{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T02:48:02Z","timestamp":1752461282464,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811527760"},{"type":"electronic","value":"9789811527777"}],"license":[{"start":{"date-parts":[[2019,12,23]],"date-time":"2019-12-23T00:00:00Z","timestamp":1577059200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-2777-7_19","type":"book-chapter","created":{"date-parts":[[2020,1,24]],"date-time":"2020-01-24T12:02:45Z","timestamp":1579867365000},"page":"226-239","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["KCRS: A Blockchain-Based Key Compromise Resilient Signature System"],"prefix":"10.1007","author":[{"given":"Lei","family":"Xu","sequence":"first","affiliation":[]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Zhimin","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Xinxin","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Kimberly","family":"Doan","sequence":"additional","affiliation":[]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,23]]},"reference":[{"key":"19_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1007\/3-540-44448-3_10","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2000","author":"M Abdalla","year":"2000","unstructured":"Abdalla, M., Reyzin, L.: A new forward-secure digital signature scheme. In: Okamoto, T. (ed.) ASIACRYPT 2000. LNCS, vol. 1976, pp. 116\u2013129. Springer, Heidelberg (2000). https:\/\/doi.org\/10.1007\/3-540-44448-3_10"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Al-Bassam, M.: Scpki: a smart contract-based PKI and identity system. In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts, pp. 35\u201340. ACM (2017)","DOI":"10.1145\/3055518.3055530"},{"key":"19_CR3","doi-asserted-by":"crossref","unstructured":"Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, p. 30. ACM (2018)","DOI":"10.1145\/3190508.3190538"},{"key":"19_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/3-540-48405-1_28","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201999","author":"M Bellare","year":"1999","unstructured":"Bellare, M., Miner, S.K.: A forward-secure digital signature scheme. In: Wiener, M. (ed.) CRYPTO 1999. LNCS, vol. 1666, pp. 431\u2013448. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48405-1_28"},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Blake-Wilson, S., Bolyard, N., Gupta, V., Hawk, C., M\u00f6ller, B.: Elliptic curve cryptography (ecc) cipher suites for transport layer security (tls). Technical report (2006)","DOI":"10.17487\/rfc4492"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Christopher, K., Rosenblum, M.: Understanding data lifetime via whole system simulation. In: Proceedings of Usenix Security Symposium 2004 (2004)","DOI":"10.1145\/1133572.1133599"},{"key":"19_CR7","unstructured":"Chow, J., Pfaff, B., Garfinkel, T., Rosenblum, M.: Shredding your garbage: reducing data lifetime. In: Proceedings 14th USENIX Security Symposium, August 2005"},{"issue":"1","key":"19_CR8","doi-asserted-by":"publisher","first-page":"167","DOI":"10.1137\/S0097539702403773","volume":"33","author":"R Cramer","year":"2003","unstructured":"Cramer, R., Shoup, V.: Design and analysis of practical public-key encryption schemes secure against adaptive chosen ciphertext attack. SIAM J. Comput. 33(1), 167\u2013226 (2003)","journal-title":"SIAM J. Comput."},{"issue":"6","key":"19_CR9","doi-asserted-by":"publisher","first-page":"838","DOI":"10.1109\/TDSC.2012.71","volume":"9","author":"W Dai","year":"2012","unstructured":"Dai, W., Parker, T.P., Jin, H., Xu, S.: Enhancing data trustworthiness via assured digital signing. IEEE Trans. Dependable Secure Comput. 9(6), 838\u2013851 (2012)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"19_CR10","doi-asserted-by":"crossref","unstructured":"Ding, X., Tsudik, G., Xu, S.: Leak-free group signatures with immediate revocation. In: 24th International Conference on Distributed Computing Systems (ICDCS 2004), pp. 608\u2013615. IEEE Computer Society (2004)","DOI":"10.1109\/ICDCS.2004.1281628"},{"issue":"4","key":"19_CR11","doi-asserted-by":"publisher","first-page":"489","DOI":"10.3233\/JCS-2009-0342","volume":"17","author":"X Ding","year":"2009","unstructured":"Ding, X., Tsudik, G., Xu, S.: Leak-free mediated group signatures. J. Comput. Secur. 17(4), 489\u2013514 (2009)","journal-title":"J. Comput. Secur."},{"key":"19_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/3-540-46035-7_5","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2002","author":"Y Dodis","year":"2002","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Key-insulated public key cryptosystems. In: Knudsen, L.R. (ed.) EUROCRYPT 2002. LNCS, vol. 2332, pp. 65\u201382. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46035-7_5"},{"key":"19_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/3-540-36288-6_10","volume-title":"Public Key Cryptography \u2014 PKC 2003","author":"Y Dodis","year":"2003","unstructured":"Dodis, Y., Katz, J., Xu, S., Yung, M.: Strong key-insulated signature schemes. In: Desmedt, Y.G. (ed.) PKC 2003. LNCS, vol. 2567, pp. 130\u2013144. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-36288-6_10"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Dodis, Y., Luo, W., Xu, S., Yung, M.: Key-insulated symmetric key cryptography and mitigating attacks against cryptographic cloud software. In: Proceedings ASIACCS 2012, pp. 57\u201358 (2012)","DOI":"10.1145\/2414456.2414489"},{"issue":"2","key":"19_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1137\/0217017","volume":"17","author":"S Goldwasser","year":"1988","unstructured":"Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281\u2013308 (1988)","journal-title":"SIAM J. Comput."