{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T18:52:46Z","timestamp":1762714366932,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":25,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819525652","type":"print"},{"value":"9789819525669","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T00:00:00Z","timestamp":1762732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-2566-9_31","type":"book-chapter","created":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T18:47:56Z","timestamp":1762714076000},"page":"459-485","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Analysis and\u00a0Design of\u00a0an\u00a0ROS Attack-Resistant Adaptor Signature Scheme for\u00a0Multiparty Cyclic Cross-Chain"],"prefix":"10.1007","author":[{"given":"Mengyan","family":"Li","sequence":"first","affiliation":[]},{"given":"Maoning","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Meijiao","family":"Duan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,10]]},"reference":[{"key":"31_CR1","doi-asserted-by":"crossref","unstructured":"Atzei, N., Bartoletti, M., Cimoli, T.: A survey of attacks on ethereum smart contracts (sok). In: Principles of Security and Trust: 6th International Conference, POST 2017, Held as Part of the European Joint Conferences on Theory and Practice of Software, ETAPS 2017, Uppsala, Sweden, April 22-29, 2017, Proceedings 6, pp. 164\u2013186. Springer (2017)","DOI":"10.1007\/978-3-662-54455-6_8"},{"issue":"4","key":"31_CR2","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1007\/s00145-022-09436-0","volume":"35","author":"F Benhamouda","year":"2022","unstructured":"Benhamouda, F., Lepoint, T., Loss, J., Orr\u00f9, M., Raykova, M.: On the (in) security of ros. J. Cryptol. 35(4), 25 (2022)","journal-title":"J. Cryptol."},{"key":"31_CR3","doi-asserted-by":"crossref","unstructured":"Bhargavan, K., et\u00a0al.: Formal verification of smart contracts: short paper. In: Proceedings of the 2016 ACM Workshop on Programming Languages and Analysis for Security, pp. 91\u201396 (2016)","DOI":"10.1145\/2993600.2993611"},{"key":"31_CR4","doi-asserted-by":"publisher","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416\u2013432. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/3-540-39200-9_26","DOI":"10.1007\/3-540-39200-9_26"},{"key":"31_CR5","unstructured":"Buterin, V., et\u00a0al.: A next-generation smart contract and decentralized application platform. white paper 3(37), 2\u20131 (2014)"},{"issue":"1","key":"31_CR6","first-page":"6","volume":"8","author":"C Chen","year":"2024","unstructured":"Chen, C., Yang, G., Li, Z., Xiao, F., Chen, Q., Li, J.: Privacy-preserving multi-party cross-chain transaction protocols. Cryptography 8(1), 6 (2024)","journal-title":"Privacy-preserving multi-party cross-chain transaction protocols. Cryptography"},{"issue":"5","key":"31_CR7","first-page":"21","volume":"22","author":"J Feng","year":"2022","unstructured":"Feng, J., Zhang, Q., Huang, W., Han, G.: A cyber threat intelligence sharing scheme based on cross-chain interaction. Netinfo Security 22(5), 21\u201329 (2022)","journal-title":"Netinfo Security"},{"key":"31_CR8","unstructured":"Fournier, L.: One-time verifiably encrypted signatures aka adaptor signatures (2019)"},{"key":"31_CR9","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/s00145-006-0347-3","volume":"20","author":"R Gennaro","year":"2007","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems. J. Cryptol. 20, 51\u201383 (2007)","journal-title":"J. Cryptol."},{"key":"31_CR10","doi-asserted-by":"crossref","unstructured":"Gerhart, P., Schr\u00f6der, D., Soni, P., Thyagarajan, S.A.: Foundations of adaptor signatures. In: Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 161\u2013189. Springer (2024)","DOI":"10.1007\/978-3-031-58723-8_6"},{"key":"31_CR11","doi-asserted-by":"publisher","first-page":"116672","DOI":"10.1109\/ACCESS.2021.3106384","volume":"9","author":"S Khan","year":"2021","unstructured":"Khan, S., Amin, M.B., Azar, A.T., Aslam, S.: Towards interoperable blockchains: a survey on the role of smart contracts in blockchain interoperability. IEEE Access 9, 116672\u2013116691 (2021)","journal-title":"IEEE Access"},{"key":"31_CR12","unstructured":"Kiffer, L., et\u00a0al.: Logging in the void: privacy issues in cross-chain systems. In: Proceedings of the ACM Conference on Computer and Communications Security (CCS) (2022)"},{"key":"31_CR13","doi-asserted-by":"crossref","unstructured":"Komlo, C., Goldberg, I.: Frost: flexible round-optimized schnorr threshold signatures. In: Selected Areas in Cryptography: 27th International Conference, Halifax, NS, Canada (Virtual Event), pp. 34\u201365, October 21-23, 2020, Revised Selected Papers 27. Springer (2021)","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"31_CR14","unstructured":"Lee, C.: Litecoin: a peer-to-peer cryptocurrency (2011). https:\/\/www.litecoin.org\/"},{"issue":"6","key":"31_CR15","first-page":"968","volume":"24","author":"Z Ling","year":"2024","unstructured":"Ling, Z., Yang, M., Yu, J.: Research on power security trading platform based on ipfs and blockchain technology. Netinfo Security 24(6), 968\u2013976 (2024)","journal-title":"Netinfo Security"},{"issue":"8","key":"31_CR16","first-page":"83","volume":"19","author":"A Lu","year":"2019","unstructured":"Lu, A., Zhao, K., Yang, J., Wang, F.: Research on cross-chain technology of blockchain. Netinfo Security 19(8), 83\u201390 (2019)","journal-title":"Netinfo Security"},{"key":"31_CR17","unstructured":"Maxwell, G., Poelstra, A., Seurin, Y., Wuille, P.: Simple schnorr multi-signatures with applications to bitcoin (deprecated version). Tech. rep., Cryptology ePrint Archive, Report 2018\/068, version 1 (2018)"},{"key":"31_CR18","unstructured":"Maxwell, G.: A secure and scalable multi-signature scheme based on schnorr signatures. In: Proceedings of the 2017 International Conference on Cryptography and Network Security, pp. 123\u2013134. Springer (2017)"},{"key":"31_CR19","unstructured":"Maxwell, G.: Coinswap: Transaction graph disjoint trustless trading (2013). https:\/\/bitcointalk.org\/index.php"},{"key":"31_CR20","unstructured":"Maxwell, G.: Bitcoin\u2019s pay-to-script-hash (p2sh) (2014). bitcoin Improvement Proposal 16"},{"key":"31_CR21","unstructured":"Nolan, T.: Hashed timelock contracts for atomic swaps (2017)"},{"issue":"8","key":"31_CR22","first-page":"109","volume":"23","author":"Z Shao","year":"2023","unstructured":"Shao, Z., Jiang, J., Zhao, J., Zhang, Y.: An improved weighted byzantine fault tolerance algorithm for cross-chain system. Netinfo Security 23(8), 109\u2013120 (2023)","journal-title":"Netinfo Security"},{"issue":"6","key":"31_CR23","first-page":"61","volume":"22","author":"S Wang","year":"2022","unstructured":"Wang, S., Ma, Z., Liu, J., Luo, S.: Research and implementation of cross-chain security access and identity authentication scheme of blockchain. Netinfo Security 22(6), 61\u201372 (2022)","journal-title":"Netinfo Security"},{"issue":"1","key":"31_CR24","first-page":"98","volume":"25","author":"Z Xinyou","year":"2025","unstructured":"Xinyou, Z., Qingfu, L., Li, F., Huanlai, X.: Smart grid data security sharing model based on multi-authority attribute-based encryption. Netinfo Security 25(1), 98\u2013109 (2025)","journal-title":"Netinfo Security"},{"issue":"1","key":"31_CR25","first-page":"84","volume":"23","author":"F Yiting","year":"2023","unstructured":"Yiting, F., Zhaofeng, M., Danheng, X., Pengfei, D.: Evaluation method for cross-chain security strength access. Netinfo Security 23(1), 84\u201392 (2023)","journal-title":"Netinfo Security"}],"container-title":["Communications in Computer and Information Science","Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-2566-9_31","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T18:48:00Z","timestamp":1762714080000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-2566-9_31"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,10]]},"ISBN":["9789819525652","9789819525669"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-2566-9_31","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"value":"1865-0929","type":"print"},{"value":"1865-0937","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,11,10]]},"assertion":[{"value":"10 November 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICPCSEE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference of Pioneering Computer Scientists, Engineers and Educators","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hiroshima","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19 September 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 September 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icpcsee2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/2025.icpcsee.org","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}