{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:49:05Z","timestamp":1768002545700,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":49,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643211","type":"print"},{"value":"9783662643228","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_8","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T22:17:23Z","timestamp":1634941043000},"page":"167-186","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":43,"title":["An Empirical Analysis of Privacy in the Lightning Network"],"prefix":"10.1007","author":[{"given":"George","family":"Kappos","sequence":"first","affiliation":[]},{"given":"Haaroon","family":"Yousaf","sequence":"additional","affiliation":[]},{"given":"Ania","family":"Piotrowska","sequence":"additional","affiliation":[]},{"given":"Sanket","family":"Kanjalkar","sequence":"additional","affiliation":[]},{"given":"Sergi","family":"Delgado-Segura","sequence":"additional","affiliation":[]},{"given":"Andrew","family":"Miller","sequence":"additional","affiliation":[]},{"given":"Sarah","family":"Meiklejohn","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"8_CR1","unstructured":"The lightning conference: of channels, flows and icebergs talk by Christian Decker. https:\/\/www.youtube.com\/watch?v=zk7hcJDQH-I"},{"key":"8_CR2","unstructured":"Lightning network specifications. https:\/\/github.com\/lightningnetwork\/lightning-rfc"},{"key":"8_CR3","unstructured":"Person behind 40% of LN\u2019s capacity: \u201cI have no doubt in Bitcoin and the Lightning Network\u201d. https:\/\/www.theblockcrypto.com\/post\/41083\/person-behind-40-of-lns-capacity-i-have-no-doubt-in-bitcoin-and-the-lightning-network"},{"key":"8_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1007\/978-3-642-39884-1_4","volume-title":"Financial Cryptography and Data Security","author":"E Androulaki","year":"2013","unstructured":"Androulaki, E., Karame, G.O., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 34\u201351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_4"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"B\u00e9res, F., Seres, I.A., Bencz\u00far, A.A.: A cryptoeconomic traffic analysis of Bitcoins lightning network. arXiv:1911.09432 (2019)","DOI":"10.21428\/58320208.d4cd697e"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Feher, D., Vitto, G.: Privacy aspects and subliminal channels in Zcash. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security (2019)","DOI":"10.1145\/3319535.3345663"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in Bitcoin P2P network. In: Proceedings of ACM CCS (2014)","DOI":"10.1145\/2660267.2660379"},{"key":"8_CR8","unstructured":"Bogatyy, I.: Linking 96% of Grin transactions. https:\/\/github.com\/bogatyy\/grin-linkability"},{"key":"8_CR9","unstructured":"Br\u00e2nzei, S., Segal-Halevi, E., Zohar, A.: How to charge lightning. arXiv:1712.10222 (2017)"},{"key":"8_CR10","doi-asserted-by":"publisher","first-page":"223","DOI":"10.3390\/info9090223","volume":"9","author":"M Conoscenti","year":"2018","unstructured":"Conoscenti, M., Vetr\u00f2, A., De Martin, J.C., Spini, F.: The cloth simulator for HTLC payment networks with introductory lightning network performance results. Information 9, 223 (2018)","journal-title":"Information"},{"key":"8_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1007\/978-3-662-53357-4_8","volume-title":"Financial Cryptography and Data Security","author":"K Croman","year":"2016","unstructured":"Croman, K., et al.: On scaling decentralized blockchains. In: Clark, J., Meiklejohn, S., Ryan, P.Y.A., Wallach, D., Brenner, M., Rohloff, K. (eds.) FC 2016. LNCS, vol. 9604, pp. 106\u2013125. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-53357-4_8"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Danezis, G., Goldberg, I.: Sphinx: a compact and provably secure mix format. In: 30th IEEE Symposium on Security and Privacy (2009)","DOI":"10.1109\/SP.2009.15"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Engelmann, F., Kopp, H., Kargl, F., Glaser, F., Weinhardt, C.: Towards an economic analysis of routing in payment channel networks. In: Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers (2017)","DOI":"10.1145\/3152824.3152826"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Gervais, A., Karame, G.O., W\u00fcst, K.., Glykantzis, V., Ritzdorf, H., Capkun, S.: On the security and performance of proof of work blockchains. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security (2016)","DOI":"10.1145\/2976749.2978341"},{"key":"8_CR15","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: Off the chain transactions. IACR Cryptology ePrint Archive, Sok (2019)"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Ranchal-Pedrosa, A., P\u00e9rez-Sol\u00e0, C., Garcia-Alfaro, J.: On the difficulty of hiding the balance of lightning network channels. In: Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security (CCS) (2019)","DOI":"10.1145\/3321705.3329812"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Hinteregger, A., Haslhofer, B.: An empirical analysis of Monero cross-chain traceability. In: Proceedings of the 23rd International Conference on Financial Cryptography and Data Security (FC) (Short paper) (2019)","DOI":"10.1007\/978-3-030-32101-7_10"},{"key":"8_CR18","unstructured":"Kalodner, H.A., Goldfeder, S., Chator, A., M\u00f6ser, M., Narayanan, A.: BlockSci: design and applications of a blockchain analysis platform. arXiv:1709.02489 (2017)"},{"key":"8_CR19","unstructured":"Kappos, G., Yousaf, H., Maller, M., Meiklejohn, S.: An empirical analysis of anonymity in Zcash. In: 27th $$USENIX$$ Security Symposium 2018 (2018)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Khalil, R., Gervais, A.: Revive: rebalancing off-blockchain payment networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 439\u2013453 (2017)","DOI":"10.1145\/3133956.3134033"},{"key":"8_CR21","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/978-3-030-23813-1_2","volume-title":"Blockchain and Applications","author":"N Khan","year":"2020","unstructured":"Khan, N., State, R.: Lightning network: a comparative review of transaction fees and data analysis. In: Prieto, J., Das, A.K., Ferretti, S., Pinto, A., Corchado, J.M. (eds.) BLOCKCHAIN 2019. AISC, vol. 1010, pp. 11\u201318. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-23813-1_2"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Koshy, P., Koshy, D., McDaniel, P.: An analysis of anoymity in Bitcoin using P2P network traffic. In: International Conference on Financial Cryptography and Data Security (FC) (2014)","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"8_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1007\/978-3-319-66399-9_9","volume-title":"Computer Security \u2013 ESORICS 2017","author":"A Kumar","year":"2017","unstructured":"Kumar, A., Fischer, C., Tople, S., Saxena, P.: A traceability analysis of Monero\u2019s blockchain. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 153\u2013173. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_9"},{"key":"8_CR24","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., Kate, A., Maffei, M.: Anonymous Multi-Hop Locks for blockchain scalability and interoperability. In: Proceedings of NDSS (2018)","DOI":"10.14722\/ndss.2019.23330"},{"key":"8_CR26","unstructured":"Martinazzi, S.: The evolution of lightning network\u2019s topology during its first year and the influence over its core values. arXiv preprint arXiv:1902.07307 (2019)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of Bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"8_CR28","doi-asserted-by":"crossref","unstructured":"M\u00f6ser, M., et al.: An empirical analysis of traceability in the Monero blockchain. In: Proceedings on Privacy Enhancing Technologies (2018)","DOI":"10.1515\/popets-2018-0025"},{"key":"8_CR29","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Technical report, Manubot (2019)"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Nisslmueller, U., Foerster, K.-T., Schmid, S., Decker, C.: Toward active and passive confidentiality attacks on cryptocurrency off-chain networks (2020)","DOI":"10.5220\/0009429200070014"},{"issue":"12","key":"8_CR31","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.3390\/app9122519","volume":"9","author":"M Nowostawski","year":"2019","unstructured":"Nowostawski, M., T\u00f8n, J.: Evaluating methods for the identification of off-chain transactions in the Lightning Network. Appl. Sci. 9(12), 2519 (2019)","journal-title":"Appl. Sci."},{"key":"8_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-51280-4_14","volume-title":"Financial Cryptography and Data Security","author":"C P\u00e9rez-Sol\u00e0","year":"2020","unstructured":"P\u00e9rez-Sol\u00e0, C., Ranchal-Pedrosa, A., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Garcia-Alfaro, J.: LockDown: balance availability attack against lightning network channels. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 245\u2013263. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_14"},{"key":"8_CR33","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments (2016)"},{"key":"8_CR34","unstructured":"Quesnelle, J.: On the linkability of Zcash transactions (2017)"},{"key":"8_CR35","doi-asserted-by":"publisher","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler Y., Elovici Y., Cremers A., Aharony N., Pentland A. (eds.) Security and Privacy in Social Networks. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-4139-7_10","DOI":"10.1007\/978-1-4614-4139-7_10"},{"issue":"1","key":"8_CR36","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1145\/290163.290168","volume":"1","author":"MK Reiter","year":"1998","unstructured":"Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. ACM Trans. Inf. Syst. Secur. 1(1), 66\u201392 (1998)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR37","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Malliaris, J., Tschorsch, F.: Discharged payment channels: quantifying the lightning network\u2019s resilience to topology-based attacks. In: 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), pp. 347\u2013356. IEEE (2019)","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"8_CR38","doi-asserted-by":"crossref","unstructured":"Romiti, M., Victor, F., Moreno-Sanchez, P., Haslhofer, B., Maffei, M.: Cross-layer deanonymization methods in the lightning protocol (2020)","DOI":"10.1007\/978-3-662-64322-8_9"},{"key":"8_CR39","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"8_CR40","doi-asserted-by":"crossref","unstructured":"Seres, I.A., Guly\u00e1s, L., Nagy, D.A., Burcsi, P.: Topological analysis of Bitcoin\u2019s lightning network. arXiv:1901.04972 (2019)","DOI":"10.1007\/978-3-030-37110-4_1"},{"key":"8_CR41","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-662-45472-5_29","volume-title":"Financial Cryptography and Data Security","author":"M Spagnuolo","year":"2014","unstructured":"Spagnuolo, M., Maggi, F., Zanero, S.: BitIodine: extracting intelligence from the bitcoin network. In: Christin, N., Safavi-Naini, R. (eds.) FC 2014. LNCS, vol. 8437, pp. 457\u2013468. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"key":"8_CR42","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Moreno-Sanchez, P., Maffei, M.: A quantitative analysis of security, anonymity and scalability for the lightning network. Cryptology ePrint Archive, Report 2020\/303 (2020). https:\/\/eprint.iacr.org\/2020\/303","DOI":"10.1109\/EuroSPW51379.2020.00059"},{"key":"8_CR43","unstructured":"Tikhomirov, S., Pickhardt, R., Biryukov, A., Nowostawski, M.: Probing channel balances in the lightning network (2020)"},{"key":"8_CR44","unstructured":"Tochner, S., Schmid, S., Zohar, A.: Hijacking routes in payment channel networks: a predictability tradeoff. arXiv:1909.06890 (2019)"},{"key":"8_CR45","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"175","DOI":"10.1007\/978-3-030-00305-0_13","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"S Werman","year":"2018","unstructured":"Werman, S., Zohar, A.: Avoiding deadlocks in payment channel\u00a0networks. In: Garcia-Alfaro, J., Herrera-Joancomart\u00ed, J., Livraga, G., Rios, R. (eds.) DPM\/CBT -2018. LNCS, vol. 11025, pp. 175\u2013187. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-030-00305-0_13"},{"issue":"4","key":"8_CR46","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1145\/1042031.1042032","volume":"7","author":"MK Wright","year":"2004","unstructured":"Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: an analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4), 489\u2013522 (2004)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"8_CR47","doi-asserted-by":"publisher","first-page":"526","DOI":"10.1090\/qam\/253822","volume":"27","author":"JY Yen","year":"1970","unstructured":"Yen, J.Y.: An algorithm for finding shortest routes from all source nodes to a given destination in general networks. Q. Appl. Math. 27, 526\u2013530 (1970)","journal-title":"Q. Appl. Math."},{"key":"8_CR48","doi-asserted-by":"crossref","unstructured":"Yu, Z., Au, M.H., Yu, J., Yang, R., Xu, Q., Lau, W.F.: New empirical traceability analysis of CryptoNote-style blockchains. In: Proceedings of the 23rd International Conference on Financial Cryptography and Data Security (FC) (2019)","DOI":"10.1007\/978-3-030-32101-7_9"},{"key":"8_CR49","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Yang, D., Xue, G., CheaPay: an optimal algorithm for fee minimization in blockchain-based payment channel networks. In: IEEE International Conference on Communications (ICC) (2019)","DOI":"10.1109\/ICC.2019.8761804"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T12:45:22Z","timestamp":1673613922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":49,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}