{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T16:12:10Z","timestamp":1742919130296,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":29,"publisher":"Springer Nature Singapore","isbn-type":[{"type":"print","value":"9789819973552"},{"type":"electronic","value":"9789819973569"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-981-99-7356-9_36","type":"book-chapter","created":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T09:03:24Z","timestamp":1697706204000},"page":"608-626","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Blockchain Based Publicly Auditable Multi-party Computation with Cheater Detection"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0689-6544","authenticated-orcid":false,"given":"Shan","family":"Jin","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1419-6257","authenticated-orcid":false,"given":"Yong","family":"Li","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8553-827X","authenticated-orcid":false,"given":"Xi","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruxian","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,10,20]]},"reference":[{"key":"36_CR1","doi-asserted-by":"crossref","unstructured":"Yao, A.C.: Protocols for secure computations. In: 23rd Annual Symposium on Foundations of Computer Science (FOCS 1982), pp. 160\u2013164. IEEE (1982)","DOI":"10.1109\/SFCS.1982.38"},{"key":"36_CR2","doi-asserted-by":"crossref","unstructured":"Micali, S., Goldreich, O., Wigderson, A.: How to play any mental game. In: Proceedings of the Nineteenth ACM Symposium on the Theory of Computing, STOC, pp. 218\u2013229. ACM (1987)","DOI":"10.1145\/28395.28420"},{"issue":"11","key":"36_CR3","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir, A.: How to share a secret. Commun. ACM 22(11), 612\u2013613 (1979)","journal-title":"Commun. ACM"},{"key":"36_CR4","doi-asserted-by":"publisher","first-page":"20558","DOI":"10.1109\/ACCESS.2018.2821445","volume":"6","author":"S Boubiche","year":"2018","unstructured":"Boubiche, S., Boubiche, D.E., Bilami, A., et al.: Big data challenges and data aggregation strategies in wireless sensor networks. IEEE Access 6, 20558\u201320571 (2018)","journal-title":"IEEE Access"},{"issue":"2","key":"36_CR5","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1049\/iet-ifs.2015.0387","volume":"11","author":"X Zhao","year":"2017","unstructured":"Zhao, X., Zhu, J., Liang, X., et al.: Lightweight and integrity-protecting oriented data aggregation scheme for wireless sensor networks. IET Inf. Secur. 11(2), 82\u201388 (2017)","journal-title":"IET Inf. Secur."},{"key":"36_CR6","doi-asserted-by":"publisher","unstructured":"Damg\u00e5rd, I., Pastro, V., Smart, N., et al.: Multiparty computation from somewhat homomorphic encryption. In: Safavi-Naini, R., Canetti, R. (eds.) Advances in Cryptology \u2013 CRYPTO 2012. CRYPTO 2012. LNCS, vol. 7417, pp. 643\u2013662. Springer, Berlin, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-32009-5_38","DOI":"10.1007\/978-3-642-32009-5_38"},{"issue":"3","key":"36_CR7","doi-asserted-by":"publisher","first-page":"305","DOI":"10.14257\/ijca.2015.8.3.31","volume":"8","author":"T Ma","year":"2015","unstructured":"Ma, T., Liu, Y., Zhang, Z.: An energy-efficient reliable trust-based data aggregation protocol for wireless sensor networks. Int. J. Control Autom. 8(3), 305\u2013318 (2015)","journal-title":"Int. J. Control Autom."},{"key":"36_CR8","doi-asserted-by":"crossref","unstructured":"Akila, V., Sheela, T.: Preserving data and key privacy in data aggregation for wireless sensor networks. In: 2017 2nd International Conference on Computing and Communications Technologies (ICCCT), pp. 282\u2013287. IEEE (2017)","DOI":"10.1109\/ICCCT2.2017.7972286"},{"issue":"3","key":"36_CR9","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1016\/j.dcan.2016.07.001","volume":"2","author":"D Wu","year":"2016","unstructured":"Wu, D., Yang, B., Wang, R.: Scalable privacy-preserving big data aggregation mechanism. Digit. Commun. Netw. 2(3), 122\u2013129 (2016)","journal-title":"Digit. Commun. Netw."},{"key":"36_CR10","unstructured":"Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, p. 21260 (2008)"},{"key":"36_CR11","doi-asserted-by":"crossref","unstructured":"Suzuki, S., Murai, J.: Blockchain as an auditable communication channel. In: 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 516\u2013522. IEEE (2017)","DOI":"10.1109\/COMPSAC.2017.72"},{"key":"36_CR12","doi-asserted-by":"crossref","unstructured":"Shen, J., Chen, X., Wei, J., et al.: Blockchain-based accountable auditing with multi-ownership transfer. IEEE Trans. Cloud Comput. (01), 1\u201314 (2022)","DOI":"10.1109\/TCC.2022.3224440"},{"key":"36_CR13","doi-asserted-by":"crossref","unstructured":"Chen, J., Yao, S., Yuan, Q., et al.: Certchain: public and efficient certificate audit based on blockchain for TLS connections. In: IEEE INFOCOM 2018-IEEE Conference on Computer Communications, pp. 2060\u20132068. IEEE (2018)","DOI":"10.1109\/INFOCOM.2018.8486344"},{"issue":"6","key":"36_CR14","doi-asserted-by":"publisher","first-page":"3941","DOI":"10.1109\/TDSC.2021.3114160","volume":"19","author":"G Tian","year":"2021","unstructured":"Tian, G., Hu, Y., Wei, J., et al.: Blockchain-based secure deduplication and shared auditing in decentralized storage. IEEE Trans. Dependable Secure Comput. 19(6), 3941\u20133954 (2021)","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"36_CR15","doi-asserted-by":"crossref","unstructured":"Ahmad, A., Saad, M., Bassiouni, M., et al.: Towards blockchain-driven, secure and transparent audit logs. In: Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services, pp. 443\u2013448 (2018)","DOI":"10.1145\/3286978.3286985"},{"key":"36_CR16","doi-asserted-by":"publisher","unstructured":"Faust, S., Hazay, C., Kretzler, D., et al.: Financially backed covert security. In: Hanaoka, G., Shikata, J., Watanabe, Y. (eds.) Public-Key Cryptography \u2013 PKC 2022. PKC 2022. LNCS, vol. 13178, pp. 99\u2013129. