2021
DOI: 10.1007/978-3-662-64322-8_9
|View full text |Cite
|
Sign up to set email alerts
|

Cross-Layer Deanonymization Methods in the Lightning Protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Deanonymization: Deanonymization is generally named by Fröhlich et al [131] and others. Romiti et al [85] explain deanonymization by heuristics and linking algorithms, whereas Apostolaki et al [86] use perimeter by traffic interception. Ghesmati et al [87] describe the following deanonymization techniques that can be applied to the cryptocurrency Bitcoin: heuristics, side-channel attacks, flow analysis, and auxiliary information.…”
Section: Human Errors and Accidental Threatsmentioning
confidence: 99%
“…Deanonymization: Deanonymization is generally named by Fröhlich et al [131] and others. Romiti et al [85] explain deanonymization by heuristics and linking algorithms, whereas Apostolaki et al [86] use perimeter by traffic interception. Ghesmati et al [87] describe the following deanonymization techniques that can be applied to the cryptocurrency Bitcoin: heuristics, side-channel attacks, flow analysis, and auxiliary information.…”
Section: Human Errors and Accidental Threatsmentioning
confidence: 99%
“…Kappos et al use the same methodology to identify private channels (i.e., between two unknown LN nodes) [34]. These onchain transactions can further be used to cluster Bitcoin wallets and LN nodes into the same entity [60]. Aiming to learn the channel balances (e.g., that lead to large-scale payment deanonymization [34]), several probing attacks have been proposed.…”
Section: Privacy Attacks In the Lnmentioning
confidence: 99%