Has anyone any ideas?
The Lightning Network seems to be the thing you are looking for. The LN consists of many payment channels which are connected one to another. The LN transactions are not broadcast to the Bitcoin Network and they are instant in most cases. However, because of the way the LN works, there are problems with payments failures due to routing problems. The coins need to be passed between nodes which are connected via channels which have limited capacity and different liquidity. The Lightning Network involves two on-chain transactions (opening a channel and its closure).
When you open a channel, the coins are moved to a multi-signature address controlled by both nodes. How do we make sure that coins are not stolen by the other party then? Both signatures are required to spend from the address. Each time a channel state is updated, both parties sign a commitment transaction which can be broadcast to the Bitcoin network resulting in the channel closure. A new commitment transaction revokes the previous one which is useful in case the other party attempts to cheat by broadcasting the old channel state. The penalty is included as well. By default, in the case of an uncooperative channel closure, one has 24 hours to publish the penalty transaction. The uncooperative channel closures happen when one of the nodes is offline or if the other node closes the channel forcefully without negotiation. Cooperative channel closures can happen instantly.
As for the LN payments,
Hash Time Locked Contracts are used. The following explanation should be fairly easy to understand.
Alice opens a payment channel to Bob, and Bob opens a payment channel to Charlie.
Alice wants to buy something from Charlie for 1000 satoshis.
Charlie generates a random number and generates its SHA256 hash. Charlie gives that hash to Alice.
Alice uses her payment channel to Bob to pay him 1,000 satoshis, but she adds the hash Charlie gave her to the payment along with an extra condition: in order for Bob to claim the payment, he has to provide the data which was used to produce that hash.
Bob uses his payment channel to Charlie to pay Charlie 1,000 satoshis, and Bob adds a copy of the same condition that Alice put on the payment she gave Bob.
Charlie has the original data that was used to produce the hash (called a pre-image), so Charlie can use it to finalize his payment and fully receive the payment from Bob. By doing so, Charlie necessarily makes the pre-image available to Bob.
Bob uses the pre-image to finalize his payment from Alice
You should read my "
Basics of The Lightning Network" and "
The Lightning Network FAQ" threads. You will find plenty of information there! There are also a few other second layer protocols which are less popular.