{"id":"https://openalex.org/W4292230728","doi":"https://doi.org/10.1109/icc45855.2022.9839015","title":"Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism","display_name":"Enabling Privacy-Preserving Off-chain Payment via Hybrid Multi-hop Mechanism","publication_year":2022,"publication_date":"2022-05-16","ids":{"openalex":"https://openalex.org/W4292230728","doi":"https://doi.org/10.1109/icc45855.2022.9839015"},"language":"en","primary_location":{"id":"doi:10.1109/icc45855.2022.9839015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839015","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5114378267","display_name":"Qian Zhang","orcid":"https://orcid.org/0000-0001-9205-1881"},"institutions":[{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]},{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qian Zhang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101425388","display_name":"Sheng Cao","orcid":"https://orcid.org/0000-0002-0929-9067"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Sheng Cao","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5006791216","display_name":"Yi Ni","orcid":null},"institutions":[{"id":"https://openalex.org/I2800372957","display_name":"China Electronics Technology Group Corporation","ror":"https://ror.org/0098hst83","country_code":"CN","type":"company","lineage":["https://openalex.org/I2800372957"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yi Ni","raw_affiliation_strings":["No.30 Research Institute of China Electronics Technology Group Corporation"],"affiliations":[{"raw_affiliation_string":"No.30 Research Institute of China Electronics Technology Group Corporation","institution_ids":["https://openalex.org/I2800372957"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100443178","display_name":"Ting Chen","orcid":"https://orcid.org/0000-0001-9165-8331"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ting Chen","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100780268","display_name":"Xiaosong Zhang","orcid":"https://orcid.org/0000-0001-9886-1412"},"institutions":[{"id":"https://openalex.org/I202334528","display_name":"Beijing Electronic Science and Technology Institute","ror":"https://ror.org/01xdzh226","country_code":"CN","type":"education","lineage":["https://openalex.org/I202334528"]},{"id":"https://openalex.org/I150229711","display_name":"University of Electronic Science and Technology of China","ror":"https://ror.org/04qr3zq92","country_code":"CN","type":"education","lineage":["https://openalex.org/I150229711"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiaosong Zhang","raw_affiliation_strings":["University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China"],"affiliations":[{"raw_affiliation_string":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Institute for Cyber Security,China","institution_ids":["https://openalex.org/I202334528","https://openalex.org/I150229711"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Institute for Cyber Security, University of Electronic Science and Technology of China, China","institution_ids":["https://openalex.org/I150229711"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5114378267"],"corresponding_institution_ids":["https://openalex.org/I150229711","https://openalex.org/I202334528"],"apc_list":null,"apc_paid":null,"fwci":0.7283,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.72114269,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"13","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9923999905586243,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7210713624954224},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6153531074523926},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.6066213250160217},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5654831528663635},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5585833191871643},{"id":"https://openalex.org/keywords/payment","display_name":"Payment","score":0.555294394493103},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5035309195518494},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.4731220602989197}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210713624954224},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6153531074523926},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.6066213250160217},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5654831528663635},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5585833191871643},{"id":"https://openalex.org/C145097563","wikidata":"https://www.wikidata.org/wiki/Q1148747","display_name":"Payment","level":2,"score":0.555294394493103},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5035309195518494},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.4731220602989197},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icc45855.2022.9839015","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icc45855.2022.9839015","pdf_url":null,"source":{"id":"https://openalex.org/S4363607711","display_name":"ICC 2022 - IEEE International Conference on Communications","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"ICC 2022 - IEEE International Conference on Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320337504","display_name":"Research and Development","ror":"https://ror.org/027s68j25"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":27,"referenced_works":["https://openalex.org/W2088175567","https://openalex.org/W2143215034","https://openalex.org/W2182035090","https://openalex.org/W2536325433","https://openalex.org/W2739845435","https://openalex.org/W2767101501","https://openalex.org/W2798342357","https://openalex.org/W2898893210","https://openalex.org/W2936876535","https://openalex.org/W2947736742","https://openalex.org/W2963627345","https://openalex.org/W2977013343","https://openalex.org/W2981399413","https://openalex.org/W2982003166","https://openalex.org/W3017248416","https://openalex.org/W3045791987","https://openalex.org/W3090306331","https://openalex.org/W3135383686","https://openalex.org/W3136214928","https://openalex.org/W3156695027","https://openalex.org/W3174289473","https://openalex.org/W3210715031","https://openalex.org/W6685985903","https://openalex.org/W6741928516","https://openalex.org/W6755481866","https://openalex.org/W6763257209","https://openalex.org/W6768167848"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W3123387860","https://openalex.org/W4291291739","https://openalex.org/W2957710009","https://openalex.org/W3115531728","https://openalex.org/W4387389211","https://openalex.org/W2059272164"],"abstract_inverted_index":{"The":[0],"adoption":[1],"of":[2,41,86,149],"cryptocurrency":[3,27],"based":[4],"on":[5,43,80],"blockchain":[6],"technology":[7],"has":[8],"grown":[9],"to":[10,25,47,68,82,109,117],"an":[11,15],"unprecedented":[12],"level.":[13],"As":[14],"off-chain":[16,49,72,150],"scaling":[17],"fashion,":[18],"payment":[19,93],"channel":[20],"network":[21],"(PCN)":[22],"is":[23],"used":[24],"fulfill":[26],"transfer":[28,99],"conveniently":[29],"for":[30,103],"different":[31],"users.":[32],"However,":[33],"current":[34],"PCNs":[35],"cannot":[36],"guarantee":[37],"the":[38,70,77,92,98,111,119,143],"identity":[39,84,144],"privacy":[40,145],"nodes":[42,127],"channels":[44],"partly":[45],"due":[46],"various":[48],"channel-based":[50],"threats":[51],"by":[52,114,125,152],"wormhole":[53,129],"attack.":[54,130],"This":[55],"paper":[56],"proposes":[57],"a":[58],"hybrid":[59],"multi-hop":[60],"mechanism,":[61],"including":[62],"PCN,":[63],"onion":[64,78],"routing":[65,79],"and":[66,101,133,146],"sidechain":[67,108],"ensure":[69],"privacy-preserving":[71],"payment.":[73],"First,":[74],"we":[75,90],"overlay":[76],"PCN":[81],"realize":[83],"anonymity":[85],"each":[87],"node.":[88],"Then":[89],"divide":[91],"fund":[94],"into":[95],"two":[96],"parts:":[97],"amount":[100],"fees":[102,113,121],"intermediate":[104,112,120],"nodes.":[105],"We":[106],"apply":[107],"lock":[110],"smart":[115],"contract":[116],"prevent":[118],"from":[122],"being":[123],"stolen":[124],"malicious":[126],"using":[128],"Security":[131],"analysis":[132],"performance":[134],"evaluation":[135],"show":[136],"that":[137],"our":[138],"mechanism":[139],"can":[140],"effectively":[141],"improve":[142],"transaction":[147],"security":[148],"payments":[151],"reducing":[153],"computational":[154],"latency.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
