{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:30:34Z","timestamp":1772724634426,"version":"3.50.1"},"reference-count":40,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T00:00:00Z","timestamp":1726444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"Ministry of Education (MoE) of the Government of India"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Priv. Secur."],"published-print":{"date-parts":[[2024,11,30]]},"abstract":"<jats:p>\n            The payment channel network (PCN) is an effective off-chain scaling solution widely recognized for reducing operational costs on permissionless blockchains. However, it still faces challenges such as lack of flexibility, channel exhaustion, and poor sustainability. Currently, a separate deposit is required for each payment channel, which locks a significant amount of coins for a longer period. This restricts the ability to move locked coins across their channels off-chain. Additionally, unbalanced (unidirectional) transfers can lead to channel exhaustion, rendering the channel unsustainable. To address these issues, we propose a novel off-chain flexible PCN protocol called\n            <jats:italic>Flexichain<\/jats:italic>\n            . Unlike existing approaches, Flexichain allows users to deposit coins per user rather than per channel. This provides flexibility to move coins freely between channels without relying on the blockchain or disrupting the off-chain cycle. Flexichain is proven to be secure under the Universal Composability framework and resistant against channel exhaustion attacks. To assess the performance of Flexichain, we conduct experiments on both on-chain and off-chain operations using snapshots of the Lightning Network. We evaluate the on-chain gas costs, success ratio and success amount of off-chain payments under uniform and skewed payment demands, as well as the computational and communication overheads of the off-chain contracts.\n          <\/jats:p>","DOI":"10.1145\/3687476","type":"journal-article","created":{"date-parts":[[2024,8,8]],"date-time":"2024-08-08T11:14:18Z","timestamp":1723115658000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Flexichain: Flexible Payment Channel Network to Defend Against Channel Exhaustion Attack"],"prefix":"10.1145","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8643-5501","authenticated-orcid":false,"given":"Susil Kumar","family":"Mohanty","sequence":"first","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology Patna, Patna, India and Cryptography and Blockchain Group, Faculty of Mathematics, Informatics, and Mechanics, University of Warsaw, Warsaw, Poland"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6964-2648","authenticated-orcid":false,"given":"Somanath","family":"Tripathy","sequence":"additional","affiliation":[{"name":"Computer Science and Engineering, Indian Institute of Technology Patna, Patna, India"}]}],"member":"320","published-online":{"date-parts":[[2024,9,16]]},"reference":[{"key":"e_1_3_2_2_2","unstructured":"Raiden Network. 2018. Raiden Network: Fast Cheap Scalable Token Transfers for Ethereum. Retrieved August 10 2024 from https:\/\/raiden.network\/"},{"key":"e_1_3_2_3_2","article-title":"Securing Lightning Channels Against Rational Miners","author":"Aumayr Lukas","year":"2024","unstructured":"Lukas Aumayr, Zeta Avarikioti, Matteo Maffei, and Subhra Mazumdar. 2024. Securing Lightning Channels Against Rational Miners. Paper 2024\/826. Cryptology ePrint Archive. https:\/\/eprint.iacr.org\/2024\/826","journal-title":"Cryptology ePrint Archive"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"358","DOI":"10.1007\/978-3-031-18283-9_17","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Avarikioti Zeta","year":"2022","unstructured":"Zeta Avarikioti, Krzysztof Pietrzak, Iosif Salem, Stefan Schmid, Samarth Tiwari, and Michelle Yeo. 2022. Hide & Seek: Privacy-preserving rebalancing on payment channel networks. In Proceedings of the International Conference on Financial Cryptography and Data Security. 358\u2013373."