{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T02:52:52Z","timestamp":1769827972272,"version":"3.49.0"},"publisher-location":"Cham","reference-count":41,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783031182822","type":"print"},{"value":"9783031182839","type":"electronic"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-18283-9_18","type":"book-chapter","created":{"date-parts":[[2022,10,21]],"date-time":"2022-10-21T20:23:03Z","timestamp":1666383783000},"page":"374-385","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Short Paper: A Centrality Analysis of\u00a0the\u00a0Lightning Network"],"prefix":"10.1007","author":[{"given":"Philipp","family":"Zabka","sequence":"first","affiliation":[]},{"given":"Klaus-T.","family":"Foerster","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Decker","sequence":"additional","affiliation":[]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,10,22]]},"reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Khalil, R., Gervais, A.: Revive: Rebalancing off-blockchain payment networks. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), pp. 439\u2013453 (2017)","DOI":"10.1145\/3133956.3134033"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Tochner, S., Zohar, A., Schmid, S.: Route hijacking and dos in off-chain networks. In: Proceedings of the ACM Conference on Advances in Financial Technologies (AFT) (2020)","DOI":"10.1145\/3419614.3423253"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Nisslmueller, U., Foerster, K.T., Schmid, S., Decker, C.: Toward active and passive confidentiality attacks on cryptocurrency off-chain networks. In: Proceedings of the 6th International Conference on Information Systems Security and Privacy (ICISSP) (2020)","DOI":"10.5220\/0009429200070014"},{"issue":"2","key":"18_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3392147","volume":"4","author":"W Tang","year":"2020","unstructured":"Tang, W., Wang, W., Fanti, G., Oh, S.: Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Measur. Anal. Comput. Syst. 4(2), 1\u201339 (2020)","journal-title":"Proc. ACM Measur. Anal. Comput. Syst."},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. In: 26th Annual Network and Distributed System Security Symposium (NDSS) (2019)","DOI":"10.14722\/ndss.2019.23330"},{"key":"18_CR6","unstructured":"Zabka, P., Foerster, K.T., Schmid, S., Decker, C.: Data and other artifacts. https:\/\/github.com\/philippzabka\/fc22"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Kappos, G., et al.: An Empirical Analysis of Privacy in the Lightning Network. arXiv:2003.12470 [cs], January 2021","DOI":"10.1007\/978-3-662-64322-8_8"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Tschorsch, F.: Counting down thunder: timing attacks on privacy in payment channel networks. In: AFT, pp. 214\u2013227. ACM (2020)","DOI":"10.1145\/3419614.3423262"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Romiti, M., et al.: Cross-Layer Deanonymization Methods in the Lightning Protocol. arXiv:2007.00764 [cs], February 2021","DOI":"10.1007\/978-3-662-64322-8_9"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Harris, J., Zohar, A.: Flood & loot: a systemic attack on the lightning network. In: AFT, pp. 202\u2013213. ACM (2020)","DOI":"10.1145\/3419614.3423248"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Moreno-Sanchez, P., Kate, A., Maffei, M., Pecina, K.: Privacy preserving payments in credit networks: enabling trust with privacy in online marketplaces. In: 22nd Annual Network and Distributed System Security Symposium, NDSS 2015, San Diego, California, USA, February 8\u201311, 2015. The Internet Society (2015)","DOI":"10.14722\/ndss.2015.23284"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, 24\u201327 February, 2019. The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23330"},{"issue":"5","key":"18_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3453161","volume":"54","author":"M Dotan","year":"2021","unstructured":"Dotan, M., Pignolet, Y.A., Schmid, S., Tochner, S., Zohar, A.: Survey on blockchain networking: context, state-of-the-art, challenges. ACM Comput. Surv. (CSUR) 54(5), 1\u201334 (2021)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"issue":"1","key":"18_CR15","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/COMST.2018.2852480","volume":"21","author":"T Neudecker","year":"2018","unstructured":"Neudecker, T., Hartenstein, H.: Network layer aspects of permissionless blockchains. IEEE Commun. Surv. Tutorials 21(1), 838\u2013857 (2018)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"18_CR16","unstructured":"Coindesk: Why china\u2019s crackdown may make bitcoin mining more centralized. In: online (2021)"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Beikverdi, A., Song, J.: Trend of centralization in bitcoin\u2019s distributed network. In: 2015 IEEE\/ACIS 16th International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD), pp. 1\u20136. IEEE (2015)","DOI":"10.1109\/SNPD.2015.7176229"},{"key":"18_CR18","unstructured":"Forbes: Bitcoin mining centralization is \u2018quite alarming\u2019, but a solution is in the works. In: online (2019)"},{"key":"18_CR19","unstructured":"EmelyanenkoK: Payment channel congestion via spam-attack (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/issues\/182"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Khamis, J., Schmid, S., Rottenstreich, O.: Demand matrix optimization for offchain payments in blockchain. In: 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC). IEEE (2021)","DOI":"10.1109\/ICBC51069.2021.9461154"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455\u2013471 (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"18_CR22","doi-asserted-by":"publisher","unstructured":"Tripathy, S., Mohanty, S.K.: MAPPCN: multi-hop anonymous and privacy-preserving payment channel network. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 481\u2013495. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_34","DOI":"10.1007\/978-3-030-54455-3_34"},{"key":"18_CR23","series-title":"Springer Proceedings in Business and Economics","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-37110-4_1","volume-title":"Mathematical Research for Blockchain Economy","author":"IA Seres","year":"2020","unstructured":"Seres, I.A., Guly\u00e1s, L., Nagy, D.A., Burcsi, P.: Topological analysis of bitcoin\u2019s lightning network. In: Pardalos, P., Kotsireas, I., Guo, Y., Knottenbelt, W. (eds.) Mathematical Research for Blockchain Economy. SPBE, pp. 1\u201312. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37110-4_1"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Malliaris, J., Tschorsch, F.: Discharged payment channels: quantifying the lightning network\u2019s resilience to topology-based attacks. In: EuroS &P Workshops, pp. 347\u2013356. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Stefano Martinazzi, A.F.: The evolving topology of the lightning network: Centralization, efficiency, robustness, synchronization, and anonymity (2020)","DOI":"10.1371\/journal.pone.0225966"},{"key":"18_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2022.101584","volume":"83","author":"P Zabka","year":"2022","unstructured":"Zabka, P., Foerster, K.T., Schmid, S., Decker, C.: Empirical evaluation of nodes and channels of the lightning network. Pervasive Mob. Comput. 83, 101584 (2022)","journal-title":"Pervasive Mob. Comput."},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Zabka, P., F\u00f6rster, K., Schmid, S., Decker, C.: Node classification and geographical analysis of the lightning cryptocurrency network. In: ICDCN, pp. 126\u2013135. ACM (2021)","DOI":"10.1145\/3427796.3427837"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Mizrahi, A., Zohar, A.: Congestion attacks in payment channel networks. arXiv:2002.06564v4 [cs], January 2021","DOI":"10.1007\/978-3-662-64331-0_9"},{"key":"18_CR29","unstructured":"Scellato, S., Mascolo, C., Musolesi, M., Latora, V.: Distance matters: Geo-social metrics for online social networks. In: WOSN. USENIX Association (2010)"},{"key":"18_CR30","unstructured":"Mislove, A., Lehmann, S., Ahn, Y., Onnela, J., Rosenquist, J.N.: Understanding the demographics of twitter users. In: ICWSM. The AAAI Press (2011)"},{"key":"18_CR31","unstructured":"LND GitHub Repository (2020). https:\/\/github.com\/lightningnetwork\/lnd. Accessed 15 July 2021"},{"key":"18_CR32","unstructured":"C-lightning GitHub Repository (2020). https:\/\/github.com\/ElementsProject\/lightning. Accessed 15 July 2021"},{"key":"18_CR33","unstructured":"Eclair GitHub Repository (2020). https:\/\/github.com\/ACINQ\/eclair. Accessed 15 July 2021"},{"key":"18_CR34","doi-asserted-by":"crossref","unstructured":"Hagberg, A.A., Schult, D.A., Swart, P.J.: Exploring network structure, dynamics, and function using networkx. In: Varoquaux, G., Vaught, T., Millman, J. (eds.) Proceedings of the 7th Python in Science Conference, pp. 11\u201315. Pasadena, CA USA (2008)","DOI":"10.25080\/TCWV9851"},{"issue":"2","key":"18_CR35","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.socnet.2007.11.001","volume":"30","author":"U Brandes","year":"2008","unstructured":"Brandes, U.: On variants of shortest-path betweenness centrality and their generic computation. Soc. Networks 30(2), 136\u2013145 (2008)","journal-title":"Soc. Networks"},{"key":"18_CR36","doi-asserted-by":"publisher","unstructured":"Liu, Y.Y., Slotine, J.J., Barabasi, A.L.: Controllability of complex networks. Nature 473, 167\u201373 (2011). https:\/\/doi.org\/10.1038\/nature10011","DOI":"10.1038\/nature10011"},{"issue":"1","key":"18_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s13278-018-0493-2","volume":"8","author":"K Das","year":"2018","unstructured":"Das, K., Samanta, S., Pal, M.: Study on centrality measures in social networks: a survey. Soc. Netw. Anal. Min. 8(1), 1\u201311 (2018). https:\/\/doi.org\/10.1007\/s13278-018-0493-2","journal-title":"Soc. Netw. Anal. Min."},{"key":"18_CR38","doi-asserted-by":"publisher","unstructured":"Decker, C.: Lightning network research; topology datasets. http:\/\/www.ithub.com\/lnresearch\/topology. https:\/\/doi.org\/10.5281\/zenodo.4088530. Accessed 01 Oct 2020","DOI":"10.5281\/zenodo.4088530"},{"key":"18_CR39","unstructured":"ACINQ Homepage (2021). https:\/\/acinq.co. Accessed 11 Sept 2021"},{"key":"18_CR40","unstructured":"Rompert.com (2021). https:\/\/rompert.com. Accessed 11 Sept 2021"},{"key":"18_CR41","unstructured":"Lightning Network: BOLT 7: P2P Node and Channel Discovery (2019). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/07-routing-gossip.md. Accessed 15 July 2021"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-18283-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,6]],"date-time":"2024-10-06T09:36:50Z","timestamp":1728207410000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-18283-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031182822","9783031182839"],"references-count":41,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-18283-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"22 October 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Grenada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 May 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 May 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc22.ifca.ai\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"159","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}