{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T13:49:15Z","timestamp":1742996955286,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030629731"},{"type":"electronic","value":"9783030629748"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-62974-8_21","type":"book-chapter","created":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T13:10:38Z","timestamp":1606223438000},"page":"372-390","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["An Accountable Decryption System Based on Privacy-Preserving Smart Contracts"],"prefix":"10.1007","author":[{"given":"Rujia","family":"Li","sequence":"first","affiliation":[]},{"given":"Qin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Wang","sequence":"additional","affiliation":[]},{"given":"David","family":"Galindo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,25]]},"reference":[{"key":"21_CR1","unstructured":"Oasis labs: A safer way to use data (2020). https:\/\/www.oasislabs.com\/"},{"key":"21_CR2","unstructured":"Origo: the privacy preserving platform for decentralized applications (2020). https:\/\/origo.network\/"},{"key":"21_CR3","doi-asserted-by":"crossref","unstructured":"Alder, F., Asokan, N., et al.: S-FAAS: Trustworthy and accountable function-as-a-service using intel SGX. In: CCSW 2019, pp. 185\u2013199 (2019)","DOI":"10.1145\/3338466.3358916"},{"key":"21_CR4","doi-asserted-by":"crossref","unstructured":"Azaria, A., Ekblaw, A., Vieira, T.: Medrec: using blockchain for medical data access and permission management. In: OBD 2016, pp. 25\u201330. IEEE (2016)","DOI":"10.1109\/OBD.2016.11"},{"key":"21_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1007\/978-3-540-28628-8_3","volume-title":"Advances in Cryptology \u2013 CRYPTO 2004","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Boyen, X., Shacham, H.: Short group signatures. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 41\u201355. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-28628-8_3"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: Towards privacy in a smart contract world. In: FC 2020 (2020)","DOI":"10.1007\/978-3-030-51280-4_23"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Canetti, R.: Universally composable security: a new paradigm for cryptographic protocols. In: FOCS 2001, pp. 136\u2013145. IEEE (2001)","DOI":"10.1109\/SFCS.2001.959888"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, R., et al.: Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contracts. In: EuroSP 2019, pp. 185\u2013200. IEEE (2019)","DOI":"10.1109\/EuroSP.2019.00023"},{"issue":"2","key":"21_CR9","first-page":"251","volume":"19","author":"D Contractor","year":"2017","unstructured":"Contractor, D., Patel, D.R.: Accountability in cloud computing by means of chain of trust. IJ Network Secur. 19(2), 251\u2013259 (2017)","journal-title":"IJ Network Secur."},{"issue":"086","key":"21_CR10","first-page":"1","volume":"2016","author":"V Costan","year":"2016","unstructured":"Costan, V., Devadas, S.: Intel SGX explained. IACR Cryptol. ePrint Archive 2016(086), 1\u2013118 (2016)","journal-title":"IACR Cryptol. ePrint Archive"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Goyal, V., Lu, S., Sahai, A., Waters, B.: Black-box accountable authority identity-based encryption. In: ACM CCS 2008, pp. 427\u2013436. ACM (2008)","DOI":"10.1145\/1455770.1455824"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"234","DOI":"10.1007\/978-3-030-29959-0_12","volume-title":"Computer Security \u2013 ESORICS 2019","author":"H Guo","year":"2019","unstructured":"Guo, H., Zhang, Z., Xu, J., Xia, M.: Generic traceable proxy re-encryption and accountable extension in consensus network. In: Sako, K., Schneider, S., Ryan, P.Y.A. (eds.) ESORICS 2019. LNCS, vol. 11735, pp. 234\u2013256. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-29959-0_12"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Juels, A., Kosba, A., Shi, E.: The ring of GYGES: investigating the future of criminal smart contracts. In: ACM CCS 2016, pp. 283\u2013295. ACM (2016)","DOI":"10.1145\/2976749.2978362"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Kaaniche, N., Laurent, M.: A blockchain-based data usage auditing architecture with enhanced privacy and availability. In: NCA 2017, pp. 1\u20135. IEEE (2017)","DOI":"10.1109\/NCA.2017.8171384"},{"key":"21_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"581","DOI":"10.1007\/11681878_30","volume-title":"Theory of Cryptography","author":"E Kiltz","year":"2006","unstructured":"Kiltz, E.: Chosen-ciphertext security from tag-based encryption. In: Halevi, S., Rabin, T. (eds.) TCC 2006. LNCS, vol. 3876, pp. 581\u2013600. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11681878_30"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Kosba, A., Miller, A., et al.: Hawk: the blockchain model of cryptography and privacy-preserving smart contracts. In: IEEE S&P 2016, pp. 839\u2013858. IEEE (2016)","DOI":"10.1109\/SP.2016.55"},{"key":"21_CR17","unstructured":"Kroll, J.A., Zimmerman, J., Wu, D.J., Nikolaenko, V., Felten, E.W.: Accountable cryptographic access control. In: Workshop, CRYPTO 2018, vol. 2018 (2018)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Truderung, T., Vogt, A.: Accountability: definition and relationship to verifiability. In: ACM CCS 2010, pp. 526\u2013535. ACM (2010)","DOI":"10.1145\/1866307.1866366"},{"key":"21_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"527","DOI":"10.1007\/978-3-319-98989-1_26","volume-title":"Computer Security","author":"J Lai","year":"2018","unstructured":"Lai, J., Tang, Q.: Making Any attribute-based encryption accountable, efficiently. In: Lopez, J., Zhou, J., Soriano, M. (eds.) ESORICS 2018. LNCS, vol. 11099, pp. 527\u2013547. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-98989-1_26"},{"key":"21_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1007\/978-3-030-31500-9_23","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"R Li","year":"2019","unstructured":"Li, R., Galindo, D., Wang, Q.: Auditable credential anonymity revocation based on privacy-preserving smart contracts. In: P\u00e9rez-Sol\u00e0, C., Navarro-Arribas, G., Biryukov, A., Garcia-Alfaro, J. (eds.) DPM\/CBT -2019. LNCS, vol. 11737, pp. 355\u2013371. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31500-9_23"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Luo, Y., Fan, J., Deng, C., Li, Y., Zheng, Y., Ding, J.: Accountable data sharing scheme based on blockchain and SGX. In: CyberC 2019, pp. 9\u201316. IEEE (2019)","DOI":"10.1109\/CyberC.2019.00012"},{"key":"21_CR22","unstructured":"Microsoft: The coco framework: Technical overview, May 2019. https:\/\/github.com\/Azure\/coco-framework\/"},{"key":"21_CR23","doi-asserted-by":"crossref","unstructured":"Neisse, R., Steri, G., Nai-Fovino, I.: A blockchain-based approach for data accountability and provenance tracking. In: ARES 2017, p. 14. ACM (2017)","DOI":"10.1145\/3098954.3098958"},{"key":"21_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1007\/978-3-319-71075-4_12","volume-title":"Security Protocols XXV","author":"MD Ryan","year":"2017","unstructured":"Ryan, M.D.: Making decryption accountable (Transcript of Discussion). In: Stajano, F., Anderson, J., Christianson, B., Maty\u00e1\u0161, V. (eds.) Security Protocols 2017. LNCS, vol. 10476, pp. 99\u2013108. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71075-4_12"},{"key":"21_CR25","doi-asserted-by":"crossref","unstructured":"Steffen, S., et al.: zkay: specifying and enforcing data privacy in smart contracts. In: ACM CCS 2019, pp. 1759\u20131776. ACM (2019)","DOI":"10.1145\/3319535.3363222"},{"key":"21_CR26","unstructured":"Szabo, N.: Smart contracts: building blocks for digital markets. EXTROPY: J. Transhumanist Thought, 18(16), 2 (1996)"},{"issue":"2014","key":"21_CR27","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1\u201332 (2014)","journal-title":"Ethereum Project Yellow Paper"},{"issue":"2","key":"21_CR28","first-page":"289","volume":"13","author":"Y Xu","year":"2019","unstructured":"Xu, Y., et al.: Blockchain empowered arbitrable data auditing scheme for network storage as a service. IEEE TSC 13(2), 289\u2013300 (2019)","journal-title":"IEEE TSC"},{"key":"21_CR29","unstructured":"Zyskind, G., Nathan, O., Pentland, A.: Enigma: Decentralized computation platform with guaranteed privacy. arXiv preprint arXiv:1506.03471 (2015)"}],"container-title":["Lecture Notes in Computer Science","Information Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62974-8_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,12,7]],"date-time":"2020-12-07T00:13:28Z","timestamp":1607300008000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62974-8_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030629731","9783030629748"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62974-8_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bali","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Indonesia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"isw2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/isc2020.petra.ac.id\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}