journal article Open Access Apr 03, 2026

Adaptive Multipath Proofs for Privacy Protection and Security in Payment Channel Networks

Mathematics Vol. 14 No. 7 pp. 1199 · MDPI AG
View at Publisher Save 10.3390/math14071199
Abstract
Payment channel networks enable scalable off-chain payments, but their practical deployment remains constrained by a persistent tension among routing efficiency, liquidity visibility, transaction privacy, and settlement security. Existing multipath routing mechanisms can improve payment success under fragmented liquidity, yet they often expose sensitive balance information, leak structural features of payment routes, and enlarge the attack surface for probing, channel exhaustion, and selective forwarding. This paper presents a novel framework, Adaptive Multipath Proofs (AMPs), for privacy protection and security in payment channel networks. The core idea is to bind multipath routing decisions with lightweight zero-knowledge verifiability, allowing intermediate nodes to validate path feasibility, fragment consistency, and settlement constraints without learning exact channel balances, the complete payment amount, or the global route structure. AMP integrates three mechanisms: a hidden-liquidity feasibility proof that supports privacy-preserving route selection, an adaptive payment-splitting strategy that dynamically determines fragment allocation according to network congestion and balance uncertainty, and a proof-coupled settlement guard that enforces atomicity and timeout consistency across all payment fragments. Together, these mechanisms reduce information leakage while preserving robust payment execution under dynamic network conditions. Experimental evaluation on real Lightning Network topologies and synthetic stress scenarios demonstrates that AMP significantly lowers balance disclosure and endpoint inference risk, improves payment completion under skewed liquidity distributions, and introduces only moderate computational and communication overhead. The results indicate that adaptive proof-carrying multipath routing offers a practical and effective direction for building secure, privacy-preserving, and high-success payment channel networks.
Topics

No keywords indexed for this article. Browse by subject →

References
47
[1]
Decker "A Fast and Scalable Payment Network with Bitcoin Duplex Micropayment Channels" Proceedings of the Stabilization, Safety, and Security of Distributed Systems; Lecture Notes in Computer Science (2015)
[2]
Poon, J., and Dryja, T. (2026, March 31). The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. White Paper. Available online: https://lightning.network/lightning-network-paper.pdf.
[3]
Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., and Ravi, S. (2017). Concurrency and Privacy with Payment-Channel Networks. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, ACM. 10.1145/3133956.3134096
[4]
Roos, S., Moreno-Sanchez, P., Kate, A., and Goldberg, I. (2018, January 18–21). Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions. Proceedings of the Network and Distributed System Security Symposium, San Diego, CA, USA. 10.14722/ndss.2018.23252
[5]
Miller "Sprites and State Channels: Payment Networks That Go Faster Than Lightning" Proceedings of the Financial Cryptography and Data Security; Lecture Notes in Computer Science (2019) 10.1007/978-3-030-32101-7_30
[6]
Pickhardt, R., Tikhomirov, S., Biryukov, A., and Nowostawski, M. (2021). Security and Privacy of Lightning Network Payments with Uncertain Channel Balances. arXiv.
[7]
Lobmaier "Assessing Routing Algorithms for Payment Channel Networks" Distrib. Ledger Technol. Res. Pract. (2024)
[8]
Corcoran "Path Planning in Payment Channel Networks with Multi-Party Channels" Distrib. Ledger Technol. Res. Pract. (2025)
[9]
Grundmann "Security of the Lightning Network: Model Checking a Stepwise Refinement with TLA+" Proceedings of the Integrated Formal Methods; Lecture Notes in Computer Science (2025)
[10]
Tikhomirov, S., Pickhardt, R., Biryukov, A., and Nowostawski, M. (2020). Probing Channel Balances in the Lightning Network. arXiv.
[11]
Pietrzak, K., Salem, I., Schmid, S., and Yeo, M.X. (2021). LightPIR: Privacy-Preserving Route Discovery for Payment Channel Networks. Proceedings of the 2021 IFIP Networking Conference (IFIP Networking), IEEE. 10.23919/ifipnetworking52078.2021.9472205
[12]
"A Formally Verified Lightning Network" Proceedings of the Financial Cryptography and Data Security; Lecture Notes in Computer Science (2025)
[13]
Yu, W., Xu, M., Yu, D., Cheng, X., Hu, Q., and Xiong, Z. (2022). zk-PCN: A Privacy-Preserving Payment Channel Network Using zk-SNARKs. Proceedings of the 2022 IEEE International Performance, Computing, and Communications Conference (IPCCC), IEEE. 10.1109/ipccc55026.2022.9894329
[14]
Kolachala, K., Ababneh, M., and Vishwanathan, R. (2024). SoK: Payment Channel Networks. arXiv. 10.1109/buildsec64048.2024.00013
[15]
Kang "A Comprehensive Survey of Lightning Network Technology and Research" Int. J. Netw. Manag. (2025) 10.1002/nem.70023
[16]
Chen "Cryptographic Primitives in Script-based and Scriptless Payment Channel Networks: A Survey" ACM Comput. Surv. (2025) 10.1145/3725846
[17]
Tang "Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks" Proc. ACM Meas. Anal. Comput. Syst. (2020) 10.1145/3392147
[18]
Wang "Fence: Fee-Based Online Balance-Aware Routing in Payment Channel Networks" IEEE/ACM Trans. Netw. (2024) 10.1109/tnet.2023.3324136
[19]
Jiang, S., Wu, J., and Zuo, F. (2024). Utility-Based Routing in Payment Channel Networks: A Tradeoff Between Utility And Privacy. Proceedings of the 2024 IEEE/ACIS 22nd International Conference on Software Engineering Research, Management and Applications (SERA), IEEE. 10.1109/sera61261.2024.10685617
[20]
AMORA-Adaptive Multi-Objective Routing Algorithm in Payment Channel Networks

Shruti Mishra, Sujata Pal

IEEE Transactions on Network and Service Managemen... 2025 10.1109/tnsm.2025.3597407
[21]
Xu "OPRE: Towards Better Availability of PCNs Through Recovering" IEEE Trans. Dependable Secur. Comput. (2025) 10.1109/tdsc.2025.3541726
[22]
Aumayr "Optimizing Virtual Payment Channel Establishment in the Face of On-Path Adversaries" Comput. Commun. (2025) 10.1016/j.comcom.2025.108155
[23]
Davis, V., Singh, V., and Rossi, E. (2025). Channel Balance Interpolation in the Lightning Network via Machine Learning. Proceedings of the 2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE. 10.1109/icbc64466.2025.11185091
[24]
Kolachala, K., Ababneh, M., and Vishwanathan, R. (2024). RACED: Routing in Payment Channel Networks Using Distributed Hash Tables. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ACM. 10.1145/3634737.3637653
[25]
Ababneh, M., Kolachala, K., and Vishwanathan, R. (2024). Auroch: Auction-Based Multipath Routing for Payment Channel Networks. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ACM. 10.1145/3634737.3657021
[26]
Li, W., Tian, C., Zhang, Y., and Zhong, S. (2025). RCS: A High-Success-Rate and Privacy-Preserving Payment Channel Network Routing Protocol. Proceedings of the 2025 44th International Symposium on Reliable Distributed Systems (SRDS), IEEE. 10.1109/srds69199.2025.00029
[27]
Avarikioti "HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks" Proceedings of the Financial Cryptography and Data Security; Lecture Notes in Computer Science (2022)
[28]
Ni "Utility-Aware Payment Channel Network Rebalance" Proc. VLDB Endow. (2023) 10.14778/3626292.3626301
[29]
Ge "Shaduf++: Non-Cycle and Privacy-Preserving Payment Channel Rebalancing" IEEE Trans. Dependable Secur. Comput. (2025) 10.1109/tdsc.2024.3424212
[30]
Chatterjee "Boosting Payment Channel Network Liquidity with Topology Optimization and Transaction Selection" Proceedings of the 39th International Symposium on Distributed Computing (DISC 2025) (2025)
[31]
Zhang, J., Zhou, Y., Luo, D., Wu, W., and Liang, Y. (2025). Transaction-Binding Based Collateral Cost Optimization for Payment Channel Networks. Proceedings of the 2025 IEEE International Performance, Computing, and Communications Conference (IPCCC), IEEE. 10.1109/ipccc66453.2025.11304681
[32]
Avarikioti "Route Discovery in Private Payment Channel Networks" Proceedings of the Computer Security. ESORICS 2024 International Workshops; Lecture Notes in Computer Science (2025)
[33]
Zhao "Personalized Privacy-Preserving Routing Mechanism Design in Payment Channel Network" J. Comput. Sci. Technol. (2024) 10.1007/s11390-024-2635-5
[34]
Zhang "Anonymous Multi-Hop Payment for Payment Channel Networks" IEEE Trans. Dependable Secur. Comput. (2024) 10.1109/tdsc.2023.3262681
[35]
Panwar, G., Vishwanathan, R., Torres, G., and Misra, S. (2024). SPRITE: Secure and Private Routing in Payment Channel Networks. Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, ACM. 10.1145/3634737.3644995
[36]
Ndolo "Payment Censorship in the Lightning Network Despite Encrypted Communication" Proceedings of the 6th Conference on Advances in Financial Technologies (AFT 2024) (2024)
[37]
Weintraub, B., Kumble, S.P., Nita-Rotaru, C., and Roos, S. (2024). Payout Races and Congested Channels: A Formal Analysis of Security in the Lightning Network. Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, ACM. 10.1145/3658644.3670315
[38]
Aumayr, L., Avarikioti, Z., Maffei, M., and Mazumdar, S. (2024). Securing Lightning Channels against Rational Miners. Proceedings of the 2024 ACM SIGSAC Conference on Computer and Communications Security, ACM. 10.1145/3658644.3670373
[39]
Cao "Deadlock-Free Transaction Processing in Payment Channel Networks" Proceedings of the Network and Parallel Computing; Lecture Notes in Computer Science (2025) 10.1007/978-3-032-10466-3_12
[40]
Mariyala "A Novel Protocol for Mitigating Wormhole Attack in Multi-hop Payment Channels" Proceedings of the Distributed Computing and Intelligent Technology; Lecture Notes in Computer Science (2025)
[41]
Tan, Z., Pan, Z., Liang, Y., and Yang, S. (2026). A Novel Verifiable Functional Encryption Framework for Secure and Communication-Efficient Distributed Gradient Transmission Management. Electronics, 15. 10.3390/electronics15050928
[42]
Li "IvyAPC: Auditable Generalized Payment Channels" Proceedings of the Financial Cryptography and Data Security; Lecture Notes in Computer Science (2025)
[43]
Bünz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., and Maxwell, G. (2018). Bulletproofs: Short Proofs for Confidential Transactions and More. Proceedings of the 2018 IEEE Symposium on Security and Privacy, IEEE. 10.1109/sp.2018.00020
[44]
Decker, C. (2020). Lightning Network Research: Topology Datasets. Dataset.
[45]
Valko "Geolocated Lightning Network Topology Snapshots: A Dataset Covering 2019–2023" Sci. Data (2025) 10.1038/s41597-025-06413-7
[46]
Pickhardt, R., and Richter, S. (2021). Optimally Reliable & Cheap Payment Flows on the Lightning Network. arXiv.
[47]
Zabka "A Centrality Analysis of the Lightning Network" Telecommun. Policy (2024) 10.1016/j.telpol.2023.102696
Metrics
0
Citations
47
References
Details
Published
Apr 03, 2026
Vol/Issue
14(7)
Pages
1199
License
View
Cite This Article
Wenqi Li, Zijie Pan, Yunqing Yang (2026). Adaptive Multipath Proofs for Privacy Protection and Security in Payment Channel Networks. Mathematics, 14(7), 1199. https://doi.org/10.3390/math14071199