{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:26:48Z","timestamp":1775179608056,"version":"3.50.1"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031182822","type":"print"},{"value":"9783031182839","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18283-9_17","type":"book-chapter","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:23:03Z","timestamp":1666383783000},"page":"358-373","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":21,"title":["Hide &amp; Seek: Privacy-Preserving Rebalancing on\u00a0Payment Channel Networks"],"prefix":"10.1007","author":[{"given":"Zeta","family":"Avarikioti","sequence":"first","affiliation":[]},{"given":"Krzysztof","family":"Pietrzak","sequence":"additional","affiliation":[]},{"given":"Iosif","family":"Salem","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]},{"given":"Samarth","family":"Tiwari","sequence":"additional","affiliation":[]},{"given":"Michelle","family":"Yeo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"17_CR1","unstructured":"Rebalance plugin. https:\/\/github.com\/lightningd\/plugins\/tree\/master\/rebalance"},{"key":"17_CR2","doi-asserted-by":"publisher","unstructured":"Abraham, I., Dolev, D., Gonen, R., Halpern, J.Y.: Distributed computing meets game theory: robust mechanisms for rational secret sharing and multiparty computation. In: PODC (2006). https:\/\/doi.org\/10.1145\/1146381.1146393","DOI":"10.1145\/1146381.1146393"},{"key":"17_CR3","unstructured":"Ahuja, R., Magnanti, T., Orlin, J.: Network flows - theory, algorithms and applications (1993)"},{"key":"17_CR4","doi-asserted-by":"publisher","unstructured":"Ahuja, R., Goldberg, A., Orlin, J., Tarjan, R.: Finding minimum-cost flows by double scaling. Math. Program. 53, 243\u2013266 (1992). https:\/\/doi.org\/10.1007\/BF01585705","DOI":"10.1007\/BF01585705"},{"key":"17_CR5","unstructured":"Aly, A.: Network flow problems with secure multiparty computation (2015)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Avarikioti, Z., Kogias, E.K., Wattenhofer, R., Zindros, D.: Brick: asynchronous incentive-compatible payment channels. In: FC (2021). https:\/\/fc21.ifca.ai\/papers\/168.pdf","DOI":"10.1007\/978-3-662-64331-0_11"},{"key":"17_CR7","doi-asserted-by":"publisher","unstructured":"Avarikioti, Z., Litos, O.S.T., Wattenhofer, R.: Cerberus channels: incentivizing watchtowers for bitcoin. In: FC (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_19","DOI":"10.1007\/978-3-030-51280-4_19"},{"key":"17_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1007\/978-3-030-56880-1_20","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"C Baum","year":"2020","unstructured":"Baum, C., Orsini, E., Scholl, P., Soria-Vazquez, E.: Efficient constant-round MPC with identifiable abort and public verifiability. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12171, pp. 562\u2013592. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56880-1_20"},{"key":"17_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1007\/978-3-642-15497-3_9","volume-title":"Computer Security \u2013 ESORICS 2010","author":"O Catrina","year":"2010","unstructured":"Catrina, O., de Hoogh, S.: Secure multiparty linear programming using fixed-point arithmetic. In: Gritzalis, D., Preneel, B., Theoharidou, M. (eds.) ESORICS 2010. LNCS, vol. 6345, pp. 134\u2013150. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15497-3_9"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"596","DOI":"10.1007\/3-540-39200-9_37","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2003","author":"R Cramer","year":"2003","unstructured":"Cramer, R., Fehr, S., Ishai, Y., Kushilevitz, E.: Efficient multi-party computation over rings. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 596\u2013613. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_37"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1007\/978-3-540-45146-4_15","volume-title":"Advances in Cryptology - CRYPTO 2003","author":"I Damg\u00e5rd","year":"2003","unstructured":"Damg\u00e5rd, I., Nielsen, J.B.: Universally composable efficient multiparty computation from threshold homomorphic encryption. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 247\u2013264. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_15"},{"key":"17_CR12","doi-asserted-by":"publisher","unstructured":"Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Stabilization, Safety, and Security of Distributed Systems (2015). https:\/\/doi.org\/10.1007\/978-3-319-21741-3_1","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"17_CR13","unstructured":"van Engelshoven, Y., Roos, S.: The merchant: avoiding payment channel depletion through incentives. CoRR abs\/2012.10280 (2020). https:\/\/arxiv.org\/abs\/2012.10280"},{"key":"17_CR14","doi-asserted-by":"publisher","unstructured":"Garay, J., Kiayias, A., Leonardos, N.: The bitcoin backbone protocol: analysis and applications. In: Eurocrypt (2015). https:\/\/doi.org\/10.1007\/978-3-662-46803-6_10","DOI":"10.1007\/978-3-662-46803-6_10"},{"key":"17_CR15","doi-asserted-by":"publisher","unstructured":"Gilad, Y., Hemo, R., Micali, S., Vlachos, G., Zeldovich, N.: Algorand: scaling byzantine agreements for cryptocurrencies. In: SOSP (2017). https:\/\/doi.org\/10.1145\/3132747.3132757","DOI":"10.1145\/3132747.3132757"},{"key":"17_CR16","unstructured":"Joseph Poon, T.D.: The bitcoin lightning network: Scalable off-chain instant payments. Technical report. https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"17_CR17","doi-asserted-by":"publisher","unstructured":"Khalil, R., Gervais, A.: Revive: rebalancing off-blockchain payment networks. In: CCS (2017). https:\/\/doi.org\/10.1145\/3133956.3134033","DOI":"10.1145\/3133956.3134033"},{"key":"17_CR18","doi-asserted-by":"publisher","unstructured":"Li, P., Miyazaki, T., Zhou, W.: Secure balance planning of off-blockchain payment channel networks. In: IEEE INFOCOM 2020 - IEEE Conference on Computer Communications, pp. 1728\u20131737 (2020). https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155375","DOI":"10.1109\/INFOCOM41043.2020.9155375"},{"key":"17_CR19","doi-asserted-by":"publisher","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M.: Silentwhispers: enforcing security and privacy in decentralized credit networks. In: NDSS (2017). https:\/\/doi.org\/10.14722\/ndss.2017.23448","DOI":"10.14722\/ndss.2017.23448"},{"key":"17_CR20","doi-asserted-by":"publisher","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. In: NDSS (2019). https:\/\/doi.org\/10.14722\/ndss.2019.23330","DOI":"10.14722\/ndss.2019.23330"},{"key":"17_CR21","doi-asserted-by":"publisher","unstructured":"Miller, A., Bentov, I., Bakshi, S., Kumaresan, R., McCorry, P.: Sprites and state channels: Payment networks that go faster than lightning. In: FC (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_30","DOI":"10.1007\/978-3-030-32101-7_30"},{"key":"17_CR22","doi-asserted-by":"publisher","unstructured":"Orlin, J.: A polynomial time primal network simplex algorithm for minimum cost flows. Math. Prog. 78, 109\u2013129 (1996). https:\/\/doi.org\/10.1007\/BF02614365","DOI":"10.1007\/BF02614365"},{"key":"17_CR23","doi-asserted-by":"publisher","unstructured":"Pickhardt, R., Nowostawski, M.: Imbalance measure and proactive channel rebalancing algorithm for the lightning network. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, 2\u20136 May, 2020, pp. 1\u20135. IEEE (2020). https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169456","DOI":"10.1109\/ICBC48266.2020.9169456"},{"key":"17_CR24","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2015). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"17_CR25","unstructured":"Prihodko, P., Zhigulin, S., Sahno, M., Ostrovskiy, A., Osuntokun, O.: Flare: an approach to routing in lightning network. shorturl.at\/adrHP (2016)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Roos, S., Moreno-Sanchez, P., Kate, A., Goldberg, I.: Settling payments fast and private: efficient decentralized routing for path-based transactions. arXiv preprint arXiv:1709.05748 (2017)","DOI":"10.14722\/ndss.2018.23252"},{"key":"17_CR27","unstructured":"Sivaraman, V., et al.: High throughput cryptocurrency routing in payment channel networks. In: 17th USENIX Symposium on Networked Systems Design and Implementation ($$\\{$$NSDI$$\\}$$ 20), pp. 777\u2013796 (2020)"},{"key":"17_CR28","unstructured":"Spilman, J.: Anti dos for tx replacement. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2013-April\/002433.html. Accessed 22 Nov 2020"},{"key":"17_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-03549-4_6","volume-title":"Financial Cryptography and Data Security","author":"T Toft","year":"2009","unstructured":"Toft, T.: Solving linear programs using multiparty computation. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 90\u2013107. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_6"},{"key":"17_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-030-54455-3_34","volume-title":"Financial Cryptography and Data Security","author":"S Tripathy","year":"2020","unstructured":"Tripathy, S., Mohanty, S.K.: MAPPCN: multi-hop anonymous and privacy-preserving payment channel network. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 481\u2013495. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_34"},{"key":"17_CR31","doi-asserted-by":"crossref","unstructured":"Yu, R., Xue, G., Kilari, V.T., Yang, D., Tang, J.: Coinexpress: a fast payment routing mechanism in blockchain-based payment channel networks. In: 2018 27th International Conference on Computer Communication and Networks (ICCCN), pp. 1\u20139. IEEE (2018)","DOI":"10.1109\/ICCCN.2018.8487351"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18283-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:26:52Z","timestamp":1666384012000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18283-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182822","9783031182839"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18283-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}