An Empirical Analysis of Privacy in the Lightning Network
暂无分享,去创建一个
Andrew Miller | Sarah Meiklejohn | George Kappos | Haaroon Yousaf | Ania Piotrowska | Sanket Kanjalkar | Sergi Delgado-Segura
[1] Giulio Malavolta,et al. Concurrency and Privacy with Payment-Channel Networks , 2017, IACR Cryptol. ePrint Arch..
[2] Dejun Yang,et al. CheaPay: An Optimal Algorithm for Fee Minimization in Blockchain-Based Payment Channel Networks , 2019, ICC 2019 - 2019 IEEE International Conference on Communications (ICC).
[3] Giulio Malavolta,et al. Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability , 2019, NDSS.
[4] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[5] Bernhard Haslhofer,et al. An Empirical Analysis of Monero Cross-Chain Traceability , 2018, ArXiv.
[6] George Danezis,et al. Sphinx: A Compact and Provably Secure Mix Format , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[7] Radu State,et al. Lightning Network: A Comparative Review of Transaction Fees and Data Analysis , 2019, BLOCKCHAIN.
[8] Mariusz Nowostawski,et al. Evaluating Methods for the Identification of Off-Chain Transactions in the Lightning Network , 2019, Applied Sciences.
[9] Juan Carlos De Martin,et al. The CLoTH Simulator for HTLC Payment Networks with Introductory Lightning Network Performance Results , 2018, Inf..
[10] Patrick D. McDaniel,et al. An Analysis of Anonymity in Bitcoin Using P2P Network Traffic , 2014, Financial Cryptography.
[11] Joaquín García,et al. LockDown: Balance Availability Attack against Lightning Network Channels , 2020, IACR Cryptol. ePrint Arch..
[12] Aviv Zohar,et al. Avoiding Deadlocks in Payment Channel Networks , 2018, DPM/CBT@ESORICS.
[13] Sarah Meiklejohn,et al. Privacy-Enhancing Overlays in Bitcoin , 2015, Financial Cryptography Workshops.
[14] Stefan Schmid,et al. Hijacking Routes in Payment Channel Networks: A Predictability Tradeoff , 2019, ArXiv.
[15] Rami Khalil,et al. Revive: Rebalancing Off-Blockchain Payment Networks , 2017, IACR Cryptol. ePrint Arch..
[16] Stefano Zanero,et al. BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.
[17] Rainer Böhme,et al. Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques , 2017, 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[18] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[19] J. Y. Yen. An algorithm for finding shortest routes from all source nodes to a given destination in general networks , 1970 .
[20] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[21] Hubert Ritzdorf,et al. On the Security and Performance of Proof of Work Blockchains , 2016, IACR Cryptol. ePrint Arch..
[22] Pedro Moreno-Sanchez,et al. A Quantitative Analysis of Security, Anonymity and Scalability for the Lightning Network , 2020, 2020 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[23] Ethan Heilman,et al. An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..
[24] Christof Weinhardt,et al. Towards an economic analysis of routing in payment channel networks , 2017, SERIAL@Middleware.
[25] Stefano Martinazzi,et al. The evolution of Lightning Network's Topology during its first year and the influence over its core values , 2019, ArXiv.
[26] Jeffrey Quesnelle,et al. On the linkability of Zcash transactions , 2017, ArXiv.
[27] Ghassan O. Karame,et al. Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.
[28] Sarah Meiklejohn,et al. An Empirical Analysis of Anonymity in Zcash , 2018, USENIX Security Symposium.
[29] S A R A H M E I K L E J O H N,et al. A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .
[30] Man Ho Au,et al. New Empirical Traceability Analysis of CryptoNote-Style Blockchains , 2019, Financial Cryptography.
[31] Sarah Meiklejohn,et al. Tracing Transactions Across Cryptocurrency Ledgers , 2018, USENIX Security Symposium.
[32] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[33] Fergal Reid,et al. An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.
[34] Stefan Schmid,et al. Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks , 2020, ICISSP.
[35] László Gulyás,et al. Topological Analysis of Bitcoin's Lightning Network , 2019, MARBLE.
[36] Simina Brânzei,et al. How to Charge Lightning , 2017, ArXiv.
[37] Cross-Layer Deanonymization Methods in the Lightning Protocol , 2020, ArXiv.
[38] Florian Tschorsch,et al. Discharged Payment Channels: Quantifying the Lightning Network's Resilience to Topology-Based Attacks , 2019, 2019 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW).
[39] Arvind Narayanan,et al. BlockSci: Design and applications of a blockchain analysis platform , 2017, USENIX Security Symposium.
[40] Alex Biryukov,et al. Probing Channel Balances in the Lightning Network , 2020, ArXiv.
[41] Alex Biryukov,et al. Privacy Aspects and Subliminal Channels in Zcash , 2019, CCS.
[42] Adi Shamir,et al. Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.
[43] Joaquín García,et al. On the Difficulty of Hiding the Balance of Lightning Network Channels , 2019, IACR Cryptol. ePrint Arch..
[44] Prateek Saxena,et al. A Traceability Analysis of Monero's Blockchain , 2017, ESORICS.
[45] Ferenc Beres,et al. A Cryptoeconomic Traffic Analysis of Bitcoins Lightning Network , 2019, ArXiv.
[46] Pedro Moreno-Sanchez,et al. SoK: Off The Chain Transactions , 2019, IACR Cryptol. ePrint Arch..