Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3465481.3465761acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

How Lightning’s Routing Diminishes its Anonymity

Published: 17 August 2021 Publication History

Abstract

Lightning, the prevailing solution to Bitcoin’s scalability issue, uses onion routing to hide senders and recipients of payments. Yet, the path between the sender and the recipient along which payments are routed is selected such that it is short, cost efficient, and fast. The low degree of randomness in the path selection entails that anonymity sets are small. However, quantifying the anonymity provided by Lightning is challenging due to the existence of multiple implementations that differ with regard to the path selection algorithm and exist in parallel within the network. In this paper, we propose a general method allowing a local internal attacker to determine sender and recipient anonymity sets. Based on an in-depth code review of three Lightning implementations, we analyze how an adversary can predict the sender and the recipient of a multi-hop transaction. Our simulations indicate that only one adversarial node on a payment path uniquely identifies at least one of sender and recipient for around 70% of the transactions observed by the adversary. Moreover, multiple colluding attackers can almost always identify sender and receiver uniquely.

References

[1]
Brainbot Technologies AG. 2019. Raiden Network. Available at: https://raiden.network/.
[2]
Zeta Avarikioti, Lioba Heimbach, Yuyi Wang, and Roger Wattenhofer. 2020. Ride the Lightning: The Game Theory of Payment Channels. In Financial Cryptography and Data Security.
[3]
Alex Biryukov, Dmitry Khovratovich, and Ivan Pustogarov. 2014. Deanonymisation of clients in Bitcoin P2P network. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security.
[4]
Chen Chen, Daniele E Asoni, David Barrera, George Danezis, and Adrian Perrig. 2015. HORNET: High-speed onion routing at the network layer. In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security.
[5]
Chen Chen, Daniele E Asoni, Adrian Perrig, David Barrera, George Danezis, and Carmela Troncoso. 2018. TARANET: Traffic-analysis resistant anonymity at the network layer. In 2018 IEEE European Symposium on Security and Privacy (EuroS&P). IEEE.
[6]
Chen Chen and Adrian Perrig. 2017. Phi: Path-hidden lightweight anonymity protocol at network layer. Proceedings on Privacy Enhancing Technologies 2017, 1(2017).
[7]
George Danezis and Ian Goldberg. 2009. Sphinx: A compact and provably secure mix format. In 2009 30th IEEE Symposium on Security and Privacy. IEEE.
[8]
Christian Decker, Rusty Russell, and Olaoluwa Osuntokun. 2018. Eltoo: A simple layer2 protocol for bitcoin. Available at: https://blockstream.com/eltoo.pdf.
[9]
Oguzhan Ersoy, Stefanie Roos, and Zekeriya Erkin. 2020. How to profit from payment channels. In Financial Cryptography and Data Security.
[10]
Lewis Gudgeon, Pedro Moreno-Sanchez, Stefanie Roos, Patrick McCorry, and Arthur Gervais. 2020. SoK: Off The Chain Transactions. In Financial Cryptography and Data Security (FC).
[11]
Jordi Herrera-Joancomartí, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina Pérez-Solà, and Joaquin Garcia-Alfaro. 2019. On the Difficulty of Hiding the Balance of Lightning Network Channels. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (Auckland, New Zealand) (Asia CCS ’19). Association for Computing Machinery, New York, NY, USA, 11 pages. https://doi.org/10.1145/3321705.3329812
[12]
Hsu-Chun Hsiao, Tiffany Hyun-Jin Kim, Adrian Perrig, Akira Yamada, Samuel C Nelson, Marco Gruteser, and Wei Meng. 2012. LAP: Lightweight anonymity and privacy. In 2012 IEEE Symposium on Security and Privacy. IEEE.
[13]
George Kappos, Haaroon Yousaf, Ania Piotrowska, Sanket Kanjalkar, Sergi Delgado-Segura, Andrew Miller, and Sarah Meiklejohn. 2021. An Empirical Analysis of Privacy in the Lightning Network. Financial Cryptography and Data Security(2021).
[14]
Jian-Hong Lin, Kevin Primicerio, Tiziano Squartini, Christian Decker, and Claudio J Tessone. 2020. Lightning network: a second path towards centralisation of the Bitcoin economy. New Journal of Physics 22 (2020).
[15]
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2017. SilentWhispers: Enforcing security and privacy in credit networks. In Network and Distributed System Security Symposium.
[16]
Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and Privacy with Payment-Channel Networks. In Conference on Computer and Communications Security (Dallas, Texas, USA) (CCS ’17). ACM, New York, NY, USA, 17 pages. https://doi.org/10.1145/3133956.3134096
[17]
Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, and Matteo Maffei. 2019. Anonymous multi-hop locks for blockchain scalability and interoperability. In Network and Distributed System Security Symposium.
[18]
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M Voelker, and Stefan Savage. 2013. A fistful of bitcoins: characterizing payments among men with no names. In Proceedings of the 2013 conference on Internet measurement conference. ACM.
[19]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Available at: https://bitcoin.org/bitcoin.pdf.
[20]
Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, and Christian Decker. 2020. Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks. arXiv preprint arXiv:2003.00003(2020).
[21]
Andreas Pfitzmann and Marit Köhntopp. 2001. Anonymity, unobservability, and pseudonymity—a proposal for terminology. In Designing privacy enhancing technologies. Springer.
[22]
Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: scalable off-chain instant payments. Available at: https://lightning.network/lightning-network-paper.pdf.
[23]
E. Rohrer, J. Malliaris, and F. Tschorsch. 2019. Discharged Payment Channels: Quantifying the Lightning Network’s Resilience to Topology-Based Attacks. In 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS PW). https://doi.org/10.1109/EuroSPW.2019.00045
[24]
Stefanie Roos, Pedro Moreno-Sanchez, Aniket Kate, and Ian Goldberg. 2018. Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. In NDSS. https://doi.org/10.14722/ndss.2018.23254
[25]
Jody Sankey and Matthew Wright. 2014. Dovetail: Stronger anonymity in next-generation internet routing. In Privacy Enhancing Technologies Symposium. Springer.
[26]
Andrei Serjantov and George Danezis. 2002. Towards an information theoretic metric for anonymity. In International Workshop on Privacy Enhancing Technologies. Springer.
[27]
S. Tikhomirov, P. Moreno-Sanchez, and M. Maffei. 2020. A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network. In 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[28]
Sergei Tikhomirov, Rene Pickhardt, Alex Biryukov, and Mariusz Nowostawski. 2020. Probing Channel Balances in the Lightning Network. arXiv preprint arXiv:2004.00333(2020).
[29]
Saar Tochner, Stefan Schmid, and Aviv Zohar. 2019. Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff. arXiv preprint arXiv:1909.06890(2019).
[30]
Bitcoin Wiki. 2019. Hashed Timelock Contracts. Available at: https://en.bitcoin.it/wiki/Hashed_Timelock_Contracts.
[31]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum project yellow paper 151 (2014).
[32]
Jin Y Yen. 1970. An algorithm for finding shortest routes from all source nodes to a given destination in general networks. Quart. Appl. Math. 27, 4 (1970).

Cited By

View all
  • (2024)Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619889(1-10)Online publication date: 3-Jun-2024
  • (2024)Reducing CO2 emissions in a peer-to-peer distributed payment networkComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110297243:COnline publication date: 1-Apr-2024
  • (2023)Revelio: A Network-Level Privacy Attack in the Lightning Network2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00060(942-957)Online publication date: Jul-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
August 2021
1447 pages
ISBN:9781450390514
DOI:10.1145/3465481
This work is licensed under a Creative Commons Attribution International 4.0 License.

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 17 August 2021

Check for updates

Author Tags

  1. Anonymity
  2. Lightning
  3. Payment Channel Networks
  4. Routing

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ARES 2021

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)314
  • Downloads (Last 6 weeks)40
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries2024 IFIP Networking Conference (IFIP Networking)10.23919/IFIPNetworking62109.2024.10619889(1-10)Online publication date: 3-Jun-2024
  • (2024)Reducing CO2 emissions in a peer-to-peer distributed payment networkComputer Networks: The International Journal of Computer and Telecommunications Networking10.1016/j.comnet.2024.110297243:COnline publication date: 1-Apr-2024
  • (2023)Revelio: A Network-Level Privacy Attack in the Lightning Network2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P)10.1109/EuroSP57164.2023.00060(942-957)Online publication date: Jul-2023
  • (2023)On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning NetworkComputer Security. ESORICS 2023 International Workshops10.1007/978-3-031-54204-6_25(411-427)Online publication date: 25-Sep-2023
  • (2022)Probabilistic Logic Models for the Lightning NetworkCryptography10.3390/cryptography60200296:2(29)Online publication date: 15-Jun-2022

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media