论文标题
闪电协议中的跨层脱位方法
Cross-Layer Deanonymization Methods in the Lightning Protocol
论文作者
论文摘要
比特币(BTC)假名(第1层)可以使用启发式聚类技术有效地将其脱离nony。但是,尽管在闪电网络(LN)中执行链链(第2层)的交易似乎增强了隐私,但由于缺少两层之间的相互作用,对匿名性和隐私泄漏进行了系统分析。我们根据共享的命名和托管信息,介绍了BTC与LN的互动以及LN节点的相互作用,介绍了组BTC的启发式方法。我们还提出了将所有LN节点的45.97%与BTC解决与LN相互作用的29.61%的启发式方法。这些链接使我们能够将信息(例如,别名,IP地址)归因于BTC地址的21.19%,以造成其脱名单。此外,这些脱名单的结果表明,LN付款的安全性和隐私比通常认为的弱,而LN用户的个人受到了五个控制36个节点的参与者的个人的控制,占总容量的33%以上。总体而言,这是第一个提供一种将LN节点与BTC地址跨层链接并讨论隐私和安全含义的方法。
Bitcoin (BTC) pseudonyms (layer 1) can effectively be deanonymized using heuristic clustering techniques. However, while performing transactions off-chain (layer 2) in the Lightning Network (LN) seems to enhance privacy, a systematic analysis of the anonymity and privacy leakages due to the interaction between the two layers is missing. We present clustering heuristics that group BTC addresses, based on their interaction with the LN, as well as LN nodes, based on shared naming and hosting information. We also present linking heuristics that link 45.97% of all LN nodes to 29.61% BTC addresses interacting with the LN. These links allow us to attribute information (e.g., aliases, IP addresses) to 21.19% of the BTC addresses contributing to their deanonymization. Further, these deanonymization results suggest that the security and privacy of LN payments are weaker than commonly believed, with LN users being at the mercy of as few as five actors that control 36 nodes and over 33% of the total capacity. Overall, this is the first paper to present a method for linking LN nodes with BTC addresses across layers and to discuss privacy and security implications.