{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:27:45Z","timestamp":1775744865964,"version":"3.50.1"},"reference-count":252,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100002322","name":"Coordena\u00e7\u00e3o de Aperfei\u00e7oamento de Pessoal de N\u00edvel Superior\u2014Brasil (CAPES)\u2014Finance Code 001","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002322","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001807","name":"FAPESP","doi-asserted-by":"publisher","award":["2014\/50937-1"],"award-info":[{"award-number":["2014\/50937-1"]}],"id":[{"id":"10.13039\/501100001807","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/comst.2024.3376252","type":"journal-article","created":{"date-parts":[[2024,3,18]],"date-time":"2024-03-18T20:07:08Z","timestamp":1710792428000},"page":"2411-2458","source":"Crossref","is-referenced-by-count":69,"title":["A Survey on Blockchain Scalability: From Hardware to Layer-Two Protocols"],"prefix":"10.1109","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3344-0734","authenticated-orcid":false,"given":"Gabriel Antonio F.","family":"Rebello","sequence":"first","affiliation":[{"name":"Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8164-8567","authenticated-orcid":false,"given":"Gustavo F.","family":"Camilo","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8941-3121","authenticated-orcid":false,"given":"Lucas Airam C.","family":"de Souza","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"given":"Maria","family":"Potop-Butucaru","sequence":"additional","affiliation":[{"name":"Sorbonne Universit&#x00E9;, CNRS, LIP6, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3710-6805","authenticated-orcid":false,"given":"Marcelo Dias","family":"de Amorim","sequence":"additional","affiliation":[{"name":"Sorbonne Universit&#x00E9;, CNRS, LIP6, Paris, France"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8752-9382","authenticated-orcid":false,"given":"Miguel Elias M.","family":"Campista","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Rio de Janeiro, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7789-3359","authenticated-orcid":false,"given":"Lu\u00eds Henrique M. K.","family":"Costa","sequence":"additional","affiliation":[{"name":"Department of Electrical Engineering, Universidade Federal do Rio de Janeiro, Rio de Janeiro, Brazil"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Blockchain charts","year":"2022"},{"key":"ref2","volume-title":"GDP (current US$)","year":"2022"},{"key":"ref3","volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","author":"Nakamoto","year":"2008"},{"key":"ref4","volume-title":"Ethereum: A secure decentralised generalised transaction ledger","author":"Wood","year":"2014"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2899617"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3072611"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00019"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3093633"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/s13369-020-04950-4"},{"key":"ref11","volume-title":"Visa annual report","year":"2022"},{"key":"ref12","volume-title":"Why sharding is great: Demystifying the technical properties","author":"Buterin","year":"2021"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_12"},{"key":"ref14","article-title":"Intel SGX explained","author":"Costan","year":"2016"},{"key":"ref15","article-title":"Teechain: Scalable blockchain payments using trusted execution environments","author":"Lind","year":"2017","journal-title":"arXiv:1707.05454"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017EDP7290"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ISI.2019.8823238"},{"key":"ref18","article-title":"Blockchain machine: A network-attached hardware accelerator for hyperledger fabric","author":"Javaid","year":"2021","journal-title":"arXiv:2104.06968"},{"key":"ref19","volume-title":"Hyperledger sawtooth","year":"2022"},{"key":"ref20","volume-title":"High-speed Bitcoin relay network","author":"Corallo","year":"2013"},{"key":"ref21","volume-title":"BIP 141: Segregated witness (consensus layer)","author":"Lombrozo","year":"2015"},{"key":"ref22","volume-title":"BIP 152: Compact block relay","author":"Corallo","year":"2016"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/DSN-W.2018.00054"},{"key":"ref24","article-title":"Txilm: Lossy block compression with salted short hashing","author":"Ding","year":"2019","journal-title":"arXiv:1906.06500"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3340422.3343640"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2948009"},{"key":"ref27","volume-title":"Something on transaction structure","author":"Cheow","year":"2020"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2022.3147960"},{"key":"ref29","volume-title":"Enabling Blockchain Innovations With Pegged Sidechains","author":"Back","year":"2014"},{"key":"ref30","volume-title":"A decentralized system for storage and transfer of value","author":"Churyumov","year":"2016"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978389"},{"key":"ref32","first-page":"131","volume-title":"The Tangle, Version 1.4.3","author":"Popov","year":"2017"},{"key":"ref33","first-page":"1","volume-title":"Plasma: Scalable autonomous smart contracts","author":"Poon","year":"2017"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3055518.3055531"},{"key":"ref35","volume-title":"Chainlink: A decentralized oracle network","author":"Ellis","year":"2017"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2018.000-5"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243853"},{"key":"ref38","first-page":"1","volume-title":"The Zilliqa Project: A Secure, Scalable Blockchain Platform","author":"Team","year":"2018"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom\/BigDataSE.2019.00074"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3319889"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ISNCC.2019.8909175"},{"key":"ref42","first-page":"95","article-title":"Monoxide: Scale out Blockchains with asynchronous consensus zones","volume-title":"Proc. Symp. Netw. Syst. Design Implement. (NSDI)","author":"Wang"},{"key":"ref43","volume-title":"Cosmos a network of distributed ledgers","author":"Kwon","year":"2019"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3392153"},{"key":"ref45","volume-title":"The Coordicide","author":"Popov","year":"2020"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/COINS49042.2020.9191430"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.102471"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3410699.3413799"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain53845.2021.00043"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488747"},{"key":"ref51","volume-title":"Chainlink 2.0: Next steps in the evolution of decentralized oracle networks","author":"Breidenbach","year":"2021"},{"key":"ref52","volume-title":"[Bitcoin-development] anti DoS for tx replacement","author":"Spilman","year":"2013"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"ref54","volume-title":"The Bitcoin lightning network: Scalable offchain instant payments","author":"Poon","year":"2016"},{"key":"ref55","volume-title":"Flare: An approach to routing in lightning network","author":"Prihodko","year":"2016"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134096"},{"key":"ref57","article-title":"Sprites and state channels: Payment networks that go faster than lightning","author":"Miller","year":"2017","journal-title":"arXiv:1702.05812"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23086"},{"key":"ref60","volume-title":"Splicing. [lightning-dev] channel top-up","year":"2017"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-67816-0_23"},{"key":"ref63","volume-title":"Trinity white paper: Universal off-chain scaling solution","year":"2018"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00305-0_5"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00209"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2018.8487351"},{"key":"ref67","volume-title":"[Lightningdev] AMP: Atomic Multi-Path Payments Over Lightning","author":"Osuntokun","year":"2018"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23252"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-94478-4_8"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3166071"},{"key":"ref71","article-title":"Anonymous multi-hop locks for blockchain scalability and interoperability","author":"Malavolta","year":"2018"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00305-0_13"},{"key":"ref73","first-page":"1353","article-title":"Arbitrum: Scalable, private smart contracts","volume-title":"Proc. Security Symp.","author":"Kalodner"},{"key":"ref74","volume-title":"The core of cartesi","author":"Teixeira","year":"2018"},{"key":"ref75","article-title":"Scalable, transparent, and post-quantum secure computational integrity","author":"Ben-Sasson","year":"2018"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355461"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359627"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3312614.3312629"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSPW.2019.00045"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365411"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2019.8761804"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2941448"},{"key":"ref83","volume-title":"lightning-network-autopilot","author":"Pickhardt","year":"2019"},{"key":"ref84","article-title":"Hijacking routes in payment channel networks: A predictability tradeoff","author":"Tochner","year":"2019","journal-title":"arXiv:1909.06890"},{"key":"ref85","article-title":"HTLCs considered harmful","volume-title":"Stanford Blockchain Conference","author":"Robinson"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329812"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-37110-4_1"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1088\/1367-2630\/aba062"},{"key":"ref89","volume-title":"The Raiden Network: Fast, Cheap, Scalable Token Transfers for Ethereum","year":"2020"},{"key":"ref90","first-page":"777","article-title":"High throughput cryptocurrency routing in payment channel networks","volume-title":"Proc. Symp. Netw. Syst. Des. Implement. (NSDI)","author":"Sivaraman"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.21428\/58320208.d4cd697e"},{"key":"ref92","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.future.2020.05.033","article-title":"Enhanced lightning network (off-chain)-based micropayment in IoT ecosystems","volume":"112","author":"Robert","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169458"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169456"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169405"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.09.114"},{"key":"ref97","article-title":"Ant