{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T12:11:08Z","timestamp":1742991068106,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789811952081"},{"type":"electronic","value":"9789811952098"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-981-19-5209-8_7","type":"book-chapter","created":{"date-parts":[[2022,8,9]],"date-time":"2022-08-09T23:03:17Z","timestamp":1660086197000},"page":"92-104","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["KPH: A Novel Blockchain Privacy Preserving Scheme Based on Paillier and FO Commitment"],"prefix":"10.1007","author":[{"given":"Yang","family":"Li","sequence":"first","affiliation":[]},{"given":"Mengmeng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Xiuli","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,10]]},"reference":[{"key":"7_CR1","first-page":"19","volume":"01","author":"L Naiquan","year":"2022","unstructured":"Naiquan, L.: Overview of privacy data security based on blockchain. Netw. Secur. Technol. Appl. 01, 19\u201321 (2022)","journal-title":"Netw. Secur. Technol. Appl."},{"key":"7_CR2","unstructured":"Zongyu, L., Xiaolin, G., Yingjie, G., Xuesong, L., Xuejun, Z.: Homomorphic encryption technology and its application in cloud computing privacy protection. J. Softw. 29(07), 1830\u20131851 (2018)"},{"key":"7_CR3","unstructured":"Maxwell, G.: CoinJoin: bitcoin privacy for the real world. Post on Bitcoin Forum (2013)"},{"key":"7_CR4","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.M.: A method for Obtaining Digital Signatures and Public Key Cryptosystems, pp. 217\u2013239. Routledge (2019)"},{"key":"7_CR5","unstructured":"Todd, P.: Stealth addresses.\u00a0Post on Bitcoin development mailing list (2014). https:\/\/www.mail-archive.com\/bitcoindevelopment@lists.sourceforge.net\/msg03613.html"},{"issue":"1","key":"7_CR6","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186\u2013208 (1989)","journal-title":"SIAM J. Comput."},{"key":"7_CR7","unstructured":"Sasson, E.B., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474. IEEE (2014)"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Koundinya, A.K., Gautham, S.K.: Two-layer encryption based on paillier and elgamal cryptosystem for privacy violation.\u00a0Int. J. Wirel. Microw. Technol. (IJWMT), 11(3), 9\u201315 (2021)","DOI":"10.5815\/ijwmt.2021.03.02"},{"key":"7_CR9","doi-asserted-by":"publisher","first-page":"18807","DOI":"10.1007\/s11042-022-12684-8","volume":"81","author":"CS Tsai","year":"2022","unstructured":"Tsai, C.S., Zhang, Y.S., Weng, C.Y.: Separable reversible data hiding in encrypted images based on Paillier cryptosystem. Multimed Tools Appl. 81, 18807\u201318827 (2022)","journal-title":"Multimed Tools Appl."},{"key":"7_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2020.104869","volume":"148","author":"W Fang","year":"2021","unstructured":"Fang, W., Zamani, M., Chen, Z.: Secure and privacy preserving consensus for second-order systems based on paillier encryption. Syst. Control Lett. 148, 104869 (2021)","journal-title":"Syst. Control Lett."},{"key":"7_CR11","doi-asserted-by":"crossref","unstructured":"Ma, J., Naas, S., Sigg, S., Lyu, X.: Privacy\u2010preserving federated learning based on multi\u2010key homomorphic encryption.\u00a0Int. J. Intell. Syst. (2022)","DOI":"10.1002\/int.22818"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Bernal Bernabe, J., Canovas, J.L., Hernandez-Ramos, J.L., Torres Moreno, R. Skarmeta, A.: Privacy-preserving solutions for blockchain review and challenges.\u00a0IEEE Access\u00a07, 164908\u2013164940 (2019)","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"7_CR13","first-page":"166","volume":"11","author":"S Zhu","year":"2021","unstructured":"Zhu, S., Wang, H.: Smart grid data aggregation and incentive scheme based on Paillier algorithm. Comput. Eng. 11, 166\u2013174 (2021)","journal-title":"Comput. Eng."},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Ghadamyari, M., Samet, S.: Privacy-preserving statistical analysis of health data using paillier homomorphic encryption and permissioned blockchain. In:\u00a02019 IEEE International Conference on Big Data (Big Data), pp. 5474\u20135479. IEEE (2019)","DOI":"10.1109\/BigData47090.2019.9006231"},{"key":"7_CR15","unstructured":"Jianzhen, L.: Applied research on privacy protection of blockchain transactions based on paillier homomorphic encryption, Master\u2019s thesis, Southeast University. (2019)"},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Yan, X., Wu, Q., Sun, Y.: A homomorphic encryption and privacy protection method based on blockchain and edge computing.\u00a0Wirel. Commun. Mob. Comput.\u00a0(2020)","DOI":"10.1155\/2020\/8832341"},{"key":"7_CR17","first-page":"172","volume":"01","author":"Y Diao","year":"2022","unstructured":"Diao, Y., Ye, A., Zhang, J., Deng, H., Zhang, Q., Cheng, B.: A dual privacy protection method based on group signature and homomorphic encryption for alliance blockchain. J. Comput. Res. Dev. 01, 172\u2013181 (2022)","journal-title":"J. Comput. Res. Dev."},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Yao, L., Shuai, X.: Accelerate the paillier cryptosystem in CryptDB by Chinese remainder theorem. In:\u00a02018 20th International Conference on Advanced Communication Technology (ICACT), pp. 74\u201377. IEEE (2018)","DOI":"10.23919\/ICACT.2018.8323649"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Paillier, P.: Public-key cryptosystems based on composite degree residuosity classes. In: Stern, J. (ed.) EUROCRYPT 1999. LNCS, vol. 1592, pp. 223\u2013238. Springer, Heidelberg (1999). https:\/\/doi.org\/10.1007\/3-540-48910-X_16","DOI":"10.1007\/3-540-48910-X_16"},{"key":"7_CR20","unstructured":"The wikipedia website. https:\/\/en.wikipedia.org\/wiki\/Chineseremaindertheorem"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Ogunseyi, T.B., Bo, T.: Fast decryption algorithm for paillier homomorphic cryptosystem. In: 2020 IEEE International Conference on Power, Intelligent Computing and Systems (ICPICS), pp. 803\u2013806. IEEE (2020)","DOI":"10.1109\/ICPICS50287.2020.9202325"},{"key":"7_CR22","first-page":"1071","volume":"07","author":"Q Wu","year":"2004","unstructured":"Wu, Q., Zhang, J., Wang, Y.: Simple proof that a commitment value is in a specific interval. Electron. J. 07, 1071\u20131073 (2004)","journal-title":"Electron. J."},{"issue":"3","key":"7_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3316481","volume":"52","author":"R Zhang","year":"2019","unstructured":"Zhang, R., Xue, R., Liu, L.: Security and privacy on blockchain. ACM Comput. Surv. (CSUR) 52(3), 1\u201334 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-19-5209-8_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T17:15:05Z","timestamp":1710350105000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-19-5209-8_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9789811952081","9789811952098"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-19-5209-8_7","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"10 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chengdu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 August 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"261","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"65","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"5","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}