{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T15:27:47Z","timestamp":1759332467651},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319788128"},{"type":"electronic","value":"9783319788135"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-78813-5_33","type":"book-chapter","created":{"date-parts":[[2018,4,10]],"date-time":"2018-04-10T10:03:21Z","timestamp":1523354601000},"page":"644-658","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["BKI: Towards Accountable and Decentralized Public-Key Infrastructure with Blockchain"],"prefix":"10.1007","author":[{"given":"Zhiguo","family":"Wan","sequence":"first","affiliation":[]},{"given":"Zhangshuang","family":"Guan","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Zhuo","sequence":"additional","affiliation":[]},{"given":"Hequn","family":"Xian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","unstructured":"Kim, T.H.J., Huang, L.S., Perring, A., Jackson, C., Gligor, V.: Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure. In: Proceedings of the International World Wide Web Conference, pp. 679\u2013690. ACM (2013)","DOI":"10.1145\/2488388.2488448"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Basin, D., Cremers, C., Kim, T.H.J., Perrig, A., Sasse, R., Szalachowski, P.: ARPKI: Attack resilient public-key infrastructure. In: Proceedings of ACM CCS 2014, pp. 382\u2013393. ACM (2014)","DOI":"10.1145\/2660267.2660298"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Ryan, M.D.: Enhanced certificate transparency and end-to-end encrypted mail. In: Proceedings of NDSS (2014)","DOI":"10.14722\/ndss.2014.23379"},{"key":"33_CR4","unstructured":"Yu, J., Cheval, V., Ryan, M.: DTKI: a new formalized PKI with no trusted parties (2014). http:\/\/arxiv.org\/abs\/1408.1023"},{"key":"33_CR5","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008). http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"33_CR6","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger (2014). http:\/\/gavwood.com\/Paper.pdf"},{"key":"33_CR7","unstructured":"Buterin, V.: Ethereum white paper: a next generation smart contract and decentralized application platform (2013). https:\/\/github.com\/ethereum\/wiki\/wiki\/White-Paper"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate transparency. IETF RFC 6962 (2013)","DOI":"10.17487\/rfc6962"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Laurie, B., Kasper, E.: Revocation transparency. Google Research, September 2012","DOI":"10.17487\/rfc6962"},{"key":"33_CR10","unstructured":"Eckersley, P.: Sovereign key cryptography for internet domains (2011). https:\/\/git.eff.org\/?p=sovereign-keys.git"},{"key":"33_CR11","unstructured":"Androulaki, E., Cachin, C., Christidis, K., Murthy, C., Nguyen, B., Vukoli\u0107, M.: Hyperledger fabric proposals: next consensus architecture proposal (2016)"},{"key":"33_CR12","unstructured":"King, S., Nadal, S.: PPCoin: Peer-to-peer crypto-currency with proof-of-stake (2012). http:\/\/peerco.in\/assets\/paper\/peercoin-paper.pdf"},{"key":"33_CR13","unstructured":"Buterin, V.: Slasher: a punitive proof-of-stake algorithm (2014). https:\/\/blog.ethereum.org\/2014\/01\/15\/slasher-a-punitive-proof-of-stake-algorithm"},{"key":"33_CR14","unstructured":"Larimer, D.: Delegated proof-of-stake (DPOS). Bitshare whitepaper (2014)"},{"key":"33_CR15","unstructured":"Castro, M., Liskov, B.: Practical byzantine fault tolerance. In: OSDI. 99, pp. 173\u2013186 (1999)"},{"key":"33_CR16","unstructured":"Work2Heat: understanding the ethereum trie (2014). https:\/\/easythereentropy.wordpress.com\/2014\/06\/04\/understanding-the-ethereum-trie\/"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-78813-5_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,14]],"date-time":"2019-10-14T21:55:47Z","timestamp":1571090147000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-78813-5_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319788128","9783319788135"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-78813-5_33","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2018]]}}}