Skip to main content

On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network

  • Conference paper
  • First Online:
Computer Security. ESORICS 2023 International Workshops (ESORICS 2023)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 14398))

Included in the following conference series:

  • 484 Accesses

Abstract

The Lightning network (LN) addresses Bitcoin’s scalability issues by providing fast and private payment processing. In order to mitigate failures caused by insufficient channel capacities, LN introduced multi-path payments. To the best of our knowledge, the effect of multi-path payments remains unclear. In this paper, we therefore study the impact of multi-path payments on performance and privacy. We identify metrics quantifying the aforementioned properties and utilise them to evaluate the impact of multi-path payments. To this end, we develop a simulator implementing pathfinding in LN using single and multi-path payments as well as various pathfinding algorithms. We find that, while the success rate of multi-path payments is up to \(20\%\) higher, the impact of multi-path payments on performance otherwise remains within limits. On the other hand, the impact on privacy appears to be greater, e.g., multi-path payments are more likely to encounter an on-path adversary and the relationship anonymity is more likely to be compromised by colluding intermediate hops. However, multi-path payments are less likely to be deanonymised based on the path lengths.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    https://github.com/lightning/bolts/blob/master/07-routing-gossip.md#requirements-9.

  2. 2.

    https://github.com/cndolo/lightning-simulator.

  3. 3.

    https://github.com/lightning/bolts/blob/master/07-routing-gossip.md#htlc-fees.

  4. 4.

    https://cndolo.github.io/lightning-simulator.

  5. 5.

    According to https://lnrouter.app/graph/zero-base-fee.

References

  1. Bolt: Basis of lightning technology (lightning network specifications). https://github.com/lightning/bolts

  2. Bagaria, V., Neu, J., Tse, D.: Boomerang: redundancy improves latency and throughput in payment-channel networks. In: Bonneau, J., Heninger, N. (eds.) Financial Cryptography and Data Security: 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers, pp. 304–324. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_17

    Chapter  Google Scholar 

  3. Béres, F., Seres, I.A., Benczúr, A.A.: A cryptoeconomic traffic analysis of bitcoins lightning network (2019). http://arxiv.org/abs/1911.09432

  4. Biryukov, A., Naumenko, G., Tikhomirov, S.: Analysis and probing of parallel channels in the lightning network. In: Eyal, I., Garay, J. (eds.) Financial Cryptography and Data Security: 26th International Conference, FC 2022, Grenada, May 2–6, 2022, Revised Selected Papers, pp. 337–357. Springer International Publishing, Cham (2022). https://doi.org/10.1007/978-3-031-18283-9_16

    Chapter  Google Scholar 

  5. Dijkstra, E.W.: A note on two problems in connexion with graphs. Numer. Math. 1, 269–271 (1959)

    Article  MathSciNet  Google Scholar 

  6. Eckey, L., Faust, S., Hostáková, K., Roos, S.: Splitting payments locally while routing interdimensionally. IACR Cryptol. ePrint Arch. p. 555 (2020). https://eprint.iacr.org/2020/555

  7. Ersoy, O., Roos, S., Erkin, Z.: How to profit from payments channels. In: Bonneau, J., Heninger, N. (eds.) Financial Cryptography and Data Security: 24th International Conference, FC 2020 , Kota Kinabalu, Malaysia, February 10–14, 2020 Revised Selected Papers, pp. 284–303. Springer International Publishing, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_16

    Chapter  Google Scholar 

  8. Fromknecht, C., Osuntokun, O.: Bolt 21: Atomic multi-path payments. https://github.com/cfromknecht/lightning-rfc/blob/bolt-amp/21-atomic-multi-path-payments.md

  9. Herrera-Joancomartí, J., Navarro-Arribas, G., Ranchal-Pedrosa, A., Pérez-Solà, C., García-Alfaro, J.: On the difficulty of hiding the balance of lightning network channels. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09–12, 2019.,pp. 602–612. ACM (2019)

    Google Scholar 

  10. Kappos, G., Yousaf, H., Piotrowska, A., Kanjalkar, S., Delgado-Segura, S., Miller, A., Meiklejohn, S.: An empirical analysis of privacy in the lightning network. In: Borisov, N., Diaz, C. (eds.) Financial Cryptography and Data Security: 25th International Conference, FC 2021, Virtual Event, March 1–5, 2021, Revised Selected Papers, Part I, pp. 167–186. Springer Berlin Heidelberg, Berlin, Heidelberg (2021). https://doi.org/10.1007/978-3-662-64322-8_8

    Chapter  Google Scholar 

  11. Kumble, S.P., Epema, D.H.J., Roos, S.: How lightning’s routing diminishes its anonymity. In: ARES 2021: The 16th International Conference on Availability, Reliability and Security, Vienna, Austria, August 17–20, 2021. pp. 13:1–13:10. ACM (2021)

    Google Scholar 

  12. Lin, J., Primicerio, K., Squartini, T., Decker, C., Tessone, C.J.: Lightning network: a second path towards centralisation of the bitcoin economy (2020). https://arxiv.org/abs/2002.02819

  13. Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30 - November 03, 2017, pp. 455–471. ACM (2017)

    Google Scholar 

  14. Martinazzi, S.: The evolution of lightning network’s topology during its first year and the influence over its core values (2019). https://arxiv.org/abs/1902.07307