routing scalability for the lightning network","author":"Grunspan","year":"2020","journal-title":"arXiv:2002.01374"},{"key":"ref98","first-page":"1728","article-title":"Secure balance planning of offblockchain payment channel networks","volume-title":"Proc. Int. Conf. Comput. Commun. (INFOCOM)","author":"Li"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_15"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_16"},{"key":"ref101","volume-title":"Route blinding","author":"Teinturier","year":"2022"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423262"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/3392147"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423248"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423253"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_17"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58201-2_21"},{"key":"ref108","article-title":"Probing channel balances in the lightning network","author":"Tikhomirov","year":"2020","journal-title":"arXiv:2004.00333"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3046020"},{"key":"ref110","first-page":"1","article-title":"MIRAGE: Succinct arguments for randomized algorithms with applications to universal Zk-SNARKs","volume-title":"Proc. Conf. Security Symp. (SEC)","author":"Kosba"},{"key":"ref111","doi-asserted-by":"crossref","DOI":"10.1016\/j.softx.2021.100717","article-title":"CLoTH: A lightning network simulator","volume":"15","author":"Conoscenti","year":"2021","journal-title":"SoftwareX"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64322-8_8"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/3448300.3467833"},{"key":"ref114","volume-title":"ION Lightning Network Wiki","year":"2021"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS53633.2021.9614304"},{"key":"ref116","article-title":"Optimally reliable & cheap payment flows on the lightning network","author":"Pickhardt","year":"2021","journal-title":"arXiv:2107.05322"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461104"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31500-9_12"},{"key":"ref119","article-title":"An evaluation of cryptocurrency payment channel networks and their privacy implications","author":"Erdin","year":"2021","journal-title":"arXiv:2102.02659"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_9"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1145\/3479722.3480997"},{"key":"ref122","first-page":"452","article-title":"Signaling traffic in Internet-of-Things mobile networks","volume-title":"Proc. Int. Symp. Integr. Netw. Manage. (IM)","author":"Geissler"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOMWKSHPS54753.2022.9798003"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796862"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/tmc.2023.3317704"},{"key":"ref126","volume-title":"Lightning services","year":"2022"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839064"},{"key":"ref128","article-title":"HIDE & SEEK: Privacy-preserving Rebalancing on payment channel networks","author":"Avarikioti","year":"2021"},{"key":"ref129","volume-title":"Lightning loop: Lightning labs","year":"2022"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24203"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1109\/LATINCOM56090.2022.10000445"},{"key":"ref132","article-title":"Unjamming lightning: A systematic approach","author":"Shikhelman","year":"2022"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1109\/DSN53405.2022.00017"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1109\/ICC45855.2022.9839171"},{"key":"ref135","volume-title":"lnd-autopilot","year":"2022"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-18283-9_16"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3200051"},{"key":"ref138","volume-title":"zkSync basics","year":"2022"},{"key":"ref139","article-title":"PLONK: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge","author":"Gabizon","year":"2019"},{"key":"ref140","volume-title":"Protocol specs","year":"2023"},{"key":"ref141","volume-title":"protocols\/packages\/loopring_v3\/DESIGN.md at master. Loopring\/protocols","year":"2023"},{"key":"ref142","volume-title":"Lightning network explorer","year":"2022"},{"key":"ref143","article-title":"SoK: A taxonomy for layer-2 scalability related protocols for Cryptocurrencies","author":"Jourenko","year":"2019"},{"key":"ref144","article-title":"SoK: Off the chain transactions","author":"Gudgeon","year":"2019"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3007251"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/HPEC49654.2021.9622868"},{"key":"ref147","article-title":"Layer 2 blockchain scaling: A survey","author":"Sguanci","year":"2021","journal-title":"arXiv:2107.10881"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1109\/DSC49826.2021.9346275"},{"key":"ref149","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2022.103539","article-title":"A survey of layertwo blockchain protocols","volume":"209","author":"Gangwal","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"issue":"1","key":"ref150","first-page":"101","article-title":"A survey about consensus algorithms used in blockchain","volume":"14","author":"Nguyen","year":"2018","journal-title":"J. Inf. Process. Syst."