{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:30:34Z","timestamp":1772724634550,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,9,19]],"date-time":"2022-09-19T00:00:00Z","timestamp":1663545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,9,19]]},"DOI":"10.1145\/3558535.3559775","type":"proceedings-article","created":{"date-parts":[[2023,7,5]],"date-time":"2023-07-05T14:54:17Z","timestamp":1688568857000},"page":"217-231","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Wiser: Increasing Throughput in Payment Channel Networks with Transaction Aggregation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7987-1519","authenticated-orcid":false,"given":"Samarth","family":"Tiwari","sequence":"first","affiliation":[{"name":"Networks &amp; Optimization, Centrum Wiskunde &amp; Informatica, Amsterdam, Netherlands"}]},{"given":"Michelle","family":"Yeo","sequence":"additional","affiliation":[{"name":"Institute of Science and Technology Austria, Klosterneuburg, Austria"}]},{"given":"Zeta","family":"Avarikioti","sequence":"additional","affiliation":[{"name":"TU Wien, Vienna, Austria"}]},{"given":"Iosif","family":"Salem","sequence":"additional","affiliation":[{"name":"TU Berlin, Berlin, Germany"}]},{"given":"Krzysztof","family":"Pietrzak","sequence":"additional","affiliation":[{"name":"Institute of Science and Technology Austria, Klosterneuburg, Austria"}]},{"given":"Stefan","family":"Schmid","sequence":"additional","affiliation":[{"name":"TU Berlin &amp; University of Vienna, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2023,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560556"},{"key":"e_1_3_2_1_4_1","volume-title":"Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. In 30th USENIX Security Symposium, USENIX Security 2021","author":"Aumayr Lukas","year":"2021","unstructured":"Lukas Aumayr , Pedro Moreno-Sanchez , Aniket Kate , and Matteo Maffei . 2021 . Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. In 30th USENIX Security Symposium, USENIX Security 2021 , August 11 --13 , 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 4043--4060. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/aumayr Lukas Aumayr, Pedro Moreno-Sanchez, Aniket Kate, and Matteo Maffei. 2021. Blitz: Secure Multi-Hop Payments Without Two-Phase Commits. In 30th USENIX Security Symposium, USENIX Security 2021, August 11--13, 2021, Michael Bailey and Rachel Greenstadt (Eds.). USENIX Association, 4043--4060. https:\/\/www.usenix.org\/conference\/usenixsecurity21\/presentation\/aumayr"},{"key":"e_1_3_2_1_5_1","volume-title":"Krzysztof Pietrzak, Jakub Svoboda, and Michelle Yeo.","author":"Avarikioti Zeta","year":"2021","unstructured":"Zeta Avarikioti , Mahsa Bastankhah , Mohammad Ali Maddah-Ali , Krzysztof Pietrzak, Jakub Svoboda, and Michelle Yeo. 2021 . Route Discovery in Private Payment Channel Networks. IACR Cryptol. ePrint Arch . (2021), 1539. https:\/\/eprint.iacr.org\/2021\/1539 Zeta Avarikioti, Mahsa Bastankhah, Mohammad Ali Maddah-Ali, Krzysztof Pietrzak, Jakub Svoboda, and Michelle Yeo. 2021. Route Discovery in Private Payment Channel Networks. IACR Cryptol. ePrint Arch. (2021), 1539. https:\/\/eprint.iacr.org\/2021\/1539"},{"key":"e_1_3_2_1_6_1","volume-title":"Roger Wattenhofer, and Dionysis Zindros.","author":"Avarikioti Zeta","year":"2021","unstructured":"Zeta Avarikioti , Eleftherios Kokoris Kogias , Roger Wattenhofer, and Dionysis Zindros. 2021 . Brick : Asynchronous Incentive-Compatible Payment Channels. In FC. https:\/\/fc21.ifca.ai\/papers\/168.pdf Zeta Avarikioti, Eleftherios Kokoris Kogias, Roger Wattenhofer, and Dionysis Zindros. 2021. Brick: Asynchronous Incentive-Compatible Payment Channels. In FC. https:\/\/fc21.ifca.ai\/papers\/168.