{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T23:25:38Z","timestamp":1768001138410,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T00:00:00Z","timestamp":1603238400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,10,21]]},"DOI":"10.1145\/3419614.3423262","type":"proceedings-article","created":{"date-parts":[[2020,10,27]],"date-time":"2020-10-27T02:10:27Z","timestamp":1603764627000},"page":"214-227","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Counting Down Thunder"],"prefix":"10.1145","author":[{"given":"Elias","family":"Rohrer","sequence":"first","affiliation":[{"name":"Technical University of Berlinn, Berlin, Germany"}]},{"given":"Florian","family":"Tschorsch","sequence":"additional","affiliation":[{"name":"Technical University of Berlinn, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2020,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: a peer-to-peer electronic cash system. (2008).  Satoshi Nakamoto. 2008. Bitcoin: a peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_2_1","volume-title":"BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin Research. Christ Church","author":"Croman Kyle","year":"2016","unstructured":"Kyle Croman , Christian Decker , Ittay Eyal , Adem Efe Gencer , Ari Juels , Ahmed E. Kosba , Andrew Miller , Prateek Saxena , Elaine Shi , Emin G\u00fcn Sirer , Dawn Song , and Roger Wattenhofer . 2016 . On scaling decentralized blockchains - aposition paper . In BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin Research. Christ Church , Barbados , (February 2016), 106--125. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed E. Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin G\u00fcn Sirer, Dawn Song, and Roger Wattenhofer. 2016. On scaling decentralized blockchains - aposition paper. In BITCOIN '16: Proceedings of the 3rd Workshop on Bitcoin Research. Christ Church, Barbados, (February 2016), 106--125."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"e_1_3_2_1_4_1","volume-title":"NIPS '17: Proceedings of 30th Annual Conference on Neural Information Processing Systems","author":"Giulia","year":"2017","unstructured":"Giulia C. Fanti and Pramod Viswanath. 2017. Deanonymization in the bitcoin P2P network . In NIPS '17: Proceedings of 30th Annual Conference on Neural Information Processing Systems . Long Beach, CA, USA , ( December 2017 ). Giulia C. Fanti and Pramod Viswanath. 2017. Deanonymization in the bitcoin P2P network. In NIPS '17: Proceedings of 30th Annual Conference on Neural Information Processing Systems. Long Beach, CA, USA, (December 2017)."},{"key":"e_1_3_2_1_5_1","volume-title":"The bitcoin lightning network: scalable off-chain instant payments, (January","author":"Poon Joseph","year":"2016","unstructured":"Joseph Poon and Thaddeus Dryja . 2016. The bitcoin lightning network: scalable off-chain instant payments, (January 2016 ). Joseph Poon and Thaddeus Dryja. 2016. The bitcoin lightning network: scalable off-chain instant payments, (January 2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.15"},{"key":"e_1_3_2_1_7_1","volume-title":"Hijacking routes in payment channel networks: A predictability tradeoff. CoRR, abs\/1909.06890. arXiv","author":"Tochner Saar","year":"1909","unstructured":"Saar Tochner , Stefan Schmid , and Aviv Zohar . 2019. Hijacking routes in payment channel networks: A predictability tradeoff. CoRR, abs\/1909.06890. arXiv : 1909 .06890. Saar Tochner, Stefan Schmid, and Aviv Zohar. 2019. Hijacking routes in payment channel networks: A predictability tradeoff. CoRR, abs\/1909.06890. arXiv: 1909.06890."},{"key":"e_1_3_2_1_8_1","volume-title":"Certicom Research","author":"Brown Daniel R. L.","year":"2010","unstructured":"Daniel R. L. Brown . 2010 . Sec 2: recommended elliptic curve domain parameters . Certicom Research , (2010). http:\/\/www.secg.org\/sec2-v2.pdf. Daniel R. L. Brown. 2010. Sec 2: recommended elliptic curve domain parameters. Certicom Research, (2010). http:\/\/www.secg.org\/sec2-v2.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Trevor Perrin. 2018. The noise protocol framework. (2018). https:\/\/noiseprotocol.org\/noise.pdf.  Trevor Perrin. 2018. The noise protocol framework. (2018). https:\/\/noiseprotocol.org\/noise.pdf."},{"key":"e_1_3_2_1_10_1","unstructured":"Lightning Network. 2020. BOLT in-progress specifications. