2020
DOI: 10.48550/arxiv.2006.08513
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Flood & Loot: A Systemic Attack On The Lightning Network

Abstract: The Lightning Network promises to alleviate Bitcoin's known scalability problems. The operation of such second layer approaches relies on the ability of participants to turn to the blockchain to claim funds at any time, which is assumed to happen rarely.One of the risks that was identified early on is that of a wide systemic attack on the protocol, in which an attacker triggers the closure of many Lightning channels at once. The resulting high volume of transactions in the blockchain will not allow for the pro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
3
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 18 publications
0
3
0
Order By: Relevance
“…If the attack is sustained for long enough, the claiming transactions may expire, causing the claimant to lose their funds, and the attacker will be able to obtain the rest of the funds in the payment channel. [10].…”
Section: Lightning Networkmentioning
confidence: 99%
“…If the attack is sustained for long enough, the claiming transactions may expire, causing the claimant to lose their funds, and the attacker will be able to obtain the rest of the funds in the payment channel. [10].…”
Section: Lightning Networkmentioning
confidence: 99%
“…These assumptions need to be met to instantiate a first layer that allows for a secure PCN as second layer. Recent work [11,23,7] has shown attacks against payment channels that attack the liveness of a blockchain, e.g. by bribing miners to censor transactions.…”
Section: Instances and Options Of The Rfl Modelmentioning
confidence: 99%
“…In the computer science literature, papers have focused on the financial viability of the LN (e.g., Béres, Seres, and Benczúr (2019) and Brânzei, Segal-Halevi, and Zohar (2017)); its network struc-ture (e.g., Lin et al (2020) and Martinazzi and Flori (2020)); and its ability to guarantee security and privacy (e.g., Harris and Zohar (2020), Kappos et al (2021), and Pérez-Solà et al ( 2020)).…”
mentioning
confidence: 99%