{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T10:31:55Z","timestamp":1743071515981,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":27,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811591280"},{"type":"electronic","value":"9789811591297"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-981-15-9129-7_22","type":"book-chapter","created":{"date-parts":[[2020,10,21]],"date-time":"2020-10-21T23:07:29Z","timestamp":1603321649000},"page":"309-321","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Bitcoin-Based Anti-collusion Fair Payments for Outsourcing Computations in Cloud Computing"],"prefix":"10.1007","author":[{"given":"Duo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Xiaodong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Youliang","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,10,22]]},"reference":[{"key":"22_CR1","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1016\/j.ins.2018.06.018","volume":"462","author":"YH Zhang","year":"2018","unstructured":"Zhang, Y.H., Deng, R., Liu, X.M., Zhang, D.: Blockchain based efficient and robust fair payment for outsourcing services in cloud computing. Inf. Sci. 462, 262\u2013277 (2018)","journal-title":"Inf. Sci."},{"issue":"4","key":"22_CR2","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1145\/1721654.1721672","volume":"53","author":"M Armbrust","year":"2010","unstructured":"Armbrust, M., et al.: A view of cloud computing. Commun. ACM 53(4), 50\u201358 (2010)","journal-title":"Commun. ACM"},{"key":"22_CR3","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1016\/j.ins.2017.05.031","volume":"412","author":"Z Huang","year":"2017","unstructured":"Huang, Z., Liu, S., Mao, X., Chen, K., Li, J.: Insight of the protection for data security under selective opening attacks. Inf. Sci. 412, 223\u2013241 (2017)","journal-title":"Inf. Sci."},{"key":"22_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.cose.2017.08.007","volume":"72","author":"J Li","year":"2018","unstructured":"Li, J., Zhang, Y., Chen, X., Xiang, Y.: Secure attribute-based data sharing for resource-limited users in cloud computing. Comput. Secur. 72, 1\u201312 (2018)","journal-title":"Comput. Secur."},{"issue":"14","key":"22_CR5","doi-asserted-by":"publisher","first-page":"2397","DOI":"10.1002\/sec.1509","volume":"9","author":"Y Zhang","year":"2016","unstructured":"Zhang, Y., Li, J., Chen, X., Li, H.: Anonymous attribute-based proxy reencryption for access control in cloud computing. Secur. Commun. Netw. 9(14), 2397\u20132411 (2016)","journal-title":"Secur. Commun. Netw."},{"key":"22_CR6","doi-asserted-by":"publisher","unstructured":"Ateniese, G., et al.: Provable data possession at untrusted stores. In: Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS)2007, pp. 598\u2013609. ACM (2007). https:\/\/doi.org\/10.1007\/978-1-59593-703-2\/07\/0011","DOI":"10.1007\/978-1-59593-703-2\/07\/0011"},{"issue":"5","key":"22_CR7","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1109\/TDSC.2014.2366471","volume":"12","author":"X Chen","year":"2015","unstructured":"Chen, X., Li, J., Huang, X., Ma, J., Lou, W.: New publicly verifiable databases with efficient updates. IEEE Trans. Dependable Secure Comput. 12(5), 546\u2013556 (2015)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"22_CR8","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system (2008)"},{"key":"22_CR9","doi-asserted-by":"publisher","unstructured":"Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J. A., Felten, E.W.: SoK: research perspectives and challenges for bitcoin and cryptocurrencies. In: IEEE Symposium on Security and Privacy 2015, San Jose, USA, pp. 104\u2013121 (2015). https:\/\/doi.org\/10.1109\/SP.2015.14","DOI":"10.1109\/SP.2015.14"},{"key":"22_CR10","doi-asserted-by":"publisher","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, L.: Secure multiparty computations on bitcoin. In: IEEE Symposium on Security and Privacy(SP)2014, San Jose, USA, pp. 443\u2013458 (2014). https:\/\/doi.org\/10.1109\/SP.2014.35","DOI":"10.1109\/SP.2014.35"},{"key":"22_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1007\/978-3-662-44774-1_8","volume-title":"Financial Cryptography and Data Security","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., Mazurek, \u0141.: Fair two-party computations via bitcoin deposits. In: B\u00f6hme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 105\u2013121. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44774-1_8"},{"key":"22_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-3-662-44381-1_24","volume-title":"Advances in Cryptology \u2013 CRYPTO 2014","author":"I Bentov","year":"2014","unstructured":"Bentov, I., Kumaresan, R.: How to use bitcoin to design fair protocols. In: Garay, J.A., Gennaro, R. (eds.) CRYPTO 2014. LNCS, vol. 8617, pp. 421\u2013439. Springer, Heidelberg (2014). https:\/\/doi.org\/10.1007\/978-3-662-44381-1_24"},{"key":"22_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/3-540-46088-8_23","volume-title":"Financial Cryptography","author":"P Golle","year":"2002","unstructured":"Golle, P., Stubblebine, S.: Secure distributed computing in a commercial environment. In: Syverson, P. (ed.) FC 2001. LNCS, vol. 2339, pp. 289\u2013304. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-46088-8_23"},{"key":"22_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1007\/3-540-45353-9_31","volume-title":"Topics in Cryptology \u2014 CT-RSA 2001","author":"P Golle","year":"2001","unstructured":"Golle, P., Mironov, I.: Uncheatable distributed computations. In: Naccache, D. (ed.) CT-RSA 2001. LNCS, vol. 2020, pp. 425\u2013440. Springer, Heidelberg (2001). https:\/\/doi.org\/10.1007\/3-540-45353-9_31"},{"key":"22_CR15","doi-asserted-by":"publisher","unstructured":"Szajda, D., Lawson, B., Owen, J.: Hardening functions for large scale distributed computations. In: Symposium on Security and Privacy 2003, Berkeley, USA, pp. 216\u2013224 (2003). https:\/\/doi.org\/10.1109\/SECPRI.2003.1199338","DOI":"10.1109\/SECPRI.2003.1199338"},{"issue":"4","key":"22_CR16","doi-asserted-by":"publisher","first-page":"561","DOI":"10.1016\/S0167-739X(01)00077-2","volume":"18","author":"LFG Sarmenta","year":"2002","unstructured":"Sarmenta, L.F.G.: Sabotage-tolerance mechanisms for volunteer computing systems. Future Gener. Comput. Syst. 18(4), 561\u2013572 (2002)","journal-title":"Future Gener. Comput. Syst."},{"key":"22_CR17","doi-asserted-by":"publisher","unstructured":"Du, W., Jia, J., Mangal, M., Murugesan, M.: Uncheatable grid computing. In: Proceedings of the 24th International Conference on Distributed Computing, Systems, ICDCS 2004, pp. 4\u201311. IEEE Computer Society (2004). https:\/\/doi.org\/10.1109\/ICDCS.2004.1281562","DOI":"10.1109\/ICDCS.2004.1281562"},{"key":"22_CR18","unstructured":"Monrose, F., Wyckoff, P., Rubin, A. D.: Distributed execution with remote audit. In: Proceedings of the 1999 ISOC Network and Distributed System Security Symposium (NDSS) 1999, San Diego, pp. 103\u2013113 (1999)"},{"key":"22_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14623-7_25","volume-title":"Advances in Cryptology \u2013 CRYPTO 2010","author":"R Gennaro","year":"2010","unstructured":"Gennaro, R., Gentry, C., Parno, B.: Non-interactive verifiable computing: outsourcing computation to untrusted workers. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 465\u2013482. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-14623-7_25"},{"issue":"2","key":"22_CR20","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TPDS.2011.163","volume":"23","author":"B Carbunar","year":"2012","unstructured":"Carbunar, B., Tripunitara, M.V.: Payments for outsourced computations. IEEE Trans. Parallel Distrib. Syst. 23(2), 313\u2013320 (2012)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"6","key":"22_CR21","doi-asserted-by":"publisher","first-page":"1687","DOI":"10.1109\/TIFS.2012.2210880","volume":"7","author":"X Chen","year":"2012","unstructured":"Chen, X., Li, J., Susilo, W.: Efficient fair conditional payments for outsourcing computations. IEEE Trans. Inf. Forensics Secur. 7(6), 1687\u20131694 (2012)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"22_CR22","unstructured":"Dong, C., Wang, Y., Aldweesh, A., McCorry, P., Moorsel, A.: Betrayal, distrust, and rationality: Smart counter-collusion contracts for verifiable cloud computing. In: Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS) 2017, pp. 211\u2013227. ACM (2001). arXiv:1708.01171v4"},{"key":"22_CR23","doi-asserted-by":"publisher","first-page":"850","DOI":"10.1016\/j.future.2016.12.016","volume":"78","author":"H Huang","year":"2018","unstructured":"Huang, H., Chen, X., Wu, Q., Huang, X., Shen, J.: Bitcoin-based fair payments for outsourcing computations of fog devices. Future Gener. Comput. Syst. 78, 850\u2013858 (2018)","journal-title":"Future Gener. Comput. Syst."},{"key":"22_CR24","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.future.2013.07.015","volume":"37","author":"X Chen","year":"2014","unstructured":"Chen, X., Li, J., Ma, J., Lou, W., Wong, D.S.: New and efficient conditional e-payment systems with transferability. Future Gener. Comput. Syst. 37, 252\u2013258 (2014)","journal-title":"Future Gener. Comput. Syst."},{"issue":"7","key":"22_CR25","first-page":"1","volume":"8","author":"Y Zhang","year":"2018","unstructured":"Zhang, Y., Deng, R., Liu, X., Zheng, D.: Outsourcing service fair payment based on blockchain and its applications in cloud computing. IEEE Trans. Serv. Comput. 8(7), 1\u201314 (2018)","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"06","key":"22_CR26","first-page":"1","volume":"4","author":"J Ding","year":"2019","unstructured":"Ding, J., Yu, N., Lin, X., Zhang, W.: A private information retrieval and payment protocol based on bitcoin. Inf. Secur. 4(06), 1\u20139 (2019)","journal-title":"Inf. Secur."},{"issue":"6","key":"22_CR27","doi-asserted-by":"publisher","first-page":"1378","DOI":"10.1016\/j.future.2013.02.001","volume":"29","author":"D Quick","year":"2013","unstructured":"Quick, D., Choo, K.R.: Digital droplets: microsoft skydrive forensic data remnants. Future Gener. Comput. Syst. 29(6), 1378\u20131394 (2013)","journal-title":"Future Gener. Comput. Syst."}],"container-title":["Communications in Computer and Information Science","Security and Privacy in Digital Economy"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-15-9129-7_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,25]],"date-time":"2021-04-25T02:28:15Z","timestamp":1619317695000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-15-9129-7_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789811591280","9789811591297"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-981-15-9129-7_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"22 October 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPDE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Digital Economy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Quzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spde2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spde2020.csp.escience.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"132","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"36% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}