An Empirical Analysis of Privacy in the Lightning Network

Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies. Previous research has already focused on the scalability, availability, and crypto-economics of the Lightning Network, but relatively little attention has been paid to exploring the level of privacy it achieves in practice. This paper presents a thorough analysis of the privacy offered by the Lightning Network. We present three main attacks that exploit publicly available information about the network topology and its active nodes and channels in order to learn information that is designed to be kept secret, such as how many coins a node has available to spend or who the sender and recipient are in a payment routed through the network. We evaluate one of our attacks on the live network and, due to cost and ethical considerations, evaluate our other two attacks on a simulated Lightning network that faithfully mimics the real one.

[1]  Dejun Yang,et al.  CheaPay: An Optimal Algorithm for Fee Minimization in Blockchain-Based Payment Channel Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[2]  Simina Brânzei,et al.  How to Charge Lightning , 2017, ArXiv.

[3]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[4]  Radu State,et al.  Lightning Network: A Comparative Review of Transaction Fees and Data Analysis , 2019, BLOCKCHAIN.

[5]  Patrick D. McDaniel,et al.  An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.

[6]  Man Ho Au,et al.  New Empirical Traceability Analysis of CryptoNote-Style Blockchains , 2019, Financial Cryptography.

[7]  Stefan Schmid,et al.  Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff , 2019, ArXiv.

[8]  Rainer Böhme,et al.  Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[9]  Jeffrey Quesnelle,et al.  On the linkability of Zcash transactions , 2017, ArXiv.

[10]  Stefano Martinazzi,et al.  The evolution of Lightning Network's Topology during its first year and the influence over its core values , 2019, ArXiv.

[11]  Bernhard Haslhofer,et al.  An Empirical Analysis of Monero Cross-Chain Traceability , 2018, ArXiv.

[12]  Joaquín García,et al.  On the Difficulty of Hiding the Balance of Lightning Network Channels , 2019, IACR Cryptol. ePrint Arch..

[13]  Florian Tschorsch,et al.  Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[14]  Arvind Narayanan,et al.  BlockSci: Design and applications of a blockchain analysis platform , 2017, USENIX Security Symposium.

[15]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[16]  Giulio Malavolta,et al.  Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.

[17]  Ferenc Beres,et al.  A Cryptoeconomic Traffic Analysis of Bitcoins Lightning Network , 2019, ArXiv.

[18]  Christof Weinhardt,et al.  Towards an economic analysis of routing in payment channel networks , 2017, SERIAL@Middleware.

[19]  Juan Carlos De Martin,et al.  The CLoTH Simulator for HTLC Payment Networks with Introductory Lightning Network Performance Results , 2018, Inf..

[20]  Sarah Meiklejohn,et al.  An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.

[21]  Sarah Meiklejohn,et al.  Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.

[22]  Prateek Saxena,et al.  A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.

[23]  Alex Biryukov,et al.  Privacy Aspects and Subliminal Channels in Zcash , 2019, CCS.

[24]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[25]  Giulio Malavolta,et al.  Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..

[26]  Sarah Meiklejohn,et al.  Tracing Transactions Across Cryptocurrency Ledgers , 2018, USENIX Security Symposium.

[27]  George Danezis,et al.  Sphinx: A Compact and Provably Secure Mix Format , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[28]  Mariusz Nowostawski,et al.  Evaluating Methods for the Identification of Off-Chain Transactions in the Lightning Network , 2019, Applied Sciences.

[29]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[30]  Aviv Zohar,et al.  Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.

[31]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[32]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[33]  Rami Khalil,et al.  Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..

[34]  J. Y. Yen An algorithm for finding shortest routes from all source nodes to a given destination in general networks , 1970 .

[35]  Ethan Heilman,et al.  An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..

[36]  László Gulyás,et al.  Topological Analysis of Bitcoin's Lightning Network , 2019, MARBLE.

[37]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[38]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[39]  Pedro Moreno-Sanchez,et al.  SoK: Off The Chain Transactions , 2019, IACR Cryptol. ePrint Arch..