Fwd: Paper: A Composable Security Treatment of the Lightning Network



Summary:

Orfeas Stefanos Thyfronitis Litos, a security engineer at Chain, has responded to Lloyd Fournier's inquiry regarding the Lightning Network. Orfeas agrees that F_PayNet is too complex and states that he is currently exploring alternative models. He explains that in security proofs, the Adversary can be any polynomial machine, including those that do not fulfill HTLCs. Honest parties may end up being negligent because they are activated by the Environment, which may refuse to activate them in time. The receipt mechanism exists to let the environment know which channels were successfully opened/closed and which payments were made. In the ideal world, Alice's key is created by the Simulator when it receives REGISTER from F_PayNet.


Updated on: 2023-06-01T18:14:13.629207+00:00