Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Evaluation of Payment Channels for Bitcoin Exchange Inflows and Outflows
Umeå University, Faculty of Science and Technology, Department of Computing Science.
2018 (English)Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Abstract [en]

With increasing popularity, the scalability of blockchain-based crypto-currencies becomes an urgent concern. Bitcoin, among other crypto-currencies, have known limitations in transaction throughput and speedbut no agreed upon solution. Many of the proposals increasing throughput also increase the load on the Bitcoin network.

Lightning is a proposal enabling payments to be conducted without affecting the Bitcoin network. Lightning is a protocol using payment channels to enable instant and cheap payments using the blockchain for security. With Lightning, payments can be sent through a network of nodes connected by payment channels.

In this thesis, the current state of Lightning is explored and an evaluation for use on Bitcoin exchanges is performed. The usability, privacy and security of Lightning are the topics evaluated. In order to evaluate the usability, an exchange interface application was built allowing deposits and withdrawals using Lightning. The protocol specification and relevant literature are examined in order to evaluate the security and privacy of Lightning.

The exchange interface showed that Lightning can be integrated into an exchange and provide a fast and cheap way to deposit and withdraw money for clients. In this paper some integration designs are proposed and ways to improve the client user experience are discussed. The Lightning node implementations need to mature a bit before real usage and there are some security issues that also need to be considered. With monitoring and network analysis the privacy can be compromised.

Place, publisher, year, edition, pages
2018. , p. 54
Series
UMNAD ; 1144
National Category
Engineering and Technology
Identifiers
URN: urn:nbn:se:umu:diva-149692OAI: oai:DiVA.org:umu-149692DiVA, id: diva2:1223841
External cooperation
Cinnober Financial Technology
Educational program
Master of Science Programme in Computing Science and Engineering
Supervisors
Examiners
Available from: 2018-06-26 Created: 2018-06-26 Last updated: 2018-06-26Bibliographically approved

Open Access in DiVA

fulltext(664 kB)20 downloads
File information
File name FULLTEXT01.pdfFile size 664 kBChecksum SHA-512
d09d1dc2926168c735f9f0e24e2387c774f5f014f62716e2f70dc4bafba121f911a8cdd49529088fae848d64cd6362c29bafc1133679060cfb8917a316806372
Type fulltextMimetype application/pdf

By organisation
Department of Computing Science
Engineering and Technology

Search outside of DiVA

GoogleGoogle Scholar
Total: 20 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

urn-nbn

Altmetric score

urn-nbn
Total: 40 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf