Abstract
Payment Channel Network (PCN) provides the off-chain settlement of transactions. It is one of the most promising solutions to solve the scalability issue of the blockchain. Many routing techniques in PCN have been proposed. However, both incentive attack and privacy protection have not been considered in existing studies. In this paper, we present an auction-based system model for PCN routing using the Laplace differential privacy mechanism. We formulate the cost optimization problem to minimize the path cost under the constraints of the Hashed Time-Lock Contract (HTLC) tolerance and the channel capacity. We propose an approximation algorithm to find the top \(\cal{K}\) shortest paths constrained by the HTLC tolerance and the channel capacity, i.e., top \(\cal{K}\)-restricted shortest paths. Besides, we design the probability comparison function to find the path with the largest probability of having the lowest path cost among the top \(\cal{K}\)-restricted shortest paths as the final path. Moreover, we apply the binary search to calculate the transaction fee of each user. Through both theoretical analysis and extensive simulations, we demonstrate that the proposed routing mechanism can guarantee the truthfulness and individual rationality with the probabilities of 1/2 and 1/4, respectively. It can also ensure the differential privacy of the users. The experiments on the real-world datasets demonstrate that the privacy leakage of the proposed mechanism is 73.21% lower than that of the unified privacy protection mechanism with only 13.2% more path cost compared with the algorithm without privacy protection on average.
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.References
Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. Bitcoin, 2008.
Buterin V. A next-generation smart contract and decentralized application platform. Etherum, 2014.
Xu J, Wu Y, Luo X, Yang D. Improving the efficiency of blockchain applications with smart contract based cyber-insurance. In Proc. the 2020 IEEE International Conference on Communications (ICC), Jun. 2020. DOI: https://doi.org/10.1109/ICC40277.2020.9149301.
Decker C, Wattenhofer R. A fast and scalable payment network with bitcoin duplex micropayment channels. In Proc. the 17th International Symposium on Stabilization, Safety, and Security of Distributed Systems, Aug. 2015, pp.3–18. DOI: https://doi.org/10.1007/978-3-319-21741-3_1.
Zhang Y, Yang D, Xue G. CheaPay: An optimal algorithm for fee minimization in blockchain-based payment channel networks. In Proc. the 2019 IEEE International Conference on Communications (ICC), May. 2019. DOI: https://doi.org/10.1109/ICC.2019.8761804.
Di Stasi G, Avallone S, Canonico R, Ventre G. Routing payments on the lightning network. In Proc. the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Jul. 30–Aug. 3, 2018, pp.1161–1170. DOI: https://doi.org/10.1109/Cybermatics_2018.2018.00209.
Yu R, Xue G, Kilari V T, Yang D, Tang J. CoinExpress: A fast payment routing mechanism in blockchain-based payment channel networks. In Proc. the 27th International Conference on Computer Communication and Networks (ICCCN), Jul. 30–Aug. 2, 2018. DOI: https://doi.org/10.1109/ICCCN.2018.8487351.
Wang Z, Li J, Hu J, Ren J, Li Z, Li Y. Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform. In Proc. the 2019 IEEE Conference on Computer Communications, Apr. 29–May 2, 2019, pp.2053–2061. DOI: https://doi.org/10.1109/INFOCOM.2019.8737594.
Xu J, Luo Z, Guan C, Yang D, Liu L, Zhang Y. Hiring a team from social network: Incentive mechanism design for two-tiered social mobile crowdsourcing. IEEE Trans. Mobile Computing, 2023, 22(8): 4664–4681. DOI: https://doi.org/10.1109/TMC.2022.3162108.
Xu J, Rao Z, Xu L, Yang D, Li T. Incentive mechanism for multiple cooperative tasks with compatible users in mobile crowd sensing via online communities. IEEE Trans. Mobile Computing, 2020, 19(7): 1618–1633. DOI: https://doi.org/10.1109/TMC.2019.2911512.
Lu W, Zhang S, Xu J, Yang D, Xu L. Truthful multi-resource transaction mechanism for P2P task offloading based on edge computing. IEEE Trans. Vehicular Technology, 2021, 70(6): 6122–6135. DOI: https://doi.org/10.1109/TVT.2021.3079258.
Zhang D, Tan L, Ren J, Awad M, Zhang S, Zhang Y, Wan P. Near-optimal and truthful online auction for computation offloading in green edge-computing systems. IEEE Trans. Mobile Computing, 2020, 19(4): 880–893. DOI: https://doi.org/10.1109/TMC.2019.2901474.
Cheng K, Wang L, Shen Y, Liu Y, Wang Y, Zheng L. A lightweight auction framework for spectrum allocation with strong security guarantees. In Proc. the 2020 IEEE Conference on Computer Communications, Jul. 2020, pp.1708–1717. DOI: https://doi.org/10.1109/INFOCOM41043.2020.91552-79.
