SoK: Bitcoin Layer Two (L2)

Uložené v:
Podrobná bibliografia
Názov: SoK: Bitcoin Layer Two (L2)
Autori: Minfeng Qi, Qin Wang, Zhipeng Wang, Manvir Schneider, Tianqing Zhu, Shiping Chen, William Knottenbelt, Thomas Hardjono
Zdroj: Qi, M, Wang, Q, Wang, Z, Schneider, M, Zhu, T, Chen, S, Knottenbelt, W & Hardjono, T 2025, 'SoK: Bitcoin Layer Two (L2)', ACM Computing Surveys. https://doi.org/10.1145/3763232
Publication Status: Preprint
Informácie o vydavateľovi: Association for Computing Machinery (ACM), 2025.
Rok vydania: 2025
Predmety: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Emerging Technologies (cs.ET), Computer Science - Emerging Technologies, Cryptography and Security (cs.CR)
Popis: In this article, we present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modifying transactions and creating proofs). Notably, we are the first to incorporate the inscription technology (emerged in mid-2023), along with a series of related innovations. We further establish a reference framework that serves as a baseline criterion ideally suited for evaluating the security aspects of Bitcoin L2 solutions, and which can also be extended to broader L2 applications. We apply this framework to evaluate each of the projects we investigated. We find that the inscription-based approaches introduce new functionality (i.e., programability) to Bitcoin systems, whereas existing proof-based solutions primarily address scalability challenges. Our security analysis reveals new attack vectors targeting data/state (availability, verification), assets (withdrawal, recovery), and users (disputes, censorship).
Druh dokumentu: Article
Jazyk: English
ISSN: 1557-7341
0360-0300
DOI: 10.1145/3763232
DOI: 10.48550/arxiv.2409.02650
Prístupová URL adresa: http://arxiv.org/abs/2409.02650
Rights: CC BY
Prístupové číslo: edsair.doi.dedup.....73bf5dd3fe0675b545e7c77bfb2af007
Databáza: OpenAIRE
Popis
Abstrakt:In this article, we present the first Systematization of Knowledge (SoK) on constructing Layer Two (L2) solutions for Bitcoin. We carefully examine a representative subset of ongoing Bitcoin L2 solutions (40 out of 335 extensively investigated cases) and provide a concise yet impactful identification of six classic design patterns through two approaches (i.e., modifying transactions and creating proofs). Notably, we are the first to incorporate the inscription technology (emerged in mid-2023), along with a series of related innovations. We further establish a reference framework that serves as a baseline criterion ideally suited for evaluating the security aspects of Bitcoin L2 solutions, and which can also be extended to broader L2 applications. We apply this framework to evaluate each of the projects we investigated. We find that the inscription-based approaches introduce new functionality (i.e., programability) to Bitcoin systems, whereas existing proof-based solutions primarily address scalability challenges. Our security analysis reveals new attack vectors targeting data/state (availability, verification), assets (withdrawal, recovery), and users (disputes, censorship).
ISSN:15577341
03600300
DOI:10.1145/3763232