n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks
In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriate...
Gespeichert in:
Veröffentlicht in: | Computers & security 2021-07, Vol.106, p.102291, Article 102291 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | 102291 |
container_title | Computers & security |
container_volume | 106 |
creator | Mohanty, Susil Kumar Tripathy, Somanath |
description | In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead. |
doi_str_mv | 10.1016/j.cose.2021.102291 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2549288592</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404821001152</els_id><sourcerecordid>2549288592</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wFPA89Yk-5UVL1LUCote6jmks7Nutt2kJqnSf-_WevY0MDzvO8NDyDVnM854cdvPwAWcCSb4uBCi4idkwmUpkkIweUomI1QmGcvkObkIoWeMl4WUE4I2WSzr-R19RUc7HTpsaDQDJrWDNQU3DCYOaCONjjbYom2o_tDGhki_nR86t0GqY9QjbCzd6v0vDJ22FjfUYhypdbgkZ63eBLz6m1Py_vS4nC-S-u35Zf5QJ5AKGZNWY8sBgHEUPGcMJGCeZ6s2F5XWWKx0VZScp6u2aSSkIGXFgFVpKfNMVhlLp-Tm2Lv17nOHIare7bwdTyqRZ5WQMq_ESIkjBd6F4LFVW28G7feKM3XQqXp10KkOOtVR5xi6P4Zw_P_LoFcBDFrAxniEqBpn_ov_AM--fjc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2549288592</pqid></control><display><type>article</type><title>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Mohanty, Susil Kumar ; Tripathy, Somanath</creator><creatorcontrib>Mohanty, Susil Kumar ; Tripathy, Somanath</creatorcontrib><description>In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2021.102291</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Anonymity ; Blockchain ; Cryptography ; Digital currencies ; Format ; Hashed time-lock contract (HTLC) ; Payment channel network (PCN) ; Privacy ; Protocol ; Scalability ; Security ; Wormhole attack</subject><ispartof>Computers & security, 2021-07, Vol.106, p.102291, Article 102291</ispartof><rights>2021 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Jul 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</citedby><cites>FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</cites><orcidid>0000-0002-8643-5501 ; 0000-0002-6964-2648</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2021.102291$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Mohanty, Susil Kumar</creatorcontrib><creatorcontrib>Tripathy, Somanath</creatorcontrib><title>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</title><title>Computers & security</title><description>In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.</description><subject>Anonymity</subject><subject>Blockchain</subject><subject>Cryptography</subject><subject>Digital currencies</subject><subject>Format</subject><subject>Hashed time-lock contract (HTLC)</subject><subject>Payment channel network (PCN)</subject><subject>Privacy</subject><subject>Protocol</subject><subject>Scalability</subject><subject>Security</subject><subject>Wormhole attack</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_wFPA89Yk-5UVL1LUCote6jmks7Nutt2kJqnSf-_WevY0MDzvO8NDyDVnM854cdvPwAWcCSb4uBCi4idkwmUpkkIweUomI1QmGcvkObkIoWeMl4WUE4I2WSzr-R19RUc7HTpsaDQDJrWDNQU3DCYOaCONjjbYom2o_tDGhki_nR86t0GqY9QjbCzd6v0vDJ22FjfUYhypdbgkZ63eBLz6m1Py_vS4nC-S-u35Zf5QJ5AKGZNWY8sBgHEUPGcMJGCeZ6s2F5XWWKx0VZScp6u2aSSkIGXFgFVpKfNMVhlLp-Tm2Lv17nOHIare7bwdTyqRZ5WQMq_ESIkjBd6F4LFVW28G7feKM3XQqXp10KkOOtVR5xi6P4Zw_P_LoFcBDFrAxniEqBpn_ov_AM--fjc</recordid><startdate>202107</startdate><enddate>202107</enddate><creator>Mohanty, Susil Kumar</creator><creator>Tripathy, Somanath</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8643-5501</orcidid><orcidid>https://orcid.org/0000-0002-6964-2648</orcidid></search><sort><creationdate>202107</creationdate><title>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</title><author>Mohanty, Susil Kumar ; Tripathy, Somanath</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Anonymity</topic><topic>Blockchain</topic><topic>Cryptography</topic><topic>Digital currencies</topic><topic>Format</topic><topic>Hashed time-lock contract (HTLC)</topic><topic>Payment channel network (PCN)</topic><topic>Privacy</topic><topic>Protocol</topic><topic>Scalability</topic><topic>Security</topic><topic>Wormhole attack</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mohanty, Susil Kumar</creatorcontrib><creatorcontrib>Tripathy, Somanath</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers & security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohanty, Susil Kumar</au><au>Tripathy, Somanath</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</atitle><jtitle>Computers & security</jtitle><date>2021-07</date><risdate>2021</risdate><volume>106</volume><spage>102291</spage><pages>102291-</pages><artnum>102291</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2021.102291</doi><orcidid>https://orcid.org/0000-0002-8643-5501</orcidid><orcidid>https://orcid.org/0000-0002-6964-2648</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0167-4048 |
ispartof | Computers & security, 2021-07, Vol.106, p.102291, Article 102291 |
issn | 0167-4048 1872-6208 |
language | eng |
recordid | cdi_proquest_journals_2549288592 |
source | Elsevier ScienceDirect Journals Complete |
subjects | Anonymity Blockchain Cryptography Digital currencies Format Hashed time-lock contract (HTLC) Payment channel network (PCN) Privacy Protocol Scalability Security Wormhole attack |
title | n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T07%3A50%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=n-HTLC:%20Neo%20hashed%20time-Lock%20commitment%20to%20defend%20against%20wormhole%20attack%20in%20payment%20channel%20networks&rft.jtitle=Computers%20&%20security&rft.au=Mohanty,%20Susil%20Kumar&rft.date=2021-07&rft.volume=106&rft.spage=102291&rft.pages=102291-&rft.artnum=102291&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2021.102291&rft_dat=%3Cproquest_cross%3E2549288592%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2549288592&rft_id=info:pmid/&rft_els_id=S0167404821001152&rfr_iscdi=true |