{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T22:34:16Z","timestamp":1743114856897,"version":"3.40.3"},"publisher-location":"Cham","reference-count":15,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031814037"},{"type":"electronic","value":"9783031814044"}],"license":[{"start":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T00:00:00Z","timestamp":1735603200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T00:00:00Z","timestamp":1735603200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-81404-4_10","type":"book-chapter","created":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T00:38:10Z","timestamp":1735605490000},"page":"124-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Protocol for\u00a0Mitigating Wormhole Attack in\u00a0Multi-hop Payment Channels"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5963-5228","authenticated-orcid":false,"given":"Rohan","family":"Mariyala","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1046-5966","authenticated-orcid":false,"given":"Susmita","family":"Mandal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,31]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455\u2013471. ACM (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"10_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"key":"10_CR3","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"key":"10_CR4","doi-asserted-by":"publisher","first-page":"227596","DOI":"10.1109\/ACCESS.2020.3046020","volume":"8","author":"N Papadis","year":"2020","unstructured":"Papadis, N., Tassiulas, L.: Blockchain-based payment channel networks: challenges and recent advances. IEEE Access 8, 227596\u2013227609 (2020)","journal-title":"IEEE Access"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Di Stasi, G., Avallone, S., Canonico, R., Ventre, G.: Routing payments on the lightning network. In: 2018 IEEE International Conference on Internet of Things (IThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1161\u20131170. IEEE (2018)","DOI":"10.1109\/Cybermatics_2018.2018.00209"},{"key":"10_CR6","unstructured":"Decker, C., Russell, R., Osuntokun, O.: eltoo: A Simple Layer2 Protocol for Bitcoin. White paper (2018). https:\/\/blockstream.com\/eltoo.pdf"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-51280-4_14","volume-title":"Financial Cryptography and Data Security","author":"C P\u00e9rez-Sol\u00e0","year":"2020","unstructured":"P\u00e9rez-Sol\u00e0, C., Ranchal-Pedrosa, A., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Garcia-Alfaro, J.: LockDown: balance availability attack against lightning network channels. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 245\u2013263. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_14"},{"key":"10_CR8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2021.102291","volume":"106","author":"SK Mohanty","year":"2021","unstructured":"Mohanty, S.K., Tripathy, S.: n-HTLC: neo hashed time-lock commitment to defend against wormhole attack in payment channel networks. Comput. Secur. 106, 102291 (2021)","journal-title":"Comput. Secur."},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-662-64331-0_10","volume-title":"Financial Cryptography and Data Security","author":"M Jourenko","year":"2021","unstructured":"Jourenko, M., Larangeira, M., Tanaka, K.: Payment trees: low collateral payments for payment channel networks. In: Borisov, N., Diaz, C. (eds.) FC 2021. LNCS, vol. 12675, pp. 189\u2013208. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-64331-0_10"},{"key":"10_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/978-3-662-63958-0_39","volume-title":"Financial Cryptography and Data Security. FC 2021 International Workshops","author":"A Judmayer","year":"2021","unstructured":"Judmayer, A., et al.: Pay to win: cheap, cross-chain bribing attacks on PoW cryptocurrencies. In: Bernhard, M., et al. (eds.) FC 2021. LNCS, vol. 12676, pp. 533\u2013549. Springer, Heidelberg (2021). https:\/\/doi.org\/10.1007\/978-3-662-63958-0_39"},{"key":"10_CR11","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments (2016)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous multi-hop locks for blockchain scalability and interoperability. Cryptology ePrint Archive (2018)","DOI":"10.14722\/ndss.2019.23330"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"481","DOI":"10.1007\/978-3-030-54455-3_34","volume-title":"Financial Cryptography and Data Security","author":"S Tripathy","year":"2020","unstructured":"Tripathy, S., Mohanty, S.K.: MAPPCN: multi-hop anonymous and privacy-preserving payment channel network. In: Bernhard, M., et al. (eds.) FC 2020. LNCS, vol. 12063, pp. 481\u2013495. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-54455-3_34"},{"key":"10_CR14","unstructured":"Aumayr, L., Moreno-Sanchez, P., Kate, A., Maffei, M.: Blitz: secure multi-hop payments without two-phase commits. In: 30th USENIX Security Symposium (USENIX Security 2021), pp. 4043\u20134060 (2021)"},{"key":"10_CR15","unstructured":"Liu, Z., Yang, A., Weng, J., Li, T., Zeng, H., Liang, X.: GMHL: Generalized Multi-Hop Locks for Privacy-Preserving Payment Channel Networks. Cryptology ePrint Archive (2022)"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Intelligent Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-81404-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T01:05:00Z","timestamp":1735607100000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-81404-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,31]]},"ISBN":["9783031814037","9783031814044"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-81404-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,31]]},"assertion":[{"value":"31 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICDCIT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Distributed Computing and Intelligent Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bhubaneswar","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 January 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 January 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icdcit2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icdcit.ac.in","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}