},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Guan, L., Lin, J., Luo, B., Jing, J., Wang, J.: Protecting private keys against memory disclosure attacks using hardware transactional memory. In: Proceedings of the 2015 IEEE Symposium on Security and Privacy, SP 2015, pp. 3\u201319 (2015)","DOI":"10.1109\/SP.2015.8"},{"key":"19_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"437","DOI":"10.1007\/3-540-38424-3_32","volume-title":"Advances in Cryptology-CRYPT0\u2019 90","author":"S Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to time-stamp a digital document. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 437\u2013455. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-38424-3_32"},{"key":"19_CR18","doi-asserted-by":"crossref","unstructured":"Harrison, K., Xu, S.: Protecting cryptographic keys from memory disclosure attacks. In: The 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2007, 25\u201328 June 2007, Edinburgh, UK, Proceedings, pp. 137\u2013143 (2007)","DOI":"10.1109\/DSN.2007.77"},{"key":"19_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/3-540-45708-9_32","volume-title":"Advances in Cryptology \u2014 CRYPTO 2002","author":"G Itkis","year":"2002","unstructured":"Itkis, G., Reyzin, L.: SiBIR: signer-base intrusion-resilient signatures. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol. 2442, pp. 499\u2013514. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45708-9_32"},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Krawczyk, H.: Simple forward-secure signatures from any signature scheme. In: ACM Conference on Computer and Communications Security, pp. 108\u2013115 (2000)","DOI":"10.1145\/352600.352617"},{"key":"19_CR21","unstructured":"Kreps, J., Narkhede, N., Rao, J., et al.: Kafka: a distributed messaging system for log processing. In: Proceedings of the NetDB, pp. 1\u20137 (2011)"},{"key":"19_CR22","doi-asserted-by":"crossref","unstructured":"Laurie, B., Langley, A., Kasper, E.: Certificate transparency. Technical report (2013)","DOI":"10.17487\/rfc6962"},{"key":"19_CR23","unstructured":"Locke, G., Gallagher, P.: Fips pub 186\u20133: digital signature standard (dss). Federal Information Processing Standards Publication 3, 186\u20133 (2009)"},{"key":"19_CR24","unstructured":"Loscocco, P., Smalley, S., Muckelbauer, P., Taylor, R., Turner, S., Farrell, J.: The inevitability of failure: the flawed assumption of security in modern computing environments. In: Proceedings 21st National Information Systems Security Conference (NISSC 1998) (1998)"},{"issue":"2","key":"19_CR25","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/MIC.2018.022021659","volume":"22","author":"H Orman","year":"2018","unstructured":"Orman, H.: Blockchain: the emperors new PKI? IEEE Internet Comput. 22(2), 23\u201328 (2018)","journal-title":"IEEE Internet Comput."},{"key":"19_CR26","doi-asserted-by":"crossref","unstructured":"Parker, T.P., Xu, S.: A method for safekeeping cryptographic keys from memory disclosure attacks. In: First International Conference on Trusted Systems (INTRUST 2009), pp. 39\u201359 (2009)","DOI":"10.1007\/978-3-642-14597-1_3"},{"key":"19_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1007\/3-540-48390-X_9","volume-title":"Financial Cryptography","author":"A Shamir","year":"1999","unstructured":"Shamir, A., van Someren, N.: Playing \u2018Hide and Seek\u2019 with stored keys. In: Franklin, M. (ed.) FC 1999. LNCS, vol. 1648, pp. 118\u2013124. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48390-X_9"},{"key":"19_CR28","doi-asserted-by":"crossref","unstructured":"Xu, S., Li, X., Parker, T.P.: Exploiting social networks for threshold signing: attack-resilience vs. availability. In: Proceedings of ASIACCS 2008, pp. 325\u2013336 (2008)","DOI":"10.1145\/1368310.1368358"},{"issue":"1","key":"19_CR29","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TIFS.2010.2093521","volume":"6","author":"S Xu","year":"2011","unstructured":"Xu, S., Li, X., Parker, T.P., Wang, X.: Exploiting trust-based social networks for distributed protection of sensitive data. IEEE Trans. Inf. Forensics Secur. 6(1), 39\u201352 (2011)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"19_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1007\/978-3-540-73538-0_12","volume-title":"Data and Applications Security XXI","author":"S Xu","year":"2007","unstructured":"Xu, S., Sandhu, R.: A scalable and secure cryptographic service. In: Barker, S., Ahn, G.-J. (eds.) DBSec 2007. LNCS, vol. 4602, pp. 144\u2013160. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73538-0_12"},{"key":"19_CR31","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-642-03549-4_12","volume-title":"Financial Cryptography and Data Security","author":"S Xu","year":"2009","unstructured":"Xu, S., Yung, M.: Expecting the unexpected: towards robust credential infrastructure. In: Dingledine, R., Golle, P. (eds.) FC 2009. LNCS, vol. 5628, pp. 201\u2013221. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-03549-4_12"}],"container-title":["Communications in Computer and Information Science","Blockchain and Trustworthy Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-2777-7_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,8,27]],"date-time":"2021-08-27T22:05:02Z","timestamp":1630101902000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-2777-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,23]]},"ISBN":["9789811527760","9789811527777"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-2777-7_19","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019,12,23]]},"assertion":[{"value":"23 December 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"BlockSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Blockchain and Trustworthy Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Guangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7 December 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 December 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"blocksys2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/blocksys.info\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}