{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T18:04:48Z","timestamp":1755799488563,"version":"3.44.0"},"publisher-location":"Cham","reference-count":34,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030000172"},{"type":"electronic","value":"9783030000189"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00018-9_25","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T10:57:49Z","timestamp":1537873069000},"page":"276-285","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Distribution of CA-Role in Block-Chain Systems"],"prefix":"10.1007","author":[{"given":"Yue","family":"Fu","sequence":"first","affiliation":[]},{"given":"Rong","family":"Du","sequence":"additional","affiliation":[]},{"given":"Dagang","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Blakley, G.R.: Safeguarding cryptographic keys, p. 313. IEEE Computer Society (1979)","DOI":"10.1109\/MARK.1979.8817296"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1109\/TIT.1983.1056651","volume":"29","author":"C Asmuth","year":"1983","unstructured":"Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29(2), 208\u2013210 (1983)","journal-title":"IEEE Trans. Inf. Theory"},{"issue":"1","key":"25_CR3","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1109\/TIT.1983.1056621","volume":"29","author":"E. Karnin","year":"1983","unstructured":"Karnin, E., Greene, J., Hellman, M.: On secret sharing systems. IEEE Trans. Inf. Theory IT 29(1), 35\u201341 (1983)","journal-title":"IEEE Transactions on Information Theory"},{"issue":"11","key":"25_CR4","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"25_CR5","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Consulted (2008)"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chor, B., Goldwasser, S.: Verifiable secret sharing and achieving simultaneity in the presence of faults. In: Proceedings of 26th IEEE Symposium on Foundations of Computer Science, pp. 383\u2013395. IEEE, New York (1985)","DOI":"10.1109\/SFCS.1985.64"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Feldman, P.: A practical scheme for non-interactive verifiable secret sharing. In: Proceedings of 28th IEEE Symposium on Foundations of Computer Science, pp. 427\u2013438. IEEE, New York (1987)","DOI":"10.1109\/SFCS.1987.4"},{"key":"25_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1007\/3-540-46766-1_9","volume-title":"Advances in Cryptology \u2014 CRYPTO 1991","author":"TP Pedersen","year":"1992","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_9"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Ben-or, M., Goldwasser, S., Widgerson, A.: Completeness theorems for noncryptographic fault-tolerant distributed computation. In: Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, pp. 1\u201310. ACM, New York (1988)","DOI":"10.1145\/62212.62213"},{"key":"25_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1007\/3-540-68339-9_17","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1996","author":"M Stadler","year":"1996","unstructured":"Stadler, M.: Publicly verifiable secret sharing. In: Maurer, U. (ed.) EUROCRYPT 1996. LNCS, vol. 1070, pp. 190\u2013199. Springer, Heidelberg (1996). https:\/\/doi.org\/10.1007\/3-540-68339-9_17"},{"key":"25_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"295","DOI":"10.1007\/3-540-48910-X_21","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1999","author":"R Gennaro","year":"1999","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 295\u2013310. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_21"},{"key":"25_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"TP Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522\u2013526. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_47"},{"key":"25_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/3-540-46766-1_37","volume-title":"Advances in Cryptology \u2014 CRYPTO 1991","author":"Y Desmedt","year":"1992","unstructured":"Desmedt, Y., Frankel, Y.: Shared generation of authenticators and signatures. In: Feigenbaum, J. (ed.) CRYPTO 1991. LNCS, vol. 576, pp. 457\u2013469. Springer, Heidelberg (1992). https:\/\/doi.org\/10.1007\/3-540-46766-1_37"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Santis, A.D., Desmedt, Y., Frankei, Y., Yung, M.: How to share a function securely. In: Twenty-Sixth ACM Symposium on Theory of Computing, pp. 522\u2013533. IEEE, New York (1994)","DOI":"10.1145\/195058.195405"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Frankei, Y., Gemmei, P., Yung, M.: Witness-based cryptographic program checking and robust function sharing. In: Proceedings of the Twenty-Eighth Annual ACM Symposium on Theory of Computing, pp. 499\u2013508. ACM, New York (1996)","DOI":"10.1145\/237814.237998"},{"key":"25_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/3-540-45539-6_15","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2000","author":"V Shoup","year":"2000","unstructured":"Shoup, V.: Practical threshold signatures. In: Preneel, B. (ed.) EUROCRYPT 2000. LNCS, vol. 1807, pp. 207\u2013220. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-45539-6_15"},{"key":"25_CR17","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1016\/j.entcs.2007.01.065","volume":"186","author":"S Iftene","year":"2007","unstructured":"Iftene, S.: General secret sharing based on the Chinese remainder theorem with applications in E-voting. Electron. Notes Theor. Comput. Sci. 186, 67\u201384 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"25_CR18","unstructured":"Iftene, S., Boureanu, I.: Weighted threshold secret sharing based on the Chinese remainder theorem. Sci. Ann. Cuza Univ. 15, 161\u2013172 (2005)"},{"key":"25_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1007\/0-387-34799-2_30","volume-title":"Advances in Cryptology \u2014 CRYPTO 1988","author":"GJ Simmons","year":"1990","unstructured":"Simmons, G.J.: How to (Really) share a secret. In: Goldwasser, S. (ed.) CRYPTO 1988. LNCS, vol. 403, pp. 390\u2013448. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34799-2_30"},{"key":"25_CR20","first-page":"468","volume":"434","author":"EF Brickell","year":"1990","unstructured":"Brickell, E.F.: Some ideal secret sharing schemes. J. Comb. Math. Comb. Comput. 434, 468\u2013475 (1990)","journal-title":"J. Comb. Math. Comb. Comput."},{"key":"25_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/3-540-46416-6_20","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"TP Pedersen","year":"1991","unstructured":"Pedersen, T.P.: Distributed provers with applications to undeniable signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 221\u2013242. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_20"},{"key":"25_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1007\/978-3-540-25980-0_19","volume-title":"Public Key Infrastructure","author":"C Zouridaki","year":"2004","unstructured":"Zouridaki, C., Mark, B.L., Gaj, K., Thomas, R.K.: Distributed CA-based PKI for mobile ad hoc networks using elliptic curve cryptography. In: Katsikas, S.K., Gritzalis, S., L\u00f3pez, J. (eds.) EuroPKI 2004. LNCS, vol. 3093, pp. 232\u2013245. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-25980-0_19"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: ACM Symposium on Theory of Computing, pp. 73\u201385. DBLP (1989)","DOI":"10.1145\/73007.73014"},{"key":"25_CR24","unstructured":"Grinberg, R.: Bitcoin: An Innovative Alternative Digital Currency. Social Science Electronic Publishing (2011)"},{"key":"25_CR25","unstructured":"Cuthbertson, A.: Bitcoin Now Accepted by 100,000 Merchants Worldwide. International Business Times, IBTimes Co. (2015)"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Hileman, D.G., Rauchs, M.: 2017 Global Cryptocurrency Benchmarking Study. Social Science Electronic Publishing, Cambridge (2017)","DOI":"10.2139\/ssrn.2965436"},{"key":"25_CR27","unstructured":"Antonopoulos, A.M.: Mastering Bitcoin: Unlocking Digital Cryptocurrencies. O\u2019Reilly Media Inc., Sebastopol (2014)"},{"key":"25_CR28","volume-title":"Blockchain: Blueprint for a New Economy","author":"M Swan","year":"2015","unstructured":"Swan, M.: Blockchain: Blueprint for a New Economy. O\u2019Reilly Media Inc., Sebastopol (2015)"},{"key":"25_CR29","unstructured":"Technical report by the UK government chief scientific adviser. https:\/\/www.gov.uk\/government\/news\/distributed-ledger-technology-beyond-block-chain . Accessed 10 May 2018"},{"key":"25_CR30","unstructured":"Ethereum White Paper: a next-generation smart contract and decentralized application platform. https:\/\/github.com\/ethereum\/wiki\/wiki\/WhitePaper . Accessed 10 May 2018"},{"key":"25_CR31","unstructured":"Brito, J., Shadab, H., Castillo, A.: Bitcoin financial regulation: securities, derivatives, prediction markets, and gambling. Columbia Sci. Technol. Law Rev. 16, 146\u2013221 (2014)"},{"key":"25_CR32","unstructured":"Eyal, I., Efe Gencer, A., Sirer, E.G., van Renesse, R.: Bitcoin-NG: a scalable blockchain protocol. Cryptography and Security. arXiv:1510.02037 (2015)"},{"key":"25_CR33","unstructured":"Courtois, N.T., Bahack, L.: On subversive miner strategies and block withholding attack in bitcoin digital currency. Cryptography and Security. arXiv:1402.1718 (2014)"},{"key":"25_CR34","unstructured":"Hardjono, T., Smith, N., Alex: http:\/\/connection.mit.edu\/wp-content\/uploads\/sites\/29\/2014\/12\/Anonymous-Identities-for-Permissioned-Blockchains2.pdf . Accessed 10 May 2018"}],"container-title":["Lecture Notes in Computer Science","Cloud Computing and Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00018-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T23:23:25Z","timestamp":1755645805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00018-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030000172","9783030000189"],"references-count":34,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00018-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cloud Computing and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Haikou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icccsconf.org\/icccs2018.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}