[Paper Pick] Preventing Abuse in a Lightning-based Peer-to-Peer Exchange
This week’s brings two papers from the same team on the topic of preventing delay abuse within lightning p2p exchanges:
A trusted latency monitor service, for preventing abuse in a Lightning-based peer-to-peer exchange. link
Preventing transaction delays with a Lightning routing service, for preventing abuse in a Lightning-based peer-to-peer exchange. link
Excerpt from the papers describing the delay attack:
An exchange transaction has two exchanging parties: one intermediate node (B) that placed an order, and one node (A) that accepts the order by making a route from A to B using one asset (X), and then back to A using the other asset (Y). Both parties have a step in the Lightning protocol where they can delay the decision on whether to execute or cancel the transaction, up to the time specified in a HTLC time-out. These time-outs can be quite large, because they have to allow operators of intermediate nodes to manually repair/replace anything (including hardware and internet connections) that might break in the middle of ongoing transactions. In the mean time, the exchange rate between X and Y will be changed, either in the advantage of A, or in the advantage of B.
Support us and the authors of this article by donating to the following address:37WMnGs5smxVjKDiL6tVeHZo3mpjwpy6e2