SoK: Bitcoin Layer Two (L2)

Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono
{"title":"SoK: Bitcoin Layer Two (L2)","authors":"Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono","doi":"arxiv-2409.02650","DOIUrl":null,"url":null,"abstract":"We present the first Systematization of Knowledge (SoK) on constructing Layer\nTwo (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions\n(40 out of 335 extensively investigated cases) and provide a concise yet\nimpactful identification of six classic design patterns through two approaches\n(i.e., modifying transactions \\& creating proofs). Notably, we are the first to\nincorporate the inscription technology (emerged in mid-2023), along with a\nseries of related innovations. We further establish a reference framework that\nserves as a baseline criterion ideally suited for evaluating the security\naspects of Bitcoin L2 solutions, and which can also be extended to broader L2\napplications. We apply this framework to evaluate each of the projects we\ninvestigated. We find that the inscription-based approaches introduce new functionality\n(i.e., programability) to Bitcoin systems, whereas existing proof-based\nsolutions primarily address scalability challenges. Our security analysis\nreveals new attack vectors targeting data/state (availability, verification),\nassets (withdrawal, recovery), and users (disputes, censorship).","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.02650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

We present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modifying transactions \& creating proofs). Notably, we are the first to incorporate the inscription technology (emerged in mid-2023), along with a series of related innovations. We further establish a reference framework that serves as a baseline criterion ideally suited for evaluating the security aspects of Bitcoin L2 solutions, and which can also be extended to broader L2 applications. We apply this framework to evaluate each of the projects we investigated. We find that the inscription-based approaches introduce new functionality (i.e., programability) to Bitcoin systems, whereas existing proof-based solutions primarily address scalability challenges. Our security analysis reveals new attack vectors targeting data/state (availability, verification), assets (withdrawal, recovery), and users (disputes, censorship).
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
SoK:比特币第二层 (L2)
我们首次提出了关于构建比特币第二层(L2)解决方案的知识系统化(SoK)。我们仔细研究了正在进行中的比特币第二层解决方案的代表性子集(335 个广泛调查案例中的 40 个),并通过两种方法(即修改交易和创建证明)对六种经典设计模式进行了简明而有影响力的识别。值得注意的是,我们首次纳入了铭文技术(2023 年中期出现)以及一系列相关创新。我们进一步建立了一个参考框架,作为评估比特币二级解决方案安全方面的理想基准标准,也可扩展到更广泛的二级应用。我们应用这一框架来评估我们调查的每个项目。我们发现,基于铭文的方法为比特币系统引入了新的功能(即可编程性),而现有的基于证明的解决方案主要是解决可扩展性的挑战。我们的安全分析揭示了针对数据/状态(可用性、验证)、资产(提取、恢复)和用户(争议、审查)的新攻击向量。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Pennsieve - A Collaborative Platform for Translational Neuroscience and Beyond Analysing Attacks on Blockchain Systems in a Layer-based Approach Exploring Utility in a Real-World Warehouse Optimization Problem: Formulation Based on Quantun Annealers and Preliminary Results High Definition Map Mapping and Update: A General Overview and Future Directions Detection Made Easy: Potentials of Large Language Models for Solidity Vulnerabilities
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1