SoK: Bitcoin Layer Two (L2)
Uložené v:
| Názov: | SoK: Bitcoin Layer Two (L2) |
|---|---|
| Autori: | Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono |
| Zdroj: | Qi, M, Wang, Q, Wang, Z, Schneider, M, Zhu, T, Chen, S, Knottenbelt, W & Hardjono, T 2025, 'SoK: Bitcoin Layer Two (L2)', ACM Computing Surveys. https://doi.org/10.1145/3763232 |
| Publication Status: | Preprint |
| Informácie o vydavateľovi: | Association for Computing Machinery (ACM), 2025. |
| Rok vydania: | 2025 |
| Predmety: | FOS: Computer and information sciences, Computer Science - Cryptography and Security, Emerging Technologies (cs.ET), Computer Science - Emerging Technologies, Cryptography and Security (cs.CR) |
| Popis: | In this article, we present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modifying transactions and creating proofs). Notably, we are the first to incorporate the inscription technology (emerged in mid-2023), along with a series of related innovations. We further establish a reference framework that serves as a baseline criterion ideally suited for evaluating the security aspects of Bitcoin L2 solutions, and which can also be extended to broader L2 applications. We apply this framework to evaluate each of the projects we investigated. We find that the inscription-based approaches introduce new functionality (i.e., programability) to Bitcoin systems, whereas existing proof-based solutions primarily address scalability challenges. Our security analysis reveals new attack vectors targeting data/state (availability, verification), assets (withdrawal, recovery), and users (disputes, censorship). |
| Druh dokumentu: | Article |
| Jazyk: | English |
| ISSN: | 1557-7341 0360-0300 |
| DOI: | 10.1145/3763232 |
| DOI: | 10.48550/arxiv.2409.02650 |
| Prístupová URL adresa: | http://arxiv.org/abs/2409.02650 |
| Rights: | CC BY |
| Prístupové číslo: | edsair.doi.dedup.....73bf5dd3fe0675b545e7c77bfb2af007 |
| Databáza: | OpenAIRE |
| Abstrakt: | In this article, we present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modifying transactions and creating proofs). Notably, we are the first to incorporate the inscription technology (emerged in mid-2023), along with a series of related innovations. We further establish a reference framework that serves as a baseline criterion ideally suited for evaluating the security aspects of Bitcoin L2 solutions, and which can also be extended to broader L2 applications. We apply this framework to evaluate each of the projects we investigated. We find that the inscription-based approaches introduce new functionality (i.e., programability) to Bitcoin systems, whereas existing proof-based solutions primarily address scalability challenges. Our security analysis reveals new attack vectors targeting data/state (availability, verification), assets (withdrawal, recovery), and users (disputes, censorship). |
|---|---|
| ISSN: | 15577341 03600300 |
| DOI: | 10.1145/3763232 |
Full Text Finder
Nájsť tento článok vo Web of Science