},{"key":"e_1_3_2_5_2","first-page":"1","volume-title":"Proceedings of the 2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS\u201921)","author":"Awathare Nitin","year":"2021","unstructured":"Nitin Awathare, Suraj, Akash, Vinay Joseph Ribeiro, and Umesh Bellur. 2021. REBAL: Channel balancing for payment channel networks. In Proceedings of the 2021 29th International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOTS\u201921). IEEE, 1\u20138."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","unstructured":"Dan Boneh and Matt Franklin. 2001. Identity-based encryption from the Weil pairing. In Advances in Cryptology\u2014CRYPTO 2001. Lecture Notes in Computer Science Vol. 2139. Springer 213\u2013229.","DOI":"10.1007\/3-540-44647-8_13"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"136","DOI":"10.1109\/SFCS.2001.959888","volume-title":"Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science","author":"Canetti Ran","year":"2001","unstructured":"Ran Canetti. 2001. Universally composable security: A new paradigm for cryptographic protocols. In Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science. IEEE, 136\u2013145."},{"key":"e_1_3_2_8_2","doi-asserted-by":"crossref","first-page":"132828","DOI":"10.1109\/ACCESS.2019.2941448","article-title":"Hubs, rebalancing and service providers in the lightning network","volume":"7","author":"Conoscenti Marco","year":"2019","unstructured":"Marco Conoscenti, Antonio Vetr\u00f2, and Juan Carlos De Martin. 2019. Hubs, rebalancing and service providers in the lightning network. IEEE Access 7 (2019), 132828\u2013132840.","journal-title":"IEEE Access"},{"key":"e_1_3_2_9_2","first-page":"1161","volume-title":"Proceedings of the 2018 IEEE International Conference on Internet of Things (IThings), IEEE Green Computing and Communications (GreenCom), IEEE Cyber, Physical, and Social Computing (CPSCom), and IEEE Smart Data (SmartData)","author":"Stasi Giovanni Di","year":"2018","unstructured":"Giovanni Di Stasi, Stefano Avallone, Roberto Canonico, and Giorgio Ventre. 2018. Routing payments on the lightning network. In Proceedings of the 2018 IEEE International Conference on Internet of Things (IThings), IEEE Green Computing and Communications (GreenCom), IEEE Cyber, Physical, and Social Computing (CPSCom), and IEEE Smart Data (SmartData). IEEE, 1161\u20131170."},{"key":"e_1_3_2_10_2","first-page":"1","volume-title":"Proceedings of the 15th International Conference on Availability, Reliability, and Security","author":"Dotan Maya","year":"2020","unstructured":"Maya Dotan, Yvonne-Anne Pignolet, Stefan Schmid, Saar Tochner, and Aviv Zohar. 2020. SoK: Cryptocurrency networking context, state-of-the-art, challenges. In Proceedings of the 15th International Conference on Availability, Reliability, and Security. 1\u201313."},{"key":"e_1_3_2_11_2","volume-title":"Proceedings of the 29th Annual Network and Distributed System Security Symposium (NDSS\u201922)","author":"Ge Zhonghui","year":"2022","unstructured":"Zhonghui Ge, Yi Zhang, Yu Long, and Dawu Gu. 2022. Shaduf: Non-cycle payment channel rebalancing. In Proceedings of the 29th Annual Network and Distributed System Security Symposium (NDSS\u201922). https:\/\/www.ndss-symposium.org\/ndss-paper\/auto-draft-254\/"},{"key":"e_1_3_2_12_2","doi-asserted-by":"crossref","unstructured":"Lewis Gudgeon Pedro Moreno-Sanchez Stefanie Roos Patrick McCorry and Arthur Gervais. 2020. SoK: Layer-two blockchain protocols. In Financial Cryptography and Data Security. Lecture Notes in Computer Science Vol. 12059. Springer 201\u2013226.","DOI":"10.1007\/978-3-030-51280-4_12"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1145\/3419614.3423248","volume-title":"Proceedings of the 2nd ACM Conference on Advances in Financial Technologies","author":"Harris Jona","year":"2020","unstructured":"Jona Harris and Aviv Zohar. 2020. Flood & Loot: A systemic attack on the lightning network. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. 202\u2013213."},{"key":"e_1_3_2_14_2","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1145\/3321705.3329812","volume-title":"Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security","author":"Herrera-Joancomart\u00ed Jordi","year":"2019","unstructured":"Jordi Herrera-Joancomart\u00ed, Guillermo Navarro-Arribas, Alejandro Ranchal-Pedrosa, Cristina P\u00e9rez-Sol\u00e0, and Joaquin Garcia-Alfaro. 