Bitcoin Lightning Network Specs Pass First 'Formal' Security Test

A pair of researchers have released the results of a formal verification of the lightning network, saying it's "as secure as bitcoin."

AccessTimeIconSep 22, 2019 at 9:11 a.m. UTC
Updated Sep 13, 2021 at 11:28 a.m. UTC
10 Years of Decentralizing the Future
May 29-31, 2024 - Austin, TexasThe biggest and most established global hub for everything crypto, blockchain and Web3.Register Now

A pair of researchers have released the results of a formal verification of bitcoin's lightning network.

Lightning is new(ish), experimental, and bugs that could lead to loss of user funds are still being discovered. But even so, the paper – released last month by researchers Aggelos Kiayias and Orfeas Litos from The University of Edinburgh. Kiayias is also the chief scientist for blockchain firm IOHK – brought a dose of good news on the underlying security of the nascent payment network.

To date, lightning hadn't been tested mathematically by way of formal security, which is a means of establishing how secure a computer science idea is with the help of mathematics. The paper -- "A Composable Security Treatment of the Lightning Network" -- describes the lack of formal verification for lightning's code specification "a dire state of affairs" since lightning is today used to secure real money -- at least $8.5 million.

The paper explains:

"As a result, our treatment delineates exactly how the security guarantees of the protocol depend on the properties of the underlying ledger."

The process by which they did this is known as formal verification. While it's a popular in the cryptocurrency space and helpful for determining the security of code, "formal security" is not done on every code program. Because of the deep knowledge required, it's quite expensive.

'Rock-solid' specification

The results are positive, showing that the underlying cryptography piled together to make the payment system work is sound, the researchers argue.

"All the security-critical parts of the system are rock-solid. This was the expected result – many smart people have collaborated to converge to the current incarnation of lightning network," Litos told CoinDesk.

What does that mean exactly? Litos and Kiayias took a look at lightning network's specifications, which are the rules every lightning software implementation needs to be able to send payments to the rest of the network.

Litos told CoinDesk:

"The main result is that lightning network is as secure as bitcoin."

To determine this, they took a look at the nitty-gritty cryptography that underpins lightning. Cryptography is composed of mathematical algorithms which provide the basis for privacy and security on the internet. In lightning, cryptography is the glue holding the payment system together, with the final result of allowing a person to send bitcoin to another.

So, the researchers look at these various cryptographic technologies that underlie lightning, including digital signatures, which in the case of bitcoin can only be produced by a user with the correct bitcoin private key.

"An honest participant of lightning network can only lose their money if the signatures or the hash function used by bitcoin are broken," Litos said, adding:

"The use of a realistic underlying ledger allowed us to pinpoint the exact security bounds for the lightning network operating parameters. Specifically, we provide a concrete answer to the question 'how often a lightning network user has to check the blockchain, especially when a multi-hop payment is under way?'"

Specs not software

While the specification verification is an important step, it only applies to the code blueprint of lightning and not the software implementations that have been produced by developers.

While the paper argues that the lightning network is "as secure as bitcoin," that doesn't mean that the software itself is safe. That might sound like a subtle distinction, but there's a big difference.

There are three main lightning network implementations which follow the specs: Acinq's Eclair, Blockstream's c-lightning, and Lightning Lab's lnd.

"Our analysis is based on the formal specification, not an implementation. As a result, our work does not rule out bugs in the various implementations, only in the specification," Litos said.

That said, Litos noted that future formal analysis could eventually be used to take a look at the actual code.

"Ideally, formal verification of the code, which would prove that it matches the specification, would increase our trust to the system. But before that, a machine-readable version of the specification would be needed," he said.

Keys image via Shutterstock

Disclosure

Please note that our privacy policy, terms of use, cookies, and do not sell my personal information has been updated.

CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. In November 2023, CoinDesk was acquired by the Bullish group, owner of Bullish, a regulated, digital assets exchange. The Bullish group is majority-owned by Block.one; both companies have interests in a variety of blockchain and digital asset businesses and significant holdings of digital assets, including bitcoin. CoinDesk operates as an independent subsidiary with an editorial committee to protect journalistic independence. CoinDesk employees, including journalists, may receive options in the Bullish group as part of their compensation.


Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.