{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T06:25:04Z","timestamp":1740119104797,"version":"3.37.3"},"reference-count":29,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2020,6,1]],"date-time":"2020-06-01T00:00:00Z","timestamp":1590969600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"name":"Qing Lan Project of Jiangsu province"},{"name":"Open Foundation of State Key Laboratory of Information Security of China","award":["2017-MS-15"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61501333","61572379"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Natural Science Foundation of Hubei Province of China","award":["2015CFB257"]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Open-End Fund of Key Laboratory of Intelligent Perception and Systems","award":["TK216010"]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Future Generation Computer Systems"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1016\/j.future.2017.06.028","type":"journal-article","created":{"date-parts":[[2017,7,14]],"date-time":"2017-07-14T23:45:37Z","timestamp":1500075937000},"page":"854-862","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":32,"special_numbering":"C","title":["Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography"],"prefix":"10.1016","volume":"107","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7254-6465","authenticated-orcid":false,"given":"Huaqun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Debiao","family":"He","sequence":"additional","affiliation":[]},{"given":"Yimu","family":"Ji","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.future.2017.06.028_b1","series-title":"Handbook of Financial Cryptography and Security","article-title":"E-cash","author":"Belenkiy","year":"2011"},{"key":"10.1016\/j.future.2017.06.028_b2","doi-asserted-by":"crossref","unstructured":"J. Camenisch, S. Hohenberger, A. Lysyanskaya, Compact e-cash, in: EUROCRYPT 2005, 2005, pp. 302\u2013321.","DOI":"10.1007\/11426639_18"},{"key":"10.1016\/j.future.2017.06.028_b3","doi-asserted-by":"crossref","unstructured":"D. Chaum, Blind signatures for untraceable payments, in: CRYPTO 1982, 1982, pp. 199\u2013203.","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"10.1016\/j.future.2017.06.028_b4","series-title":"Handbook of Financial Cryptography and Security","article-title":"Micropayment systems","author":"Parhonyi","year":"2011"},{"key":"10.1016\/j.future.2017.06.028_b5","unstructured":"S. Nakamoto, Bitcoin: A peer-to-peer electronic cash system, 2008. http:\/\/www.cryptovest.co.uk\/resources\/Bitcoin."},{"key":"10.1016\/j.future.2017.06.028_b6","unstructured":"M. Swan, Blockchain thinking: The brain as a DAC (decentralized autonomous organization), in: Texas Bitcoin Conference, 2015, pp. 27\u201329."},{"key":"10.1016\/j.future.2017.06.028_b7","doi-asserted-by":"crossref","unstructured":"A. Kosba, A. Miller, E. Shi, Z. Wen, C. Papamanthou, Hawk: The blockchain model of cryptography and privacy-preserving smart contracts, in: 2016 IEEE Symposium on Security and Privacy, 2016, pp. 839\u2013858.","DOI":"10.1109\/SP.2016.55"},{"key":"10.1016\/j.future.2017.06.028_b8","doi-asserted-by":"crossref","unstructured":"J. Bonneau, A. Miller, J. Clark, A. Narayanan, J.A. Kroll, E.W. Felten, Research perspectives and challenges for bitcoin and cryptocurrencies, in: IEEE Symposium on Security and Privacy, 2015.","DOI":"10.1109\/SP.2015.14"},{"key":"10.1016\/j.future.2017.06.028_b9","doi-asserted-by":"crossref","unstructured":"G.G. Dagher, B. B\u00f6nz, J. Bonneau, J. Clark, D. Boneh, Provisions: Privacy-preserving proofs of solvency for Bitcoin exchanges, in: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015, pp. 720\u2013731.","DOI":"10.1145\/2810103.2813674"},{"key":"10.1016\/j.future.2017.06.028_b10","doi-asserted-by":"crossref","unstructured":"I. Miers, C. Garman, M. Green, A.D. Rubin, Zerocoin: Anonymous distributed e-cash from bitcoin, in: 2013 IEEE Symposium on Security and Privacy, 2013, pp. 397\u2013411.","DOI":"10.1109\/SP.2013.34"},{"key":"10.1016\/j.future.2017.06.028_b11","unstructured":"W. Markus, Dogecoin, 2013. http:\/\/dogecoin.com\/."},{"key":"10.1016\/j.future.2017.06.028_b12","unstructured":"Sunny King, Scott Nadal, Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. peercoin.net, 2013."},{"key":"10.1016\/j.future.2017.06.028_b13","unstructured":"NovaCoin. http:\/\/coinwiki.info\/en\/novacoin."