2021
DOI: 10.1007/978-3-662-64322-8_8
|View full text |Cite
|
Sign up to set email alerts
|

An Empirical Analysis of Privacy in the Lightning Network

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 36 publications
(30 citation statements)
references
References 35 publications
0
25
0
Order By: Relevance
“…Probing allows an attacker to reveal the balance of any forwarding channel (assuming no multi-channel hops) by sending probes through it [14,17,44]. A probe is a payment with amount a that contains a random value instead of a payment hash.…”
Section: Attacks On Lightningmentioning
confidence: 99%
See 3 more Smart Citations
“…Probing allows an attacker to reveal the balance of any forwarding channel (assuming no multi-channel hops) by sending probes through it [14,17,44]. A probe is a payment with amount a that contains a random value instead of a payment hash.…”
Section: Attacks On Lightningmentioning
confidence: 99%
“…The goal of the attacker is to reveal exact channel balances in target hops as quickly as possible. 17 The attacker only uses public knowledge about nodes and channels. The attacker can run multiple LN nodes, open channels, and maintain them for the duration of the attack.…”
Section: Probing Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…In the computer science literature, papers have focused on the financial viability of the LN (e.g., Béres, Seres, and Benczúr (2019) and Brânzei, Segal-Halevi, and Zohar (2017)); its network struc-ture (e.g., Lin et al (2020) and Martinazzi and Flori (2020)); and its ability to guarantee security and privacy (e.g., Harris and Zohar (2020), Kappos et al (2021), and Pérez-Solà et al ( 2020)).…”
mentioning
confidence: 99%