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_19"},{"key":"e_1_3_2_1_8_1","volume-title":"HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks. In International Conference on Financial Cryptography and Data Security (FC). https:\/\/arxiv.org\/abs\/2110","author":"Avarikioti Zeta","year":"2022","unstructured":"Zeta Avarikioti , Krzysztof Pietrzak , Iosif Salem , Stefan Schmid , Samarth Tiwari , and Michelle Yeo . 2022 . HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks. In International Conference on Financial Cryptography and Data Security (FC). https:\/\/arxiv.org\/abs\/2110 .08848 Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, and Michelle Yeo. 2022. HIDE & SEEK: Privacy-Preserving Rebalancing on Payment Channel Networks. In International Conference on Financial Cryptography and Data Security (FC). https:\/\/arxiv.org\/abs\/2110.08848"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Conrad Burchert Christian Decker and Roger Wattenhofer. 2017. Scalable Funding of Bitcoin Micropayment Channel Networks - Regular Submission. In SSS.  Conrad Burchert Christian Decker and Roger Wattenhofer. 2017. Scalable Funding of Bitcoin Micropayment Channel Networks - Regular Submission. In SSS.","DOI":"10.1007\/978-3-319-69084-1_26"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-51280-4_9"},{"key":"e_1_3_2_1_11_1","volume-title":"Project Jasper: Are Distributed Wholesale Payment Systems Feasible Yet?","author":"Chapman James","year":"2017","unstructured":"James Chapman , Rodney Garratt , Scott Hendry , Andrew McCormack , and Wade McMahon . 2017 . Project Jasper: Are Distributed Wholesale Payment Systems Feasible Yet? James Chapman, Rodney Garratt, Scott Hendry, Andrew McCormack, and Wade McMahon. 2017. Project Jasper: Are Distributed Wholesale Payment Systems Feasible Yet?"},{"key":"e_1_3_2_1_12_1","unstructured":"Christian Decker Rusty Russell and Olaoluwa Osuntokun. 2018. eltoo: A Simple Layer2 Protocol for Bitcoin. https:\/\/blockstream.com\/eltoo.pdf.  Christian Decker Rusty Russell and Olaoluwa Osuntokun. 2018. eltoo: A Simple Layer2 Protocol for Bitcoin. https:\/\/blockstream.com\/eltoo.pdf."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21741-3_1"},{"key":"e_1_3_2_1_14_1","volume-title":"Challenges. In Proc. ACM Computing Surveys (CSUR).","author":"Dotan Maya","year":"2021","unstructured":"Maya Dotan , Yvonne-Anne Pignolet , Stefan Schmid , Saar Tochner , and Aviv Zohar . 2021 . Survey on Blockchain Networking: Context, State-of-the-Art , Challenges. In Proc. ACM Computing Surveys (CSUR). Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, and Aviv Zohar. 2021. Survey on Blockchain Networking: Context, State-of-the-Art, Challenges. In Proc. ACM Computing Surveys (CSUR)."},{"key":"e_1_3_2_1_15_1","volume-title":"Parameterized complexity","author":"Downey Rodney G","unstructured":"Rodney G Downey and Michael Ralph Fellows . 2012. Parameterized complexity . Springer Science & Business Media . Rodney G Downey and Michael Ralph Fellows. 2012. Parameterized complexity. Springer Science & Business Media."},{"key":"e_1_3_2_1_16_1","volume-title":"IEEE Symposium on Security and Privacy. 327--344","author":"Dziembowski Stefan","year":"2017","unstructured":"Stefan Dziembowski , Lisa Eckey , Sebastian Faust , and Daniel Malinowski . 2017 . Perun: Virtual payment hubs over cryptocurrencies . In IEEE Symposium on Security and Privacy. 327--344 . Stefan Dziembowski, Lisa Eckey, Sebastian Faust, and Daniel Malinowski. 2017. Perun: Virtual payment hubs over cryptocurrencies. In IEEE Symposium on Security and Privacy. 327--344."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3345666"},{"key":"e_1_3_2_1_18_1","volume-title":"Proximity results and faster algorithms for Integer Programming using the Steinitz Lemma. CoRR abs\/1707.00481","author":"Eisenbrand Friedrich","year":"2017","unstructured":"Friedrich Eisenbrand and Robert Weismantel . 2017. Proximity results and faster algorithms for Integer Programming using the Steinitz Lemma. CoRR abs\/1707.00481 ( 2017 ). arXiv:1707.00481 http:\/\/arxiv.org\/abs\/1707.00481 Friedrich Eisenbrand and Robert Weismantel. 2017. Proximity results and faster algorithms for Integer Programming using the Steinitz Lemma. CoRR abs\/1707.00481 (2017). arXiv:1707.00481 http:\/\/arxiv.org\/abs\/1707.00481"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_10"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbankfin.2017.12.008"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(97)00265-8"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134033"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155375"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23448"},{"key":"e_1_3_2_1_25_1","volume-title":"Concurrency and Privacy with Payment-Channel Networks. CoRR abs\/1911.09148","author":"Malavolta Giulio","year":"2019","unstructured":"Giulio Malavolta , Pedro Moreno-Sanchez , Aniket Kate , Matteo Maffei , and Srivatsan Ravi . 2019. Concurrency and Privacy with Payment-Channel Networks. CoRR abs\/1911.09148 ( 2019 ). arXiv:1911.09148 http:\/\/arxiv.org\/abs\/1911.09148 Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2019. Concurrency and Privacy with Payment-Channel Networks. CoRR abs\/1911.09148 (2019). arXiv:1911.09148 http:\/\/arxiv.org\/abs\/1911.09148"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss"},{"key":"e_1_3_2_1_27_1","unstructured":"Subhra Mazumdar and Sushmita Ruj. 2022. CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. IACR Cryptol. ePrint Arch. (2022) 123. https:\/\/eprint.iacr.org\/2022\/123  Subhra Mazumdar and Sushmita Ruj. 2022. CryptoMaze: Privacy-Preserving Splitting of Off-Chain Payments. IACR Cryptol. ePrint Arch. (2022) 123. https:\/\/eprint.iacr.org\/2022\/123"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318041.3355461"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-32101-7_30"},{"key":"e_1_3_2_1_30_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC48266.2020.9169456"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021"},{"key":"e_1_3_2_1_33_1","unstructured":"Joseph Poon and Thaddeus Dryja. 2015. The Bitcoin lightning network: Scalable off-chain instant payments. https:\/\/lightning.network\/lightning-network-paper.pdf.  Joseph Poon and Thaddeus Dryja. 2015. The Bitcoin lightning network: Scalable off-chain instant payments. https:\/\/lightning.network\/lightning-network-paper.pdf."},{"key":"e_1_3_2_1_34_1","volume-title":"Flare: An Approach to Routing in Lightning Network. shorturl.at\/adrHP.","author":"Prihodko Pavel","year":"2016","unstructured":"Pavel Prihodko , Slava Zhigulin , Mykola Sahno , Aleksei Ostrovskiy , and Olaoluwa Osuntokun . 2016 . Flare: An Approach to Routing in Lightning Network. shorturl.at\/adrHP. Pavel Prihodko, Slava Zhigulin, Mykola Sahno, Aleksei Ostrovskiy, and Olaoluwa Osuntokun. 2016. Flare: An Approach to Routing in Lightning Network. shorturl.at\/adrHP."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5089\/9781589062269.084"},{"key":"e_1_3_2_1_36_1","volume-title":"VOUTE-Virtual Overlays Using Tree Embeddings. arXiv: 1601.06119","author":"Roos Stefanie","year":"2016","unstructured":"Stefanie Roos , Martin Beck , and Thorsten Strufe . 2016. VOUTE-Virtual Overlays Using Tree Embeddings. arXiv: 1601.06119 ( 2016 ). arXiv:1601.06119 http:\/\/arxiv.org\/abs\/1601.06119 Stefanie Roos, Martin Beck, and Thorsten Strufe. 