Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1007/978-3-030-51280-4_10guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The Arwen Trading Protocols

Published: 10 February 2020 Publication History

Abstract

The Arwen Trading Protocols are layer-two blockchain protocols for traders to securely trade cryptocurrencies at a centralized exchange, without ceding custody of their coins to the exchange. Before trading begins, traders deposit their coins in an on-blockchain escrow where the agent of escrow is the blockchain itself. Each trade is backed by the coins locked in escrow. Each trade is fast, because it happens off-blockchain, and secure, because atomic swaps prevent even a hacked exchange from taking custody of a trader’s coins. Arwen is designed to work even with the “lowest common denominator” of blockchains—namely Bitcoin-derived coins without SegWit support. As a result, Arwen supports essentially all “Bitcoin-derived” coins e.g., BTC, LTC, BCH, ZEC, as well as Ethereum. Our protocols support Limit and RFQ order types, we implemented our RFQ protocol and it is available for use at arwen.io.

References

[2]
KuCoin: Download arwen to trade on KuCoin directly from your wallet. https://www.kucoin.com/page/arwen
[6]
Komodo. White paper, 3 June 2018
[7]
Baldwin, C.: Bitcoin worth \$72 million stolen from Bitfinex exchange in Hong Kong. Reuters, 3 August 2016
[8]
Barber S, Boyen X, Shi E, and Uzun E Keromytis AD Bitter to better—how to make bitcoin a better currency Financial Cryptography and Data Security 2012 Heidelberg Springer 399-414
[10]
Buterin, V.: Bitfloor Hacked, \$250,000 Missing. Bitcoin Magazine, 5 September 2012
[11]
Decker C and Wattenhofer R Pelc A and Schwarzmann AA A fast and scalable payment network with bitcoin duplex micropayment channels Stabilization, Safety, and Security of Distributed Systems 2015 Cham Springer 3-18
[12]
DeMartino, I.: Mintpal hacked ‘considerable amount’ of vericoin stolen. Cointelegraph, 13 July 2014
[13]
Eskandari S, Moosavi S, and Clark J Bracciali A, Clark J, Pintore F, Rønne PB, and Sala M SoK: transparent dishonesty: front-running attacks on blockchain Financial Cryptography and Data Security 2020 Cham Springer 170-189
[14]
Gervais, A., Karame, G.O., Wüst, K., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp 3–16. ACM (2016)
[15]
Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 473–489. ACM (2017)
[16]
Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium (2017)
[17]
Heilman, E., Lipmann, S., Goldberg, S.: The arwen trade protocols (full version). IACR Cryptology ePrint Archive (2020)
[18]
[19]
Higgins, S.: Cryptsy threatens bankruptcy, claims millions lost in bitcoin heist. Coindesk, 15 January 2016
[20]
Higgins, S.: Bitcoin exchange youbit to declare bankruptcy after hack. Coindesk, 19 December 2017
[21]
Khalil, R., Gervais, A.: NOCUST-A Non-Custodial 2nd-Layer Financial Intermediary. IACR Cryptology ePrint Archive (2018)
[23]
Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. In: Network and Distributed System Security Symposium (NDSS) (2019)
[25]
McCorry, P., Bakshi, S., Bentov, I., Miller, A., Meiklejohn, S.: Pisa: arbitration outsourcing for state channels. IACR Cryptology ePrint Archive (2018)
[26]
McCorry P, Heilman E, and Miller A Garcia-Alfaro J, Navarro-Arribas G, Hartenstein H, and Herrera-Joancomartí J Atomically trading with roger: gambling on the success of a hardfork Data Privacy Management, Cryptocurrencies and Blockchain Technology 2017 Cham Springer 334-353
[28]
Möser M, Eyal I, and Gün Sirer E Clark J, Meiklejohn S, Ryan PYA, Wallach D, Brenner M, and Rohloff K Bitcoin covenants Financial Cryptography and Data Security 2016 Heidelberg Springer 126-141
[29]
[31]
Pagnia, H., Gärtner, F.C.: On the impossibility of fair exchange without a trusted third party. Technical report, TTUD-BS-1999-02, Darmstadt University of Technology (1999)
[32]
[33]
Poon, J., Buterin, V.: Plasma: scalable autonomous smart contracts (2017)
[34]
Poon, J., Dryja, T.: The bitcoin lightning network (2016)
[37]
Russell, J.: Korean crypto exchange coinrail loses over \$40m in tokens following a hack. Techcrunch, 10 June 2018
[38]
Spilman, J.: [bitcoin-development] anti dos for tx replacement, 20 April 2013
[39]
[40]
TierNolan. Re: Alt chains and atomic transfers. Bitcoin-talk, 21 May 2013
[42]
[43]
Zamyatin, A., Harz, D., Lind, J., Panayiotou, P., Gervais, A., Knottenbelt, W.: XCLAIM: trustless, interoperable, cryptocurrency-backed assets. In: IEEE Security and Privacy. IEEE (2019)
[44]
Zhao, W.: Crypto exchange zaif hacked in \$60 million bitcoin theft. Coindesk, 20 September 2018

Cited By

View all
  • (2023)Invited Paper: Fault-tolerant and Expressive Cross-Chain SwapsProceedings of the 24th International Conference on Distributed Computing and Networking10.1145/3571306.3571388(28-37)Online publication date: 4-Jan-2023
  • (2023)Unlinkability and Interoperability in Account-Based Universal Payment ChannelsFinancial Cryptography and Data Security. FC 2023 International Workshops10.1007/978-3-031-48806-1_24(367-384)Online publication date: 1-May-2023
  • (2021)Anonymous SidechainsData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-030-93944-1_17(262-277)Online publication date: 8-Oct-2021

Index Terms

  1. The Arwen Trading Protocols
    Index terms have been assigned to the content through auto-classification.

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    Financial Cryptography and Data Security: 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers
    Feb 2020
    688 pages
    ISBN:978-3-030-51279-8
    DOI:10.1007/978-3-030-51280-4

    Publisher

    Springer-Verlag

    Berlin, Heidelberg

    Publication History

    Published: 10 February 2020

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 16 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Invited Paper: Fault-tolerant and Expressive Cross-Chain SwapsProceedings of the 24th International Conference on Distributed Computing and Networking10.1145/3571306.3571388(28-37)Online publication date: 4-Jan-2023
    • (2023)Unlinkability and Interoperability in Account-Based Universal Payment ChannelsFinancial Cryptography and Data Security. FC 2023 International Workshops10.1007/978-3-031-48806-1_24(367-384)Online publication date: 1-May-2023
    • (2021)Anonymous SidechainsData Privacy Management, Cryptocurrencies and Blockchain Technology10.1007/978-3-030-93944-1_17(262-277)Online publication date: 8-Oct-2021

    View Options

    View options

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media