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc.  Lightning Network. 2020. BOLT in-progress specifications. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01386390"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134096"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516651"},{"key":"e_1_3_2_1_14_1","unstructured":"Christian Decker. 2020. Rendez-vous routing proposal. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/rendez-vous\/proposals\/0001-rendez-vous.md.  Christian Decker. 2020. Rendez-vous routing proposal. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/rendez-vous\/proposals\/0001-rendez-vous.md."},{"key":"e_1_3_2_1_15_1","volume-title":"Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath.","author":"Fanti Giulia C.","year":"2018","unstructured":"Giulia C. Fanti , Shaileshh Bojja Venkatakrishnan , Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018 . Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees. POMACS , 2, 2, 29:1--29:35. Giulia C. Fanti, Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller, and Pramod Viswanath. 2018. Dandelion++: lightweight cryptocurrency networking with formal anonymity guarantees. POMACS, 2, 2, 29:1--29:35."},{"key":"e_1_3_2_1_16_1","unstructured":"Ayelet Mizrahi and Aviv Zohar. 2020. Congestion attacks in payment channel networks. CoRR abs\/2002.06564. arXiv:2002.06564.  Ayelet Mizrahi and Aviv Zohar. 2020. Congestion attacks in payment channel networks. CoRR abs\/2002.06564. arXiv:2002.06564."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"Elisabetta Bergamini Pierluigi Crescenzi Gianlorenzo D'Angelo Henning Meyerhenke Lorenzo Severini and Yllka Velaj. 2018. Improving the betweenness centrality of a node by adding links. ACM Journal of Experimental Algorithmics 23.  Elisabetta Bergamini Pierluigi Crescenzi Gianlorenzo D'Angelo Henning Meyerhenke Lorenzo Severini and Yllka Velaj. 2018. Improving the betweenness centrality of a node by adding links. ACM Journal of Experimental Algorithmics 23.","DOI":"10.1145\/3166071"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_15"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_16"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.52"},{"key":"e_1_3_2_1_21_1","unstructured":"c-lightning Project. 2020. Github. https:\/\/github.com\/ElementsProject\/lightning.  c-lightning Project. 2020. Github. https:\/\/github.com\/ElementsProject\/lightning."},{"key":"e_1_3_2_1_22_1","unstructured":"Lightning Network. 2020. BOLT #4: onion routing protocol. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/04-onion-routing.md.  Lightning Network. 2020. BOLT #4: onion routing protocol. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/04-onion-routing.md."},{"key":"e_1_3_2_1_23_1","unstructured":"LND. 2020. Github: policy failure logic. https:\/\/github.com\/lightningnetwork\/lnd\/blob\/1354a461701b9396f0b4a35b01d308c5fcc0dbd2\/routing\/result_interpretation.go#L343.  LND. 2020. Github: policy failure logic. https:\/\/github.com\/lightningnetwork\/lnd\/blob\/1354a461701b9396f0b4a35b01d308c5fcc0dbd2\/routing\/result_interpretation.go#L343."},{"key":"e_1_3_2_1_24_1","unstructured":"LND. 2020. Github commit: move second chance logic. https:\/\/github.com\/lightningnetwork\/lnd\/commit\/dc13da5abbfa429273b516abd566f6c6fa5bb200.  LND. 2020. Github commit: move second chance logic. https:\/\/github.com\/lightningnetwork\/lnd\/commit\/dc13da5abbfa429273b516abd566f6c6fa5bb200."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49380-8_7"},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX Security '17: Proceedings of the 26th USENIX Security Symposium","author":"Piotrowska Ania M.","year":"2017","unstructured":"Ania M. Piotrowska , Jamie Hayes , Tariq Elahi , Sebastian Meiser , and George Danezis . 2017 . The loopix anonymity system . In USENIX Security '17: Proceedings of the 26th USENIX Security Symposium . Vancouver, BC, Canada, 1199--1216. Ania M. Piotrowska, Jamie Hayes, Tariq Elahi, Sebastian Meiser, and George Danezis. 2017. The loopix anonymity system. In USENIX Security '17: Proceedings of the 26th USENIX Security Symposium. Vancouver, BC, Canada, 1199--1216."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_17"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23330"},{"key":"e_1_3_2_1_29_1","unstructured":"Lightning Network. 2020. BOLT #7: P2P node and channel discovery. