n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks

In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriate...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Computers & security 2021-07, Vol.106, p.102291, Article 102291
Hauptverfasser: Mohanty, Susil Kumar, Tripathy, Somanath
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page 102291
container_title Computers & security
container_volume 106
creator Mohanty, Susil Kumar
Tripathy, Somanath
description In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.
doi_str_mv 10.1016/j.cose.2021.102291
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2549288592</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0167404821001152</els_id><sourcerecordid>2549288592</sourcerecordid><originalsourceid>FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</originalsourceid><addsrcrecordid>eNp9kE1LAzEQhoMoWKt_wFPA89Yk-5UVL1LUCote6jmks7Nutt2kJqnSf-_WevY0MDzvO8NDyDVnM854cdvPwAWcCSb4uBCi4idkwmUpkkIweUomI1QmGcvkObkIoWeMl4WUE4I2WSzr-R19RUc7HTpsaDQDJrWDNQU3DCYOaCONjjbYom2o_tDGhki_nR86t0GqY9QjbCzd6v0vDJ22FjfUYhypdbgkZ63eBLz6m1Py_vS4nC-S-u35Zf5QJ5AKGZNWY8sBgHEUPGcMJGCeZ6s2F5XWWKx0VZScp6u2aSSkIGXFgFVpKfNMVhlLp-Tm2Lv17nOHIare7bwdTyqRZ5WQMq_ESIkjBd6F4LFVW28G7feKM3XQqXp10KkOOtVR5xi6P4Zw_P_LoFcBDFrAxniEqBpn_ov_AM--fjc</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2549288592</pqid></control><display><type>article</type><title>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</title><source>Elsevier ScienceDirect Journals Complete</source><creator>Mohanty, Susil Kumar ; Tripathy, Somanath</creator><creatorcontrib>Mohanty, Susil Kumar ; Tripathy, Somanath</creatorcontrib><description>In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.</description><identifier>ISSN: 0167-4048</identifier><identifier>EISSN: 1872-6208</identifier><identifier>DOI: 10.1016/j.cose.2021.102291</identifier><language>eng</language><publisher>Amsterdam: Elsevier Ltd</publisher><subject>Anonymity ; Blockchain ; Cryptography ; Digital currencies ; Format ; Hashed time-lock contract (HTLC) ; Payment channel network (PCN) ; Privacy ; Protocol ; Scalability ; Security ; Wormhole attack</subject><ispartof>Computers &amp; security, 2021-07, Vol.106, p.102291, Article 102291</ispartof><rights>2021 Elsevier Ltd</rights><rights>Copyright Elsevier Sequoia S.A. Jul 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</citedby><cites>FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</cites><orcidid>0000-0002-8643-5501 ; 0000-0002-6964-2648</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.cose.2021.102291$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3550,27924,27925,45995</link.rule.ids></links><search><creatorcontrib>Mohanty, Susil Kumar</creatorcontrib><creatorcontrib>Tripathy, Somanath</creatorcontrib><title>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</title><title>Computers &amp; security</title><description>In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.</description><subject>Anonymity</subject><subject>Blockchain</subject><subject>Cryptography</subject><subject>Digital currencies</subject><subject>Format</subject><subject>Hashed time-lock contract (HTLC)</subject><subject>Payment channel network (PCN)</subject><subject>Privacy</subject><subject>Protocol</subject><subject>Scalability</subject><subject>Security</subject><subject>Wormhole attack</subject><issn>0167-4048</issn><issn>1872-6208</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNp9kE1LAzEQhoMoWKt_wFPA89Yk-5UVL1LUCote6jmks7Nutt2kJqnSf-_WevY0MDzvO8NDyDVnM854cdvPwAWcCSb4uBCi4idkwmUpkkIweUomI1QmGcvkObkIoWeMl4WUE4I2WSzr-R19RUc7HTpsaDQDJrWDNQU3DCYOaCONjjbYom2o_tDGhki_nR86t0GqY9QjbCzd6v0vDJ22FjfUYhypdbgkZ63eBLz6m1Py_vS4nC-S-u35Zf5QJ5AKGZNWY8sBgHEUPGcMJGCeZ6s2F5XWWKx0VZScp6u2aSSkIGXFgFVpKfNMVhlLp-Tm2Lv17nOHIare7bwdTyqRZ5WQMq_ESIkjBd6F4LFVW28G7feKM3XQqXp10KkOOtVR5xi6P4Zw_P_LoFcBDFrAxniEqBpn_ov_AM--fjc</recordid><startdate>202107</startdate><enddate>202107</enddate><creator>Mohanty, Susil Kumar</creator><creator>Tripathy, Somanath</creator><general>Elsevier Ltd</general><general>Elsevier Sequoia S.A</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>K7.