{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T01:00:10Z","timestamp":1760576410203,"version":"build-2065373602"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819531813","type":"print"},{"value":"9789819531820","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T00:00:00Z","timestamp":1760486400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-3182-0_7","type":"book-chapter","created":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:16:49Z","timestamp":1760555809000},"page":"105-122","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Hash Time-Locked Contract Scheme Based on\u00a0Enclave-Based Agent and\u00a0Stealth Addresses"],"prefix":"10.1007","author":[{"given":"Shengyi","family":"Lin","sequence":"first","affiliation":[]},{"given":"Longshen","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guoyu","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,15]]},"reference":[{"key":"7_CR1","doi-asserted-by":"publisher","first-page":"24","DOI":"10.3389\/fbloc.2019.00024","volume":"2","author":"T Hardjono","year":"2019","unstructured":"Hardjono, T., Smith, N.: Decentralized trusted computing base for blockchain infrastructure security. Front. Blockchain 2, 24 (2019)","journal-title":"Front. Blockchain"},{"key":"7_CR2","doi-asserted-by":"publisher","first-page":"100107","DOI":"10.1016\/j.iot.2019.100107","volume":"8","author":"BK Mohanta","year":"2019","unstructured":"Mohanta, B.K., Jena, D., Panda, S.S., et al.: Blockchain technology: a survey on applications and security privacy challenges. Internet Things 8, 100107 (2019)","journal-title":"Internet Things"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Joshi, A. P., Han, M., Wang, Y.: A survey on security and privacy issues of blockchain technology. Math. Found. Comput. 1(2) (2018)","DOI":"10.3934\/mfc.2018007"},{"key":"7_CR4","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Joedan, G., et al.: A fistful of bitcoins: characterizing payments among men with no names. In: Proceedings of the 2013 Conference on Internet Measurement Conference, pp. 127\u2013140. ACM (2013)","DOI":"10.1145\/2504730.2504747"},{"key":"7_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-642-39884-1_2","volume-title":"Financial Cryptography and Data Security","author":"D Ron","year":"2013","unstructured":"Ron, D., Shamir, A.: Quantitative analysis of the full bitcoin transaction graph. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 6\u201324. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-39884-1_2"},{"key":"7_CR6","doi-asserted-by":"publisher","unstructured":"Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. IEEE (2012). https:\/\/doi.org\/10.1109\/PASSAT\/SocialCom.2011.79","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., Bouabdallah, A.: Trusted execution environment: what it is, and what it is not. In: 2015 IEEE Trustcom BigDataSE Ispa, vol. 1, pp. 57\u201364. IEEE (2015)","DOI":"10.1109\/Trustcom.2015.357"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Courtois, N.T., Mercer, R.: Stealth address and key management techniques in blockchain systems. In: ICISSP 2017-Proceedings of the 3rd International Conference on Information Systems Security and Privacy, pp. 559\u2013566 (2017)","DOI":"10.5220\/0006270005590566"},{"issue":"10","key":"7_CR9","first-page":"2099","volume":"55","author":"C Pan","year":"2018","unstructured":"Pan, C., Liu, Z.Q., Liu, Z., et al.: Research on scalability of blockchain technology: problems and methods. J. Comput. Res. Dev. 55(10), 2099\u20132110 (2018)","journal-title":"J. Comput. Res. Dev."