Xue G, Xu J, Wu H, Lu W, Xu L. Incentive mechanism for rational miners in Bitcoin mining pool. Information Systems Frontiers, 2021, 23(2): 317–327. DOI: https://doi.org/10.1007/s10796-020-10019-2.
Wang Y, Wang W, Dahlberg T A. Truthful routing for wireless hybrid networks. In Proc. the 2005 IEEE Global Telecommunications Conference, Nov. 28–Dec. 2, 2005, pp.3460–3465. DOI: https://doi.org/10.1109/GLOCOM.2005.1578416.
McSherry F, Talwar K. Mechanism design via differential privacy. In Proc. the 48th Annual IEEE Symposium on Foundations of Computer Science, Oct. 2007, pp.94–103. DOI: https://doi.org/10.1109/FOCS.2007.66.
Dwork C. Differential privacy: A survey of results. In Proc. the 5th International Conference on Theory and Applications of Models of Computation, Apr. 2008. DOI: https://doi.org/10.1007/978-3-540-79228-4_1.
Wallace K A. Anonymity. Ethics and Information Technology, 1999, 1(1): 21–31. DOI: https://doi.org/10.1023/A:1010066509278.
Alenezi M N, Alabdulrazzaq H K, Mohammad N Q. Symmetric encryption algorithms: Review and evaluation study. International Journal of Communication Networks and Information Security, 2022, 12(2): 256–272. DOI: https://doi.org/10.17762/ijcnis.v12i2.4698.
Wang Z, Hu J, Lv R, Wei J, Wang Q, Yang D, Qi H. Personalized privacy-preserving task allocation for mobile crowdsensing. IEEE Trans. Mobile Computing, 2019, 18(6): 1330–1341. DOI: https://doi.org/10.1109/TMC.2018.2861393.
Zhang X, Shi S, Qian C. Scalable decentralized routing for blockchain payment networks. In Proc. the 3rd International Symposium on Foundations and Applications of Blockchain, May 2020.
Khalil R, Gervais A. Revive: Rebalancing off-blockchain payment networks. In Proc. the 2017 ACM SIGSAC Conference on Computer and Communications Security, Oct. 2017, pp.439–453. DOI: https://doi.org/10.1145/3133956.3134033.
Zhang Y, Yang D. RobustPay: Robust payment routing protocol in blockchain-based payment channel networks. In Proc. the 27th International Conference on Network Protocols (ICNP), Oct. 2019. DOI: https://doi.org/10.1109/ICNP.2019.8888094.
Tripathy S, Mohanty S K. MAPPCN: Multi-hop anonymous and privacy-preserving payment channel network. In Proc. the 2020 International Conference on Financial Cryptography and Data Security, Feb. 2020, pp.481–495. DOI: https://doi.org/10.1007/978-3-030-54455-3_34.
Mazumdar S, Ruj S. CryptoMaze: Privacy-preserving splitting of off-chain payments. IEEE Trans. Dependable and Secure Computing, 2023, 20(2): 1060–1073. DOI: https://doi.org/10.1109/TDSC.2022.3148476.
Yu B, Kermanshahi S K, Sakzad A, Nepal S. Chameleon hash time-lock contract for privacy preserving payment channel networks. In Proc. the 13th International Conference on Provable Security, Oct. 2019, pp.303–318. DOI: https://doi.org/10.1007/978-3-030-31919-9_18.
Herrera-Joancomarti J, Navarro-Arribas G, Ranchal-Pedrosa A, Perez-Sola C, Garcia-Alfaro J. On the difficulty of hiding the balance of lightning network channels. In Proc. the 2019 ACM Asia Conference on Computer and Communications Security, Jul. 2019, pp.602–612. DOI: https://doi.org/10.1145/3321705.3329812.
Tang W, Wang W, Fanti G, Oh S. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. In Proc. the 2020 ACM on Measurement and Analysis of Computing Systems, Jun. 2020, Article No. 29. DOI: https://doi.org/10.1145/3392147.
Roos S, Moreno-Sanchez P, Kate A, Goldberg I. Settling payments fast and private: Efficient decentralized routing for path-based transactions. In Proc. the 25th Annual Network and Distributed System Security Symposium, Feb. 2018, pp.455–471. DOI: https://doi.org/10.48550/arXiv.1709.05748.
Li P, Luo X F, Miyazaki T, Guo S. Privacy-preserving payment channel networks using trusted execution environment. In Proc. the 2020 IEEE International Conference on Communications (ICC), Jun. 2020. DOI: https://doi.org/10.1109/ICC40277.2020.9149447.
Niu B, Chen Y, Wang B, Cao J, Li F. Utility-aware exponential mechanism for personalized differential privacy. In Proc. the 2020 IEEE Wireless Communications and Networking Conference (WCNC), May 2020. DOI: https://doi.org/10.1109/WCNC45663.2020.9120532.
Jorgensen Z, Yu T, Cormode G. Conservative or liberal? Personalized differential privacy. In Proc. the 31st International Conference on Data Engineering, Apr. 2015, pp.1023–1034. DOI: https://doi.org/10.1109/ICDE.2015.7113353.
