{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T14:41:38Z","timestamp":1740148898160,"version":"3.37.3"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,3,1]],"date-time":"2023-03-01T00:00:00Z","timestamp":1677628800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFB1804500","2019YFB1804500","2019YFB1804500","2019YFB1804500","2019YFB1804500"],"award-info":[{"award-number":["2019YFB1804500","2019YFB1804500","2019YFB1804500","2019YFB1804500","2019YFB1804500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272413","62272413","62272413","62272413"],"award-info":[{"award-number":["62272413","62272413","62272413","62272413"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s12083-023-01455-3","type":"journal-article","created":{"date-parts":[[2023,3,13]],"date-time":"2023-03-13T09:02:46Z","timestamp":1678698166000},"page":"1211-1226","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A domain name management system based on account-based consortium blockchain"],"prefix":"10.1007","volume":"16","author":[{"given":"Genhua","family":"Lu","sequence":"first","affiliation":[]},{"given":"Xiaofeng","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Shao","sequence":"additional","affiliation":[]},{"given":"Guiyi","family":"Wei","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,3,13]]},"reference":[{"key":"1455_CR1","unstructured":"Mockapetris PV. Domain names-concepts and facilities. https:\/\/www.ietf.org\/rfc\/rfc1034.txt. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR2","unstructured":"Mockapetris PV. Domain names-implementation and specification. https:\/\/www.rfc-editor.org\/rfc\/inline-errata\/rfc1035.html. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR3","doi-asserted-by":"crossref","unstructured":"Khormali A et al (2021) Domain name system security and srivacy: A contemporary survey. Comput Netw 185:107699","DOI":"10.1016\/j.comnet.2020.107699"},{"key":"1455_CR4","unstructured":"Florian M. Dns single point of failure detection using transitive availability dependency analysis. https:\/\/www.sstic.org\/media\/SSTIC2018\/SSTIC-actes\/transdep\/SSTIC2018-Article-transdep-maury.pdf. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR5","unstructured":"Wikipedia. Ddos attacks on dyn. https:\/\/en.wikipedia.org\/wiki\/DDoS_attacks_on_Dyn#References. [Online; accessed 11 Feb 2023]"},{"key":"1455_CR6","doi-asserted-by":"crossref","unstructured":"Wang X, Li K, Li H, Li Y, Liang Z (2017)\u00a0Balaji, P. & Siegel, H.J. (eds)\u00a0ConsortiumDNS: A distributed domain name service based on consortium chain. (eds Balaji, P. & Siegel, H.J.) HPCC\/SmartCity\/DSS pp\u00a0617\u2013620","DOI":"10.1109\/HPCC-SmartCity-DSS.2017.83"},{"key":"1455_CR7","unstructured":"Johnson N, Griffith V (2017)\u00a0Ethereum name service. https:\/\/ensuser.com\/docs\/readme.html. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR8","unstructured":"Roquerre T. Handshake project paper. https:\/\/ensuser.com\/docs\/readme.html. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR9","doi-asserted-by":"crossref","unstructured":"Benshoof B, Rosen A, Bourgeois AG, Harrison RW (2016)\u00a0Abramson, D. & Acar, U. (eds)\u00a0Distributed decentralized domain name service. (eds Abramson, D. & Acar, U.) IPDPS, pp 1279\u20131287","DOI":"10.1109\/IPDPSW.2016.109"},{"key":"1455_CR10","doi-asserted-by":"publisher","first-page":"259","DOI":"10.32604\/iasc.2021.013704","volume":"27","author":"Y Shen","year":"2021","unstructured":"Shen Y et al (2021) Dns service model based on permissioned blockchain. Intell Autom Soft Comput 27:259\u2013268","journal-title":"Intell Autom Soft Comput"},{"key":"1455_CR11","doi-asserted-by":"crossref","unstructured":"Liu W et al (2020)\u00a0Montavont, N. & Douligeris, C. (eds) A secure domain name resolution and management architecture based on blockchain. (eds Montavont, N. & Douligeris, C.) ISCC, pp 1\u20137","DOI":"10.1109\/ISCC50000.2020.9219632"},{"key":"1455_CR12","doi-asserted-by":"publisher","first-page":"912","DOI":"10.1016\/j.future.2019.09.037","volume":"102","author":"G He","year":"2020","unstructured":"He G, Su W, Gao S, Yue J (2020) TD-Root: A trustworthy decentralized DNS root management architecture based