We gratefully acknowledge support from
the Simons Foundation and member institutions.
Full-text links:

Download:

Current browse context:

cs.CR

Change to browse by:

cs

References & Citations

DBLP - CS Bibliography

Bookmark

(what is this?)
CiteULike logo BibSonomy logo Mendeley logo del.icio.us logo Digg logo Reddit logo

Computer Science > Cryptography and Security

Title: LNGate: Powering IoT with Next Generation Lightning Micro-payments using Threshold Cryptography

Abstract: Bitcoin has emerged as a revolutionary payment system with its decentralized ledger concept however it has significant problems such as high transaction fees and long confirmation times. Lightning Network (LN), which was introduced much later, solves most of these problems with an innovative concept called off-chain payments. With this advancement, Bitcoin has become an attractive venue to perform micro-payments which can also be adopted in many IoT applications (e.g. toll payments). Nevertheless, it is not feasible to host LN and Bitcoin on IoT devices due to the storage, memory, and processing requirements. Therefore, in this paper, we propose an efficient and secure protocol that enables an IoT device to use LN through an untrusted gateway node. The gateway hosts LN and Bitcoin nodes and can open & close LN channels, send LN payments on behalf of the IoT device. This delegation approach is powered by a (2,2)-threshold scheme that requires the IoT device and the LN gateway to jointly perform all LN operations which in turn secures both parties' funds. Specifically, we propose to thresholdize LN's Bitcoin public and private keys as well as its commitment points. With these and several other protocol level changes, IoT device is protected against revoked state broadcast, collusion, and ransom attacks. We implemented the proposed protocol by changing LN's source code and thoroughly evaluated its performance using a Raspberry Pi. Our evaluation results show that computational and communication delays associated with the protocol are negligible. To the best of our knowledge, this is the first work that implemented threshold cryptography in LN.
Comments: Author's version. To appear at 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks (WiSec 2021). arXiv admin note: text overlap with arXiv:2012.10576
Subjects: Cryptography and Security (cs.CR)
Cite as: arXiv:2105.08902 [cs.CR]
  (or arXiv:2105.08902v2 [cs.CR] for this version)

Submission history

From: Ahmet Kurt [view email]
[v1] Wed, 19 May 2021 03:11:10 GMT (333kb,D)
[v2] Fri, 28 May 2021 00:53:16 GMT (332kb,D)

Link back to: arXiv, form interface, contact.