{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:16:48Z","timestamp":1768000608822,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643211","type":"print"},{"value":"9783662643228","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64322-8_9","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:17:23Z","timestamp":1634926643000},"page":"187-204","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Cross-Layer Deanonymization Methods in the Lightning Protocol"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8218-5077","authenticated-orcid":false,"given":"Matteo","family":"Romiti","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8329-3133","authenticated-orcid":false,"given":"Friedhelm","family":"Victor","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2315-7839","authenticated-orcid":false,"given":"Pedro","family":"Moreno-Sanchez","sequence":"additional","affiliation":[]},{"given":"Peter Sebastian","family":"Nordholt","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0415-4491","authenticated-orcid":false,"given":"Bernhard","family":"Haslhofer","sequence":"additional","affiliation":[]},{"given":"Matteo","family":"Maffei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"9_CR1","unstructured":"Hash time locked contracts. Wiki post. https:\/\/en.bitcoin.it\/wiki\/Hash_Time_Locked_Contracts"},{"key":"9_CR2","unstructured":"Community, L.N.: Bitcoin transaction and script formats. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/03-transactions.md"},{"key":"9_CR3","unstructured":"Community, L.N.: Wip: dual funding (v2 channel establishment protocol). Github Issue. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/pull\/524"},{"key":"9_CR4","unstructured":"Decker, C.: Privacy in lightning. Blog post (2018). https:\/\/snyke.net\/post\/privacy-in-lightning\/"},{"key":"9_CR5","unstructured":"Decker, L.N.C.: New release: c-lightning 0.7.1. Blostream Blog Post. https:\/\/medium.com\/blockstream\/new-release-c-lightning-0-7-1-9fca65debeb2"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-030-51280-4_12","volume-title":"Financial Cryptography and Data Security","author":"L Gudgeon","year":"2020","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: SoK: layer-two blockchain protocols. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 201\u2013226. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_12"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Harrigan, M., Fretter, C.: The unreasonable effectiveness of address clustering. In: Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC\/ATC\/ScalCom\/CBDCom\/IoP\/SmartWorld) (2016)","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0071"},{"key":"9_CR8","unstructured":"Jian-Hong, L., Kevin, P., Tiziano, S., Christian, D., J, T.C.: Lightning network: a second path towards centralisation of the bitcoin economy (2020). https:\/\/arxiv.org\/abs\/2002.02819"},{"key":"9_CR9","unstructured":"Jourenko, M., Kurazumi, K., Larangeira, M., Tanaka, K.: SoK: A Taxonomy for Layer-2 Scalability Related Protocols for Cryptocurrencies. Cryptology ePrint Archive, Report 2019\/352 (2019). https:\/\/eprint.iacr.org\/2019\/352"},{"key":"9_CR10","unstructured":"Kalodner, H., Goldfeder, S., Chator, A., M\u00f6ser, M., Narayanan, A.: BlockSci: design and applications of a blockchain analysis platform (2017). https:\/\/arxiv.org\/abs\/"},{"key":"9_CR11","unstructured":"Kappos, G., et al.: An empirical analysis of privacy in the lightning network (2020). https:\/\/arxiv.org\/abs\/2003.12470"},{"issue":"3","key":"9_CR12","doi-asserted-by":"publisher","first-page":"2543","DOI":"10.1109\/COMST.2018.2818623","volume":"20","author":"MC Kus Khalilov","year":"2018","unstructured":"Kus Khalilov, M.C., Levi, A.: A survey on anonymity and privacy in bitcoin-like digital cash systems. Commun. Surv. Tutor. 20(3), 2543\u20132585 (2018)","journal-title":"Commun. Surv. Tutor."},{"issue":"1","key":"9_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1371\/journal.pone.0225966","volume":"15","author":"S Martinazzi","year":"2020","unstructured":"Martinazzi, S., Flori, A.: The evolving topology of the lightning network: centralization, efficiency, robustness, synchronization, and anonymity. PLOS ONE 15(1), 1\u201318 (2020)","journal-title":"PLOS ONE"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Internet Measurement Conference (2013)","DOI":"10.1145\/2504730.2504747"},{"issue":"12","key":"9_CR15","doi-asserted-by":"publisher","first-page":"2519","DOI":"10.3390\/app9122519","volume":"9","author":"M Nowostawski","year":"2019","unstructured":"Nowostawski, M., Jardar, T.: Evaluating methods for the identification of off-chain transactions in the lightning network. Appl. Sci. 9(12), 2519 (2019)","journal-title":"Appl. Sci."},{"key":"9_CR16","unstructured":"Poon, J., Dryja, T.: The Bitcoin Lightning Network (2016). http:\/\/lightning.network\/"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Malliaris, J., Tschorsch, F.: Discharged payment channels: quantifying the lightning network\u2019s resilience to topology-based attacks. In: European Symposium on Security and Privacy Workshops (2019)","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"9_CR18","series-title":"Springer Proceedings in Business and Economics","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-030-37110-4_1","volume-title":"Mathematical Research for Blockchain Economy","author":"IA Seres","year":"2020","unstructured":"Seres, I.A., Guly\u00e1s, L., Nagy, D.A., Burcsi, P.: Topological analysis of bitcoin\u2019s lightning network. In: Pardalos, P., Kotsireas, I., Guo, Y., Knottenbelt, W. (eds.) Mathematical Research for Blockchain Economy. SPBE, pp. 1\u201312. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-37110-4_1"},{"key":"9_CR19","unstructured":"Vu, B.: Announcing lnd v0.10-beta! Lightning Labs Blog Post. https:\/\/lightning.engineering\/posts\/2020-04-30-lnd-v0.10\/"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64322-8_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T18:29:03Z","timestamp":1634927343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64322-8_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643211","9783662643228"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64322-8_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}