2016. VOUTE-Virtual Overlays Using Tree Embeddings. arXiv: 1601.06119 (2016). arXiv:1601.06119 http:\/\/arxiv.org\/abs\/1601.06119"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23254"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ejor.2004.09.003"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"e_1_3_2_1_40_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 777--796","author":"Sivaraman Vibhaalakshmi","year":"2020","unstructured":"Vibhaalakshmi Sivaraman , Shaileshh Bojja Venkatakrishnan , Kathleen Ruan , Parimarjan Negi , Lei Yang , Radhika Mittal , Giulia Fanti , and Mohammad Alizadeh . 2020 . High throughput cryptocurrency routing in payment channel networks . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 777--796 . Vibhaalakshmi Sivaraman, Shaileshh Bojja Venkatakrishnan, Kathleen Ruan, Parimarjan Negi, Lei Yang, Radhika Mittal, Giulia Fanti, and Mohammad Alizadeh. 2020. High throughput cryptocurrency routing in payment channel networks. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI). 777--796."},{"key":"e_1_3_2_1_41_1","unstructured":"Jeremy Spilman. 2013. Anti DoS for tx replacement. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2013-April\/002433.html. Accessed: 2020-11-22.  Jeremy Spilman. 2013. Anti DoS for tx replacement. https:\/\/lists.linuxfoundation.org\/pipermail\/bitcoin-dev\/2013-April\/002433.html. Accessed: 2020-11-22."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40001.2021.00111"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419614.3423253"},{"key":"e_1_3_2_1_44_1","volume-title":"MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network. In International Conference on Financial Cryptography and Data Security. Springer, 481--495","author":"Tripathy Somanath","year":"2020","unstructured":"Somanath Tripathy and Susil Kumar Mohanty . 2020 . MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network. In International Conference on Financial Cryptography and Data Security. Springer, 481--495 . Somanath Tripathy and Susil Kumar Mohanty. 2020. MAPPCN: Multi-hop Anonymous and Privacy-Preserving Payment Channel Network. In International Conference on Financial Cryptography and Data Security. Springer, 481--495."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS52256.2021.00012"},{"key":"e_1_3_2_1_46_1","volume-title":"Money may make the world go round, but at what cost? https:\/\/www.bbc.com\/news\/business-31639262. [Published on","author":"Wall By Matthew","year":"2015","unstructured":"By Matthew Wall . 2015. Money may make the world go round, but at what cost? https:\/\/www.bbc.com\/news\/business-31639262. [Published on 23 March 2015 ]. By Matthew Wall. 2015. Money may make the world go round, but at what cost? https:\/\/www.bbc.com\/news\/business-31639262. [Published on 23 March 2015]."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365411"}],"event":{"name":"AFT '22: 4th ACM Conference on Advances in Financial Technologies","location":"Cambridge MA USA","acronym":"AFT '22"},"container-title":["Proceedings of the 4th ACM Conference on Advances in Financial Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558535.3559775","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3558535.3559775","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:47:08Z","timestamp":1750178828000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3558535.3559775"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,19]]},"references-count":45,"alternative-id":["10.1145\/3558535.3559775","10.1145\/3558535"],"URL":"https:\/\/doi.org\/10.1145\/3558535.3559775","relation":{},"subject":[],"published":{"date-parts":[[2022,9,19]]},"assertion":[{"value":"2023-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}