},{"year":"2004","series-title":"Foundations of Cryptography. Basic Applications","author":"Golderich","key":"10.1016\/j.future.2017.06.028_b14"},{"issue":"1","key":"10.1016\/j.future.2017.06.028_b15","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s102070100002","article-title":"The elliptic curve digital signature algorithm (ECDSA)","volume":"1","author":"Johnson","year":"2001","journal-title":"Int. J. Inf. Secur."},{"key":"10.1016\/j.future.2017.06.028_b16","series-title":"EUROCRYPT\u201996","first-page":"143","article-title":"Designated verifier proofs and their applications","volume":"vol. 1070","author":"Jakobsson","year":"1996"},{"issue":"1","key":"10.1016\/j.future.2017.06.028_b17","first-page":"55","article-title":"A provably secure identity-based strong designated verifier proxy signature scheme from bilinear pairings","volume":"26","author":"Islam","year":"2014","journal-title":"J. King Saud Univ. Comput. Inf. Sci."},{"key":"10.1016\/j.future.2017.06.028_b18","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1016\/j.ins.2015.02.033","article-title":"Universal designated verifier transitive signatures for graph-based big data","volume":"318","author":"Hou","year":"2015","journal-title":"Inform. Sci."},{"key":"10.1016\/j.future.2017.06.028_b19","doi-asserted-by":"crossref","unstructured":"Q. Huang, D.S. Wong, W. Susilo, P2ofe: privacy-preserving optimistic fair exchange of digital signatures, CT-RSA 2014, 2014, 367\u2013384.","DOI":"10.1007\/978-3-319-04852-9_19"},{"issue":"3_4","key":"10.1016\/j.future.2017.06.028_b20","first-page":"425","article-title":"An efficient and secure strong designated verifier signature scheme without bilinear pairings","volume":"31","author":"Islam","year":"2013","journal-title":"J. Appl. Math. Inf."},{"issue":"3","key":"10.1016\/j.future.2017.06.028_b21","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1007\/BF00196725","article-title":"Efficient signature generation by smart cards","volume":"4","author":"Schnorr","year":"1991","journal-title":"J. Cryptogr."},{"key":"10.1016\/j.future.2017.06.028_b22","doi-asserted-by":"crossref","unstructured":"D. Chaum, T.P. Pedersen, Wallet databases with observers, in: CRYPTO\u201992, 1992, 89\u2013105.","DOI":"10.1007\/3-540-48071-4_7"},{"key":"10.1016\/j.future.2017.06.028_b23","unstructured":"A. Fiat, A. Shamir, Witness indistinguishable and witness hiding protocols, ACM STOC 1990, 1990, 416\u2013426."},{"key":"10.1016\/j.future.2017.06.028_b24","unstructured":"Hash function. https:\/\/en.wikipedia.org\/wiki\/Hash_function."},{"key":"10.1016\/j.future.2017.06.028_b25","unstructured":"Economist Staff, Blockchains: The great chain of being sure about things, Economist, 2015."},{"year":"2008","series-title":"Elliptic Curves: Number Theory and Cryptography","author":"Washington","key":"10.1016\/j.future.2017.06.028_b26"},{"key":"10.1016\/j.future.2017.06.028_b27","first-page":"109","article-title":"On the elliptic curve digital signature algorithm","volume":"8","author":"Liao","year":"2016","journal-title":"Tunghai Sci."},{"key":"10.1016\/j.future.2017.06.028_b28","series-title":"Advances in Elliptic Curve Cryptography","article-title":"The exact security of ECDSA","author":"Brown","year":"2000"},{"key":"10.1016\/j.future.2017.06.028_b29","unstructured":"S.S. Ltd, Miracl library. 2011. http:\/\/www.shamus.ie\/index.php?page=home."}],"container-title":["Future Generation Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X1731350X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167739X1731350X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2022,6,13]],"date-time":"2022-06-13T21:34:27Z","timestamp":1655156067000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167739X1731350X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6]]},"references-count":29,"alternative-id":["S0167739X1731350X"],"URL":"https:\/\/doi.org\/10.1016\/j.future.2017.06.028","relation":{},"ISSN":["0167-739X"],"issn-type":[{"type":"print","value":"0167-739X"}],"subject":[],"published":{"date-parts":[[2020,6]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Designated-verifier proof of assets for bitcoin exchange using elliptic curve cryptography","name":"articletitle","label":"Article Title"},{"value":"Future Generation Computer Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.future.2017.06.028","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}