In order to spend a UTXO, you are required to provide a signature (or multiple if using multisig) that corresponds to the public key (wallet address) associated with the UTXO.
Hash locks create specific requirements typically related to certain information being made public before a UTXO can be released, and similarly, a time-lock can provide requirements of time or block height in order to spend a UTXO.
In order to create a bi-directional (buy and sell) channel on Lightning, two parties, or public keys, come together in order to create a channel multisignature address, where both parties provide a signature. A funding transaction is then created, and this funding can come from one of the parties involved, both of the parties, or a third party as mentioned earlier, but not signed at this point.
Two asymmetrical commitment transactions are created in order to return funds in the event of a payment dispute between the two parties known as a “non-cooperative closure.” Each of these two transactions has one output to the person you are interacting with, and one to yourself. The output to yourself contains a revocation key, or the penalty key in case things get saucey. Once these transactions are complete, the funding transaction can then be signed, which opens the channel.
In order to spend money within the channel, both parties must create a new commitment transaction with an updated balance, and share their penalty keys for the prior channel state in case someone decides to get feisty and pull some tricks. These channels are designed to penalize any user who would attempt to defraud the system. As mentioned before, when this channel is closed, it is broadcast to the network and all of those transactions are now immutabely secure on the Bitcoin protocol.
Having the penalty key allows you to seize 100% of the funds if someone tries using a previous state to manipulate the system. Since the mempool and blockchain are open and public, you have time to use a penalty key if someone tries to cheat. The incentive to cheat is drastically outweighed by the circumstances of which you can lose all of your funds for cheating. The incentive to strengthen and maintain the network, however, grows daily as adoption continues. It’s a system that doesn’t ask its users to be honest, because the system makes sure that honesty is the only choice that makes sense.
Fiat Security And Privacy
Encryption that is only readable by the bank, Advanced Encryption Standard (AES) -256 , is the standard used by most banks. This is a symmetric form of cryptography, meaning that while Bitcoin uses SHA-256 to encrypt all of its transactions by requiring both a public and private key, AES only requires one symmetrical key.
This block cipher used in AES allows for significantly higher amounts of data to be stored in each “block,” especially given the fact that the block size limit set by the Bitcoin protocol prevents massive stores of information in each block in order to maintain decentralization by having a low barrier-to-entry in hardware costs. Inherently, the encryption method of the banking system is set to a standard that allows one symmetrical key the power to decipher the encryption, and each encrypted block holds a very large amount of data within it, and all of that data is stored on a centralized server.
Now you can see why millions of people are affected every time a bank gets hacked. They are designed for efficiency, not privacy or security. They also hold every record of every transaction you’ve ever made, while only being required to insure a fraction of the total funds they represent.
Conclusion
Lightning was the harder system to design, but Bitcoin made it possible. The biggest issue was convincing a large amount of decentralized people to coalesce into an unstoppable swarm of hash functions securing a worldwide network, and Bitcoin accomplished this. Building on the hard path, Lightning allowed that scale to achieve exponential growth as a real currency, as made evident in El Salvador.
Are Lightning Hubs something to be concerned about? Absolutely. We should continue to watch this as it evolves and we should cheer the individuals and companies that incentivize the growth of additional and personal node use. Does this mean that Lightning is centralized? Not by a long shot. Anyone can enter whenever they want and that is the key difference. Fiat is a bygone relic and its aged systems will become increasingly meaningless as adoption continues.
This is a guest post by Shawn Amick. Opinions expressed are entirely their own and do not necessarily reflect those of BTC Inc or Bitcoin Magazine.