Improving the Anonymity of the Lightning Network using Sub-Optimal Routes

Bachelor Thesis (2021)
Author(s)

M. Plotean (TU Delft - Electrical Engineering, Mathematics and Computer Science)

Contributor(s)

S. Roos – Mentor (TU Delft - Data-Intensive Systems)

S. Prabhu Kumble – Mentor (TU Delft - Data-Intensive Systems)

Diomidis Spinellis – Graduation committee member (TU Delft - Software Engineering)

Faculty
Electrical Engineering, Mathematics and Computer Science
Copyright
© 2021 Mihai Plotean
More Info
expand_more
Publication Year
2021
Language
English
Copyright
© 2021 Mihai Plotean
Graduation Date
01-07-2021
Awarding Institution
Delft University of Technology
Project
['CSE3000 Research Project']
Programme
['Computer Science and Engineering']
Faculty
Electrical Engineering, Mathematics and Computer Science
Reuse Rights

Other than for strictly personal use, it is not permitted to download, forward or distribute the text or part of it, without the consent of the author(s) and/or copyright holder(s), unless the work is under an open content license such as Creative Commons.

Abstract

The Lightning Network is a second layer payment protocol built on top of Bitcoin, which is scalable and has reduced transaction fees. It does so by eliminating the need to broadcast every transaction to the whole network. When one user wants to send a payment to another, the routing protocol generates a path between them that is always fast and cost efficient. The low degree of randomness in the existing routing protocols during path selection allows an adversary to compromise the anonymity of the sender and recipient.
In this work, we propose a new routing algorithm that is less predictable when creating a transaction path. We show that this increases the anonymity of the users of the Lightning Network by creating an attack on the new routing protocol. The attacker tries to identify the potential source and recipient of a transaction. Our results suggest that there is a trade-off between the offered anonymity and transaction fees; it is not possible to get higher anonymity at no cost by designing a non-deterministic routing algorithm.

Files

Research_Paper_1.pdf
(pdf | 1.7 Mb)
License info not available