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-030-97131-1_4","DOI":"10.1007\/978-3-030-97131-1_4"},{"key":"36_CR17","unstructured":"Buterin, V.: A next-generation smart contract and decentralized application platform. White Pap. 3(37), 2\u20131 (2014)"},{"issue":"12","key":"36_CR18","doi-asserted-by":"publisher","first-page":"9259","DOI":"10.1109\/TII.2022.3177630","volume":"18","author":"Y Yang","year":"2022","unstructured":"Yang, Y., Wu, J., Long, C., et al.: Blockchain-Enabled multi-party computation for privacy preserving and public audit in industrial IoT. IEEE Trans. Ind. Inf. 18(12), 9259\u20139267 (2022)","journal-title":"IEEE Trans. Ind. Inf."},{"key":"36_CR19","doi-asserted-by":"crossref","unstructured":"Rabin, T., Ben-Or, M.: Verifiable secret sharing and multiparty protocols with honest majority. In: Proceedings of the Twenty-First Annual ACM Symposium on Theory of Computing, pp. 73\u201385 (1989)","DOI":"10.1145\/73007.73014"},{"issue":"3","key":"36_CR20","doi-asserted-by":"publisher","first-page":"19","DOI":"10.3390\/cryptography5030019","volume":"5","author":"M Seo","year":"2021","unstructured":"Seo, M.: Fair and secure multi-party computation with cheater detection. Cryptography 5(3), 19 (2021)","journal-title":"Cryptography"},{"key":"36_CR21","doi-asserted-by":"crossref","unstructured":"Zhu, R., Ding, C., Huang, Y.: Efficient publicly verifiable 2PC over a blockchain with applications to financially-secure computations. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, pp. 633\u2013650 (2019)","DOI":"10.1145\/3319535.3363215"},{"issue":"4","key":"36_CR22","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/2896386","volume":"59","author":"M Andrychowicz","year":"2016","unstructured":"Andrychowicz, M., Dziembowski, S., Malinowski, D., et al.: Secure multiparty computations on bitcoin. Commun. ACM 59(4), 76\u201384 (2016)","journal-title":"Commun. ACM"},{"key":"36_CR23","doi-asserted-by":"crossref","unstructured":"Kumaresan, R., Bentov, I.: How to use bitcoin to incentivize correct computations. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, pp. 30\u201341 (2014)","DOI":"10.1145\/2660267.2660380"},{"key":"36_CR24","doi-asserted-by":"publisher","first-page":"110439","DOI":"10.1109\/ACCESS.2019.2934147","volume":"7","author":"H Gao","year":"2019","unstructured":"Gao, H., Ma, Z., Luo, S., et al.: BFR-MPC: a blockchain-based fair and robust multi-party computation scheme. IEEE Access 7, 110439\u2013110450 (2019)","journal-title":"IEEE Access"},{"key":"36_CR25","doi-asserted-by":"publisher","unstructured":"Cordi, C., Frank, M.P., Gabert, K., et al.: Auditable, available and resilient private computation on the blockchain via MPC. In: Dolev, S., Katz, J., Meisels, A. (eds.) Cyber Security, Cryptology, and Machine Learning. CSCML 2022. LNCS, vol. 13301, pp. 281\u2013299. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07689-3_22","DOI":"10.1007\/978-3-031-07689-3_22"},{"key":"36_CR26","doi-asserted-by":"publisher","unstructured":"Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum, J. (eds.) Advances in Cryptology \u2014 CRYPTO\u201991. CRYPTO 1991. LNCS, vol. 576, pp. 129\u2013140. Springer, Berlin, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-46766-1_9","DOI":"10.1007\/3-540-46766-1_9"},{"key":"36_CR27","unstructured":"Damg\u00e5rd, I., Ganesh, C., Khoshakhlagh, H., et al.: Balancing Privacy and Accountability in Blockchain Transactions, p. 1511. IACR Cryptol. ePrint Arch. (2020)"},{"key":"36_CR28","doi-asserted-by":"crossref","unstructured":"Keller, M., Orsini, E., Scholl, P.: MASCOT: faster malicious arithmetic secure computation with oblivious transfer. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 830\u2013842 (2016)","DOI":"10.1145\/2976749.2978357"},{"key":"36_CR29","doi-asserted-by":"publisher","unstructured":"Baum, C., Damg\u00e5rd, I., Orlandi, C.: Publicly auditable secure multi-party computation. In: Abdalla, M., De Prisco, R. (eds.) Security and Cryptography for Networks. SCN 2014. LNCS, vol. 8642, pp. 175\u2013196. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-10879-7_11","DOI":"10.1007\/978-3-319-10879-7_11"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-99-7356-9_36","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,19]],"date-time":"2023-10-19T09:11:11Z","timestamp":1697706671000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-99-7356-9_36"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9789819973552","9789819973569"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-981-99-7356-9_36","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 October 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICICS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Communications Security","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tianjin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 November 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 November 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icics2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/icics23.nankai.edu.cn\/index.php","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"181","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"21% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.33","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4.93","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}