<div class="csl-bib-body">
<div class="csl-entry">Avarikioti, G., & Thyfronitis Litos, O. S. (2022). Suborn Channels: Incentives Against Timelock Bribes. In <i>Financial Cryptography and Data Security</i> (pp. 488–511). Springer Nature Switzerland AG. https://doi.org/10.34726/3904</div>
</div>
-
dc.identifier.uri
http://hdl.handle.net/20.500.12708/175986
-
dc.identifier.uri
https://doi.org/10.34726/3904
-
dc.description.abstract
As the Bitcoin mining landscape becomes more competitive, analyzing potential attacks under the assumption of rational miners becomes increasingly relevant. In the rational setting, blockchain users can bribe miners to reap an unfair benefit. Established protocols such as Duplex Micropayment Channels and Lightning Channels are susceptible to bribery, which upends their financial guarantees. Indeed, we prove that in a two-party contract in which the honest party can spend an output right away, whereas the malicious can only spend the same output after a timelock, the latter party can promise a high fee to the miners, who then intentionally ignore the transaction of the honest party in anticipation of the higher fee. This effectively prevents a valid transaction from ever entering the blockchain, resulting in potentially severe financial losses for the honest and considerable gains for the malicious party.
We expand previous results on timelock bribes to more realistic blockchains, proving that a general class of contracts are susceptible. We then apply our results to Duplex Micropayment Channels and Lightning Channels, providing exact bounds on their safe operating region. Furthermore, we enhance the Bitcoin Script of Duplex Micropayment Channels so that the coins of a party that attempts to bribe are given to the miners as fees, therefore effectively disincentivizing bribes. Our solution, named Suborn channels, is implemented as a proof-of-concept. We also propose a small change to Lightning Channels that achieves a similar effect. Moreover, we formally express the exact circumstances under which our two proposals ensure alignment of miner incentives with the prescribed protocol outcome.
en
dc.language.iso
en
-
dc.relation.ispartofseries
Lecture Notes in Computer Science
-
dc.rights.uri
http://creativecommons.org/licenses/by/4.0/
-
dc.subject
Bitcoin
en
dc.subject
Security
en
dc.subject
Layer 2
en
dc.subject
Payment Channel
en
dc.subject
Lightning Network
en
dc.subject
Incentives
en
dc.subject
Bribing
en
dc.title
Suborn Channels: Incentives Against Timelock Bribes
en
dc.type
Inproceedings
en
dc.type
Konferenzbeitrag
de
dc.rights.license
Creative Commons Namensnennung 4.0 International
de
dc.rights.license
Creative Commons Attribution 4.0 International
en
dc.identifier.doi
10.34726/3904
-
dc.contributor.affiliation
Technical University of Darmstadt, Germany
-
dc.relation.isbn
978-3-031-18282-2
-
dc.relation.doi
10.1007/978-3-031-18283-9
-
dc.relation.issn
0302-9743
-
dc.description.startpage
488
-
dc.description.endpage
511
-
dc.rights.holder
http://ifca.ai/documents/copyright.html
-
dc.type.category
Full-Paper Contribution
-
dc.relation.eissn
1611-3349
-
tuw.booktitle
Financial Cryptography and Data Security
-
tuw.container.volume
13411
-
tuw.peerreviewed
true
-
tuw.book.ispartofseries
Lecture Notes in Computer Science
-
tuw.relation.publisher
Springer Nature Switzerland AG
-
tuw.relation.publisherplace
Cham, Switzerland
-
tuw.researchTopic.id
I1
-
tuw.researchTopic.name
Logic and Computation
-
tuw.researchTopic.value
100
-
tuw.publication.orgunit
E192-06 - Forschungsbereich Security and Privacy
-
tuw.publisher.doi
10.1007/978-3-031-18283-9_24
-
dc.identifier.libraryid
AC17285470
-
dc.description.numberOfPages
24
-
tuw.author.orcid
0000-0002-8229-297X
-
dc.rights.identifier
CC BY 4.0
de
dc.rights.identifier
CC BY 4.0
en
tuw.event.name
26th International Conference Financial Cryptography and Data Security (FC 2022)
en
dc.description.sponsorshipexternal
German Federal Ministry of Education and Research
-
dc.description.sponsorshipexternal
Hessen State Ministry for Higher Education, Resear
-
dc.description.sponsorshipexternal
National Research Center for Applied Cybersecurity ATHENE