},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/ICTC.2018.8539529"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1800290"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2020.2969706"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3390566.3391665"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965147"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2967218"},{"issue":"20","key":"ref157","doi-asserted-by":"crossref","first-page":"9372","DOI":"10.3390\/app11209372","article-title":"Systematic literature review of challenges in blockchain scalability","volume":"11","author":"Khan","year":"2021","journal-title":"Appl. Sci."},{"key":"ref158","article-title":"A systematic review of blockchain scalability: Issues, solutions, analysis and future research","volume":"195","author":"Sanka","year":"2021","journal-title":"J. Netw. Comput. Appl. (JNCA)"},{"key":"ref159","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1016\/j.future.2021.07.035","article-title":"Scalable blockchains\u2014A systematic review","volume":"126","author":"Nasir","year":"2022","journal-title":"Future Gener. Comput. Syst. (FGCS)"},{"key":"ref160","volume-title":"An incomplete guide to rollups","author":"Buterin","year":"2021"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1007\/s12243-021-00896-2"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.02.001"},{"key":"ref163","first-page":"45","article-title":"{Bitcoin-NG}: A scalable blockchain protocol","volume-title":"Proc. Symp. Netw. Syst. Des. Implement. (NSDI)","author":"Eyal"},{"key":"ref164","first-page":"173","article-title":"Practical Byzantine fault tolerance","volume-title":"Proc. Symp. Operat. Syst. Design Implement. (OSDI)","author":"Castro"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref166","first-page":"1","article-title":"PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain","volume-title":"Proc. Italian Conf. Cyber Security","author":"Angelis"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"ref169","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2022.24385"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559379"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190538"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69084-1_19"},{"key":"ref173","volume-title":"The ripple protocol consensus algorithm","author":"Schwartz","year":"2014"},{"key":"ref174","volume-title":"EOS.IO white paper","author":"Larimer","year":"2017"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-31277-0_11"},{"key":"ref176","article-title":"Tendermint: Byzantine fault tolerance in the age of blockchains","author":"Buchman","year":"2016"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2935149"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355457"},{"key":"ref179","volume-title":"Blockchain size","year":"2022"},{"key":"ref180","volume-title":"Visa acceptance for retailers","year":"2022"},{"key":"ref181","volume-title":"What is block confirmation on Ethereum and how many confirmations are required?","year":"2021"},{"key":"ref182","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_18"},{"key":"ref183","volume-title":"Taproot: SegWit version 1 spending rules","author":"Nick","year":"2020"},{"key":"ref184","volume-title":"Validation of taproot scripts","author":"Wuille","year":"2020"},{"key":"ref185","volume-title":"Method for identifying subscribers and for generating and verifying electronic signatures in a data exchange system","author":"Schnorr","year":"1991"},{"key":"ref186","volume-title":"Merkelized abstract syntax tree","author":"Lau","year":"2016"},{"key":"ref187","volume-title":"CARDANO: Making the world work better for all","year":"2022"},{"key":"ref188","volume-title":"Bitcoin cash","year":"2023"},{"key":"ref189","volume-title":"A history of bitcoin hard forks","author":"Peters","year":"2023"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1145\/3212998"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1145\/3579845"},{"key":"ref192","article-title":"SoK: Diving into DAG-based blockchain systems","author":"Wang","year":"2020","journal-title":"arXiv:2012.06128v2"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103383"},{"key":"ref194","article-title":"Scalable and probabilistic leaderless BFT consensus through metastability","author":"Rocket","year":"2019","journal-title":"arXiv:1906.08936"},{"key":"ref195","first-page":"1","article-title":"When is spring coming? A security analysis of avalanche consensus","volume-title":"Proc. Int. Conf. Princ. Distrib. Syst. (OPODIS)","author":"Amores-Sesar"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/2491245"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM48880.2022.9796859"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.45"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"ref200","volume-title":"EIP-20: Token standard","author":"Vogelsteller","year":"2015"},{"key":"ref201","article-title":"[ANNOUNCE] micro-payment channels implementation now in bitcoinj","volume-title":"Bitcoin Forum","author":"Hearn"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243856"},{"key":"ref203","volume-title":"Bitcoinj","year":"2022"},{"key":"ref204","volume-title":"Script\u2014Bitcoin Wiki","year":"2021"},{"key":"ref205","volume-title":"Hash time locked contracts","year":"2021"},{"key":"ref206","volume-title":"Lightning App directory","year":"2022"},{"key":"ref207","volume-title":"How Bitcoin brought the lightning network to el