{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:10:03Z","timestamp":1748736603331,"version":"3.41.0"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T00:00:00Z","timestamp":1451347200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Key","award":["2012CB315905"],"award-info":[{"award-number":["2012CB315905"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61370190","61272501"],"award-info":[{"award-number":["61370190","61272501"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61173154","61402029"],"award-info":[{"award-number":["61173154","61402029"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61003214"],"award-info":[{"award-number":["61003214"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality (CN)","doi-asserted-by":"publisher","award":["4132056"],"award-info":[{"award-number":["4132056"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004826","name":"Natural Science Foundation of Beijing Municipality (CN)","doi-asserted-by":"publisher","award":["4122041"],"award-info":[{"award-number":["4122041"]}],"id":[{"id":"10.13039\/501100004826","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1007\/s00500-015-1997-6","type":"journal-article","created":{"date-parts":[[2015,12,29]],"date-time":"2015-12-29T15:13:54Z","timestamp":1451402034000},"page":"3123-3134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Secure joint Bitcoin trading with partially blind fuzzy signatures"],"prefix":"10.1007","volume":"21","author":[{"given":"Qianhong","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xiuwen","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Bo","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jiankun","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Jianwei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,12,29]]},"reference":[{"key":"1997_CR1","doi-asserted-by":"publisher","unstructured":"Abe M, Okamoto T (2000) Advances in cryptology CRYPTO 2000. In: Bellare M (ed) Lecture notes in computer science, vol 1880. Springer, Berlin. doi: 10.1007\/3-540-44598-6_17","DOI":"10.1007\/3-540-44598-6_17"},{"key":"1997_CR2","first-page":"443","volume":"11","author":"M Andrychowicz","year":"2014","unstructured":"Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) IEEE Secur Priv 11:443","journal-title":"IEEE Secur Priv"},{"key":"1997_CR3","doi-asserted-by":"publisher","unstructured":"Andrychowicz M, Dziembowski S, Malinowski D, Mazurek L (2014) In: Bohme R, Brenner M, Moore T, Smith M (eds) Financial cryptography and data security. Lecture notes in computer science, vol 8438. Springer, Berlin, pp 105\u2013121. doi: 10.1007\/978-3-662-44774-1_8","DOI":"10.1007\/978-3-662-44774-1_8"},{"key":"1997_CR4","doi-asserted-by":"publisher","unstructured":"Bentov I, Kumaresan R (2014) Advances in cryptology-CRYPTO. In: Lecture notes in computer science. In: Garay J, Gennaro R (eds) Lecture notes in computer science, vol 8617. Springer, Berlin, pp 421\u2013439. doi: 10.1007\/978-3-662-44381-1_24","DOI":"10.1007\/978-3-662-44381-1_24"},{"key":"1997_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1016\/S1361-3723(13)70101-5","volume":"11","author":"D Bradbury","year":"2013","unstructured":"Bradbury D (2013) Comput Fraud Secur 11:5","journal-title":"Comput Fraud Secur"},{"key":"1997_CR6","doi-asserted-by":"publisher","unstructured":"Chaum D (1983) Advances in cryptology. Chaum D, Rivest R, Sherman AT (eds). Springer, US, pp 199\u2013203. doi: 10.1007\/978-1-4757-0602-4_18","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"1997_CR7","doi-asserted-by":"publisher","unstructured":"Chow SS, Hui LC, Yiu S, Chow K (2005) Information security and privacy. In: Boyd C, Nieto JMG (eds) Lecture notes in computer science, vol 3574. Springer, Berlin, pp 316\u2013328. doi: 10.1007\/11506157_27","DOI":"10.1007\/11506157_27"},{"key":"1997_CR8","doi-asserted-by":"crossref","unstructured":"Cui W, Xin Y, Yang Y, Niu X (2007) 699\u2013702","DOI":"10.1109\/CISW.2007.4425591"},{"key":"1997_CR9","doi-asserted-by":"publisher","unstructured":"Ghodosi H, Pieprzyk J, Steinfeld R (2012) Designs. Codes Cryptogr 62(3):259. doi: 10.1007\/s10623-011-9515-z","DOI":"10.1007\/s10623-011-9515-z"},{"key":"1997_CR10","unstructured":"Goldfeder S, Bonneau J, Felten EW, Narayanan JAKA (2015) Securing bitcoin wallets via threshold signatures. http:\/\/www.cs.princeton.edu\/~stevenag\/bitcoin_threshold_signatures"},{"key":"1997_CR11","unstructured":"Hanatani Y, Komano Y, Ohta K, Kunihiro N (1006) Financial cryptography and data security, pp 236\u2013250"},{"key":"1997_CR12","unstructured":"Hartmut S (2005) Proceedings of the eighth IEEE international symposium on object-oriented real-time distributed computing, pp 201\u2013203"},{"key":"1997_CR13","unstructured":"Hongwen Lu ZZ (2014) Comput Appl 25"},{"key":"1997_CR14","doi-asserted-by":"publisher","unstructured":"Jinho K, Kwangjo K, Chulsoo L (2002) Information security and cryptology-ICISC. In: Kwangjo K (ed) Lecture notes in computer science, vol 2288. Springer, Berlin, pp 318\u2013327. doi: 10.1007\/3-540-45861-1_24","DOI":"10.1007\/3-540-45861-1_24"},{"key":"1997_CR15","doi-asserted-by":"crossref","unstructured":"Karl DM, Dwyert JO (2014) ISSC 2014\/CIICT, pp 280\u2013285","DOI":"10.1049\/cp.2014.0699"},{"key":"1997_CR16","doi-asserted-by":"crossref","unstructured":"Liaojun YW (2005) Pang Wuhan Univ J Nat Sci 10:191","DOI":"10.1007\/BF02828647"},{"key":"1997_CR17","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin"},{"key":"1997_CR18","doi-asserted-by":"crossref","unstructured":"Shamir A (1979) Commun ACM 22:612","DOI":"10.1145\/359168.359176"},{"key":"1997_CR19","unstructured":"Tang S (2007) J South China Univ Technol 168\u2013170"},{"key":"1997_CR20","unstructured":"Vo DL, Zhang F, Kim K (2003) 233\u2013238"},{"key":"1997_CR21","unstructured":"Wiki (2014a) Transaction [EB\/OL]. https:\/\/en.bitcoin.it\/wiki\/Transactions"},{"key":"1997_CR22","unstructured":"Wiki (2014b) Elliptic curve digital signature algorithm [EB\/OL]. https:\/\/en.bitcoin.it\/wiki\/EllipticCurveDigitalSignatureAlgorithm"},{"key":"1997_CR23","unstructured":"Wiki (2014c) Secp265k1 [EB\/OL]. https:\/\/en.bitcoin.it\/wiki\/Secp256k1"},{"key":"1997_CR24","unstructured":"Wiki (2014d) Deterministic wallet [EB\/OL]. https:\/\/en.bitcoin.it\/wiki\/DeterministicWallet"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-015-1997-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1997-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1997-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-015-1997-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T23:32:28Z","timestamp":1748734348000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-015-1997-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12,29]]},"references-count":24,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2017,6]]}},"alternative-id":["1997"],"URL":"https:\/\/doi.org\/10.1007\/s00500-015-1997-6","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"type":"print","value":"1432-7643"},{"type":"electronic","value":"1433-7479"}],"subject":[],"published":{"date-parts":[[2015,12,29]]}}}