|
Journal of Computer Science and Technology ›› 2022, Vol. 37 ›› Issue (4): 888-905.doi: 10.1007/s11390-022-2032-x
Special Issue: Computer Networks and Distributed Computing
• Special Section of MASS 2020-2021 • Previous Articles Next Articles
Yi Qin1 (秦毅), Qin Hu2,*, Dong-Xiao Yu1 (于东晓), Senior Member, IEEE, and Xiu-Zhen Cheng1 (成秀珍), Fellow, IEEE
[1] Li P, Miyazaki T, Zhou W. Secure balance planning of off-blockchain payment channel networks. In Proc. the IEEE Conference on Computer Communications, Jul. 2020, pp.1728-1737. DOI: 10.1109/INFOCOM41043.2020.9155375. [2] Lin S, Zhang J, Wu W. FSTR: Funds skewness aware transaction routing for payment channel networks. In Proc. the 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, Jun. 29-Jul. 2, 2020, pp.464-475. DOI: 10.1109/DSN48063.2020.00060. [3] Bagaria V K, Neu J, Tse D. Boomerang: Redundancy improves latency and throughput in payment-channel networks. In Proc. the 24th International Conference on Financial Cryptography and Data Security, Feb. 2020, pp.304-324. DOI: 10.1007/978-3-030-51280-4. [4] Khalil R, Gervais A. Revive: Rebalancing off-blockchain payment networks. In Proc. the 2017 ACM SIGSAC Conference on Computer and Communications Security, Oct. 30-Nov. 3, 2017, pp.439-453. DOI: 10.1145/3133956.3134033. [5] Rohrer E, Malliaris J, Tschorsch F. Discharged payment channels: Quantifying the lightning network’s resilience to topology-based attacks. In Proc. the 2019 IEEE European Symposium on Security and Privacy Workshops, Aug. 2019, pp.347-356. DOI: 10.1109/EuroSPW.2019.00045. [6] Kappos G, Yousaf H, Piotrowska A M, Kanjalkar S, Delgado-Segura S, Miller A, Meiklejohn S. An empirical analysis of privacy in the lightning network. In Proc. the 25th International Conference on Financial Cryptography and Data Security, Mar. 2021, pp.167-186. DOI: 10.1007/978-3-662-64322-8. [7] Tang W, Wang W, Fanti G C, Oh S. Privacy-utility tradeoffs in routing cryptocurrency over payment channel networks. Proc. ACM Meas. Anal. Comput. Syst., 2020, 4(2): Article No. 29. DOI: 10.1145/3392147. [8] Banerjee P, Mazumdar S, Ruj S. Griefing-penalty: Countermeasure for griefing attack in bitcoin-compatible PCNs. arXiv:2005.09327, 2020. https://arxiv.org/abs/2005.09327, May 2022. [9] Harris J, Zohar A. Flood & loot: A systemic attack on the lightning network. In Proc. the 2nd ACM Conference on Advances in Financial Technologies, Oct. 2020, pp.202-213. DOI: 10.1145/3419614.3423248. [10] Avarikioti Z, Heimbach L, Wang Y, Wattenhofer R. Ride the lightning: The game theory of payment channels. In Proc. the 24th International Conference on Financial Cryptography and Data Security, Feb. 2020, pp.264-283. DOI: 10.1007/978-3-030-51280-4. [11] Lange K, Rohrer E, Tschorsch F. On the impact of attachment strategies for payment channel networks. In Proc. the IEEE International Conference on Blockchain and Cryptocurrency, May 2021. DOI: 10.1109/ICBC51069.2021.9461104. [12] Pickhardt R, Nowostawski M. Imbalance measure and proactive channel rebalancing algorithm for the lightning network. In Proc. the IEEE International Conference on Blockchain and Cryptocurrency, May 2020. DOI: 10.1109/ICBC48266.2020.9169456. [13] Lu Z, Han R, Yu J. General congestion attack on HTLC-based payment channel networks. In Proc. the 3rd International Conference on Blockchain Economics, Security and Protocols, Nov. 2021, Article No. 2. DOI: 