{"id":"https://openalex.org/W7139129735","doi":"https://doi.org/10.1109/tifs.2026.3675466","title":"Txtail: A Practical Transaction Relay Incentive Scheme for Bitcoin","display_name":"Txtail: A Practical Transaction Relay Incentive Scheme for Bitcoin","publication_year":2026,"publication_date":"2026-01-01","ids":{"openalex":"https://openalex.org/W7139129735","doi":"https://doi.org/10.1109/tifs.2026.3675466"},"language":null,"primary_location":{"id":"doi:10.1109/tifs.2026.3675466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3675466","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5129848624","display_name":"Xiaopeng Dai","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Xiaopeng Dai","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5064326715","display_name":"Qianhong Wu","orcid":"https://orcid.org/0000-0003-4604-1142"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Qianhong Wu","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027832955","display_name":"Minkang Wang","orcid":"https://orcid.org/0009-0005-7825-8233"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingming Wang","raw_affiliation_strings":["School of Electronic and Information Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Information Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5129811448","display_name":"Bo Qin","orcid":null},"institutions":[{"id":"https://openalex.org/I78988378","display_name":"Renmin University of China","ror":"https://ror.org/041pakw92","country_code":"CN","type":"education","lineage":["https://openalex.org/I78988378"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Qin","raw_affiliation_strings":["School of Information, Renmin University of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Information, Renmin University of China, Beijing, China","institution_ids":["https://openalex.org/I78988378"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5020900634","display_name":"Fuyang Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Fuyang Deng","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5095747962","display_name":"Mingzhe Zhai","orcid":"https://orcid.org/0009-0001-0278-9514"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Mingzhe Zhai","raw_affiliation_strings":["School of Cyber Science and Technology, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Cyber Science and Technology, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5129863700","display_name":"Robert H. Deng","orcid":null},"institutions":[{"id":"https://openalex.org/I79891267","display_name":"Singapore Management University","ror":"https://ror.org/050qmg959","country_code":"SG","type":"education","lineage":["https://openalex.org/I79891267"]}],"countries":["SG"],"is_corresponding":false,"raw_author_name":"Robert H. Deng","raw_affiliation_strings":["School of Computing and Information Systems, Singapore Management University, Bras Basah, Singapore"],"affiliations":[{"raw_affiliation_string":"School of Computing and Information Systems, Singapore Management University, Bras Basah, Singapore","institution_ids":["https://openalex.org/I79891267"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5129848624"],"corresponding_institution_ids":["https://openalex.org/I82880672"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.85583235,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"21","issue":null,"first_page":"3197","last_page":"3211"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7335000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.7335000038146973,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.06790000200271606,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.0333000011742115,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/relay","display_name":"Relay","score":0.7534000277519226},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5746999979019165},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.5735999941825867},{"id":"https://openalex.org/keywords/incentive","display_name":"Incentive","score":0.5428000092506409},{"id":"https://openalex.org/keywords/non-repudiation","display_name":"Non-repudiation","score":0.43939998745918274},{"id":"https://openalex.org/keywords/bandwidth","display_name":"Bandwidth (computing)","score":0.39340001344680786},{"id":"https://openalex.org/keywords/upload","display_name":"Upload","score":0.3856000006198883},{"id":"https://openalex.org/keywords/information-leakage","display_name":"Information leakage","score":0.3718000054359436}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7864000201225281},{"id":"https://openalex.org/C2778156585","wikidata":"https://www.wikidata.org/wiki/Q174053","display_name":"Relay","level":3,"score":0.7534000277519226},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.7088000178337097},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5746999979019165},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.5735999941825867},{"id":"https://openalex.org/C29122968","wikidata":"https://www.wikidata.org/wiki/Q1414816","display_name":"Incentive","level":2,"score":0.5428000092506409},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.44179999828338623},{"id":"https://openalex.org/C44209976","wikidata":"https://www.wikidata.org/wiki/Q1327773","display_name":"Non-repudiation","level":3,"score":0.43939998745918274},{"id":"https://openalex.org/C2776257435","wikidata":"https://www.wikidata.org/wiki/Q1576430","display_name":"Bandwidth (computing)","level":2,"score":0.39340001344680786},{"id":"https://openalex.org/C71901391","wikidata":"https://www.wikidata.org/wiki/Q7126699","display_name":"Upload","level":2,"score":0.3856000006198883},{"id":"https://openalex.org/C2779201187","wikidata":"https://www.wikidata.org/wiki/Q2775060","display_name":"Information leakage","level":2,"score":0.3718000054359436},{"id":"https://openalex.org/C2777210771","wikidata":"https://www.wikidata.org/wiki/Q4927124","display_name":"Block (permutation group theory)","level":2,"score":0.358599990606308},{"id":"https://openalex.org/C72108876","wikidata":"https://www.wikidata.org/wiki/Q844565","display_name":"Transaction processing","level":3,"score":0.3441999852657318},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3305000066757202},{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.3255000114440918},{"id":"https://openalex.org/C205383636","wikidata":"https://www.wikidata.org/wiki/Q14746","display_name":"Merkle tree","level":4,"score":0.323199987411499},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.32010000944137573},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29339998960494995},{"id":"https://openalex.org/C111218622","wikidata":"https://www.wikidata.org/wiki/Q6554248","display_name":"Link Access Procedure for Frame Relay","level":5,"score":0.2874999940395355},{"id":"https://openalex.org/C25185021","wikidata":"https://www.wikidata.org/wiki/Q4053284","display_name":"Distributed transaction","level":4,"score":0.287200003862381},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.2800000011920929},{"id":"https://openalex.org/C191087605","wikidata":"https://www.wikidata.org/wiki/Q1501395","display_name":"Online transaction processing","level":4,"score":0.27129998803138733},{"id":"https://openalex.org/C46257984","wikidata":"https://www.wikidata.org/wiki/Q7310895","display_name":"Relay channel","level":4,"score":0.2676999866962433},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2651999890804291}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tifs.2026.3675466","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2026.3675466","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":[],"abstract_inverted_index":{"Transaction":[0],"propagation":[1,34],"delay":[2],"limits":[3],"the":[4,11,87,103,133,140,156,164,175,180],"block":[5],"interval":[6],"and":[7,31,63,90,122,168,179,186],"is":[8,23],"one":[9],"of":[10,59,135],"main":[12],"bottlenecks":[13],"in":[14,21,28],"improving":[15],"Bitcoin":[16,22],"throughput.":[17],"However,":[18],"transaction":[19,33,74,93],"relay":[20,37,75,84,115,136,141],"entirely":[24],"voluntary,":[25],"which":[26,126],"results":[27,170],"low":[29],"bandwidth":[30],"high":[32,64],"delay.":[35],"Improving":[36],"motivation":[38],"by":[39,138,184],"introducing":[40],"incentives":[41],"can":[42],"effectively":[43],"reduce":[44,155],"delay,":[45],"but":[46],"it":[47],"still":[48],"faces":[49],"challenges":[50],"such":[51],"as":[52],"Sybil":[53],"attacks":[54],"during":[55,92],"reward":[56],"allocation,":[57],"leakage":[58,134],"network":[60],"layer":[61],"privacy,":[62],"on-chain/off-chain":[65],"overhead.":[66],"Therefore,":[67],"this":[68],"paper":[69],"proposes":[70],"Txtail,":[71],"a":[72,97,145],"practical":[73,195],"incentive":[76],"scheme":[77],"for":[78,196],"Bitcoin,":[79],"based":[80,101,118,149],"on":[81,102,119,150],"continuously":[82],"attaching":[83],"evidence":[85,116],"representing":[86],"relays\u2019":[88],"identity":[89],"contribution":[91],"propagation.":[94],"We":[95,111,143],"employ":[96],"free":[98],"pricing":[99],"mechanism":[100,148],"game":[104],"between":[105],"relays":[106],"to":[107,154,160,163],"allocate":[108],"rewards":[109],"fairly.":[110],"design":[112],"an":[113],"order-insensitive":[114],"structure":[117],"aggregate":[120],"signatures":[121],"public":[123],"key":[124],"mapping,":[125],"reduces":[127,174],"off-chain":[128,177],"data":[129,157],"overhead":[130,178,183],"while":[131,193],"alleviating":[132],"paths":[137],"obfuscating":[139],"order.":[142],"construct":[144],"verifiable":[146],"lottery":[147],"Merkle":[151],"tree":[152],"commitments":[153],"that":[158,172],"needs":[159],"be":[161],"uploaded":[162],"chain.":[165],"Both":[166],"theoretical":[167],"experimental":[169],"show":[171],"Txtail":[173],"per-hop":[176],"overall":[181],"on-chain":[182],"96.6%":[185],"79.8%,":[187],"respectively,":[188],"compared":[189],"with":[190],"state-of-the-art":[191],"baselines,":[192],"remaining":[194],"deployment.":[197]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2026-03-20T00:00:00"}