</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-8643-5501</orcidid><orcidid>https://orcid.org/0000-0002-6964-2648</orcidid></search><sort><creationdate>202107</creationdate><title>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</title><author>Mohanty, Susil Kumar ; Tripathy, Somanath</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c328t-faef1ccc01e21500c8ce554bf529aae6ba967113bfdd8c3c8890c093785489403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Anonymity</topic><topic>Blockchain</topic><topic>Cryptography</topic><topic>Digital currencies</topic><topic>Format</topic><topic>Hashed time-lock contract (HTLC)</topic><topic>Payment channel network (PCN)</topic><topic>Privacy</topic><topic>Protocol</topic><topic>Scalability</topic><topic>Security</topic><topic>Wormhole attack</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Mohanty, Susil Kumar</creatorcontrib><creatorcontrib>Tripathy, Somanath</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>ProQuest Criminal Justice (Alumni)</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers &amp; security</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohanty, Susil Kumar</au><au>Tripathy, Somanath</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks</atitle><jtitle>Computers &amp; security</jtitle><date>2021-07</date><risdate>2021</risdate><volume>106</volume><spage>102291</spage><pages>102291-</pages><artnum>102291</artnum><issn>0167-4048</issn><eissn>1872-6208</eissn><abstract>In today’s cryptocurrency, the Payment Channel Network (PCN) is noticed as one of the most gifted off-chain solutions for scalability issues. Besides this, it consumes lesser transaction fees and low transaction confirmation time. However, security and privacy issues need to be addressed appropriately to make the solution even more effective. Most of the existing HTLC (Hashed Time-Lock Contract) protocols revealed the sender’s information to the intermediate users in the payment route. In this work, we propose an effective secure and privacy-preserving Payment Channel Network protocol, named Neo Hashed Time-Lock Commitment (n-HTLC) protocol. (n-HTLC) does not require the sender to send any information to each intermediate user along the payment route, thus preserves the identity of the sender. But, (n-HTLC) is not compatible with Sphinx onion packet format. Therefore, a symmetric key encryption-based protocol called kTLC has been proposed. kTLC is compatible with the Sphinx onion packet format, which is used in the current Lightning network atop of the Bitcoin blockchain network. The security of both n-HTLC and kTLC are proved using the Universal Composability (UC) framework. It is observed that both ensure that no attacker can extract information on the payment route if at least one of the users in the path is honest. To analyze the performance of both n-HTLC and kTLC payment protocol, we conduct experiments using the snapshots of Ripple network11According to the network snapshots (Dec 2015) Malavolta et al. (2017a) pre-processed by Mazumdar and Ruj (2020)., Lightning network22According to the network snapshots (May 2020) Lns pre-processed by Mazumdar and Ruj (2020)., and synthetic network of Mazumdar and Ruj (2020). Our experimental results show that both n-HTLC and kTLC outperform state-of-the-art off-chain payment protocols in terms of computational and communication overhead.</abstract><cop>Amsterdam</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.cose.2021.102291</doi><orcidid>https://orcid.org/0000-0002-8643-5501</orcidid><orcidid>https://orcid.org/0000-0002-6964-2648</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 0167-4048
ispartof Computers & security, 2021-07, Vol.106, p.102291, Article 102291
issn 0167-4048
1872-6208
language eng
recordid cdi_proquest_journals_2549288592
source Elsevier ScienceDirect Journals Complete
subjects Anonymity
Blockchain
Cryptography
Digital currencies
Format
Hashed time-lock contract (HTLC)
Payment channel network (PCN)
Privacy
Protocol
Scalability
Security
Wormhole attack
title n-HTLC: Neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-03T07%3A50%3A14IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=n-HTLC:%20Neo%20hashed%20time-Lock%20commitment%20to%20defend%20against%20wormhole%20attack%20in%20payment%20channel%20networks&rft.jtitle=Computers%20&%20security&rft.au=Mohanty,%20Susil%20Kumar&rft.date=2021-07&rft.volume=106&rft.spage=102291&rft.pages=102291-&rft.artnum=102291&rft.issn=0167-4048&rft.eissn=1872-6208&rft_id=info:doi/10.1016/j.cose.2021.102291&rft_dat=%3Cproquest_cross%3E2549288592%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2549288592&rft_id=info:pmid/&rft_els_id=S0167404821001152&rfr_iscdi=true