{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T09:41:23Z","timestamp":1743068483932,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031488054"},{"type":"electronic","value":"9783031488061"}],"license":[{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,5]],"date-time":"2023-12-05T00:00:00Z","timestamp":1701734400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-48806-1_26","type":"book-chapter","created":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:02:12Z","timestamp":1701709332000},"page":"405-419","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["FlexiPCN: Flexible Payment Channel Network"],"prefix":"10.1007","author":[{"given":"Susil Kumar","family":"Mohanty","sequence":"first","affiliation":[]},{"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,12,5]]},"reference":[{"key":"26_CR1","unstructured":"Raiden Network: Fast, cheap, scalable token transfers for Ethereum (2018). https:\/\/raiden.network\/"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: Proceedings 42nd IEEE Symposium on Foundations of Computer Science, pp. 136\u2013145. IEEE (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"26_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"Financial Cryptography and Data Security","author":"K Croman","year":"2016","unstructured":"Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106\u2013125. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_8"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Dotan, M., Pignolet, Y.A., Schmid, S., Tochner, S., Zohar, A.: SOK: cryptocurrency networking context, state-of-the-art, challenges. In: Proceedings of the 15th International Conference on Availability, Reliability and Security, pp. 1\u201313 (2020)","DOI":"10.1145\/3407023.3407043"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Ge, Z., Zhang, Y., Long, Y., Gu, D.: Shaduf: non-cycle payment channel rebalancing. In: 29th Annual Network and Distributed System Security Symposium, NDSS 2022, San Diego, California, USA (2022)","DOI":"10.14722\/ndss.2022.24203"},{"key":"26_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Harris, J., Zohar, A.: Flood & loot: a systemic attack on the lightning network. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 202\u2013213 (2020)","DOI":"10.1145\/3419614.3423248"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Ranchal-Pedrosa, A., P\u00e9rez-Sol\u00e0, C., Garcia-Alfaro, J.: On the difficulty of hiding the balance of lightning network channels. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, pp. 602\u2013612 (2019)","DOI":"10.1145\/3321705.3329812"},{"key":"26_CR9","doi-asserted-by":"crossref","unstructured":"Hong, Z., Guo, S., Zhang, R., Li, P., Zhan, Y., Chen, W.: Cycle: sustainable off-chain payment channel network with asynchronous rebalancing. In: 2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN), pp. 41\u201353. IEEE (2022)","DOI":"10.1109\/DSN53405.2022.00017"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Khalil, R., Gervais, A.: Revive: rebalancing off-blockchain payment networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS, Dallas, TX, USA, pp. 439\u2013453 (2017)","DOI":"10.1145\/3133956.3134033"},{"key":"26_CR11","doi-asserted-by":"crossref","unstructured":"Li, P., Miyazaki, T., Zhou, W.: Secure balance planning of off-blockchain payment channel networks. In: IEEE INFOCOM 2020-IEEE Conference on Computer Communications, pp. 1728\u20131737. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155375"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455\u2013471 (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. In: 26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA (2019)","DOI":"10.14722\/ndss.2019.23330"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Mavroudis, V., W\u00fcst, K., Dhar, A., Kostiainen, K., Capkun, S.: Snappy: Fast on-chain payments with practical collaterals. arXiv preprint arXiv:2001.01278 (2020)","DOI":"10.14722\/ndss.2020.24049"},{"key":"26_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-662-64331-0_9","volume-title":"Financial Cryptography and Data Security","author":"A Mizrahi","year":"2021","unstructured":"Mizrahi, A., Zohar, A.: Congestion attacks in payment channel networks. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 170\u2013188. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_9"},{"key":"26_CR16","doi-asserted-by":"publisher","first-page":"102291","DOI":"10.1016\/j.cose.2021.102291","volume":"106","author":"SK Mohanty","year":"2021","unstructured":"Mohanty, S.K., Tripathy, S.: n-htlc: Neo hashed time-lock commitment to defend against wormhole attack in payment channel networks. Comput. Secur. 106, 102291 (2021)","journal-title":"Comput. Secur."},{"issue":"12","key":"26_CR17","doi-asserted-by":"publisher","first-page":"24071","DOI":"10.1109\/TITS.2022.3192566","volume":"23","author":"SK Mohanty","year":"2022","unstructured":"Mohanty, S.K., Tripathy, S.: Siovchain: time-lock contract based privacy-preserving data sharing in siov. IEEE Trans. Intell. Transp. Syst. 23(12), 24071\u201324082 (2022)","journal-title":"IEEE Trans. Intell. Transp. Syst."},{"key":"26_CR18","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"26_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-51280-4_14","volume-title":"Financial Cryptography and Data Security","author":"C P\u00e9rez-Sol\u00e0","year":"2020","unstructured":"P\u00e9rez-Sol\u00e0, C., Ranchal-Pedrosa, A., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Garcia-Alfaro, J.: LockDown: balance availability attack against lightning network channels. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 245\u2013263. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_14"},{"key":"26_CR20","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments (2016). https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Malliaris, J., Tschorsch, F.: Discharged payment channels: quantifying the lightning network\u2019s resilience to topology-based attacks. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS &PW), pp. 347\u2013356. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"26_CR22","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Tschorsch, F.: Counting down thunder: timing attacks on privacy in payment channel networks. In: Proceedings of the 2nd ACM Conference on Advances in Financial Technologies, pp. 214\u2013227 (2020)","DOI":"10.1145\/3419614.3423262"},{"key":"26_CR23","unstructured":"Szabo, N.: The idea of smart contracts. Nick Szabo\u2019s papers and concise tutorials 6(1), 199 (1997)"},{"key":"26_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-030-54455-3_34","volume-title":"Financial Cryptography and Data Security","author":"S Tripathy","year":"2020","unstructured":"Tripathy, S., Mohanty, S.K.: MAPPCN: multi-hop anonymous and privacy-preserving payment channel network. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 481\u2013495. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_34"},{"key":"26_CR25","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger (2014). https:\/\/ethereum.github.io\/yellowpaper\/paper.pdf"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security. FC 2023 International Workshops"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-48806-1_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,4]],"date-time":"2023-12-04T17:06:43Z","timestamp":1701709603000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-48806-1_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12,5]]},"ISBN":["9783031488054","9783031488061"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-48806-1_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023,12,5]]},"assertion":[{"value":"5 December 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bol, Bra\u010d","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Croatia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc23.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"HotCRP","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"182","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"39","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"For the workshops 7 full papers have been accepted from 18 submissions.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}