{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T23:27:15Z","timestamp":1776814035868,"version":"3.51.2"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783662643303","type":"print"},{"value":"9783662643310","type":"electronic"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-662-64331-0_9","type":"book-chapter","created":{"date-parts":[[2021,10,22]],"date-time":"2021-10-22T23:16:12Z","timestamp":1634944572000},"page":"170-188","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":51,"title":["Congestion Attacks in Payment Channel Networks"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4037-1028","authenticated-orcid":false,"given":"Ayelet","family":"Mizrahi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8539-9222","authenticated-orcid":false,"given":"Aviv","family":"Zohar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,10,23]]},"reference":[{"key":"9_CR1","unstructured":"Fundingmanager: configurable remote max HTLCs [lnd pull request #4527], August 2020. https:\/\/github.com\/lightningnetwork\/lnd\/pull\/4527"},{"key":"9_CR2","unstructured":"Avarikioti, G., Laufenberg, F., Sliwinski, J., Wang, Y., Wattenhofer, R.: Towards secure and efficient payment channels. arXiv preprint arXiv:1811.12740 (2018)"},{"key":"9_CR3","unstructured":"Bastien Teinturier, A.R., Jager, J.: Spamming the lightning network, October 2020. https:\/\/github.com\/t-bast\/lightning-docs\/blob\/master\/spam-prevention.md"},{"key":"9_CR4","unstructured":"BitInfoCharts: Bitcoin avg. transaction fee historical chart (2020). https:\/\/bitinfocharts.com\/comparison\/bitcoin-transactionfees.html#3m"},{"key":"9_CR5","unstructured":"C-Lightning: A lightning network implementation in c (2020). https:\/\/github.com\/ElementsProject\/lightning"},{"key":"9_CR6","unstructured":"Dziemian, C.: Summary of the second lightning development summit (2018). https:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2018-November\/001595.html. [Lightning-dev]"},{"key":"9_CR7","unstructured":"Eclair: A scala implementation of the lightning network (2020). https:\/\/github.com\/ACINQ\/eclair"},{"key":"9_CR8","unstructured":"EmelyanenkoK: lightning-rfc issue #182: Payment channel congestion via spam-attack, May 2017. https:\/\/github.com\/lightningnetwork\/lightning-rfc\/issues\/182"},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"57","DOI":"10.4064\/-25-1-57-70","volume":"25","author":"M Fiedler","year":"1989","unstructured":"Fiedler, M.: Laplacian of graphs and algebraic connectivity. Banach Center Publ. 25(1), 57\u201370 (1989)","journal-title":"Banach Center Publ."},{"issue":"12","key":"9_CR10","doi-asserted-by":"publisher","first-page":"7821","DOI":"10.1073\/pnas.122653799","volume":"99","author":"M Girvan","year":"2002","unstructured":"Girvan, M., Newman, M.E.: Community structure in social and biological networks. Proc. Natl. Acad. Sci. 99(12), 7821\u20137826 (2002)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Green, M., Miers, I.: Bolt: Anonymous payment channels for decentralized currencies. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 473\u2013489. ACM, Dallas (2017)","DOI":"10.1145\/3133956.3134093"},{"key":"9_CR12","unstructured":"Gudgeon, L., Moreno-Sanchez, P., Roos, S., McCorry, P., Gervais, A.: Sok: Off the chain transactions. IACR Cryptology ePrint Archive 2019, p. 360 (2019)"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Heilman, E., Alshenibr, L., Baldimtsi, F., Scafuro, A., Goldberg, S.: Tumblebit: an untrusted bitcoin-compatible anonymous payment hub. In: Network and Distributed System Security Symposium, NDSS (2017)","DOI":"10.14722\/ndss.2017.23086"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Herrera-Joancomarti, J., Navarro-Arribas, G., Pedrosa, A.R., Cristina, P.S., Garcia-Alfaro, J.: On the difficulty of hiding the balance of lightning network channels. Ph.D. thesis, D\u00e9pt. R\u00e9seaux et Service de T\u00e9l\u00e9com (Institut Mines-T\u00e9l\u00e9com-T\u00e9l\u00e9com SudParis $$\\ldots $$ (2019)","DOI":"10.1145\/3321705.3329812"},{"issue":"2","key":"9_CR15","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1002\/j.1538-7305.1970.tb01770.x","volume":"49","author":"BW Kernighan","year":"1970","unstructured":"Kernighan, B.W., Lin, S.: An efficient heuristic procedure for partitioning graphs. Bell Syst. Tech. J. 49(2), 291\u2013307 (1970)","journal-title":"Bell Syst. Tech. J."},{"key":"9_CR16","doi-asserted-by":"publisher","first-page":"101108","DOI":"10.1016\/j.pmcj.2019.101108","volume":"61","author":"S Lee","year":"2020","unstructured":"Lee, S., Kim, H.: On the robustness of lightning network in bitcoin. Pervasive Mob. Comput. 61, 101108 (2020)","journal-title":"Pervasive Mob. Comput."},{"key":"9_CR17","unstructured":"LNBIG: Lnbig lightning nodes (2018\u20132019). https:\/\/lnbig.com\/#\/our-nodes"},{"key":"9_CR18","unstructured":"LND: The lightning network daemon (2020). https:\/\/github.com\/lightningnetwork\/lnd"},{"key":"9_CR19","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Kate, A., Maffei, M., Ravi, S.