{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,23]],"date-time":"2026-02-23T12:58:35Z","timestamp":1771851515017,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031488054","type":"print"},{"value":"9783031488061","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-48806-1_24","type":"book-chapter","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:02:12Z","timestamp":1701709332000},"page":"367-384","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Unlinkability and\u00a0Interoperability in\u00a0Account-Based Universal Payment Channels"],"prefix":"10.1007","author":[{"given":"Mohsen","family":"Minaei","sequence":"first","affiliation":[]},{"given":"Panagiotis","family":"Chatzigiannis","sequence":"additional","affiliation":[]},{"given":"Shan","family":"Jin","sequence":"additional","affiliation":[]},{"given":"Srinivasan","family":"Raghuraman","sequence":"additional","affiliation":[]},{"given":"Ranjit","family":"Kumaresan","sequence":"additional","affiliation":[]},{"given":"Mahdi","family":"Zamani","sequence":"additional","affiliation":[]},{"given":"Pedro","family":"Moreno-Sanchez","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,5]]},"reference":[{"key":"24_CR1","unstructured":"Bolt #2: peer protocol for channel management. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/02-peer-protocol.md#rationale-7. Accessed 22 Sept 2020"},{"key":"24_CR2","unstructured":"Payment channels - bitcoin wiki. https:\/\/en.bitcoin.it\/wiki\/Payment_channels. Accessed 05 May 2021"},{"key":"24_CR3","unstructured":"Raiden. https:\/\/raiden.network\/. Accessed 04 May 2021"},{"key":"24_CR4","unstructured":"Raiden. https:\/\/raiden-network-specification.readthedocs.io\/en\/latest\/mediated_transfer.html#limit-to-number-of-simultaneously-pending-transfers. Accessed 04 May 2021"},{"key":"24_CR5","unstructured":"Aumayr, L., et al.: Generalized bitcoin-compatible channels. Cryptology ePrint Archive, Report 2020\/476 (2020)"},{"key":"24_CR6","doi-asserted-by":"crossref","unstructured":"Baldimtsi, F., et al.: Accumulators with applications to anonymity-preserving revocation. In: IEEE EuroS&P (2017)","DOI":"10.1109\/EuroSP.2017.13"},{"key":"24_CR7","doi-asserted-by":"publisher","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE Computer Society Press (2014). https:\/\/doi.org\/10.1109\/SP.2014.36","DOI":"10.1109\/SP.2014.36"},{"key":"24_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"24_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-030-78375-4_13","volume-title":"Applied Cryptography and Network Security","author":"P Chatzigiannis","year":"2021","unstructured":"Chatzigiannis, P., Baldimtsi, F., Chalkias, K.: SoK: auditability and accountability in distributed payment systems. In: Sako, K., Tippenhauer, N.O. (eds.) ACNS 2021. LNCS, vol. 12727, pp. 311\u2013337. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-78375-4_13"},{"key":"24_CR10","unstructured":"Christodorescu, M., et al.: Universal payment channels: an interoperability platform for digital currencies. CoRR abs\/2109.12194 (2021). https:\/\/arxiv.org\/abs\/2109.12194"},{"key":"24_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-21741-3_1","volume-title":"Stabilization, Safety, and Security of Distributed Systems","author":"C Decker","year":"2015","unstructured":"Decker, C., Wattenhofer, R.: A fast and scalable payment network with bitcoin duplex micropayment channels. In: Pelc, A., Schwarzmann, A.A. (eds.) SSS 2015. LNCS, vol. 9212, pp. 3\u201318. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21741-3_1"},{"key":"24_CR12","doi-asserted-by":"crossref","unstructured":"Dziembowski, S., Eckey, L., Faust, S., Malinowski, D.: Perun: virtual payment hubs over cryptocurrencies. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 106\u2013123. IEEE (2019)","DOI":"10.1109\/SP.2019.00020"},{"key":"24_CR13","unstructured":"Heilman, E., Lipmann, S., Goldberg, S.: Atomic swaps. https:\/\/en.bitcoin.it\/wiki\/Atomic_swap. Accessed 04 May 2021"},{"key":"24_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-030-51280-4_10","volume-title":"Financial Cryptography and Data Security","author":"E Heilman","year":"2020","unstructured":"Heilman, E., Lipmann, S., Goldberg, S.: The Arwen trading protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 156\u2013173. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_10"},{"key":"24_CR15","doi-asserted-by":"crossref","unstructured":"Glaeser, N., Maffei, M., Malavolta, G., Moreno-Sanchez, P., Tairi, E., Thyagarajan, S.A.: Foundations of coin mixing services. Cryptology ePrint Archive, Report 2022\/942 (2022). https:\/\/eprint.iacr.org\/2022\/942","DOI":"10.1145\/3548606.3560637"},{"key":"24_CR16","doi-asserted-by":"crossref","unstructured":"Green, M., Miers, I.: Bolt: anonymous payment channels for decentralized currencies. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 473\u2013489. ACM (2017)","DOI":"10.1145\/3133956.3134093"},{"key":"24_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"key":"24_CR18","doi-asserted-by":"crossref","unstructured":"Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: TumbleBit: an untrusted bitcoin-compatible anonymous payment hub. In: NDSS 2017. The Internet Society (2017)","DOI":"10.14722\/ndss.2017.23086"},{"key":"24_CR19","unstructured":"Chainalysis Inc.: Chainalysis: blockchain analysis. https:\/\/www.chainalysis.com\/"},{"key":"24_CR20","unstructured":"Khalil, R., Zamyatin, A., Felley, G., Moreno-Sanchez, P., Gervais, A.: Commit-chains: Secure, scalable off-chain payments. Cryptology ePrint Archive, Report 2018\/642 (2018). https:\/\/eprint.iacr.org\/2018\/642"},{"key":"24_CR21","doi-asserted-by":"publisher","unstructured":"Le, D.V., Hurtado, L.T., Ahmad, A., Minaei, M., Lee, B., Kate, A.: A tale of two trees: one writes, and other reads: optimized oblivious accesses to bitcoin and other UTXO-based blockchains. Proc. Priv. Enhancing Technol. 