on permissioned blockchain. Futur Gener Comput Syst 102:912\u2013924","journal-title":"Futur Gener Comput Syst"},{"key":"1455_CR13","doi-asserted-by":"crossref","unstructured":"Lu G, Zhang Y, Lu Z, Shao J, Wei G (2021)\u00a0Shen, J. & Liu, J.K. (eds) Blockchain-based sealed-bid domain name auction protocol. (eds Shen, J. & Liu, J.K.) EAI AC3, pp 25\u201338","DOI":"10.1007\/978-3-030-80851-8_3"},{"key":"1455_CR14","doi-asserted-by":"publisher","first-page":"2795","DOI":"10.1109\/TSC.2021.3054772","volume":"15","author":"Y Guan","year":"2022","unstructured":"Guan Y, Zheng H, Shao J, Lu R, Wei G (2022) Fair outsourcing polynomial computation based on the blockchain. IEEE Trans Serv Comput 15:2795\u20132808","journal-title":"IEEE Trans Serv Comput"},{"key":"1455_CR15","doi-asserted-by":"publisher","first-page":"1643","DOI":"10.1007\/s12083-020-00918-1","volume":"13","author":"H Zheng","year":"2020","unstructured":"Zheng H, Shao J, Wei G (2020) Attribute-based encryption with outsourced decryption in blockchain. Peer-to-Peer Network Application 13:1643\u20131655","journal-title":"Peer-to-Peer Network Application"},{"key":"1455_CR16","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.1109\/TIFS.2020.2969565","volume":"15","author":"C Lin","year":"2020","unstructured":"Lin C, He D, Huang X, Khan MK, Choo KR (2020) DCAP: A secure and efficient decentralized conditional anonymous payment system based on blockchain. IEEE Trans Inf Forensics Secur 15:2440\u20132452","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1455_CR17","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.geb.2019.02.014","volume":"115","author":"A Rosato","year":"2019","unstructured":"Rosato A, Tymula A (2019) Loss aversion and competition in vickrey auctions: Money ain\u2019t no good. Games Econom Behav 115:188\u2013208","journal-title":"Games Econom Behav"},{"key":"1455_CR18","first-page":"1098","volume":"2015","author":"S Noether","year":"2015","unstructured":"Noether S (2015) Ring signature confidential transactions for monero. IACR Cryptology ePrint Archive 2015:1098","journal-title":"IACR Cryptology ePrint Archive"},{"key":"1455_CR19","doi-asserted-by":"crossref","unstructured":"Rivest RL, Shamir A, Tauman Y (2001)\u00a0Boyd, C. (ed.) How to leak a secret. (ed.Boyd, C.) ASIACRYPT 2248:552\u2013565","DOI":"10.1007\/3-540-45682-1_32"},{"key":"1455_CR20","unstructured":"Castro M, Liskov B, Seltzer MI, Leach PJ (eds) (1999)\u00a0Practical byzantine fault tolerance. (eds Seltzer, M.I. & Leach, P.J.) OSDI, pp 173\u2013186"},{"key":"1455_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.jpdc.2022.01.029","volume":"164","author":"G Xu","year":"2022","unstructured":"Xu G et al (2022) SG-PBFT: A secure and highly efficient distributed blockchain PBFT consensus algorithm for intelligent internet of vehicles. J Parallel Distrib Comput 164:1\u201311","journal-title":"J Parallel Distrib Comput"},{"key":"1455_CR22","doi-asserted-by":"publisher","first-page":"1146","DOI":"10.1109\/TPDS.2020.3042392","volume":"32","author":"W Li","year":"2021","unstructured":"Li W et al (2021) A scalable multi-layer PBFT consensus for blockchain. IEEE Trans Parallel Distrib Syst 32:1146\u20131160","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"1455_CR23","doi-asserted-by":"crossref","unstructured":"Lao L, Dai X, Xiao B, Guo S (2020)\u00a0Chaudhary, V., Datta, S. & Ergun, F. (eds) G-PBFT: A location-based and scalable consensus protocol for iot-blockchain applications. (eds Chaudhary, V., Datta, S. & Ergun, F.) IPDPS, pp 664\u2013673","DOI":"10.1109\/IPDPS47924.2020.00074"},{"key":"1455_CR24","doi-asserted-by":"publisher","first-page":"542","DOI":"10.1007\/s11390-018-1839-y","volume":"33","author":"R Yuan","year":"2018","unstructured":"Yuan R, Xia Y, Chen H, Zang B, Xie J (2018) Shadoweth: Private smart contract on public blockchain. J Comput Sci Technol 33:542\u2013556","journal-title":"J Comput Sci Technol"},{"key":"1455_CR25","doi-asserted-by":"crossref","unstructured":"Nguyen TDT, Thai MT (2021)\u00a0A blockchain-based iterative double auction protocol using multiparty state channels. ACM Trans Internet Technol 21:39:1\u201339:22","DOI":"10.1145\/3389249"},{"key":"1455_CR26","unstructured":"Shaun Davenport RF (2014)\u00a0Sgx: The good, the bad and the downright ugly. https:\/\/www.virusbulletin.com\/virusbulletin\/2014\/01\/sgx-good-bad-and-downright-ugly. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR27","unstructured":"Luis Merino JA (2016)\u00a0Sgx secure enclaves in practice security and crypto review. https:\/\/www.blackhat.com\/docs\/us-16\/materials\/us-16-Aumasson-SGX-Secure-Enclaves-In-Practice-Security-And-Crypto-Review.pdf. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR28","unstructured":"Durham V (2014)\u00a0Namecoin. https:\/\/www.namecoin.org. [Online; Accessed 21 Dec\u00a02022]"},{"key":"1455_CR29","unstructured":"Ali M, Nelson JC, Shea R, Freedman MJ (2016)\u00a0Gulati, A. & Weatherspoon, H. (eds) Blockstack: A global naming and storage system secured by blockchains. (eds Gulati, A. & Weatherspoon, H.) USENIX pp\u00a0181\u2013194"},{"key":"1455_CR30","doi-asserted-by":"crossref","unstructured":"Jin L, Hao S, Huang Y, Wang H, Cotton C (2021)\u00a0Hu, Y.C. & Yang, X. (eds) DNSonChain: Delegating privacy-preserved DNS resolution to blockchain. (eds Hu, Y.C. & Yang, X.) ICNP pp 1\u201311","DOI":"10.1109\/ICNP52444.2021.9651951"},{"key":"1455_CR31","doi-asserted-by":"crossref","unstructured":"Kosba AE, Miller A, Shi E, Wen Z, Papamanthou C (2016)\u00a0\u00dalfar Erlingsson & Shmatikov, V. (eds) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. (eds \u00dalfar Erlingsson & Shmatikov, V.) SP pp\u00a0839\u2013858","DOI":"10.1109\/SP.2016.55"},{"key":"1455_CR32","doi-asserted-by":"crossref","unstructured":"Blass E, Kerschbaum F (2018)\u00a0L\u00f3pez, J., Zhou, J. & Soriano, M. (eds) Strain: A secure auction for blockchains. (eds L\u00f3pez, J., Zhou, J. & Soriano, M.) ESORICS\u00a011098:87\u2013110","DOI":"10.1007\/978-3-319-99073-6_5"},{"key":"1455_CR33","doi-asserted-by":"crossref","unstructured":"Galal HS, Youssef AM (2018)\u00a0Zohar, A. et al. (eds) Verifiable sealed-bid auction on the ethereum blockchain. (eds Zohar, A. etal.) FCDS\u00a010958;265\u2013278","DOI":"10.1007\/978-3-662-58820-8_18"},{"key":"1455_CR34","doi-asserted-by":"crossref","unstructured":"Qusa H, Tarazi J, Akre V (2020)\u00a0Burmawi (ed.) Secure e-auction system using blockchain: UAE case study. (ed.Burmawi) ASET pp\u00a01\u20135","DOI":"10.1109\/ASET48392.2020.9118213"},{"key":"1455_CR35","doi-asserted-by":"crossref","unstructured":"Zhang M, Yang M, Shen G (2022) SSBAS-FA: A secure sealed-bid e-auction scheme with fair arbitration based on time-released blockchain. J Syst Archit 129:102619","DOI":"10.1016\/j.sysarc.2022.102619"},{"key":"1455_CR36","doi-asserted-by":"crossref","unstructured":"Yin S, Teng Y, Hu N, Jia XD (2020)\u00a0Tian, Z., Yin, L. & Gu, Z. (eds) Decentralization of DNS: old problems and new challenges. (eds Tian, Z., Yin, L. & Gu, Z.) CIAT pp\u00a0335\u2013341","DOI":"10.1145\/3444370.3444594"},{"key":"1455_CR37","unstructured":"Wikipedia (2020)\u00a0Domain name auction. https:\/\/en.wikipedia.org\/w\/index.php?title=Domain_name_auction&oldid=975293048. [Online; Accessed 21 Dec\u00a02022]"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01455-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-023-01455-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-023-01455-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,5]],"date-time":"2023-05-05T04:21:32Z","timestamp":1683260492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-023-01455-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["1455"],"URL":"https:\/\/doi.org\/10.1007\/s12083-023-01455-3","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2023,3]]},"assertion":[{"value":"5 October 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 January 2023","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 March 2023","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work does not involve any work related to ethics.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics approval"}},{"value":"All authors consent to publication.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to publish"}},{"value":"All authors declare that they have no potential competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interest"}}]}}