2019. On the difficulty of hiding the balance of lightning network channels. In Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security. 602\u2013612."},{"key":"e_1_3_2_15_2","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/DSN53405.2022.00017","volume-title":"Proceedings of the 2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201922)","author":"Hong Zicong","year":"2022","unstructured":"Zicong Hong, Song Guo, Rui Zhang, Peng Li, Yufen Zhan, and Wuhui Chen. 2022. Cycle: Sustainable off-chain payment channel network with asynchronous rebalancing. In Proceedings of the 2022 52nd Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN\u201922). IEEE, 41\u201353."},{"issue":"4","key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3531225","article-title":"PRShare: A framework for privacy-preserving, interorganizational data sharing","volume":"25","author":"Idan Lihi","year":"2022","unstructured":"Lihi Idan and Joan Feigenbaum. 2022. PRShare: A framework for privacy-preserving, interorganizational data sharing. ACM Transactions on Privacy and Security 25, 4 (2022), 1\u201338.","journal-title":"ACM Transactions on Privacy and Security"},{"issue":"1","key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2732196","article-title":"Misbehavior in Bitcoin: A study of double-spending and accountability","volume":"18","author":"Karame Ghassan O.","year":"2015","unstructured":"Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and Srdjan \u010capkun. 2015. Misbehavior in Bitcoin: A study of double-spending and accountability. ACM Transactions on Information and System Security 18, 1 (2015), 1\u201332.","journal-title":"ACM Transactions on Information and System Security"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1145\/3133956.3134033","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201917)","author":"Khalil Rami","year":"2017","unstructured":"Rami Khalil and Arthur Gervais. 2017. Revive: Rebalancing off-blockchain payment networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security (CCS\u201917). 439\u2013453. DOI:10.1145\/3133956.3134033"},{"key":"e_1_3_2_19_2","first-page":"1728","volume-title":"Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201920)","author":"Li Peng","year":"2020","unstructured":"Peng Li, Toshiaki Miyazaki, and Wanlei Zhou. 2020. Secure balance planning of off-blockchain payment channel networks. In Proceedings of the IEEE Conference on Computer Communications (INFOCOM\u201920). IEEE, 1728\u20131737."},{"key":"e_1_3_2_20_2","doi-asserted-by":"crossref","first-page":"455","DOI":"10.1145\/3133956.3134096","volume-title":"Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security","author":"Malavolta Giulio","year":"2017","unstructured":"Giulio Malavolta, Pedro Moreno-Sanchez, Aniket Kate, Matteo Maffei, and Srivatsan Ravi. 2017. Concurrency and privacy with payment-channel networks. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. 455\u2013471."},{"key":"e_1_3_2_21_2","volume-title":"Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS\u201919)","author":"Malavolta Giulio","year":"2019","unstructured":"Giulio Malavolta, Pedro Moreno-Sanchez, Clara Schneidewind, Aniket Kate, and Matteo Maffei. 2019. Anonymous multi-hop locks for blockchain scalability and interoperability. In Proceedings of the 26th Annual Network and Distributed System Security Symposium (NDSS\u201919). https:\/\/www.ndss-symposium.org\/ndss-paper\/anonymous-multi-hop-locks-for-blockchain-scalability-and-interoperability\/"},{"key":"e_1_3_2_22_2","volume-title":"Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS\u201920)","author":"Mavroudis Vasilios","year":"2020","unstructured":"Vasilios Mavroudis, Karl W\u00fcst, Aritra Dhar, Kari Kostiainen, and Srdjan Capkun. 2020. Snappy: Fast on-chain payments with practical collaterals. In Proceedings of the 27th Annual Network and Distributed System Security Symposium (NDSS\u201920)."},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2022.3148476"},{"key":"e_1_3_2_24_2","doi-asserted-by":"crossref","first-page":"170","DOI":"10.1007\/978-3-662-64331-0_9","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Mizrahi Ayelet","year":"2021","unstructured":"Ayelet Mizrahi and Aviv Zohar. 2021. Congestion attacks in payment channel networks. In Proceedings of the International Conference on Financial Cryptography and Data Security. 170\u2013188."},{"key":"e_1_3_2_25_2","doi-asserted-by":"crossref","first-page":"102291","DOI":"10.1016\/j.cose.2021.102291","article-title":"n-HTLC: Neo hashed time-lock commitment to defend against wormhole attack in payment channel networks","volume":"106","author":"Mohanty Susil Kumar","year":"2021","unstructured":"Susil Kumar Mohanty and Somanath Tripathy. 2021. n-HTLC: Neo hashed time-lock commitment to defend against wormhole attack in payment channel networks. Computers & Security 106 (2021), 102291.","journal-title":"Computers & Security"},{"issue":"12","key":"e_1_3_2_26_2","doi-asserted-by":"crossref","first-page":"24071","DOI":"10.1109\/TITS.2022.3192566","article-title":"SIoVChain: Time-lock contract based privacy-preserving data sharing in SIoV","volume":"23","author":"Mohanty Susil Kumar","year":"2022","unstructured":"Susil Kumar Mohanty and Somanath Tripathy. 2022. SIoVChain: Time-lock contract based privacy-preserving data sharing in SIoV. IEEE Transactions on Intelligent Transportation Systems 23, 12 (2022), 24071\u201324082.","journal-title":"IEEE Transactions on Intelligent Transportation Systems"},{"key":"e_1_3_2_27_2","volume-title":"Financial Cryptography and Data Security: FC 2023 International Workshops","author":"Mohanty Susil Kumar","year":"2023","unstructured":"Susil Kumar Mohanty and Somanath Tripathy. 2023. FlexiPCN: Flexible payment channel network. In Financial Cryptography and Data Security: FC 2023 International Workshops. Springer, 405\u2013419."},{"key":"e_1_3_2_28_2","first-page":"1763","volume-title":"Proceedings of the 2022 IEEE Global Communications Conference (GLOBECOM\u201922)","author":"Naik Badavath Shravan","year":"2022","unstructured":"Badavath Shravan Naik, Somanath Tripathy, and Susil Kumar Mohanty. 2022. MuSigRDT: MultiSig contract based reliable data transmission in social Internet of Vehicle. In Proceedings of the 2022 IEEE Global Communications Conference (GLOBECOM\u201922). IEEE, 1763\u20131768."},{"key":"e_1_3_2_29_2","first-page":"21260","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Decentralized Business Review 2008 (2008), 21260.","journal-title":"Decentralized Business Review"},{"key":"e_1_3_2_30_2","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/978-3-030-51280-4_14","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"P\u00e9rez-Sol\u00e0 Cristina","year":"2020","unstructured":"Cristina P\u00e9rez-Sol\u00e0, Alejandro Ranchal-Pedrosa, Jordi Herrera-Joancomart\u00ed, Guillermo Navarro-Arribas, and Joaquin Garcia-Alfaro. 2020. LockDown: Balance availability attack against lightning network channels. In Proceedings of the International Conference on Financial Cryptography and Data Security. 245\u2013263."},{"key":"e_1_3_2_31_2","first-page":"1","volume-title":"Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC\u201920)","author":"Pickhardt Rene","year":"2020","unstructured":"Rene Pickhardt and Mariusz Nowostawski. 2020. Imbalance measure and proactive channel rebalancing algorithm for the lightning network. In Proceedings of the 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC\u201920). IEEE, 1\u20135."},{"key":"e_1_3_2_32_2","unstructured":"Joseph Poon and Thaddeus Dryja. 2016. The Bitcoin Lightning Network: Scalable Off-Chain Instant Payments. Retrieved August 10 2024 from https:\/\/lightning.network\/lightning-network-paper.pdf"},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/EuroSPW.2019.00045","volume-title":"Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919)","author":"Rohrer Elias","year":"2019","unstructured":"Elias Rohrer, Julian Malliaris, and Florian Tschorsch. 2019. Discharged payment channels: Quantifying the lightning network\u2019s resilience to topology-based attacks. In Proceedings of the 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW\u201919). IEEE, 347\u2013356."