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455\u2013471. ACM, New York (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"9_CR20","unstructured":"McCorry, P., Bakshi, S., Bentov, I., Meiklejohn, S., Miller, A.: Pisa: arbitration outsourcing for state channels. In: Proceedings of the 1st ACM Conference on Advances in Financial Technologies, pp. 16\u201330. AFT, Zurich (2019)"},{"key":"9_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1007\/978-3-319-40253-6_4","volume-title":"Information Security and Privacy","author":"P McCorry","year":"2016","unstructured":"McCorry, P., M\u00f6ser, M., Shahandasti, S.F., Hao, F.: Towards Bitcoin payment networks. In: Liu, J.K., Steinfeld, R. (eds.) ACISP 2016, Part I. LNCS, vol. 9722, pp. 57\u201376. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-40253-6_4"},{"key":"9_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"508","DOI":"10.1007\/978-3-030-32101-7_30","volume-title":"Financial Cryptography and Data Security","author":"A Miller","year":"2019","unstructured":"Miller, A., Bentov, I., Bakshi, S., Kumaresan, R., McCorry, P.: Sprites and state channels: payment networks that go faster than lightning. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 508\u2013526. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-32101-7_30"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Mizrahi, A., Zohar, A.: Congestion attacks in payment channel networks. arXiv preprint arXiv:2002.06564 (2020)","DOI":"10.1007\/978-3-662-64331-0_9"},{"key":"9_CR24","unstructured":"Network, R.: Setting the number of pending transfers keeping the gas limit, July 2018. https:\/\/github.com\/raiden-network\/raiden\/commit\/107b3c3700a7d6cac3eae8634f945c1b6095f91c"},{"key":"9_CR25","unstructured":"Network, T.R.: An off-chain scaling solution (2020), https:\/\/github.com\/raiden-network\/raiden"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-51280-4_14","volume-title":"Financial Cryptography and Data Security","author":"C P\u00e9rez-Sol\u00e0","year":"2020","unstructured":"P\u00e9rez-Sol\u00e0, C., Ranchal-Pedrosa, A., Herrera-Joancomart\u00ed, J., Navarro-Arribas, G., Garcia-Alfaro, J.: LockDown: balance availability attack against lightning network channels. In: Bonneau, J., Heninger, N. (eds.) FC 2020. LNCS, vol. 12059, pp. 245\u2013263. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-51280-4_14"},{"key":"9_CR27","unstructured":"Poon, J., Dryja, T.: The Bitcoin lightning network: Scalable off-chain instant payments (2016)"},{"key":"9_CR28","unstructured":"(Roasbeef), O.O.: Git Commit: \u201clnd: lower default CLTV delta from 144 to 40\u201d. https:\/\/github.com\/lightningnetwork\/lnd\/commit\/c302f1ea3a91ccfa382d56851d23f4c73656208c#diff-356ddb2e7efca712327c3b2d94d3afd3 (Mar 2019)"},{"key":"9_CR29","unstructured":"Rohrer, E.: Lightning network snapshots (2018\u20132019). https:\/\/gitlab.tu-berlin.de\/rohrer\/discharged-pc-data\/tree\/master\/snapshots"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Rohrer, E., Malliaris, J., Tschorsch, F.: Discharged payment channels: Quantifying the lightning network\u2019s resilience to topology-based attacks. arXiv preprint arXiv:1904.10253 (2019)","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"9_CR31","unstructured":"Russell, R.: Loop attack with onion routing, August 2015. https:\/\/lists.linuxfoundation.org\/pipermail\/lightning-dev\/2015-August\/000135.html [Lightning-dev]"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Seres, I.A., Guly\u00e1s, L., Nagy, D.A., Burcsi, P.: Topological analysis of bitcoin\u2019s lightning network. arXiv preprint arXiv:1901.04972 (2019)","DOI":"10.1007\/978-3-030-37110-4_1"},{"key":"9_CR33","unstructured":"Specifications, L.N.: Basis of lightning technology (BOLTs) (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc"},{"key":"9_CR34","doi-asserted-by":"crossref","unstructured":"Tang, W., Wang, W., Fanti, G., Oh, S.: Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. arXiv preprint arXiv:1909.02717 (2019)","DOI":"10.1145\/3393691.3394213"},{"key":"9_CR35","doi-asserted-by":"crossref","unstructured":"Tikhomirov, S., Moreno-Sanchez, P., Maffei, M.: A quantitative analysis of security, anonymity and scalability for the lightning network. IACR Cryptol. ePrint Arch. 2020, p. 303 (2020)","DOI":"10.1109\/EuroSPW51379.2020.00059"},{"key":"9_CR36","unstructured":"Tochner, S., Schmid, S., Zohar, A.: Hijacking routes in payment channel networks: A predictability tradeoff. arXiv preprint arXiv:1909.06890 (2019)"},{"key":"9_CR37","unstructured":"Trustnodes: Lightning network ddos sends 20% of nodes down (2018). https:\/\/www.trustnodes.com\/2018\/03\/21\/lightning-network-ddos-sends-20-nodes"}],"container-title":["Lecture Notes in Computer Science","Financial Cryptography and Data Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-64331-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T12:56:56Z","timestamp":1673614616000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-662-64331-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783662643303","9783662643310"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-64331-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"23 October 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Financial Cryptography and Data Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 March 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 March 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fc2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/fc21.ifca.ai\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}