10.4230/OASIcs.Tokenomics.2021.2. [14] Qin Y, Hu Q, Yu D, Cheng X. Malice-aware transaction forwarding in payment channel networks. In Proc. the 18th IEEE International Conference on Mobile Ad Hoc and Smart Systems, Oct. 2021, pp.297-305. DOI: 10.1109/MASS52906.2021.00046. [15] Press W H, Dyson F J. Iterated prisoner’s dilemma contains strategies that dominate any evolutionary opponent. Proceedings of the National Academy of Sciences of the United States of America, 2012, 109(26): 10409-10413. DOI: 10.1073/pnas.1206569109. [16] Govaert A, Cao M. Zero-determinant strategies in finitely repeated n-player games. arXiv:1910.07858, 2019. http://arxiv.org/abs/1910.07858, Oct. 2021. [17] Traulsen A, Nowak M A, Pacheco J M. Stochastic dynamics of invasion and fixation. Physical Review E, 2006, 74(1): Article No. 011909. DOI: 10.1103/PhysRevE.74.011909. [18] Szabó G, Tőke C. Evolutionary prisoner’s dilemma game on a square lattice. Physical Review E, 1998, 58(1): 69-73. DOI: 10.1103/PhysRevE.58.69. [19] Taylor P D, Jonker L B. Evolutionary stable strategies and game dynamics. Mathematical Biosciences, 1978, 40(1/2): 145-156. DOI: 10.1016/0025-5564(78)90077-9. [20] Smith J M. Evolution and the Theory of Games (1st edition). Cambridge University Press, 1982. |
[1] | Li-De Xue, Ya-Jun Liu, Wei Yang, Wei-Lin Chen, and Liu-Sheng Huang. A Blockchain-Based Protocol for Malicious Price Discrimination [J]. Journal of Computer Science and Technology, 2022, 37(1): 266-276. |
[2] | Da-Yu Jia, Jun-Chang Xin, Zhi-Qiong Wang, Han Lei, Guo-Ren Wang. SE-Chain: A Scalable Storage and Efficient Retrieval Model for Blockchain [J]. Journal of Computer Science and Technology, 2021, 36(3): 693-706. |
[3] | Jiang Rong, Tao Qin, Bo An. Competitive Cloud Pricing for Long-Term Revenue Maximization [J]. Journal of Computer Science and Technology, 2019, 34(3): 645-656. |
[4] | Lei Cui, Youyang Qu, Mohammad Reza Nosouhi, Shui Yu, Jian-Wei Niu, Gang Xie. Improving Data Utility Through Game Theory in Personalized Differential Privacy [J]. Journal of Computer Science and Technology, 2019, 34(2): 272-286. |
[5] | Zhi-Guo Wan, Robert H. Deng, David Lee, Ying Li. MicroBTC: Efficient, Flexible and Fair Micropayment for Bitcoin Using Hash Chains [J]. Journal of Computer Science and Technology, 2019, 34(2): 403-415. |
[6] | Rui Yuan, Yu-Bin Xia, Hai-Bo Chen, Bin-Yu Zang, Jan Xie. ShadowEth: Private Smart Contract on Public Blockchain [J]. , 2018, 33(3): 542-556. |
[7] | Bao-Kun Zheng, Lie-Huang Zhu, Meng Shen, Feng Gao, Chuan Zhang, Yan-Dong Li, Jing Yang. Scalable and Privacy-Preserving Data Sharing Based on Blockchain [J]. , 2018, 33(3): 557-567. |
[8] | Mingming Wang, Qianhong Wu, Bo Qin, Qin Wang, Jianwei Liu, Zhenyu Guan. Lightweight and Manageable Digital Evidence Preservation System on Bitcoin [J]. , 2018, 33(3): 568-586. |
[9] | Zhimin Gao, Lei Xu, Lin Chen, Xi Zhao, Yang Lu, Weidong Shi. CoC: A Unified Distributed Ledger Based Supply Chain Management System [J]. , 2018, 33(2): 237-248. |
[10] | Yi Wu (吴奕). Pricing Loss Leaders Can be Hard [J]. , 2012, 27(4): 718-726. |
[11] | Mahshid Rahnamay-Naeini, and Masoud Sabaei. A Combinational Perspective in Stimulating Cooperation in Mobile Ad Hoc Networks [J]. , 2011, 26(2): 256-268. |
[12] | wang Xuejun; Shi Chunyi;. A Multiagent Dynamic interaction Testbed:Theoretic Framework, System Architecture and Experimentation [J]. , 1997, 12(2): 121-132. |
|