},{"key":"e_1_3_2_34_2","doi-asserted-by":"crossref","first-page":"214","DOI":"10.1145\/3419614.3423262","volume-title":"Proceedings of the 2nd ACM Conference on Advances in Financial Technologies","author":"Rohrer Elias","year":"2020","unstructured":"Elias Rohrer and Florian Tschorsch. 2020. Counting down thunder: Timing attacks on privacy in payment channel networks. In Proceedings of the 2nd ACM Conference on Advances in Financial Technologies. 214\u2013227."},{"key":"e_1_3_2_35_2","first-page":"1","volume-title":"Proceedings of the 2019 17th International Conference on Privacy, Security, and Trust (PST\u201919)","author":"Subramanian Lalitha Muthu","year":"2019","unstructured":"Lalitha Muthu Subramanian, Guruprasad Eswaraiah, and Roopa Vishwanathan. 2019. Rebalancing in acyclic payment networks. In Proceedings of the 2019 17th International Conference on Privacy, Security, and Trust (PST\u201919). IEEE, 1\u20135."},{"issue":"1","key":"e_1_3_2_36_2","first-page":"199","article-title":"The idea of smart contracts","volume":"6","author":"Szabo Nick","year":"1997","unstructured":"Nick Szabo. 1997. The idea of smart contracts. Nick Szabo\u2019s Papers and Concise Tutorials 6, 1 (1997), 199.","journal-title":"Nick Szabo\u2019s Papers and Concise Tutorials"},{"key":"e_1_3_2_37_2","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1007\/978-3-030-54455-3_34","volume-title":"Proceedings of the International Conference on Financial Cryptography and Data Security","author":"Tripathy Somanath","year":"2020","unstructured":"Somanath Tripathy and Susil Kumar Mohanty. 2020. MAPPCN: Multi-hop anonymous and privacy-preserving payment channel network. In Proceedings of the International Conference on Financial Cryptography and Data Security. 481\u2013495."},{"key":"e_1_3_2_38_2","first-page":"59","volume-title":"Proceedings of the 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS\u201921)","author":"Engelshoven Yuup Van","year":"2021","unstructured":"Yuup Van Engelshoven and Stefanie Roos. 2021. The merchant: Avoiding payment channel depletion through incentives. In Proceedings of the 2021 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPS\u201921). IEEE, 59\u201368."},{"key":"e_1_3_2_39_2","unstructured":"Gavin Wood. 2014. Ethereum: A Secure Decentralised Generalised Transaction Ledger. Yellow Paper 151. Ethereum Project."},{"key":"e_1_3_2_40_2","first-page":"303","volume-title":"Provable Security","author":"Yu Bin","year":"2019","unstructured":"Bin Yu, Shabnam Kasra Kermanshahi, Amin Sakzad, and Surya Nepal. 2019. Chameleon hash time-lock contract for privacy preserving payment channel networks. In Provable Security, Ron Steinfeld and Tsz Hon Yuen (Eds.). Springer International Publishing, Cham, 303\u2013318."},{"key":"e_1_3_2_41_2","article-title":"Efficient construction of verifiable timed signatures and its application in scalable payments","author":"Zhou Xiaotong","year":"2023","unstructured":"Xiaotong Zhou, Debiao He, Jianting Ning, Min Luo, and Xinyi Huang. 2023. Efficient construction of verifiable timed signatures and its application in scalable payments. IEEE Transactions on Information Forensics and Security 18 (2023), 5345\u20135358.","journal-title":"IEEE Transactions on Information Forensics and Security"}],"container-title":["ACM Transactions on Privacy and Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3687476","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3687476","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:05:59Z","timestamp":1750291559000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3687476"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,9,16]]},"references-count":40,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,11,30]]}},"alternative-id":["10.1145\/3687476"],"URL":"https:\/\/doi.org\/10.1145\/3687476","relation":{},"ISSN":["2471-2566","2471-2574"],"issn-type":[{"value":"2471-2566","type":"print"},{"value":"2471-2574","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,9,16]]},"assertion":[{"value":"2023-06-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-07-09","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-09-16","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}