},{"key":"7_CR10","doi-asserted-by":"crossref","unstructured":"Jin, H., Dai, X., Xiao, J.: Towards a novel architecture for enabling interoperability amongst multiple blockchains. In: 2018 IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp. 1203\u20131211. IEEE (2018)","DOI":"10.1109\/ICDCS.2018.00120"},{"key":"7_CR11","unstructured":"Buchman, E.,Kwon, J.: Cosmos: a network of distributed ledgers (2022). https:\/\/www.studocu.com\/in\/u\/43772779?sid=01750229714. Accessed 17 June 2023"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Siris, V., Dimopoulos, D., et al.: IoT resource access utilizing blockchains and trusted execution environments. In: Proceedings of the Global IoT Summit (GIoTS), pp. 1\u20136 (2019)","DOI":"10.1109\/GIOTS.2019.8766403"},{"key":"7_CR13","unstructured":"Fusion, F.: An Inclusive Cryptofinance Platform Based on Blockchain. Fusion Foundation Ltd., Singapore (2017)"},{"key":"7_CR14","doi-asserted-by":"crossref","unstructured":"Hope-Bailie, A., Thomas, S.: Interledger: creating a standard for payments. In: Proceedings of the 25th International Conference Companion on World Wide Web, pp. 281\u2013282 (2016)","DOI":"10.1145\/2872518.2889307"},{"key":"7_CR15","doi-asserted-by":"crossref","unstructured":"Yu, G., Wu, B., Niu, X.: Improved blockchain consensus mechanism based on PBFT algorithm. In: Proceedings of the 2nd International Conference on Advanced Computing, Technology, Information, Science, and Communication (CTISC), pp. 14\u201321 (2020)","DOI":"10.1109\/CTISC49998.2020.00009"},{"key":"7_CR16","unstructured":"Kwon, J., Buchman, E.: Cosmos whitepaper. Cosmos Foundation, Technical report (2021) https:\/\/v1.cosmos.network\/intro#what-is-tendermint-core-and-the-abci"},{"key":"7_CR17","unstructured":"Poon, J., Dryja, T.: The bitcoin lightning network: scalable off-chain instant payments. arXiv preprint arXiv:1601.06163, pp. 30\u201341 (2016)"},{"key":"7_CR18","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Malavolta, G., Moreno-Sanchez, P., Kate, A., et al.: Concurrency and privacy with payment-channel networks. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, pp. 455-471 (2017)","DOI":"10.1145\/3133956.3134096"},{"key":"7_CR19","doi-asserted-by":"crossref","unstructured":"Malavolta, G., Moreno-Sanchez, P., Schneidewind, C., et al.: Anonymous multi-hop locks for blockchain scalability and interoperability. Cryptology ePrint Archive, pp. 5\u201311 (2018)","DOI":"10.14722\/ndss.2019.23330"},{"key":"7_CR20","doi-asserted-by":"publisher","first-page":"102291","DOI":"10.1016\/j.cose.2021.102291","volume":"106","author":"SK Mohanty","year":"2021","unstructured":"Mohanty, S.K., Tripathy, S.: n-HTLC: neo hashed time-Lock commitment to defend against wormhole attack in payment channel networks. Comput. Secur. 106, 102291 (2021)","journal-title":"Comput. Secur."},{"key":"7_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1007\/978-3-030-31919-9_18","volume-title":"Provable Security","author":"B Yu","year":"2019","unstructured":"Yu, B., Kermanshahi, S.K., Sakzad, A., Nepal, S.: Chameleon hash time-lock contract for privacy preserving payment channel networks. In: Steinfeld, R., Yuen, T.H. (eds.) ProvSec 2019. LNCS, vol. 11821, pp. 303\u2013318. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-31919-9_18"},{"key":"7_CR22","unstructured":"Maxwell, G.: CoinJoin: bitcoin privacy for the real world (2020). https:\/\/c0mm4nd.com\/coinjoin\/. Accessed 11 Oct 2021"},{"key":"7_CR23","doi-asserted-by":"crossref","unstructured":"Bissias, G., Ozisik, A.P., Levine, B.N., et al.: Sybil-resistant mixing for bitcoin. In: Proceedings of the 13th Workshop on Privacy in the Electronic Society. Scottsdale, pp. 149\u2013158 (2014)","DOI":"10.1145\/2665943.2665955"},{"key":"7_CR24","unstructured":"Noether, S., Noether, S.: Monero is not that mysterious. Technical report (2014)"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1007\/978-3-319-11212-1_20","volume-title":"Computer Security - ESORICS 2014","author":"T Ruffing","year":"2014","unstructured":"Ruffing, T., Moreno-Sanchez, P., Kate, A.: CoinShuffle: practical decentralized coin mixing for bitcoin. In: Kuty\u0142owski, M., Vaidya, J. (eds.) ESORICS 2014. LNCS, vol. 8713, pp. 345\u2013364. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11212-1_20"},{"key":"7_CR26","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Moreno, S.P., Kate, A.: P2P mixing and unlinkable bitcoin transactions. In: Proceedings of NDSS, San Diego 2017, pp. 1\u201315 (2017)","DOI":"10.14722\/ndss.2017.23415"},{"key":"7_CR27","doi-asserted-by":"crossref","unstructured":"Ziegeldorf, J.H., Grossmann, F., Henze, M., et al.: Coinparty: secure multi-party mixing of bitcoins. In: Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp. 75\u201386. ACM, New York (2015)","DOI":"10.1145\/2699026.2699100"},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Xu, M., et al.: CoinMingle: a decentralized coin mixing scheme with a mutual recognition delegation strategy. In: 2018 1st IEEE International Conference on Hot Information-Centric Networking (HotICN), pp. 160\u2013166 (2018)","DOI":"10.1109\/HOTICN.2018.8605975"},{"key":"7_CR29","doi-asserted-by":"crossref","unstructured":"Ben-Sasson, E., et al.: Zerocash: decentralized anonymous payments from bitcoin. In: 2014 IEEE Symposium on Security and Privacy, pp. 459\u2013474 (2014)","DOI":"10.1109\/SP.2014.36"},{"key":"7_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1007\/978-3-642-40084-1_6","volume-title":"Advances in Cryptology \u2013 CRYPTO 2013","author":"E Ben-Sasson","year":"2013","unstructured":"Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., Virza, M.: SNARKs for C: verifying program executions succinctly and in zero knowledge. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013. LNCS, vol. 8043, pp. 90\u2013108. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-40084-1_6"},{"key":"7_CR31","unstructured":"Saberhagen, N.V.: CryptoNote v 2.0. Technical report (2013)"},{"key":"7_CR32","doi-asserted-by":"publisher","first-page":"3539","DOI":"10.1109\/TIFS.2024.3364081","volume":"19","author":"A Wahrst\u00e4tter","year":"2024","unstructured":"Wahrst\u00e4tter, A., Solomon, M., DiFrancesco, B., et al.: BaseSAP: modular stealth address protocol for programmable blockchains. IEEE Trans. Inf. Forensics Secur. 19, 3539\u20133553 (2024). https:\/\/doi.org\/10.1109\/TIFS.2024.3364081","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"7_CR33","doi-asserted-by":"crossref","unstructured":"Takahashi, A. , Tibouchi, M.: Degenerate fault attacks on elliptic curve parameters in openSSL. In: 2019 IEEE European Symposium on Security and Privacy (EuroS &P), pp. 371\u2013386 (2019)","DOI":"10.1109\/EuroSP.2019.00035"},{"key":"7_CR34","doi-asserted-by":"crossref","unstructured":"Zhai, S., Yang, Y., et al.: Research on the application of cryptography on the blockchain. In: Journal of Physics: Conference Series, vol. 1168, no. 3, p. 032077. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1168\/3\/032077"},{"issue":"11","key":"7_CR35","doi-asserted-by":"publisher","first-page":"1707","DOI":"10.1109\/TC.2020.3013266","volume":"69","author":"MA Mehrabi","year":"2020","unstructured":"Mehrabi, M.A., Doche, C., Jolfaei, A.: Elliptic curve cryptography point multiplication core for hardware security module. IEEE Trans. Comput. 69(11), 1707\u20131718 (2020)","journal-title":"IEEE Trans. Comput."}],"container-title":["Lecture Notes in Computer Science","Data Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-3182-0_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,15]],"date-time":"2025-10-15T19:16:56Z","timestamp":1760555816000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-3182-0_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,15]]},"ISBN":["9789819531813","9789819531820"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-3182-0_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,15]]},"assertion":[{"value":"15 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"DSPP","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Data Security and Privacy Protection","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Xi'an","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 October 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"dspp2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/dspp2025.xidian.edu.cn\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}