{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:23:50Z","timestamp":1762507430041,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319944777"},{"type":"electronic","value":"9783319944784"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-94478-4_9","type":"book-chapter","created":{"date-parts":[[2018,6,21]],"date-time":"2018-06-21T10:27:12Z","timestamp":1529576832000},"page":"127-138","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Faster Dual-Key Stealth Address for Blockchain-Based Internet of Things Systems"],"prefix":"10.1007","author":[{"given":"Xinxin","family":"Fan","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,22]]},"reference":[{"key":"9_CR1","unstructured":"ByteCoin: Untraceable transactions which can contain a secure message are inevitable. Bitcoin Forum. https:\/\/bitcointalk.org\/index.php?topic=5965.0"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Dierks, T., Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard) (2008). https:\/\/tools.ietf.org\/html\/rfc5246","DOI":"10.17487\/rfc5246"},{"key":"9_CR3","unstructured":"Federal Information Processing Standards Publication 186\u20132. Digital Signature Standard (DSS). National Institute of Standards and Technology (2000)"},{"issue":"1","key":"9_CR4","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186\u2013208 (1989)","journal-title":"SIAM J. Comput."},{"key":"9_CR5","doi-asserted-by":"publisher","DOI":"10.1007\/b97644","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2003","unstructured":"Hankerson, D., Menezes, A.J., Vanstone, S.: Guide to Elliptic Curve Cryptography. Springer, Secaucus (2003). https:\/\/doi.org\/10.1007\/b97644"},{"issue":"177","key":"9_CR6","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1090\/S0025-5718-1987-0866109-5","volume":"48","author":"N Koblitz","year":"1987","unstructured":"Koblitz, N.: Elliptic curve cryptosystems. Math. Comput. 48(177), 203\u2013209 (1987)","journal-title":"Math. Comput."},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO 1985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). https:\/\/doi.org\/10.1007\/3-540-39799-X_31"},{"key":"9_CR8","unstructured":"Monero. Stealth Address. https:\/\/getmonero.org\/resources\/moneropedia\/stealthaddress.html"},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s13389-013-0069-z","volume":"4","author":"Thomaz Oliveira","year":"2014","unstructured":"Oliveira, T., L\u00f3pez, J., Aranha, D.F., Rodr\u00edguez-Henr\u00edquez, F.: Two is the fastest prime: lambda coordinates for binary elliptic curves. J. Cryptographic Eng. 4(1), 3\u201317 (2014)","journal-title":"Journal of Cryptographic Engineering"},{"key":"9_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/3-540-45682-1_32","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"RL Rivest","year":"2001","unstructured":"Rivest, R.L., Shamir, A., Tauman, Y.: How to leak a secret. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 552\u2013565. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45682-1_32"},{"key":"9_CR11","unstructured":"Rynomster, Tecnovert.: Shadow: Zero-knowledge Anonymous Distributed Electronic Cash via Traceable Ring Signatures. https:\/\/coss.io\/documents\/white-papers\/shadowcash.pdf"},{"key":"9_CR12","unstructured":"Saarinen, M.-J., Aumasson, J.-P.: The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC). RFC 7693 (Informational) (2015). https:\/\/tools.ietf.org\/html\/rfc7693"},{"key":"9_CR13","unstructured":"van Saberhagen, N.: CryptoNote v 2.0. https:\/\/cryptonote.org\/whitepaper.pdf"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Salowey, J., Zhou, H., Eronen, P., Tschofenig, H.: Transport Layer Security (TLS) Session Resumption without Server-Side State. RFC 5077 (Proposed Standard) (2008). https:\/\/tools.ietf.org\/html\/rfc5077","DOI":"10.17487\/rfc5077"},{"key":"9_CR15","unstructured":"Samourai. https:\/\/samouraiwallet.com\/index.html"},{"key":"9_CR16","unstructured":"Standards for Efficient Cryptography Group, SEC 1: Elliptic Curve Cryptography, Version 2.0. http:\/\/www.secg.org\/sec1-v2.pdf"},{"key":"9_CR17","unstructured":"Standards for Efficient Cryptography Group, SEC2: Recommended Elliptic Curve Domain Parameters version 2.0. http:\/\/www.secg.org\/sec2-v2.pdf"},{"key":"9_CR18","unstructured":"The Shadow Project. Dual-key Stealth Addresses, in part of Shadow Documentation. https:\/\/doc.shadowproject.io\/#dual-key-stealth-addresses"},{"key":"9_CR19","unstructured":"Todd, P.: [Bitcoin-development] Stealth Addresses. https:\/\/www.mail-archive.com\/bitcoin-development@lists.sourceforge.net\/msg03613.html"},{"key":"9_CR20","unstructured":"TokenPay: TokenPay - The World\u2019s Most Secure Coin (Whitepaper). https:\/\/www.tokenpay.com\/whitepaper.pdf"},{"key":"9_CR21","unstructured":"Yu, W., Musa, S.A., Xu, G., Li, B.: A Novel Pre-Computation Scheme of Window $$\\tau $$NAF for Koblitz Curves. IACR Cryptology ePrint Archive, Report 2017\/1020 (2017). https:\/\/eprint.iacr.org\/2017\/1020"},{"key":"9_CR22","unstructured":"Zcash. https:\/\/z.cash\/technology\/index.html"}],"container-title":["Lecture Notes in Computer Science","Blockchain \u2013 ICBC 2018"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-94478-4_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,21]],"date-time":"2022-06-21T00:03:35Z","timestamp":1655769815000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-94478-4_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319944777","9783319944784"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-94478-4_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"22 June 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICBC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Seattle, WA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icbc2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blockchain1000.org\/2018\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"www.confhub.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"7","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"44% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}