Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono
{"title":"SoK: Bitcoin Layer Two (L2)","authors":"Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono","doi":"arxiv-2409.02650","DOIUrl":null,"url":null,"abstract":"We present the first Systematization of Knowledge (SoK) on constructing Layer\nTwo (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions\n(40 out of 335 extensively investigated cases) and provide a concise yet\nimpactful identification of six classic design patterns through two approaches\n(i.e., modifying transactions \\& creating proofs). Notably, we are the first to\nincorporate the inscription technology (emerged in mid-2023), along with a\nseries of related innovations. We further establish a reference framework that\nserves as a baseline criterion ideally suited for evaluating the security\naspects of Bitcoin L2 solutions, and which can also be extended to broader L2\napplications. We apply this framework to evaluate each of the projects we\ninvestigated. We find that the inscription-based approaches introduce new functionality\n(i.e., programability) to Bitcoin systems, whereas existing proof-based\nsolutions primarily address scalability challenges. Our security analysis\nreveals new attack vectors targeting data/state (availability, verification),\nassets (withdrawal, recovery), and users (disputes, censorship).","PeriodicalId":501168,"journal":{"name":"arXiv - CS - Emerging Technologies","volume":"20 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Emerging Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2409.02650","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
We present the first Systematization of Knowledge (SoK) on constructing Layer
Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions
(40 out of 335 extensively investigated cases) and provide a concise yet
impactful identification of six classic design patterns through two approaches
(i.e., modifying transactions \& creating proofs). Notably, we are the first to
incorporate the inscription technology (emerged in mid-2023), along with a
series of related innovations. We further establish a reference framework that
serves as a baseline criterion ideally suited for evaluating the security
aspects of Bitcoin L2 solutions, and which can also be extended to broader L2
applications. We apply this framework to evaluate each of the projects we
investigated. We find that the inscription-based approaches introduce new functionality
(i.e., programability) to Bitcoin systems, whereas existing proof-based
solutions primarily address scalability challenges. Our security analysis
reveals new attack vectors targeting data/state (availability, verification),
assets (withdrawal, recovery), and users (disputes, censorship).