{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:08:17Z","timestamp":1743012497896,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030529871"},{"type":"electronic","value":"9783030529888"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-52988-8_10","type":"book-chapter","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T15:37:10Z","timestamp":1596123430000},"page":"117-130","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Group Signature Scheme for Securing Blockchain-Based Mobile Edge Computing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8489-4010","authenticated-orcid":false,"given":"Shijie","family":"Zhang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1753-1284","authenticated-orcid":false,"given":"Jong-Hyouk","family":"Lee","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,7,31]]},"reference":[{"key":"10_CR1","unstructured":"Bissias, G., Levine, B.N., Ozisik, A.P., Andresen, G.: An analysis of attacks on blockchain consensus. arXiv preprint \narXiv:1610.07985\n\n (2016)"},{"key":"10_CR2","unstructured":"BitFury Group: Proof of Stake versus Proof of Work White paper, September 2015. \nhttps:\/\/bitfury.com\/content\/downloads\/pos-vs-pow-1.0.2.pdf"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"514","DOI":"10.1007\/3-540-45682-1_30","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"D Boneh","year":"2001","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514\u2013532. Springer, Heidelberg (2001). \nhttps:\/\/doi.org\/10.1007\/3-540-45682-1_30"},{"key":"10_CR4","unstructured":"Buterin, V., Griffith, V.: Casper the friendly finality gadget. arXiv preprint \narXiv:1710.09437\n\n (2017)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/BFb0052252","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201997","author":"J Camenisch","year":"1997","unstructured":"Camenisch, J., Stadler, M.: Efficient group signature schemes for large groups. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 410\u2013424. Springer, Heidelberg (1997). \nhttps:\/\/doi.org\/10.1007\/BFb0052252"},{"key":"10_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). \nhttps:\/\/doi.org\/10.1007\/3-540-46416-6_22"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"JR Douceur","year":"2002","unstructured":"Douceur, J.R.: The Sybil attack. In: Druschel, P., Kaashoek, F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251\u2013260. Springer, Heidelberg (2002). \nhttps:\/\/doi.org\/10.1007\/3-540-45748-8_24"},{"issue":"7","key":"10_CR8","doi-asserted-by":"publisher","first-page":"95","DOI":"10.1145\/3212998","volume":"61","author":"I Eyal","year":"2018","unstructured":"Eyal, I., Sirer, E.G.: Majority is not enough: bitcoin mining is vulnerable. Commun. ACM 61(7), 95\u2013102 (2018)","journal-title":"Commun. ACM"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Ga\u017ei, P., Kiayias, A., Russell, A.: Stake-bleeding attacks on proof-of-stake blockchains. In: 2018 Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 85\u201392. IEEE (2018)","DOI":"10.1109\/CVCBT.2018.00015"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Grunspan, C., P\u00e9rez-Marco, R.: Double spend races. arXiv preprint \narXiv:1702.02867\n\n (2017)","DOI":"10.1142\/S021902491850053X"},{"key":"10_CR11","doi-asserted-by":"publisher","first-page":"11676","DOI":"10.1109\/ACCESS.2018.2801266","volume":"6","author":"R Guo","year":"2018","unstructured":"Guo, R., Shi, H., Zhao, Q., Zheng, D.: Secure attribute-based signature scheme with multiple authorities for blockchain in electronic health records systems. IEEE Access 6, 11676\u201311686 (2018)","journal-title":"IEEE Access"},{"key":"10_CR12","unstructured":"Hu, Y.C., Patel, M., Sabella, D., Sprecher, N., Young, V.: Mobile edge computing\u2014a key technology towards 5g. ETSI white paper, vol. 11, no. 11, pp. 1\u201316 (2015)"},{"key":"10_CR13","doi-asserted-by":"crossref","unstructured":"Huh, S., Cho, S., Kim, S.: Managing IoT devices using blockchain platform. In: 2017 19th International Conference on Advanced Communication Technology (ICACT), pp. 464\u2013467. IEEE (2017)","DOI":"10.23919\/ICACT.2017.7890132"},{"issue":"1","key":"10_CR14","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36\u201363 (2001)","journal-title":"Int. J. Inf. Secur."