MAD-HTLC: Because HTLC is Crazy-Cheap to Attack

06/22/2020
by   Itay Tsabary, et al.
0

Smart Contracts and transactions allow users to implement elaborate constructions on cryptocurrency blockchains like Bitcoin, Ethereum, and Libra. Many of these, including operational payment channels, use a building block called Hashed Time-Locked Contract (HTLC). In this work, we distill from HTLC a specification (HTLCSpec), and present an implementation called Mutual-Assured-Destruction Hashed Time-Locked Contract (MAD-HTLC). MADHTLC employs a novel approach of utilizing the existing blockchain operators, called miners, as part of the design. If a user misbehaves, MAD-HTLC incentivizes the miners to confiscate all her funds. We prove that MAD-HTLC satisfies HTLC-Spec with game-theoretic analysis and instantiate it on Bitcoin's operational blockchain. Notably, current miner software makes only little effort to optimize revenue, since the advantage is relatively small. However, as the demand grows and other revenue components shrink, miners are more motivated to fully optimize their fund intake. By patching the standard Bitcoin client, we demonstrate such an optimization is easy to implement, making the miners natural enforcers of MAD-HTLC. Finally, we show how vulnerable HTLC is to bribery attacks. An attacker can incentivize miners to prefer her transactions by offering high transaction fees. We demonstrate this can be easily implemented by patching the Bitcoin client, and use game theoretic tools to qualitatively tighten the known cost bound of such bribery attacks.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
04/27/2020

EventWarden: A Decentralized Event-driven Proxy Service for Outsourcing Arbitrary Transactions in Ethereum-like Blockchains

Transactions represent a fundamental component in blockchains as they ar...
research
04/15/2019

Detecting brute-force attacks on cryptocurrency wallets

Blockchain is a distributed ledger, which is protected against malicious...
research
03/31/2023

The Blockchain Imitation Game

The use of blockchains for automated and adversarial trading has become ...
research
05/22/2019

Towards Global Asset Management in Blockchain Systems

Permissionless blockchains (e.g., Bitcoin, Ethereum, etc) have shown a w...
research
08/01/2023

Game Theoretic Modelling of a Ransom and Extortion Attack on Ethereum Validators

Consensus algorithms facilitate agreement on and resolution of blockchai...
research
12/10/2018

An Air-Gapped 2-Factor Authentication for Smart-Contract Wallets

With the recent rise of cryptocurrencies, the security and management of...
research
07/29/2020

DiLeNA: Distributed Ledger Network Analyzer

This paper describes the Distributed Ledger Network Analyzer (DiLeNA), a...

Please sign up or login with your details

Forgot password? Click here to reset