Privacy-Utility Tradeoffs in Routing Cryptocurrency over Payment Channel Networks

[1]  Prateek Saxena,et al.  OHIE: Blockchain Scaling Made Simple , 2018, 2020 IEEE Symposium on Security and Privacy (SP).

[2]  John N. Tsitsiklis,et al.  Delay-Predictability Trade-offs in Reaching a Secret Goal , 2018, Oper. Res..

[3]  ChaumD. The dining cryptographers problem , 1988 .

[4]  Srdjan Capkun,et al.  Secure and Privacy-Preserving Communication in Hybrid Ad Hoc Networks , 2004 .

[5]  Giulio Malavolta,et al.  Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..

[6]  Aviv Zohar,et al.  Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.

[7]  Giulio Malavolta,et al.  SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks , 2017, NDSS.

[8]  Michael K. Reiter,et al.  Anonymous Web transactions with Crowds , 1999, CACM.

[9]  Robert Tappan Morris,et al.  Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.

[10]  Kannan Ramchandran,et al.  Hiding the Rumor Source , 2015, IEEE Transactions on Information Theory.

[11]  Mariusz Nowostawski,et al.  Split Payments in Payment Networks , 2018, DPM/CBT@ESORICS.

[12]  Xiaozhou Li,et al.  Celer Network: Bring Internet Scale to Every Blockchain , 2018, ArXiv.

[13]  G. Loewenstein,et al.  What Is Privacy Worth? , 2013, The Journal of Legal Studies.

[14]  Sören Preibusch,et al.  Unwillingness to Pay for Privacy: A Field Experiment , 2011, SSRN Electronic Journal.

[15]  Rami Khalil,et al.  Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..

[16]  Ian Goldberg,et al.  Settling Payments Fast and Private: Efficient Decentralized Routing for Path-Based Transactions , 2017, NDSS.

[17]  Pramod Viswanath,et al.  Spy vs. Spy , 2014, SIGMETRICS.

[18]  William H. Cunningham,et al.  Optimal attack and reinforcement of a network , 1985, JACM.