. Cristian, F., Aghili, H., Strong, R.: Approximate clock synchronization despite omission and performance failures and processor joins. In: Proceedings of the 16th International Symposium on Fault-Tolerant Computing, pp. 218–223 (1986)

    Google Scholar 

  27. Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 2001 IEEE International Conference on Cluster Computing, pp. 136–145. IEEE (2001)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shabnam Kasra Kermanshahi .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Yu, B., Kermanshahi, S.K., Sakzad, A., Nepal, S. (2019). Chameleon Hash Time-Lock Contract for Privacy Preserving Payment Channel Networks. In: Steinfeld, R., Yuen, T. (eds) Provable Security. ProvSec 2019. Lecture Notes in Computer Science(), vol 11821. Springer, Cham. https://doi.org/10.1007/978-3-030-31919-9_18

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-31919-9_18

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-31918-2

  • Online ISBN: 978-3-030-31919-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics