{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:45:19Z","timestamp":1726065919124},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527760"},{"type":"electronic","value":"9789811527777"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_1","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"3-14","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Group Signature Based Digital Currency System"],"prefix":"10.1007","author":[{"given":"Haibo","family":"Tian","sequence":"first","affiliation":[]},{"given":"Peiran","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Yinxue","family":"Su","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"1_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/3-540-44598-6_16","volume-title":"Advances in Cryptology \u2014 CRYPTO 2000","author":"G Ateniese","year":"2000","unstructured":"Ateniese, G., Camenisch, J., Joye, M., Tsudik, G.: A practical and provably secure coalition-resistant group signature scheme. In: Bellare, M. (ed.) CRYPTO 2000. LNCS, vol. 1880, pp. 255\u2013270. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44598-6_16"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Faonio, A., Magri, B., de Medeiros, B.: Certified bitcoins. IACR Cryptology ePrint Archive 2014, 76 (2014)","DOI":"10.1007\/978-3-319-07536-5_6"},{"key":"1_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"614","DOI":"10.1007\/3-540-39200-9_38","volume-title":"Advances in Cryptology\u2014EUROCRYPT 2003","author":"M Bellare","year":"2003","unstructured":"Bellare, M., Micciancio, D., Warinschi, B.: Foundations of group signatures: formal definitions, simplified requirements, and a construction based on general assumptions. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 614\u2013629. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_38"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: 2018 IEEE Symposium on Security and Privacy (SP), pp. 315\u2013334, May 2018","DOI":"10.1109\/SP.2018.00020"},{"key":"1_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41\u201355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_3"},{"issue":"4","key":"1_CR6","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. J. Cryptol. 17(4), 297\u2013319 (2004)","journal-title":"J. Cryptol."},{"key":"1_CR7","unstructured":"Duffield, E., Hagan, K.: Darkcoin: peertopeer cryptocurrency with anonymous blockchain transactions and an improved proofofwork system (2014). https:\/\/docs.dash.org\/en\/stable\/introduction\/about.html. Accessed 2 Aug 2019"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"El Defrawy, K., Lampkins, J.: Founding digital currency on secure computation. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS 2014, pp. 1\u201314. ACM, New York (2014)","DOI":"10.1145\/2660267.2660293"},{"key":"1_CR9","unstructured":"Hinteregger, A., Haslhofer, B.: An empirical analysis of monero cross-chain traceability (2019). https:\/\/arxiv.org\/abs\/1812.02808. Accessed 2 Aug 2019"},{"key":"1_CR10","unstructured":"Hopwood, D., Bowe, S., Hornby, T., Wilcox, N.: Zcash protocol specification version 2019.0.4 (2019). https:\/\/zcash.readthedocs.io\/en\/latest\/. Accessed 2 Aug 2019"},{"key":"1_CR11","unstructured":"Lin, Q.: An anonymous digital money trading supervision method with hidden center (2019). http:\/\/pss-system.cnipa.gov.cn\/sipopublicsearch\/portal\/uiIndex.shtml"},{"key":"1_CR12","unstructured":"Marek, P., Pavol, R.: Multi-account hierarchy for deterministic wallets (2014). https:\/\/wiki.bitcoin.com\/w\/BIP_0044. Accessed 4 Aug 2019"},{"key":"1_CR13","unstructured":"Narula, N., Vasquez, W., Virza, M.: zkledger: privacy-preserving auditing for distributed ledgers. In: 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2018), Renton, WA, USENIX Association, pp. 65\u201380, April 2018"},{"key":"1_CR14","doi-asserted-by":"crossref","unstructured":"Noether, S., Mackenzie, A., Team, M.C.: Ring confidential transactions (2016). https:\/\/www.researchgate.net\/publication\/311865049_Ring_Confidential_Transactions","DOI":"10.5195\/ledger.2016.34"},{"key":"1_CR15","unstructured":"Poelstra, A.: Mimblewimble (2016). http:\/\/mimblewimble.cash\/20161006-WhitePaperUpdate-e9f45ec.pdf. Accessed 4 Aug 2019"},{"key":"1_CR16","unstructured":"Saberhagen, N.: Cryptonote v 2.0 (2013). https:\/\/www.mendeley.com\/catalogue\/cryptonote-v-20\/. Accessed 1 Aug 2019"},{"key":"1_CR17","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1007\/978-3-030-14234-6_4","volume-title":"Information Security and Cryptology","author":"H Tian","year":"2019","unstructured":"Tian, H., Chen, X., Ding, Y., Zhu, X., Zhang, F.: Afcoin: a framework for digital fiat currency of central banks based on account model. In: Guo, F., Huang, X., Yung, M. (eds.) Information Security and Cryptology, pp. 70\u201385. Springer, Cham (2019)"},{"key":"1_CR18","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-319-93638-3_18","volume-title":"Information Security and Privacy","author":"H Zheng","year":"2018","unstructured":"Zheng, H., Wu, Q., Qin, B., Zhong, L., He, S., Liu, J.: Linkable group signature for auditing anonymous communication. In: Susilo, W., Yang, G. (eds.) Information Security and Privacy, pp. 304\u2013321. Springer, Cham (2018)"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T22:03:23Z","timestamp":1630101803000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}