New Protocol Makes Bitcoin Transactions More Secure and Faster Than Lightning
Our research unit Security and Privacy developed a protocol that makes transactions with cryptocurrencies faster and more secure.
Cryptocurrencies like Bitcoin are becoming increasingly popular. At first glance, they have many advantages: Transactions are usually anonymous, fast and inexpensive. But sometimes there are problems with them. In certain situations, fraud is possible, users can discover information about other users that should be kept secret, and occasionally delays occur.
Lukas Aumayr and his supervisor Matteo Maffei from our research unit Security and Privacy in collaboration with the IMDEA Software Institute (Pedro Moreno-Sanchez, previously postdoc at TU Wien) and the Purdue University (Aniket Kate) analyzed these problems and developed an improved protocol. It has now been published and will be presented this year at the prestigious USENIX Security Symposium.
The bottleneck of Bitcoin
“It has long been known that Bitcoin and other blockchain technologies have a scalability problem: There can only be a maximum of ten transactions per second,” says Lukas Aumayr of the Security and Privacy research unit. “That’s very few compared to credit card companies, for example, which perform tens of thousands of transactions per second worldwide.”
An approach to solve this problem is the “Lightning Network”—an additional payment channel network between blockchain users. For example, if two people want to process many transactions in a short time, they can exchange payments directly between each other in this way, without each transaction being published on the blockchain. Only at the beginning and end of this series of transactions is there an official entry in the blockchain.
These “side branches” of the blockchain can also be made relatively complicated, with chains of multiple users. “Problems can arise in the process,” says Lukas Aumayr. “In certain cases, users can then get hold of data about other users. In addition, everyone in this chain has to contribute a certain amount of money, locked as collateral. Sometimes a transaction fails, and then a lot of money can remain locked for a relatively long time—the more people involved, the longer.”
Mathematically Ruling out Vulnerabilities
Our research team analyzed how this transaction protocol can be improved and developed an alternative construction. “You can analyze the security of such protocols using formal methods. So we can mathematically prove that our new protocol does not allow certain errors and problems in any situation,” Aumayr explains.
This makes it possible to rule out particular security-critical attacks that were previously possible, and also to prevent long-term money blocking: “Previously, two rounds of communication were necessary: In the first round, the money is locked, in the second round it is released—or refunded if there were problems. That could mean an extra day of delay for each user in that chain. With our protocol, the communication chain only has to be run through once,” explains Lukas Aumayr.
Simulation Proves Practicality
However, it is not only the fundamental logical structure of the new protocol that is important, but also its practicality. Therefore, the team simulated how the new technology behaves compared to the previous Lightning network in a payment channel network. The advantages of the new protocol became particularly apparent: depending on the situation, such as whether or not there are attacks and fraud attempts, the new protocol results in a factor of 4 to 33 fewer failed transactions than with the conventional Lightning network.
Our team is already in contact with the Lightning network’s development organizations. “Of course, we hope that our technology will be quickly deployed, or at least offered as a more secure alternative to the current technology,” says Lukas Aumayr. “Technically, this could be implemented immediately.”