Duchi J C, Jordan M I, Wainwright M J. Local privacy and statistical minimax rates. In Proc. the 54th Annual Symposium on Foundations of Computer Science, Oct. 2013, pp.429–438. DOI: https://doi.org/10.1109/FOCS.2013.53.
Jin X, Zhang Y. Privacy-preserving crowdsourced spectrum sensing. IEEE/ACM Trans. Networking, 2018, 26(3): 1236–1249. DOI: https://doi.org/10.1109/TNET.2018.2823272.
Lin J, Yang D, Li M, Xu J, Xue G. Frameworks for privacy-preserving mobile crowdsensing incentive mechanisms. IEEE Trans. Mobile Computing, 2018, 17(8): 1851–1864. DOI: https://doi.org/10.1109/TMC.2017.2780091.
Lv D, Zhu S. Achieving correlated differential privacy of big data publication. Computers & Security, 2019, 82: 184–195. DOI: https://doi.org/10.1016/j.cose.2018.12.017.
Wang T, Mei Y, Jia W, Zheng X, Wang G, Xie M. Edge-based differential privacy computing for sensor-cloud systems. Journal of Parallel and Distributed Computing, 2020, 136: 75–85. DOI: https://doi.org/10.1016/j.jpdc.2019.10.009.
Wei K, Li J, Ding M, Ma C, Yang H H, Farokhi F, Jin S, Quek T Q S, Poor H V. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Trans. Information Forensics and Security, 2020, 15: 3454–3469. DOI: https://doi.org/10.1109/TIFS.2020.2988575.
Bao T, Xu L, Zhu L, Wang L, Li T. Successive point-of-interest recommendation with personalized local differential privacy. IEEE Trans. Vehicular Technology, 2021, 70(10): 10477–10488. DOI: https://doi.org/10.1109/TVT.2021.3108463.
Dwork C, Roth A. The algorithmic foundations of differential privacy. Foundations and Trends® in Theoretical Computer Science, 2014, 9(3/4): 211–407. DOI: https://doi.org/10.1561/0400000042.
McSherry F D. Privacy integrated queries: An extensible platform for privacy-preserving data analysis. In Proc. the 2009 ACM SIGMOD International Conference on Management of Data, Jun. 2009, pp.19–30. DOI: https://doi.org/10.1145/1559845.1559850.
Hassin R. Approximation schemes for the restricted shortest path problem. Mathematics of Operations Research, 1992, 17(1): 36–42. DOI: https://doi.org/10.1287/moor.17.1.36.
Yen J Y. Finding the K shortest loopless paths in a network. Management Science, 1971, 17(11): 712–716. DOI: https://doi.org/10.1287/mnsc.17.11.712.
Xue G, Zhang W, Tang J, Thulasiraman K. Polynomial time approximation algorithms for multi-constrained QoS routing. IEEE/ACM Trans. Networking, 2008, 16(3): 656–669. DOI: https://doi.org/10.1109/TNET.2007.900712.
Singla A, Krause A. Truthful incentives in crowdsourcing tasks using regret minimization mechanisms. In Proc. the 22nd International Conference on World Wide Web, May 2013, pp.1167–1178. DOI: https://doi.org/10.1145/2488388.2488490.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflict of Interest The authors declare that they have no conflict of interest.
Additional information
This work was partially supported by the National Natural Science Foundation of China under Grant Nos. 61872193, 61872191, and 62072254, and the Postgraduate Research and Practice Innovation Program of Jiangsu Province of China under Grant No. KYCX20_0762.
Peng-Cheng Zhao received his M.S. degree from Nanjing Forestry University, Nanjing, in 2019, and his B.S. degree from Chengxian College, Nanjing, in 2015. He is pursuing his Ph.D. degree at Nanjing University of Posts and Telecommunications, Nanjing. His research interests are mainly in the areas of the mobile crowdsensing, edge computing, and blockchain.
Li-Jie Xu received his Ph.D. degree from Nanjing University, Nanjing, in 2014. He is currently an associate professor in the School of Computer Science at Nanjing University of Posts and Telecommunications, Nanjing. His research interests are mainly in the areas of wireless sensor networks, ad-hoc networks, mobile and distributed computing, and graph theory algorithms.
Jia Xu received his M.S. degree from Yangzhou University, Yangzhou, in 2006, and his Ph.D. degree from Nanjing University of Science and Technology, Nanjing, in 2010. He is currently a professor in the School of Computer Science at Nanjing University of Posts and Telecommunications, Nanjing. His main research interests include crowdsourcing, edge computing, and blockchain.
Electronic Supplementary Material
Rights and permissions
About this article
Cite this article
Zhao, PC., Xu, LJ. & Xu, J. Personalized Privacy-Preserving Routing Mechanism Design in Payment Channel Network. J. Comput. Sci. Technol. 39, 1380–1400 (2024). https://doi.org/10.1007/s11390-024-2635-5
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11390-024-2635-5