论文标题
lngate $^2 $:使用比特币的闪电网络和阈值密码学安全双向物联网微付款
LNGate$^2$: Secure Bidirectional IoT Micro-payments using Bitcoin's Lightning Network and Threshold Cryptography
论文作者
论文摘要
比特币以其分散的分类帐概念而成为一种革命性的支付系统。但是,它存在重大问题,例如高交易费用和低通量。在很久以后引入的闪电网络(LN)以称为链支付的创新概念解决了大多数这些问题。随着这一进步,比特币已成为执行微付款的有吸引力的场所,这些场所也可以在许多物联网应用程序(例如收费付款)中采用。然而,由于存储,内存和处理限制,在物联网设备上托管LN和比特币是不可行的。因此,在本文中,我们提出了一个安全有效的协议,该协议使IoT设备能够通过不信任的网关节点使用LN的功能。通过托管LN和比特币节点的该网关,物联网设备可以打开和关闭LN通道并发送和接收LN付款。这种委派方法由基于阈值加密的方案提供动力,该方案需要IoT设备和LN网关共同执行所有LN操作。具体来说,我们建议将LN的比特币公共钥匙和私人钥匙及其新渠道州的公共和私钥(即承诺点)提出阈值。我们通过游戏理论安全分析证明,物联网设备可以防止勾结攻击。我们通过更改LN的源代码,并使用多个Raspberry PI对其性能进行了彻底评估。我们的评估结果表明该方案;快速,不会带来额外的成本开销,可以在低数据速率无线网络上运行,可扩展并且可以忽略不计的能源消耗开销。据我们所知,这是在LN中实施阈值加密的第一部作品。
Bitcoin has emerged as a revolutionary payment system with its decentralized ledger concept; however it has significant problems such as high transaction fees and low throughput. Lightning Network (LN), which was introduced much later, solves most of these problems with an innovative concept called off-chain payments. With this advancement, Bitcoin has become an attractive venue to perform micro-payments which can also be adopted in many IoT applications (e.g., toll payments). Nevertheless, it is not feasible to host LN and Bitcoin on IoT devices due to the storage, memory, and processing restrictions. Therefore, in this paper, we propose a secure and efficient protocol that enables an IoT device to use LN's functions through an untrusted gateway node. Through this gateway which hosts the LN and Bitcoin nodes, the IoT device can open & close LN channels and send & receive LN payments. This delegation approach is powered by a threshold cryptography based scheme that requires the IoT device and the LN gateway to jointly perform all LN operations. Specifically, we propose thresholdizing LN's Bitcoin public and private keys as well as its public and private keys for the new channel states (i.e., commitment points). We prove with a game theoretical security analysis that the IoT device is secure against collusion attacks. We implemented the proposed protocol by changing LN's source code and thoroughly evaluated its performance using several Raspberry Pis. Our evaluation results show that the protocol; is fast, does not bring extra cost overhead, can be run on low data rate wireless networks, is scalable and has negligible energy consumption overhead. To the best of our knowledge, this is the first work that implemented threshold cryptography in LN.