{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:30:22Z","timestamp":1772724622537,"version":"3.50.1"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031477539","type":"print"},{"value":"9783031477546","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-47754-6_18","type":"book-chapter","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T09:02:35Z","timestamp":1701334955000},"page":"309-325","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["R2: Boosting Liquidity in\u00a0Payment Channel Networks with\u00a0Online Admission Control"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6342-9105","authenticated-orcid":false,"given":"Mahsa","family":"Bastankhah","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4561-241X","authenticated-orcid":false,"given":"Krishnendu","family":"Chatterjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3222-1874","authenticated-orcid":false,"given":"Mohammad Ali","family":"Maddah-Ali","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7798-1711","authenticated-orcid":false,"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1419-3267","authenticated-orcid":false,"given":"Jakub","family":"Svoboda","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3676-4809","authenticated-orcid":false,"given":"Michelle","family":"Yeo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,1]]},"reference":[{"key":"18_CR1","unstructured":"Raiden network (2017). https:\/\/raiden.network\/"},{"issue":"3","key":"18_CR2","doi-asserted-by":"publisher","first-page":"486","DOI":"10.1145\/258128.258201","volume":"44","author":"J Aspnes","year":"1997","unstructured":"Aspnes, J., Azar, Y., Fiat, A., Plotkin, S., Waarts, O.: On-line routing of virtual circuits with applications to load balancing and machine scheduling. J. ACM (JACM) 44(3), 486\u2013504 (1997)","journal-title":"J. ACM (JACM)"},{"key":"18_CR3","unstructured":"Avarikioti, G., Besic, K., Wang, Y., Wattenhofer, R.: Online payment network design. CoRR abs\/1908.00432 (2019). http:\/\/arxiv.org\/abs\/1908.00432"},{"key":"18_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-030-51280-4_15","volume-title":"Financial Cryptography and Data Security","author":"Z Avarikioti","year":"2020","unstructured":"Avarikioti, Z., Heimbach, L., Wang, Y., Wattenhofer, R.: Ride the lightning: the game theory of\u00a0payment channels. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 264\u2013283. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_15"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Avarikioti, Z., Pietrzak, K., Salem, I., Schmid, S., Tiwari, S., Yeo, M.: HIDE & SEEK: privacy-preserving rebalancing on payment channel networks. CoRR abs\/2110.08848 (2021). https:\/\/arxiv.org\/abs\/2110.08848","DOI":"10.23919\/IFIPNetworking52078.2021.9472205"},{"key":"18_CR6","doi-asserted-by":"publisher","unstructured":"Bastankhah, M., Chatterjee, K., Maddah-Ali, M.A., Schmid, S., Svoboda, J., Yeo, M.: Online admission control and rebalancing in payment channel networks. CoRR abs\/2209.11936 (2022). https:\/\/doi.org\/10.48550\/arXiv.2209.11936","DOI":"10.48550\/arXiv.2209.11936"},{"key":"18_CR7","volume-title":"Online Computation and Competitive Analysis","author":"A Borodin","year":"2005","unstructured":"Borodin, A., El-Yaniv, R.: Online Computation and Competitive Analysis. Cambridge University Press, Cambridge (2005)"},{"key":"18_CR8","doi-asserted-by":"publisher","unstructured":"Decker, C.: Lightning network research; topology, datasets. https:\/\/github.com\/lnresearch\/topology, https:\/\/doi.org\/10.5281\/zenodo.4088530. Accessed 01 Apr 2022","DOI":"10.5281\/zenodo.4088530"},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"van Engelshoven, Y., Roos, S.: The merchant: avoiding payment channel depletion through incentives. In: 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS), pp. 59\u201368 (2021)","DOI":"10.1109\/DAPPS52256.2021.00012"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Ersoy, O., Roos, S., Erkin, Z.: How to profit from payments channels (2019)","DOI":"10.1007\/978-3-030-51280-4_16"},{"key":"18_CR11","unstructured":"Fazli, M., Nehzati, S.M., Salarkia, M.: Building stable off-chain payment networks. CoRR abs\/2107.03367 (2021). https:\/\/arxiv.org\/abs\/2107.03367"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Khalil, R., Gervais, A.: Revive: rebalancing off-blockchain payment networks. IACR Cryptol. ePrint Arch. p. 823 (2017). http:\/\/eprint.iacr.org\/2017\/823","DOI":"10.1145\/3133956.3134033"},{"key":"18_CR13","doi-asserted-by":"publisher","unstructured":"Li, P., Miyazaki, T., Zhou, W.: Secure balance planning of off-blockchain payment channel networks. In: 39th IEEE Conference on Computer Communications, INFOCOM 2020, Toronto, ON, Canada, 6\u20139 July 2020, pp. 1728\u20131737. IEEE (2020). https:\/\/doi.org\/10.1109\/INFOCOM41043.2020.9155375","DOI":"10.1109\/INFOCOM41043.2020.9155375"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-319-25258-2_8","volume-title":"Structural Information and Communication Complexity","author":"T Lukovszki","year":"2015","unstructured":"Lukovszki, T., Schmid, S.: Online admission control and embedding of service chains. In: Scheideler, C. (ed.) SIROCCO 2014. LNCS, vol. 9439, pp. 104\u2013118. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-25258-2_8"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M.: SilentWhispers: enforcing security and privacy in decentralized credit networks. In: 24th Annual Network and Distributed System Security Symposium, NDSS 2017, San Diego, California, USA, February 26 - March 1, 2017. The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23448"},{"key":"18_CR16","doi-asserted-by":"publisher","unstructured":"Pickhardt, R., Nowostawski, M.: Imbalance measure and proactive channel rebalancing algorithm for the lightning network. In: IEEE International Conference on Blockchain and Cryptocurrency, ICBC 2020, Toronto, ON, Canada, 2\u20136 May 2020, pp. 1\u20135. IEEE (2020). https:\/\/doi.org\/10.1109\/ICBC48266.2020.9169456","DOI":"10.1109\/ICBC48266.2020.9169456"},{"key":"18_CR17","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2015). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"18_CR18","unstructured":"Prihodko, P., Zhigulin, S.N., Sahno, M., Ostrovskiy, A.B., Osuntokun, O.: Flare : an approach to routing in lightning network white paper (2016)"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Roos, S., Moreno-Sanchez, P., Kate, A., Goldberg, I.: Settling payments fast and private: efficient decentralized routing for path-based transactions. In: 25th Annual Network and Distributed System Security Symposium, NDSS 2018, San Diego, California, USA, 18\u201321 February 2018. The Internet Society (2018)","DOI":"10.14722\/ndss.2018.23252"},{"key":"18_CR20","doi-asserted-by":"publisher","unstructured":"Schmid, S., Svoboda, J., Yeo, M.: Weighted packet selection for rechargeable links: complexity and approximation (2022). https:\/\/doi.org\/10.48550\/ARXIV.2204.13459","DOI":"10.48550\/ARXIV.2204.13459"},{"key":"18_CR21","unstructured":"Sivaraman, V., et al.: High throughput cryptocurrency routing in payment channel networks. In: Bhagwan, R., Porter, G. (eds.) 17th USENIX Symposium on Networked Systems Design and Implementation, NSDI 2020, Santa Clara, CA, USA, 25\u201327 February 2020, pp. 777\u2013796. USENIX Association (2020)"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-47754-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T09:06:22Z","timestamp":1701335182000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-47754-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,1]]},"ISBN":["9783031477539","9783031477546"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-47754-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,1]]},"assertion":[{"value":"1 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}