{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T23:10:06Z","timestamp":1751843406009,"version":"3.41.0"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030003043"},{"type":"electronic","value":"9783030003050"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00305-0_7","type":"book-chapter","created":{"date-parts":[[2018,9,6]],"date-time":"2018-09-06T10:55:57Z","timestamp":1536231357000},"page":"85-93","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Atomic Information Disclosure of Off-Chained Computations Using Threshold Encryption"],"prefix":"10.1007","author":[{"given":"Oliver","family":"Stengele","sequence":"first","affiliation":[]},{"given":"Hannes","family":"Hartenstein","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,7]]},"reference":[{"key":"7_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"494","DOI":"10.1007\/978-3-319-70278-0_31","volume-title":"Financial Cryptography and Data Security","author":"M Bartoletti","year":"2017","unstructured":"Bartoletti, M., Pompianu, L.: An empirical analysis of smart contracts: platforms, applications, and design patterns. In: Brenner, M., et al. (eds.) FC 2017. LNCS, vol. 10323, pp. 494\u2013509. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-70278-0_31"},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Bartolucci, S., Bernat, P., Joseph, D.: SHARVOT: secret SHARe-based VOTing on the blockchain. arXiv.org , March 2018","DOI":"10.1145\/3194113.3194118"},{"key":"7_CR3","unstructured":"Benet, J.: IPFS - Content Addressed, Versioned, P2P File System. arXiv.org , July 2014"},{"key":"7_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/BFb0052253","volume-title":"Advances in Cryptology \u2014 CRYPTO 1997","author":"D Boneh","year":"1997","unstructured":"Boneh, D., Franklin, M.: Efficient generation of shared RSA keys. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 425\u2013439. Springer, Heidelberg (1997). https:\/\/doi.org\/10.1007\/BFb0052253"},{"key":"7_CR5","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform. White paper (2014)"},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: MapReduce - simplified data processing on large clusters. Commun. ACM 51(1), 107 (2008)","journal-title":"Commun. ACM"},{"key":"7_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1007\/3-540-48184-2_8","volume-title":"Advances in Cryptology \u2014 CRYPTO 1987","author":"Y Desmedt","year":"1988","unstructured":"Desmedt, Y.: Society and group oriented cryptography: a new concept. In: Pomerance, C. (ed.) CRYPTO 1987. LNCS, vol. 293, pp. 120\u2013127. Springer, Heidelberg (1988). https:\/\/doi.org\/10.1007\/3-540-48184-2_8"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Desmedt, Y.: Threshold cryptosystems (1993)","DOI":"10.1007\/3-540-57220-1_47"},{"key":"7_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/978-3-319-67262-5_1","volume-title":"Service-Oriented and Cloud Computing","author":"J Eberhardt","year":"2017","unstructured":"Eberhardt, J., Tai, S.: On or off the blockchain? Insights on off-chaining computation and data. In: De Paoli, F., Schulte, S., Broch Johnsen, E. (eds.) ESOCC 2017. LNCS, vol. 10465, pp. 3\u201315. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-67262-5_1"},{"key":"7_CR10","unstructured":"Kokoris-Kogias, E., et al.: Hidden in plain sight - storing and managing secrets on a public ledger. IACR Cryptology ePrint Archive (2018)"},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Luu, L., Teutsch, J., Kulkarni, R., Saxena, P.: Demystifying incentives in the consensus computer. In: The 22nd ACM SIGSAC Conference, pp. 706\u2013719. ACM Press, New York (2015)","DOI":"10.1145\/2810103.2813659"},{"key":"7_CR12","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. bitcoin.org (2008)"},{"key":"7_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"522","DOI":"10.1007\/3-540-46416-6_47","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 1991","author":"TP Pedersen","year":"1991","unstructured":"Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522\u2013526. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_47"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Szabo, N.: Formalizing and securing relationships on public networks. First Monday 2(9) (1997)","DOI":"10.5210\/fm.v2i9.548"},{"key":"7_CR15","unstructured":"Teutsch, J., Reitwei\u00dfner, C.: A scalable verification solution for blockchains. people.cs.uchicago.edu , March 2017"},{"issue":"8","key":"7_CR16","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1145\/358198.358210","volume":"27","author":"K Thompson","year":"1984","unstructured":"Thompson, K.: Reflections on trusting trust. Commun. ACM 27(8), 761\u2013763 (1984)","journal-title":"Commun. ACM"},{"key":"7_CR17","doi-asserted-by":"crossref","unstructured":"Wheeler, D.: Countering trusting trust through diverse double-compiling. In: 21st Annual Computer Security Applications Conference (ACSAC 2005), pp. 33\u201348. IEEE (2005)","DOI":"10.1109\/CSAC.2005.17"},{"issue":"1","key":"7_CR18","doi-asserted-by":"publisher","first-page":"12","DOI":"10.2478\/acss-2018-0002","volume":"23","author":"K Z\u012ble","year":"2018","unstructured":"Z\u012ble, K., Strazdin\u0327a, R.: Blockchain use cases and their feasibility. Appl. Comput. Syst. 23(1), 12\u201320 (2018)","journal-title":"Appl. Comput. Syst."}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00305-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T22:47:48Z","timestamp":1751842068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00305-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030003043","9783030003050"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00305-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"7 September 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CBT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Workshop on Cryptocurrencies and Blockchain Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cbt2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}