An Empirical Analysis of Privacy in the Lightning Network

Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies. Previous research has already focused on the scalability, availability, and crypto-economics of the Lightning Network, but relatively little attention has been paid to exploring the level of privacy it achieves in practice. This paper presents a thorough analysis of the privacy offered by the Lightning Network. We present three main attacks that exploit publicly available information about the network topology and its active nodes and channels in order to learn information that is designed to be kept secret, such as how many coins a node has available to spend or who the sender and recipient are in a payment routed through the network. We evaluate one of our attacks on the live network and, due to cost and ethical considerations, evaluate our other two attacks on a simulated Lightning network that faithfully mimics the real one.

[1]  Giulio Malavolta,et al.  Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..

[2]  Dejun Yang,et al.  CheaPay: An Optimal Algorithm for Fee Minimization in Blockchain-Based Payment Channel Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).

[3]  Giulio Malavolta,et al.  Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.

[4]  Michael K. Reiter,et al.  Crowds: anonymity for Web transactions , 1998, TSEC.

[5]  Bernhard Haslhofer,et al.  An Empirical Analysis of Monero Cross-Chain Traceability , 2018, ArXiv.

[6]  George Danezis,et al.  Sphinx: A Compact and Provably Secure Mix Format , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[7]  Radu State,et al.  Lightning Network: A Comparative Review of Transaction Fees and Data Analysis , 2019, BLOCKCHAIN.

[8]  Mariusz Nowostawski,et al.  Evaluating Methods for the Identification of Off-Chain Transactions in the Lightning Network , 2019, Applied Sciences.

[9]  Juan Carlos De Martin,et al.  The CLoTH Simulator for HTLC Payment Networks with Introductory Lightning Network Performance Results , 2018, Inf..

[10]  Patrick D. McDaniel,et al.  An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.

[11]  Joaquín García,et al.  LockDown: Balance Availability Attack against Lightning Network Channels , 2020, IACR Cryptol. ePrint Arch..

[12]  Aviv Zohar,et al.  Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.

[13]  Sarah Meiklejohn,et al.  Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.

[14]  Stefan Schmid,et al.  Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff , 2019, ArXiv.

[15]  Rami Khalil,et al.  Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..

[16]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[17]  Rainer Böhme,et al.  Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[18]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[19]  J. Y. Yen An algorithm for finding shortest routes from all source nodes to a given destination in general networks , 1970 .

[20]  Alex Biryukov,et al.  Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.

[21]  Hubert Ritzdorf,et al.  On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..

[22]  Pedro Moreno-Sanchez,et al.  A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[23]  Ethan Heilman,et al.  An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..

[24]  Christof Weinhardt,et al.  Towards an economic analysis of routing in payment channel networks , 2017, SERIAL@Middleware.

[25]  Stefano Martinazzi,et al.  The evolution of Lightning Network's Topology during its first year and the influence over its core values , 2019, ArXiv.

[26]  Jeffrey Quesnelle,et al.  On the linkability of Zcash transactions , 2017, ArXiv.

[27]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[28]  Sarah Meiklejohn,et al.  An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.

[29]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[30]  Man Ho Au,et al.  New Empirical Traceability Analysis of CryptoNote-Style Blockchains , 2019, Financial Cryptography.

[31]  Sarah Meiklejohn,et al.  Tracing Transactions Across Cryptocurrency Ledgers , 2018, USENIX Security Symposium.

[32]  Micah Adler,et al.  The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.

[33]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[34]  Stefan Schmid,et al.  Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks , 2020, ICISSP.

[35]  László Gulyás,et al.  Topological Analysis of Bitcoin's Lightning Network , 2019, MARBLE.

[36]  Simina Brânzei,et al.  How to Charge Lightning , 2017, ArXiv.

[37]  Cross-Layer Deanonymization Methods in the Lightning Protocol , 2020, ArXiv.

[38]  Florian Tschorsch,et al.  Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).

[39]  Arvind Narayanan,et al.  BlockSci: Design and applications of a blockchain analysis platform , 2017, USENIX Security Symposium.

[40]  Alex Biryukov,et al.  Probing Channel Balances in the Lightning Network , 2020, ArXiv.

[41]  Alex Biryukov,et al.  Privacy Aspects and Subliminal Channels in Zcash , 2019, CCS.

[42]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[43]  Joaquín García,et al.  On the Difficulty of Hiding the Balance of Lightning Network Channels , 2019, IACR Cryptol. ePrint Arch..

[44]  Prateek Saxena,et al.  A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.

[45]  Ferenc Beres,et al.  A Cryptoeconomic Traffic Analysis of Bitcoins Lightning Network , 2019, ArXiv.

[46]  Pedro Moreno-Sanchez,et al.  SoK: Off The Chain Transactions , 2019, IACR Cryptol. ePrint Arch..