  15. Nisslmueller, U., Foerster, K., Schmid, S., Decker, C.: Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy, ICISSP 2020, Valletta, Malta, February 25–27, 2020, pp. 7–14. SCITEPRESS (2020)

    Google Scholar 

  16. Papadis, N., Tassiulas, L.: Blockchain-based payment channel networks: Challenges and recent advances. IEEE Access 8, 227596–227609 (2020)

    Article  Google Scholar 

  17. Paverd, A.J., Martin, A.C.: Modelling and automatically analysing privacy properties for honest-but-curious adversaries (2014)

    Google Scholar 

  18. Piatkivskyi, D., Nowostawski, M.: Split payments in payment networks. In: Garcia-Alfaro, J., Herrera-Joancomartí, J., Livraga, G., Rios, R. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2018 International Workshops, DPM 2018 and CBT 2018, Barcelona, Spain, September 6-7, 2018, Proceedings, pp. 67–75. Springer International Publishing, Cham (2018). https://doi.org/10.1007/978-3-030-00305-0_5

    Chapter  Google Scholar 

  19. Pickhardt, R., Richter, S.: Optimally reliable & cheap payment flows on the lightning network (2021). https://arxiv.org/abs/2107.05322

  20. Pickhardt, R., Tikhomirov, S., Biryukov, A., Nowostawski, M.: Security and privacy of lightning network payments with uncertain channel balances (2021). https://arxiv.org/abs/2103.08576

  21. Poon, J., Dryja, T.: The bitcoin lightning network: Scalable off-chain instant payments (Jan 2016), https://lightning.network/lightning-network-paper.pdf

  22. Rohrer, E., Laß, J.-F., Tschorsch, F.: Towards a concurrent and distributed route selection for payment channel networks. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2017 International Workshops, DPM 2017 and CBT 2017, Oslo, Norway, September 14-15, 2017, Proceedings, pp. 411–419. Springer International Publishing, Cham (2017). https://doi.org/10.1007/978-3-319-67816-0_23

    Chapter  Google Scholar 

  23. Rohrer, E., Malliaris, J., Tschorsch, F.: Discharged payment channels: quantifying the lightning network’s resilience to topology-based attacks. In: 2019 IEEE European Symposium on Security and Privacy Workshops, EuroS &P Workshops 2019, Stockholm, Sweden, June 17–19, 2019,. pp. 347–356. IEEE (2019)

    Google Scholar 

  24. Rohrer, E., Tschorsch, F.: Counting down thunder: timing attacks on privacy in payment channel networks. In: AFT ’20: 2nd ACM Conference on Advances in Financial Technologies, New York, NY, USA, October 21–23, 2020, pp. 214–227. ACM (2020)

    Google Scholar 

  25. Rohrer, J.P., Jabbar, A., Sterbenz, J.P.G.: Path diversification: a multipath resilience mechanism. In: 7th International Workshop on Design of Reliable Communication Networks, DRCN 2009, Washington, DC, USA, October 25–28, 2009, pp. 343–351. IEEE (2009)

    Google Scholar 

  26. Roos, S., Moreno-Sanchez, P., Kate, A., Goldberg, I.: Settling payments fast and private: Efficient decentralized routing for path-based transactions. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, February 18–21, 2018. The Internet Society (2018)

    Google Scholar 

  27. Seres, I.A., Gulyás, L., Nagy, D.A., Burcsi, P.: Topological analysis of bitcoin’s lightning network. In: Mathematical Research for Blockchain Economy, 1st International Conference, MARBLE 2019, Santorini, Greece, May 6–9, 2019, pp. 1–12. Springer (2019)

    Google Scholar 

  28. Tang, W., Wang, W., Fanti, G., Oh, S.: Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst. 4(2), 29:1–29:39 (2020)

    Google Scholar 

  29. Tikhomirov, S., Moreno-Sanchez, P., Maffei, M.: A quantitative analysis of security, anonymity and scalability for the lightning network. In: IEEE European Symposium on Security and Privacy Workshops, EuroS &P Workshops 2020, Genoa, Italy, September 7–11, 2020, pp. 387–396. IEEE (2020)

    Google Scholar 

  30. Tochner, S., Schmid, S., Zohar, A.: Hijacking routes in payment channel networks: A predictability tradeoff (2019). https://arxiv.org/abs/1909.06890

  31. Waugh, F., Holz, R.: An empirical study of availability and reliability properties of the bitcoin lightning network (2020). https://arxiv.org/abs/2006.14358

  32. Zabka, P., Foerster, K., Schmid, S., Decker, C.: Empirical evaluation of nodes and channels of the lightning network. Pervasive Mob. Comput. 83, 101584 (2022)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Charmaine Ndolo .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Ndolo, C., Tschorsch, F. (2024). On the (Not So) Surprising Impact of Multi-Path Payments on Performance And Privacy in the Lightning Network. In: Katsikas, S., et al. Computer Security. ESORICS 2023 International Workshops. ESORICS 2023. Lecture Notes in Computer Science, vol 14398. Springer, Cham. https://doi.org/10.1007/978-3-031-54204-6_25

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-54204-6_25

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-54203-9

  • Online ISBN: 978-3-031-54204-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics