Research/Lightning

Payment Channels: From Concept to Lightning Network Implementation

The evolution of payment channels from simple unidirectional designs to Lightning's bidirectional channels with HTLCs.

bcSatoruFeb 17, 2026

Bitcoin’s base layer processes roughly seven transactions per second. For a global payment network, that number is insufficient by orders of magnitude. Payment channels were proposed as a solution almost as early as Bitcoin itself: two parties lock funds on-chain, exchange updates off-chain, and only settle the final balance back to the blockchain. The idea sounds simple. Getting it right required over a decade of protocol design, several false starts, and fundamental cryptographic innovations.

This article traces the evolution of payment channels from Satoshi’s original sketch through the Lightning Network’s penalty-based design, examining the cryptographic machinery that makes each generation work and the limitations that motivated the next.

Satoshi’s Original Payment Channel Concept

The idea of updating transaction state without broadcasting appeared in Bitcoin’s earliest days. In 2010, Satoshi Nakamoto described a mechanism using the nSequence field in transaction inputs. The concept: two parties create a transaction spending from a shared output, and they can replace it with a newer version by incrementing the sequence number. Miners would only confirm the transaction with the highest sequence number.

The problem was fundamental. This design relied on miners voluntarily honoring the replacement rule. A miner could include an older, lower-sequence transaction if it paid higher fees, or simply because it arrived first. There was no enforcement mechanism: the protocol treated the sequence field as advisory, not binding. Without on-chain enforcement of the “latest state wins” rule, the entire construction was insecure.

Historical note: The nSequence field was later repurposed by BIP 68 to encode relative timelocks, a completely different function from Satoshi’s original intent. This repurposing became one of the building blocks that made modern payment channels viable.

Unidirectional Payment Channels

The first practical payment channels were unidirectional: funds flow in one direction only, from a payer to a payee. The construction is straightforward and does not require complex revocation mechanisms.

How they work

  1. Alice creates a funding transaction that locks coins into a 2-of-2 multisig between Alice and Bob. Before broadcasting it, she obtains a signed refund transaction from Bob that returns all funds to her after a timelock (say, 30 days).
  2. Alice broadcasts the funding transaction. The channel is now open.
  3. To pay Bob, Alice signs a new transaction spending the multisig output: for example, 0.9 BTC to herself and 0.1 BTC to Bob. She sends this signed transaction to Bob but does not broadcast it.
  4. For each subsequent payment, Alice creates a new transaction with a higher amount allocated to Bob: 0.8 to Alice and 0.2 to Bob, then 0.7 and 0.3, and so on. Each transaction replaces the last.
  5. Bob can close the channel at any time by broadcasting the most recent transaction, which gives him the highest payout. He has no incentive to broadcast an older version.

This design is elegant in its simplicity. Bob always holds the latest state and is always incentivized to use it. Alice cannot cheat because she needs Bob’s signature to spend the multisig, and Bob will never sign a transaction that pays him less than the current balance.

Limitations of unidirectional channels

  • Funds flow one way only: Alice pays Bob, never the reverse
  • The channel has a fixed lifetime determined by the refund timelock
  • Once the total channel capacity is exhausted, a new channel must be opened on-chain
  • They cannot be composed into a network: routing payments through intermediaries requires bidirectional flow

Despite these constraints, unidirectional channels demonstrated the core value proposition: many off-chain payments settled by a single on-chain transaction. Early Bitcoin payment processors used variants of this design for micropayment streaming.

Bidirectional Channels: The Duplex Micropayment Problem

Making channels bidirectional (both parties can send and receive) introduces a fundamental problem: either party might try to broadcast an outdated state that favors them. If Alice and Bob have exchanged dozens of updates and the current balance is 0.3 BTC to Alice and 0.7 BTC to Bob, Alice has an incentive to broadcast an earlier state where she held 0.9 BTC.

Several approaches emerged to solve this problem, each with distinct tradeoffs.

Duplex Micropayment Channels (Decker-Wattenhofer)

Christian Decker and Roger Wattenhofer proposed Duplex Micropayment Channels in 2015. The construction layers two unidirectional channels with a decrementing timelock mechanism. A kickoff transaction triggers a chain of invalidation trees, where each new state replaces the old by using a lower timelock value. This guarantees the latest state confirms first.

The limitation: the number of updates is bounded by the initial timelock value. If you start with a 1000-block timelock and decrement by one for each update, you get at most 1000 state changes before needing to close and reopen the channel. For high-frequency payments, this ceiling is too low.

LN-Penalty Channels: The Lightning Network Design

The Lightning Network, described by Joseph Poon and Thaddeus Dryja in their 2016 whitepaper, solved the state invalidation problem with a penalty mechanism. Rather than limiting the number of updates, Lightning makes it financially dangerous to broadcast old states. This is the design that powers the Lightning channels in production today.

The commitment transaction structure

Each channel update produces two commitment transactions: one for each party. These transactions are asymmetric. Alice’s version pays Bob immediately but makes Alice’s output subject to a timelock (typically 144 blocks, or roughly one day). Bob’s version mirrors this: Alice gets paid immediately, while Bob’s output is timelocked.

This asymmetry is deliberate. The timelocked output gives the other party a window to react if an old state is broadcast. During that window, the wronged party can claim all channel funds using a revocation key.

Revocation: making cheating expensive

When Alice and Bob agree to a new channel state, they exchange revocation secrets for the previous state. Each party reveals the private key material needed to construct the revocation key for their old commitment transaction. Once Bob has Alice’s revocation secret for state N, he can punish her if she ever broadcasts state N by sweeping all funds from the channel via a justice transaction.

The penalty is total: the cheating party loses their entire channel balance, not just the disputed amount. This disproportionate punishment is intentional. It creates a strong economic deterrent against broadcasting revoked states, even when the potential gain from cheating is small.

The watchtower role: For the penalty mechanism to work, the honest party must be online to detect and respond to a fraudulent broadcast within the timelock window. If Alice broadcasts a revoked state while Bob is offline, Bob cannot file a justice transaction. This is why watchtowers exist: third-party services that monitor the blockchain on behalf of channel participants and submit justice transactions automatically.

Channel lifecycle

A Lightning channel progresses through three distinct phases.

PhaseOn-chain transactionsDescription
Opening1 (funding tx)Both parties negotiate parameters, create the funding transaction sending to a 2-of-2 multisig, and exchange initial commitment transactions before broadcasting the funding tx
Operating0Parties exchange commitment transactions and revocation secrets for each payment, updating balances without touching the blockchain
Closing (cooperative)1 (closing tx)Both parties agree on final balances and sign a simple transaction distributing funds without timelocks or revocation clauses
Closing (force)1+ (commitment + sweeps)One party broadcasts their latest commitment transaction unilaterally; outputs are subject to timelocks and may require additional sweep transactions

Cooperative closes are preferred because they produce cleaner on-chain footprints and avoid timelock delays. Force closes happen when one party is unresponsive, when there is a dispute, or when software crashes. The on-chain cost of a force close is significantly higher due to the multiple transactions involved, which is one reason anchor outputs were introduced to allow fee-bumping commitment transactions after the fact.

HTLCs: Routing Payments Across Channels

A single payment channel only connects two parties. To build a network, payments must be routable through intermediaries. This is where Hash Time-Locked Contracts (HTLCs) become essential.

The mechanism

An HTLC is a conditional payment: “I will pay you X bitcoin if you can reveal the preimage of this payment hash before block height Y.” If the preimage is not revealed in time, the payment reverts to the sender.

For a routed payment from Alice to Carol through Bob:

  1. Carol generates a random secret (the preimage) and sends its hash to Alice
  2. Alice offers Bob an HTLC on their channel: “0.01 BTC if you reveal the preimage of hash H, expiring at block 700,100”
  3. Bob offers Carol an HTLC on their channel: “0.01 BTC if you reveal the preimage of hash H, expiring at block 700,050” (note the shorter expiry)
  4. Carol reveals the preimage to claim Bob’s HTLC
  5. Bob uses the same preimage to claim Alice’s HTLC

The decreasing timelocks ensure each hop has time to claim before the preceding hop expires. This is also why routing fees exist: each intermediary charges a small fee for providing this forwarding service and locking up liquidity along the route.

HTLC limitations

HTLCs have a notable privacy weakness: the same payment hash is used across every hop. An adversary controlling two nodes on a payment route can correlate the sender and receiver by observing identical hashes. This motivated the design of Point Time-Locked Contracts (PTLCs), which use adaptor signatures to decorrelate each hop. PTLCs require Schnorr signatures, which became available with the Taproot soft fork.

The Operational Burden of Payment Channels

While the cryptography of payment channels is elegant, running them in production introduces significant operational complexity. Understanding these challenges is important because they shaped the design of subsequent protocols.

Liquidity management

Every payment channel has a fixed capacity determined at open time. Funds can only be sent if there is sufficient balance on the sender’s side. This creates a constant liquidity management challenge: node operators must decide how much capital to allocate to each channel, rebalance channels when they become depleted on one side, and sometimes open entirely new channels to reach specific destinations.

  • Inbound liquidity must be acquired from peers or purchased through services like Loop
  • Outbound liquidity is consumed with every payment sent and must be replenished
  • Circular rebalancing can redistribute existing liquidity but costs routing fees
  • Splicing allows adding or removing funds from live channels but still requires an on-chain transaction

The online requirement

Both channel parties must be online to update state. A recipient who is offline cannot receive payments. This is particularly problematic for mobile wallets, which cannot maintain persistent connections. Lightning Service Providers (LSPs) partially address this, but they introduce their own trust and complexity tradeoffs.

State management and toxic waste

Every revoked commitment transaction represents what the Lightning community calls “toxic waste”: data that must never be broadcast. If a node accidentally broadcasts a revoked state (due to a database corruption, backup restore, or software bug), the counterparty’s watchtower will file a justice transaction and seize all channel funds. This makes channel backups dangerous: restoring from a backup almost certainly means broadcasting revoked states.

ChallengeDescriptionCurrent mitigations
Liquidity lockupCapital is locked in channels and cannot be used elsewhereChannel factories, splicing
Routing failuresPayments fail when intermediate channels lack liquidityMulti-path payments, trampoline routing
Force close costsUnilateral closes are expensive and lock funds for daysAnchor outputs, zero-conf channels
Backup fragilityRestoring old state triggers penalty; static channel backups are partial solutionsChantools for recovery, peer-based data loss protection
Privacy leaksPayment hash correlation across hopsPTLCs, blinded paths

Eltoo: A Cleaner State Update Mechanism

The penalty-based design works, but its complexity motivated research into alternatives. Eltoo (also written as LN-Symmetry), proposed by Christian Decker, Rusty Russell, and Olaoluwa Osuntokun in 2018, replaces penalties with a simpler “latest state wins” mechanism.

How eltoo differs

In eltoo, each new state transaction can spend any previous state transaction. If Alice broadcasts state 5, Bob can simply broadcast state 10 on top of it. There is no penalty: the outdated state is simply overwritten. This eliminates toxic waste entirely because old states cannot cause fund loss.

The design requires a new Bitcoin opcode called SIGHASH_ANYPREVOUT (defined in BIP 118), which allows a signature to be valid for any preceding transaction with a matching output script. This flexibility is what enables state N+1 to spend from any prior state. As of early 2026, SIGHASH_ANYPREVOUT has not been activated on Bitcoin, so eltoo remains a proposal rather than a deployed protocol.

Eltoo vs LN-penalty

PropertyLN-Penalty (current Lightning)Eltoo / LN-Symmetry
Cheating deterrentPenalty: cheater loses all fundsReplacement: latest state simply overwrites
Toxic wasteYes: old states are dangerousNo: old states are harmless
Watchtower storageO(n): must store data for every revoked stateO(1): only needs the latest state
Backup safetyDangerous: restoring old state triggers penaltySafe: counterparty simply publishes newer state
Bitcoin soft fork requiredNo (deployed today)Yes (SIGHASH_ANYPREVOUT / BIP 118)
Multi-party channelsComplex: revocation state grows combinatoriallyNatural: replacement model scales to N parties

Beyond Payment Channels: Alternative Approaches

The operational weight of payment channels, even with improvements like eltoo, stems from a core architectural choice: maintaining a bilateral state machine between two peers. Every channel is a miniature consensus system that must be kept in sync, funded, monitored, and eventually settled on-chain. Some protocols have explored fundamentally different approaches to Bitcoin scaling that avoid channels entirely.

Statechains: transferring UTXOs instead of updating state

Spark takes a structurally different path. Instead of opening payment channels and updating bilateral state, Spark uses statechains to transfer ownership of UTXOs off-chain. The Bitcoin never moves on the blockchain: what changes is who holds the signing authority over it, using a 2-of-2 multisig where one key belongs to the user and the other is cooperatively held by a distributed set of operators via FROST threshold signatures.

This design eliminates several of the problems inherent to payment channels:

  • No channels to open, fund, rebalance, or close
  • No liquidity management: there is no concept of inbound or outbound capacity
  • No toxic waste: there are no revoked states that could trigger penalties
  • Offline receiving is possible through Spark Service Providers
  • No routing: transfers happen directly rather than hopping through intermediaries

The tradeoff is a different trust model. Payment channels are fully trustless (assuming correct software and monitoring). Spark requires that at least one operator in its distributed set behaves honestly during each transfer. Users retain self-custody and can always exit to Bitcoin L1 unilaterally, but the moment-of-transfer security assumption is weaker than Lightning’s cryptographic guarantees.

The Broader Design Space

Payment channels represent one point in a larger design space for off-chain Bitcoin transactions. Each approach makes different tradeoffs between trust, complexity, on-chain footprint, and user experience.

ApproachTrust modelChannel/state managementOn-chain cost
LN-Penalty channelsTrustless (with monitoring)High: bilateral state, liquidity, watchtowers2 tx minimum (open + close)
Eltoo channelsTrustless (with monitoring)Medium: simpler state, no toxic waste2 tx minimum (open + close)
Statechains (Spark)1-of-n operator honestyNone: no channels or bilateral state1 tx (deposit); exit on demand
Federated sidechainsMajority of federationLow: sidechain manages state2 tx (peg-in + peg-out)

The evolution from Satoshi’s sequence-number sketch to today’s Lightning Network demonstrates how much engineering is required to make off-chain Bitcoin transactions both secure and practical. Each generation of payment channels solved real problems while revealing new ones: unidirectional channels introduced the concept but couldn’t route; bidirectional channels enabled routing but introduced toxic waste; penalty channels enforced honesty but demanded constant vigilance.

The BOLT specifications that define Lightning today represent thousands of hours of protocol engineering. Yet the fundamental constraints of bilateral payment channels: liquidity lockup, online requirements, and state management complexity, are architectural rather than implementation-specific. They follow directly from the decision to maintain pairwise state machines.

Understanding these tradeoffs matters because the next generation of Bitcoin scaling solutions is being built around them. Whether through cleaner channel designs like eltoo, channel-free approaches like statechains, or hybrid architectures combining multiple models, the lessons from payment channel evolution continue to shape how we think about moving Bitcoin off-chain.

This article is for educational purposes only. It does not constitute financial or investment advice. Bitcoin and Layer 2 protocols involve technical and financial risk. Always do your own research and understand the tradeoffs before using any protocol.