{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T06:55:48Z","timestamp":1726037748113},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030242671"},{"type":"electronic","value":"9783030242688"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24268-8_55","type":"book-chapter","created":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:03:34Z","timestamp":1563390214000},"page":"599-611","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Privacy-Preserving Electricity Trading Scheme Based on Blockchain"],"prefix":"10.1007","author":[{"given":"Yu","family":"Xu","sequence":"first","affiliation":[]},{"given":"Zhoubin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lili","family":"Li","sequence":"additional","affiliation":[]},{"given":"You","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,7,11]]},"reference":[{"key":"55_CR1","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. \n                      www.bitcoin.org\n                      \n                    . Accessed 20 Mar 2019"},{"key":"55_CR2","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference (IMC 2013), pp. 127\u2013140 (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: International Conference on Availability, Reliability and Security, p. 14. ACM (2017)","DOI":"10.1145\/3098954.3098958"},{"issue":"4","key":"55_CR4","doi-asserted-by":"publisher","first-page":"2292","DOI":"10.1109\/ACCESS.2016.2566339","volume":"2016","author":"K Christidis","year":"2016","unstructured":"Christidis, K., Devetsikiotis, M.: Blockchains and smart contracts for the internet of things. IEEE Access 2016(4), 2292\u20132303 (2016)","journal-title":"IEEE Access"},{"issue":"s1","key":"55_CR5","first-page":"216","volume":"43","author":"H Zhao","year":"2015","unstructured":"Zhao, H., Li, X., Zhan, L., Zhongcheng, W.: Data integrity protection method for microorganism sampling robots based on blockchain technology. J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.) 43(s1), 216\u2013219 (2015)","journal-title":"J. Huazhong Univ. Sci. Technol. (Nat. Sci. Ed.)"},{"key":"55_CR6","doi-asserted-by":"crossref","unstructured":"Jordi, C., Jordi, P.: Distributed immutabilization of secure logs. In: International Workshop on Security and Trust Management, pp. 122\u2013137 (2016)","DOI":"10.1007\/978-3-319-46598-2_9"},{"issue":"99","key":"55_CR7","doi-asserted-by":"publisher","first-page":"9239","DOI":"10.1109\/ACCESS.2016.2645904","volume":"4","author":"J Zhang","year":"2016","unstructured":"Zhang, J., Xue, N., Huang, X.: A secure system for pervasive social network-based healthcare. IEEE Access 4(99), 9239\u20139250 (2016)","journal-title":"IEEE Access"},{"key":"55_CR8","doi-asserted-by":"crossref","unstructured":"Siddiqi, M., All, S.T., Sivaraman, V.: Secure lightweight context-driven data logging for bodyworn sensing devices. In: International Symposium on Digital Forensic and Security, pp. 1\u20136 (2017)","DOI":"10.1109\/ISDFS.2017.7916500"},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., Shi, E., Wen, Z., Papamanthou, C.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE Security and Privacy, pp. 839\u2013858 (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"55_CR10","unstructured":"Greenspan, G.: MultiChain Private Blockchain-White Paper. \n                      http:\/\/www.multichain.com\/white-paper\/\n                      \n                    . Accessed 20 Mar 2019"},{"key":"55_CR11","unstructured":"ElementsProject\/Elements: Feature Experiments to Advance the Art of Bitcoin. \n                      https:\/\/github.com\/ElementsProject\/elements\n                      \n                    . Accessed 15 Mar 2019"},{"key":"55_CR12","unstructured":"Maxwell, G.: Confidential Transactions. \n                      https:\/\/www.elementsproject.org\/elements\/ confidential-transactions\/\n                      \n                    . Accessed 20 Mar 2019"},{"key":"55_CR13","unstructured":"Lazarovich, A.: Invisible Ink: blockchain for data privacy, Massachusetts Institute of Technology (2015)"},{"key":"55_CR14","unstructured":"Zyskind, G., Nathan, O., \u2018Sandy\u2019 Pentland, A.: Enigma: decentralized computation platform with guaranteed privacy. Comput. Sci. (2015)"},{"key":"55_CR15","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1007\/3-540-45748-8_5","volume-title":"Peer-to-Peer Systems","author":"Petar Maymounkov","year":"2002","unstructured":"Maymounkov, P.: Mazi\u00e8res, D.: Kademlia: a peer-to-peer information system based on the XOR metric. In: The First International Workshop on Peer-to-Peer Systems, pp. 53\u201365 (2002)"},{"key":"55_CR16","doi-asserted-by":"crossref","unstructured":"Bonneau, J., et al.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy, pp. 104\u2013121 (2015)","DOI":"10.1109\/SP.2015.14"},{"key":"55_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/11426639_27","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"A Sahai","year":"2005","unstructured":"Sahai, A., Waters, B.: Fuzzy identity-based encryption. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 457\u2013473. Springer, Heidelberg (2005). \n                      https:\/\/doi.org\/10.1007\/11426639_27"},{"key":"55_CR18","doi-asserted-by":"crossref","unstructured":"Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS 1006), pp. 89\u201398 (2006)","DOI":"10.1145\/1180405.1180418"},{"key":"55_CR19","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321\u2013334 (2007)","DOI":"10.1109\/SP.2007.11"},{"key":"55_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1007\/978-3-319-98989-1_27","volume-title":"Computer Security","author":"Y Michalevsky","year":"2018","unstructured":"Michalevsky, Y., Joye, M.: Decentralized policy-hiding ABE with receiver privacy. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11099, pp. 548\u2013567. Springer, Cham (2018). \n                      https:\/\/doi.org\/10.1007\/978-3-319-98989-1_27"},{"key":"55_CR21","unstructured":"Castro, M., Liskov, B.: Practical Byzantine fault tolerance. In: USENIX Technical Program - OSDI 1999 (1999)"},{"issue":"1","key":"55_CR22","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24268-8_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,17]],"date-time":"2019-07-17T19:17:17Z","timestamp":1563391037000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24268-8_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030242671","9783030242688"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24268-8_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"11 July 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"New York, NY","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"incodldos2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icaisconf.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}