{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:44:03Z","timestamp":1742913843310,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_3","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"39-56","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Blockchain-Based Confidential Payment System with Controllable Regulation"],"prefix":"10.1007","author":[{"given":"Yu-Chen","family":"Liao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1485-0164","authenticated-orcid":false,"given":"Raylin","family":"Tso","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7164-088X","authenticated-orcid":false,"given":"Zi-Yuan","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6948-2405","authenticated-orcid":false,"given":"Yi-Fan","family":"Tseng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"3_CR1","doi-asserted-by":"publisher","unstructured":"Ateniese, G., Faonio, A., Magri, B., de Medeiros, B.: Certified Bitcoins. In: Boureanu, I., Owesarski, P., Vaudenay, S. (eds.) ACNS 2014. LNCS, vol. 8479, pp. 80\u201396. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-07536-5_6","DOI":"10.1007\/978-3-319-07536-5_6"},{"key":"3_CR2","doi-asserted-by":"crossref","unstructured":"Ben Sasson, E., et al.: Zerocash: decentralized anonymous payments from Bitcoin. In: IEEE S &P 2014, pp. 459\u2013474. IEEE (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"3_CR3","unstructured":"Buterin, V.: Ethereum: a next-generation smart contract and decentralized application platform (2014). https:\/\/nft2x.com\/wp-content\/uploads\/2021\/03\/EthereumWP.pdf"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P., Maxwell, G.: Bulletproofs: short proofs for confidential transactions and more. In: IEEE S &P 2018, pp. 315\u2013334. IEEE (2018)","DOI":"10.1109\/SP.2018.00020"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., Shi, E.: Solidus: confidential distributed ledger transactions via PVORM. In: CCS 2017, pp. 701\u2013717. ACM (2017)","DOI":"10.1145\/3133956.3134010"},{"key":"3_CR6","doi-asserted-by":"publisher","unstructured":"Chaidos, P., Groth, J.: Making Sigma-protocols non-interactive without random oracles. In: Katz, J. (ed.) PKC 2015. LNCS, vol. 9020, pp. 650\u2013670. Springer, Heidelberg (2015). https:\/\/doi.org\/10.1007\/978-3-662-46447-2_29","DOI":"10.1007\/978-3-662-46447-2_29"},{"key":"3_CR7","doi-asserted-by":"publisher","unstructured":"Chen, Y., Ma, X., Tang, C., Au, M.H.: PGC: decentralized confidential payment system with auditability. In: Chen, L., Li, N., Liang, K., Schneider, S. (eds.) ESORICS 2020. LNCS, vol. 12308, pp. 591\u2013610. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-58951-6_29","DOI":"10.1007\/978-3-030-58951-6_29"},{"key":"3_CR8","doi-asserted-by":"crossref","unstructured":"Conti, M., Sandeep Kumar, E., Lal, C., Ruj, S.: A survey on security and privacy issues of Bitcoin. In: IEEE Communications Surveys and Tutorials, vol. 20, pp. 3416\u20133452. IEEE (2018)","DOI":"10.1109\/COMST.2018.2842460"},{"key":"3_CR9","doi-asserted-by":"publisher","unstructured":"Desmedt, Y., Frankel, Y.: Threshold cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307\u2013315. Springer, New York (1990). https:\/\/doi.org\/10.1007\/0-387-34805-0_28","DOI":"10.1007\/0-387-34805-0_28"},{"key":"3_CR10","doi-asserted-by":"publisher","unstructured":"Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186\u2013194. Springer, Heidelberg (1987). https:\/\/doi.org\/10.1007\/3-540-47721-7_12","DOI":"10.1007\/3-540-47721-7_12"},{"key":"3_CR11","doi-asserted-by":"publisher","unstructured":"Fouque, P.A., Joux, A., Tibouchi, M.: Injective encodings to elliptic curves. In: Boyd, C., Simpson, L. (eds.) ACISP 2013. LNCS, vol. 7959, pp. 203\u2013218. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39059-3_14","DOI":"10.1007\/978-3-642-39059-3_14"},{"key":"3_CR12","doi-asserted-by":"publisher","unstructured":"Garman, C., Green, M., Miers, I.: Accountable privacy for decentralized anonymous payments. In: Grossklags, J., Preneel, B. (eds.) FC 2016. LNCS, vol. 9603, pp. 81\u201398. Springer, Heidelberg (2017). https:\/\/doi.org\/10.1007\/978-3-662-54970-4_5","DOI":"10.1007\/978-3-662-54970-4_5"},{"key":"3_CR13","doi-asserted-by":"crossref","unstructured":"I. Miers, C.G., M. Green, A.D.R.: Zerocoin: anonymous distributed E-cash from Bitcoin. In: IEEE S &P 2013, pp. 397\u2013411. IEEE (2013)","DOI":"10.1109\/SP.2013.34"},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Krawczyk, H.: SIGMA: the SIGn-and-MAc\u2019 approach to authenticated diffie-hellman and its use in the IKE protocols. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 400\u2013425. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-540-45146-4_24","DOI":"10.1007\/978-3-540-45146-4_24"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Lin, C., He, D., Huang, X., Khan, M.K., Choo, K.K.R.: DCAP: a secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans. Inf. Forensics Secur. 15, 2440\u20132452 (2020)","DOI":"10.1109\/TIFS.2020.2969565"},{"key":"3_CR16","doi-asserted-by":"crossref","unstructured":"McCarthy, K.J., van Santen, P., Fiedler, I.: Modeling the money launderer: microtheoretical arguments on anti-money laundering policy. In: International Review of Law and Economics, vol. 43, pp. 148\u2013155. Elsevier (2015)","DOI":"10.1016\/j.irle.2014.04.006"},{"key":"3_CR17","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). https:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"3_CR18","doi-asserted-by":"publisher","unstructured":"Pedersen, T.P.: A threshold cryptosystem without a trusted party. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 522\u2013526. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46416-6_47","DOI":"10.1007\/3-540-46416-6_47"},{"key":"3_CR19","unstructured":"Petkus, M.: Why and how zk-SNARK works (2019). http:\/\/arxiv.org\/abs\/1906.07221"},{"key":"3_CR20","unstructured":"Pietschmann, T., Walker, J.: Estimating illicit financial flows resulting from drug trafficking and other transnational organized crimes (2011). https:\/\/www.unodc.org\/documents\/data-and-analysis\/Studies\/Illicit_financial_flows_2011_web.pdf"},{"key":"3_CR21","unstructured":"Saberhagen, N.V.: Cryptonote v 2.0 (2013). https:\/\/bytecoin.org\/old\/whitepaper.pdf"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Shen, X.S., et al.: Data management for future wireless networks: architecture, privacy preservation, and regulation. In: IEEE Networking, vol. 35, pp. 8\u201315. IEEE (2021)","DOI":"10.1109\/MNET.011.2000666"},{"key":"3_CR23","doi-asserted-by":"publisher","unstructured":"Sun, S.F., Au, M.H., Liu, J.K., Yuen, T.H.: RingCT 2.0: a compact accumulator-based (Linkable Ring Signature) protocol for blockchain cryptocurrency monero. In: Foley, S.N., Gollmann, D., Snekkenes, E. (eds.) ESORICS 2017. LNCS, vol. 10493, pp. 456\u2013474. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-66399-9_25","DOI":"10.1007\/978-3-319-66399-9_25"},{"key":"3_CR24","doi-asserted-by":"crossref","unstructured":"van Wegberg, R., Oerlemans, J.J., van Deventer, O.: Bitcoin money laundering: Mixed results? an explorative study on money laundering of cybercrime proceeds using Bitcoin. In: Journal Financial Crime, pp. 419\u2013435. Emerald Publishing Limited (2018)","DOI":"10.1108\/JFC-11-2016-0067"},{"key":"3_CR25","unstructured":"Williamson, Z.J.: The AZTEC protocol (2018). https:\/\/raw.githubusercontent.com\/AztecProtocol\/AZTEC\/master\/AZTEC.pdf"},{"key":"3_CR26","doi-asserted-by":"crossref","unstructured":"Xue, L., Liu, D., Ni, J., Lin, X., Shen, X.S.: Enabling regulatory compliance and enforcement in decentralized anonymous payment. In: IEEE Transactions on Dependable and Secure Computing. IEEE (2022)","DOI":"10.1109\/TDSC.2022.3144991"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:31:24Z","timestamp":1668760284000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}