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/07-routing-gossip.md.  Lightning Network. 2020. BOLT #7: P2P node and channel discovery. (2020). https:\/\/github.com\/lightningnetwork\/lightning-rfc\/blob\/master\/07-routing-gossip.md."},{"key":"e_1_3_2_1_30_1","unstructured":"Lightning Network Daemon LND. 2018. Shadow route github issue. (2018). https:\/\/github.com\/lightningnetwork\/lnd\/issues\/1222.  Lightning Network Daemon LND. 2018. Shadow route github issue. (2018). https:\/\/github.com\/lightningnetwork\/lnd\/issues\/1222."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/UIC-ATC-ScalCom-CBDCom-IoP-SmartWorld.2016.0070"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCN44214.2019.8990796"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"crossref","unstructured":"George Kappos Haaroon Yousaf Ania Piotrowska Sanket Kanjalkar Sergi Delgado-Segura Andrew Miller and Sarah Meiklejohn. 2020. An empirical analysis of privacy in the lightning network. arXiv preprint arXiv:2003.12470.  George Kappos Haaroon Yousaf Ania Piotrowska Sanket Kanjalkar Sergi Delgado-Segura Andrew Miller and Sarah Meiklejohn. 2020. An empirical analysis of privacy in the lightning network. arXiv preprint arXiv:2003.12470.","DOI":"10.1007\/978-3-662-64322-8_8"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39884-1_2"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660267.2660379"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078505.3078528"},{"key":"e_1_3_2_1_38_1","first-page":"220","article-title":"Remote side-channel attacks on anonymous transactions","volume":"2020","author":"Tram\u00e8r Florian","year":"2020","unstructured":"Florian Tram\u00e8r , Dan Boneh , and Kenneth G. Paterson . 2020 . Remote side-channel attacks on anonymous transactions . IACR Cryptology ePrint Archive , 2020 , 220 . Florian Tram\u00e8r, Dan Boneh, and Kenneth G. Paterson. 2020. Remote side-channel attacks on anonymous transactions. IACR Cryptology ePrint Archive, 2020, 220.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_39_1","volume-title":"S&B '19: Proceedings of IEEE Security & Privacy on the Blockchain. (June","author":"Rohrer Elias","year":"2019","unstructured":"Elias Rohrer , Julian Malliaris , and Florian Tschorsch . 2019. Discharged payment channels: quantifying the lightning network's resilience to topology-based attacks . In S&B '19: Proceedings of IEEE Security & Privacy on the Blockchain. (June 2019 ). Elias Rohrer, Julian Malliaris, and Florian Tschorsch. 2019. Discharged payment channels: quantifying the lightning network's resilience to topology-based attacks. In S&B '19: Proceedings of IEEE Security & Privacy on the Blockchain. (June 2019)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3321705.3329812"},{"key":"e_1_3_2_1_41_1","first-page":"1385","article-title":"Improvements of the balance discovery attack on lightning network payment channels","volume":"2019","author":"van Dam Gijs","year":"2019","unstructured":"Gijs van Dam , Rabiah Abdul Kadir , Puteri N. E. Nohuddin , and Halimah Badioze Zaman . 2019 . Improvements of the balance discovery attack on lightning network payment channels . IACR Cryptology ePrint Archive , 2019 , 1385 . Gijs van Dam, Rabiah Abdul Kadir, Puteri N. E. Nohuddin, and Halimah Badioze Zaman. 2019. Improvements of the balance discovery attack on lightning network payment channels. IACR Cryptology ePrint Archive, 2019, 1385.","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_42_1","volume-title":"Proc. ACM Meas. Anal. Comput. Syst., 4, 2, 29:1--29:39","author":"Tang Weizhao","year":"2020","unstructured":"Weizhao Tang , Weina Wang , Giulia C. Fanti , and Sewoong Oh . 2020 . Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks . Proc. ACM Meas. Anal. Comput. Syst., 4, 2, 29:1--29:39 . Weizhao Tang, Weina Wang, Giulia C. Fanti, and Sewoong Oh. 2020. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst., 4, 2, 29:1--29:39."},{"key":"e_1_3_2_1_43_1","volume-title":"Topological analysis of bitcoin's lightning network. CoRR, abs\/1901.04972. arXiv","author":"Seres Istv\u00e1n Andr\u00e1s","year":"1901","unstructured":"Istv\u00e1n Andr\u00e1s Seres , L\u00e1szl\u00f3 Guly\u00e1s , D\u00e1niel A. Nagy , and P\u00e9ter Burcsi . 