},{"key":"10_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-030-32101-7_4","volume-title":"Financial Cryptography and Data Security","author":"S Kanjalkar","year":"2019","unstructured":"Kanjalkar, S., Kuo, J., Li, Y., Miller, A.: Short paper: i can\u2019t believe it\u2019s not stake! resource exhaustion attacks on PoS. In: Goldberg, I., Moore, T. (eds.) FC 2019. LNCS, vol. 11598, pp. 62\u201369. Springer, Cham (2019). \nhttps:\/\/doi.org\/10.1007\/978-3-030-32101-7_4"},{"key":"10_CR16","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/ACCESS.2017.2782733","volume":"6","author":"JH Lee","year":"2017","unstructured":"Lee, J.H.: BIDaaS: blockchain based ID as a service. IEEE Access 6, 2274\u20132278 (2017)","journal-title":"IEEE Access"},{"key":"10_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1007\/978-3-319-50011-9_20","volume-title":"Information and Communications Security","author":"PTS Liu","year":"2016","unstructured":"Liu, P.T.S.: Medical record system using blockchain, big data and tokenization. In: Lam, K.-Y., Chi, C.-H., Qing, S. (eds.) ICICS 2016. LNCS, vol. 9977, pp. 254\u2013261. Springer, Cham (2016). \nhttps:\/\/doi.org\/10.1007\/978-3-319-50011-9_20"},{"key":"10_CR18","doi-asserted-by":"publisher","unstructured":"Mengelkamp, E., Notheisen, B., Beer, C., Dauer, D., Weinhardt, C.: A blockchain-based smart grid: towards sustainable local energy markets. Comput. Sci. Res. Dev., 207\u2013214 (2017). \nhttps:\/\/doi.org\/10.1007\/s00450-017-0360-9","DOI":"10.1007\/s00450-017-0360-9"},{"key":"10_CR19","unstructured":"Nakamoto, S.: Bitcoin: A Peer-to-Peer Electronic Cash System (2008)"},{"issue":"3","key":"10_CR20","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/BF00196725","volume":"4","author":"CP Schnorr","year":"1991","unstructured":"Schnorr, C.P.: Efficient signature generation by smart cards. J. Cryptol. 4(3), 161\u2013174 (1991). \nhttps:\/\/doi.org\/10.1007\/BF00196725","journal-title":"J. Cryptol."},{"key":"10_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"456","DOI":"10.1007\/978-3-319-66399-9_25","volume-title":"Computer Security \u2013 ESORICS 2017","author":"S-F Sun","year":"2017","unstructured":"Sun, S.-F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456\u2013474. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-66399-9_25"},{"issue":"8","key":"10_CR22","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/MCOM.2018.1701095","volume":"56","author":"Z Xiong","year":"2018","unstructured":"Xiong, Z., Zhang, Y., Niyato, D., Wang, P., Han, Z.: When mobile blockchain meets edge computing. IEEE Commun. Mag. 56(8), 33\u201339 (2018)","journal-title":"IEEE Commun. Mag."},{"key":"10_CR23","doi-asserted-by":"publisher","first-page":"5715","DOI":"10.1109\/TII.2019.2921566","volume":"15","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Lee, J.H.: Double-spending with a Sybil attack in the bitcoin decentralized network. IEEE Trans. Ind. Inform. 15, 5715\u20135722 (2019)","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Wireless Internet"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-52988-8_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T15:46:54Z","timestamp":1596124014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-52988-8_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030529871","9783030529888"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-52988-8_10","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 July 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"WiCON","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Wireless Internet Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"TaiChung","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 November 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 November 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"wicon2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/wicon2019.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}