salvador","year":"2021"},{"key":"ref208","first-page":"1","article-title":"Tor: The second-generation onion router","volume-title":"Proc. 13th Security Symp. (Security)","author":"Dingledine"},{"key":"ref209","volume-title":"BOLT #0: Introduction and index","author":"Towns","year":"2022"},{"key":"ref210","volume-title":"BOLT #3: Bitcoin transaction and script formats","author":"Russell","year":"2022"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1145\/3427796.3427837"},{"key":"ref212","volume-title":"BOLT #2: Peer protocol for channel management","author":"Russell","year":"2022"},{"key":"ref213","volume-title":"Raiden network statistics","year":"2022"},{"key":"ref214","volume-title":"Raiden network market data","year":"2022"},{"key":"ref215","volume-title":"Raiden Explorer","year":"2022"},{"key":"ref216","volume-title":"Trinity project","year":"2018"},{"key":"ref217","doi-asserted-by":"publisher","DOI":"10.1145\/3286062.3286067"},{"key":"ref218","first-page":"1","article-title":"SilentWhispers: Enforcing security and privacy in Decentralized credit networks","volume-title":"Proc. Netw. Distrib. Syst. Security Symp. (NDSS)","author":"Malavolta"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/321694.321699"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-22846-4_10"},{"key":"ref221","volume-title":"[Lightningdev] Code for Sub Second Runtime of Piecewise Linarization to Quickly Approximate the Minimum Convex Cost Flow Problem","author":"Pickhardt","year":"2022"},{"key":"ref222","doi-asserted-by":"crossref","first-page":"399","DOI":"10.4153\/CJM-1956-045-5","article-title":"Maximal flow through a network","volume":"8","author":"Ford","year":"1956","journal-title":"Can. J. Math."},{"key":"ref223","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87744-8_39"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3069725"},{"issue":"1","key":"ref225","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1090\/qam\/102435","article-title":"On a routing problem","volume":"16","author":"Bellman","year":"1958","journal-title":"Quart. Appl. Math."},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1002\/net.3230140209"},{"key":"ref227","volume-title":"Price of anarchy from selfish routing strategies on the lightning","author":"Pickhardt","year":"2022"},{"key":"ref228","volume-title":"Trampoline routing","author":"Teinturier","year":"2021"},{"key":"ref229","volume-title":"Balance of Satoshis","author":"Bosworth","year":"2021"},{"key":"ref230","volume-title":"Rebalance-LND","author":"Otto","year":"2022"},{"key":"ref231","article-title":"Deep reinforcement learning-based rebalancing policies for profit maximization of relay nodes in payment channel networks","author":"Papadis","year":"2022"},{"key":"ref232","doi-asserted-by":"publisher","DOI":"10.1103\/revmodphys.74.47"},{"issue":"1","key":"ref233","first-page":"17","article-title":"On the evolution of random graphs","volume":"5","author":"Erd\u02ddos","year":"1960","journal-title":"Publ. Math. Inst. Hung. Acad. Sci"},{"key":"ref234","volume-title":"BOLT #7: P2P node and channel discovery","author":"Russell","year":"2022"},{"key":"ref235","volume-title":"Lightning network explorer: Bitfinex lightning node","year":"2022"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/22145.22178"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain50366.2020.00055"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom50675.2020.00138"},{"key":"ref239","volume-title":"Preventing channel jamming","author":"Bier\u02d9","year":"2021"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/986537.986560"},{"key":"ref241","doi-asserted-by":"crossref","DOI":"10.17487\/RFC8684","volume-title":"TCP extensions for Multipath operation with multiple addresses","author":"Ford","year":"2020"},{"issue":"6684","key":"ref242","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018small-world\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"ref243","doi-asserted-by":"publisher","DOI":"10.1126\/science.286.5439.509"},{"key":"ref244","volume-title":"Credit card fraud detection","year":"2023"},{"key":"ref245","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12331-3_2"},{"key":"ref246","volume-title":"StarkEx Documentation","year":"2023"},{"key":"ref247","volume-title":"Loopring: A Decentralized Token Exchange Protocol","author":"Wang","year":"2018"},{"key":"ref248","doi-asserted-by":"publisher","DOI":"10.1007\/bf00195207"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1145\/2090236.2090263"},{"key":"ref250","volume-title":"The Sequencer and Censorship Resistance |Arbitrum Docs","year":"2023"},{"key":"ref251","volume-title":"Answer to \u201chow do i set the our_to_self_delay parameter?\u201d","author":"Poinsot","year":"2022"},{"key":"ref252","volume-title":"Preliminary Hidden Lightning Network Analysis","author":"Giorgio","year":"2022"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10762797\/10468547.pdf?arnumber=10468547","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,27]],"date-time":"2024-11-27T00:02:52Z","timestamp":1732665772000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10468547\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":252,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/comst.2024.3376252","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"value":"1553-877X","type":"electronic"},{"value":"2373-745X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}