2019. Topological analysis of bitcoin's lightning network. CoRR, abs\/1901.04972. arXiv : 1901 .04972. Istv\u00e1n Andr\u00e1s Seres, L\u00e1szl\u00f3 Guly\u00e1s, D\u00e1niel A. Nagy, and P\u00e9ter Burcsi. 2019. Topological analysis of bitcoin's lightning network. CoRR, abs\/1901.04972. arXiv: 1901.04972."},{"key":"e_1_3_2_1_44_1","volume-title":"Tessone","author":"Lin Jian-Hong","year":"2020","unstructured":"Jian-Hong Lin , Kevin Primicerio , Tiziano Squartini , Christian Decker , and Claudio J . Tessone . 2020 . Lightning network: a second path towards centralisation of the bitcoin economy. CoRR , abs\/2002.02819. arXiv: 2002.02819. Jian-Hong Lin, Kevin Primicerio, Tiziano Squartini, Christian Decker, and Claudio J. Tessone. 2020. Lightning network: a second path towards centralisation of the bitcoin economy. CoRR, abs\/2002.02819. arXiv: 2002.02819."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0225966"},{"key":"e_1_3_2_1_46_1","volume-title":"Istv\u00e1n Andr\u00e1s Seres, and Andr\u00e1s A. Bencz\u00far","author":"B\u00e9res Ferenc","year":"2019","unstructured":"Ferenc B\u00e9res , Istv\u00e1n Andr\u00e1s Seres, and Andr\u00e1s A. Bencz\u00far . 2019 . A cryptoeconomic traffic analysis of bitcoins lightning network. CoRR , abs\/1911.09432. arXiv: 1911.09432. Ferenc B\u00e9res, Istv\u00e1n Andr\u00e1s Seres, and Andr\u00e1s A. Bencz\u00far. 2019. A cryptoeconomic traffic analysis of bitcoins lightning network. CoRR, abs\/1911.09432. arXiv: 1911.09432."},{"key":"e_1_3_2_1_47_1","first-page":"303","article-title":"A quantitative analysis of security, anonymity and scalability for the lightning network","volume":"2020","author":"Tikhomirov Sergei","year":"2020","unstructured":"Sergei Tikhomirov , Pedro Moreno-Sanchez , and Matteo Maffei . 2020 . A quantitative analysis of security, anonymity and scalability for the lightning network . IACR Cryptol. ePrint Arch. , 2020 , 303 . Sergei Tikhomirov, Pedro Moreno-Sanchez, and Matteo Maffei. 2020. A quantitative analysis of security, anonymity and scalability for the lightning network. IACR Cryptol. ePrint Arch., 2020, 303.","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.5220\/0009429200070014"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23086"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134093"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23252"},{"key":"e_1_3_2_1_52_1","volume-title":"Ram Govind Singh, and Arindam Pal","author":"Mazumdar Subhra","year":"2020","unstructured":"Subhra Mazumdar , Sushmita Ruj , Ram Govind Singh, and Arindam Pal . 2020 . Hushrelay : A privacy-preserving, efficient, and scalable routing algorithm for off-chain payments. CoRR , abs\/2002.05071. arXiv: 2002.05071. Subhra Mazumdar, Sushmita Ruj, Ram Govind Singh, and Arindam Pal. 2020. Hushrelay: A privacy-preserving, efficient, and scalable routing algorithm for off-chain payments. CoRR, abs\/2002.05071. arXiv: 2002.05071."},{"key":"e_1_3_2_1_53_1","unstructured":"Inc. MaxMind. 2020. Geoip geolite2 database. https:\/\/dev.maxmind.com\/geoip\/geoip2\/geolite2\/.  Inc. MaxMind. 2020. Geoip geolite2 database. https:\/\/dev.maxmind.com\/geoip\/geoip2\/geolite2\/."},{"key":"e_1_3_2_1_54_1","unstructured":"Bitnodes. 2020. Homepage. https:\/\/bitnodes.io.  Bitnodes. 2020. Homepage. https:\/\/bitnodes.io."},{"key":"e_1_3_2_1_55_1","unstructured":"Dallas TX USA (October 2017).  Dallas TX USA (October 2017)."},{"key":"e_1_3_2_1_56_1","unstructured":"Kota Kinabalu Malaysia (February 2020).  Kota Kinabalu Malaysia (February 2020)."}],"event":{"name":"AFT '20: 2nd ACM Conference on Advances in Financial Technologies","location":"New York NY USA","acronym":"AFT '20","sponsor":["ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 2nd ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419614.3423262","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3419614.3423262","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:43Z","timestamp":1750197703000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3419614.3423262"}},"subtitle":["Timing Attacks on Privacy in Payment Channel Networks"],"short-title":[],"issued":{"date-parts":[[2020,10,21]]},"references-count":56,"alternative-id":["10.1145\/3419614.3423262","10.1145\/3419614"],"URL":"https:\/\/doi.org\/10.1145\/3419614.3423262","relation":{},"subject":[],"published":{"date-parts":[[2020,10,21]]},"assertion":[{"value":"2020-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}