2020(2), 519\u2013536 (2020). https:\/\/doi.org\/10.2478\/popets-2020-0039. https:\/\/par.nsf.gov\/biblio\/10200542","DOI":"10.2478\/popets-2020-0039"},{"key":"24_CR22","unstructured":"Lind, J., Eyal, I., Pietzuch, P.R., Sirer, E.G.: Teechan: payment channels using trusted execution environments (2016). http:\/\/arxiv.org\/abs\/1612.07766"},{"key":"24_CR23","doi-asserted-by":"publisher","unstructured":"Lind, J., Naor, O., Eyal, I., Kelbert, F., Sirer, E.G., Pietzuch, P.: Teechain: a secure payment network with asynchronous blockchain access. In: Proceedings of the 27th ACM Symposium on Operating Systems Principles, pp. 63\u201379. SOSP 2019, Association for Computing Machinery, New York, NY, USA (2019). https:\/\/doi.org\/10.1145\/3341301.3359627","DOI":"10.1145\/3341301.3359627"},{"key":"24_CR24","doi-asserted-by":"publisher","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Thuraisingham, B.M., Evans, D., Malkin, T., Xu, D. (eds.) ACM CCS 2017. pp. 455\u2013471. ACM Press (2017). https:\/\/doi.org\/10.1145\/3133956.3134096","DOI":"10.1145\/3133956.3134096"},{"key":"24_CR25","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. In: NDSS 2019. The Internet Society (2019)","DOI":"10.14722\/ndss.2019.23330"},{"key":"24_CR26","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. Commun. ACM (2016)","DOI":"10.1145\/2896384"},{"key":"24_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-030-32101-7_30","volume-title":"Financial Cryptography and Data Security","author":"A Miller","year":"2019","unstructured":"Miller, A., Bentov, I., Bakshi, S., Kumaresan, R., McCorry, P.: Sprites and state channels: payment networks that go faster than lightning. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 508\u2013526. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_30"},{"key":"24_CR28","unstructured":"Minaei, M., et al.: Unlinkability and interoperability in account-based universal payment channels. Cryptology ePrint Archive, Paper 2023\/916 (2023). https:\/\/eprint.iacr.org\/2023\/916"},{"key":"24_CR29","unstructured":"Minaei Bidgoli, M., Kumaresan, R., Zamani, M., Gaddam, S.: System and method for managing data in a database (2023). https:\/\/patents.google.com\/patent\/US11556909B2\/"},{"key":"24_CR30","unstructured":"Mizrahi, A., Zohar, A.: Congestion attacks in payment channel networks. https:\/\/arxiv.org\/pdf\/2002.06564.pdf. Accessed 04 May 2021"},{"key":"24_CR31","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2009). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"24_CR32","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments. http:\/\/lightning.network\/lightning-network-paper.pdf. Accessed 22 Sept 2020"},{"key":"24_CR33","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Vaikuntanathan, V., Vasudevan, P. N.: Improvements to secure computation with penalties. In: CCS, pp. 406\u2013417 (2016)","DOI":"10.1145\/2976749.2978421"},{"key":"24_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"24_CR35","doi-asserted-by":"publisher","unstructured":"Tairi, E., Moreno-Sanchez, P., Maffei, M.: A$${}^{\\text{2}}$$l: anonymous atomic locks for scalability in payment channel hubs. In: 42nd IEEE Symposium on Security and Privacy, SP 2021, San Francisco, CA, USA, 24\u201327 May 2021, pp. 1834\u20131851. IEEE (2021). https:\/\/doi.org\/10.1109\/SP40001.2021.00111","DOI":"10.1109\/SP40001.2021.00111"},{"key":"24_CR36","unstructured":"Van Saberhagen, N.: Cryptonote v 2.0 (2013). https:\/\/cryptonote.org\/whitepaper.pdf"},{"key":"24_CR37","doi-asserted-by":"crossref","unstructured":"Zamyatin, A., Harz, D., Lind, J., Panayiotou, P., Gervais, A., Knottenbelt, W.: XCLAIM: trustless, interoperable, cryptocurrency-backed assets. In: IEEE Security and Privacy. IEEE (2019)","DOI":"10.1109\/SP.2019.00085"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48806-1_24","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:06:28Z","timestamp":1701709588000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48806-1_24"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"ISBN":["9783031488054","9783031488061"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48806-1_24","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12,5]]},"assertion":[{"value":"5 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"Case studies, comparisons, statistics, research and recommendations are provided \u201cAS IS\u201d and intended for informational purposes only and should not be relied upon for operational, marketing, legal, technical, tax, financial or other advice. Visa Inc. neither makes any warranty or representation as to the completeness or accuracy of the information within this document, nor assumes any liability or responsibility that may result from reliance on such information. The Information contained herein is not intended as investment or legal advice, and readers are encouraged to seek the advice of a competent professional where such advice is required. These materials and best practice recommendations are provided for informational purposes only and should not be relied upon for marketing, legal, regulatory or other advice. Recommended marketing materials should be independently evaluated in light of your specific business needs and any applicable laws and regulations. Visa is not responsible for your use of the marketing materials, best practice recommendations, or other information, including errors of any kind, contained in this document. All trademarks are the property of their respective owners, are used for identification purposes only, and do not necessarily imply product endorsement or affiliation with Visa.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Disclaimers"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}