{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,10]],"date-time":"2025-09-10T22:05:16Z","timestamp":1757541916768,"version":"3.37.3"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1-2","license":[{"start":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T00:00:00Z","timestamp":1622851200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T00:00:00Z","timestamp":1622851200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Ann. Telecommun."],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s12243-021-00861-z","type":"journal-article","created":{"date-parts":[[2021,6,5]],"date-time":"2021-06-05T15:02:54Z","timestamp":1622905374000},"page":"3-12","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Realizing privacy aspects in blockchain networks"],"prefix":"10.1007","volume":"77","author":[{"given":"Oded","family":"Noam","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-1238","authenticated-orcid":false,"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,6,5]]},"reference":[{"key":"861_CR1","unstructured":"Nakamoto S (2009) Bitcoin: A peer-to-peer electronic cash system. [Online]. Available: http:\/\/bitcoin.org\/bitcoin.pdf"},{"key":"861_CR2","volume-title":"Cryptography and network security: Principles and practice","author":"S William","year":"1999","unstructured":"William S (1999) Cryptography and network security: Principles and practice. Prentice-Hall Inc, Hoboken"},{"key":"861_CR3","unstructured":"Wood G (2014) Ethereum: A secure decentralised generalised transaction ledger. [Online]. Available: http:\/\/gavwood.com\/Paper.pdf"},{"key":"861_CR4","doi-asserted-by":"crossref","unstructured":"Catalini C, Gans J S (2016) Some simple economics of the blockchain. National Bureau of Economic Research, Tech. Rep.","DOI":"10.3386\/w22952"},{"key":"861_CR5","unstructured":"(1948) Universal declaration of human rights. [Online]. Available: http:\/\/www.un.org\/en\/universal-declaration-human-rights\/"},{"key":"861_CR6","unstructured":"Onn Y, et al. (2005) Privacy in the digital environment. Haifa Center of Law & Technology: 1\u201312"},{"key":"861_CR7","unstructured":"Activism: Cypherpunks (1992) [Online]. Available: https:\/\/www.activism.net\/cypherpunk\/crypto-anarchy.html"},{"issue":"1","key":"861_CR8","first-page":"36","volume":"7","author":"EE B\u00f8","year":"2015","unstructured":"B\u00f8 EE, Slemrod J, Thoresen TO (2015) Taxes on the internet: Deterrence effects of public disclosure. American Economic Journal: Economic Policy 7(1):36\u201362","journal-title":"American Economic Journal: Economic Policy"},{"issue":"8","key":"861_CR9","first-page":"114","volume":"38","author":"GE Moore","year":"1965","unstructured":"Moore G E (1965) Cramming more components onto integrated circuits. Electronics 38(8):114\u2013117","journal-title":"Electronics"},{"issue":"2","key":"861_CR10","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1109\/MCSE.2017.29","volume":"19","author":"TN Theis","year":"2017","unstructured":"Theis T N, Wong H P (2017) The end of Moore\u2019s Law: A new beginning for information technology. Comput Sci Eng 19(2):41\u201350","journal-title":"Comput Sci Eng"},{"issue":"1","key":"861_CR11","doi-asserted-by":"publisher","first-page":"20","DOI":"10.3366\/count.2017.0073","volume":"3","author":"G Anders","year":"2017","unstructured":"Anders G (2017) The obsolescence of privacy. CounterText 3(1):20\u201346","journal-title":"CounterText"},{"key":"861_CR12","unstructured":"(2016). Regulation (EU) 2016\/679 of the European parliament and of the council. Official Journal of the European Union (OJ) 59(1-88):294"},{"key":"861_CR13","first-page":"995","volume":"47","author":"TZ Zarsky","year":"2016","unstructured":"Zarsky T Z (2016) Incompatible: The GDPR in the age of big data. Seton Hall L Rev 47:995","journal-title":"Seton Hall L Rev"},{"key":"861_CR14","doi-asserted-by":"crossref","unstructured":"Finn RL, Wright D, Friedewald M (2013) Seven types of privacy. In: European data protection: coming of age. Springer, Dordrecht, pp 3\u201332","DOI":"10.1007\/978-94-007-5170-5_1"},{"key":"861_CR15","doi-asserted-by":"crossref","unstructured":"Dierks T (2008) The Transport Layer Security (TLS) Protocol, RFC 5246","DOI":"10.17487\/rfc5246"},{"issue":"2","key":"861_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MSEC.2019.2947124","volume":"18","author":"P Jauernig","year":"2020","unstructured":"Jauernig P, Ahmad-Reza S, Emmanuel S (2020) Trusted execution environments: properties, applications, and challenges. IEEE Security & Privacy 18(2):56\u201360","journal-title":"IEEE Security & Privacy"},{"key":"861_CR17","doi-asserted-by":"crossref","unstructured":"Kremer S, Jacomme C (2021) An extensive formal analysis of multi-factor authentication protocols. ACM Trans Priv Secur 24(2)","DOI":"10.1145\/3440712"},{"key":"861_CR18","doi-asserted-by":"crossref","unstructured":"Bonneau J, Herley C, Van Oorschot PC, Stajano F (2012) The quest to replace passwords: a framework for comparative evaluation of web authentication schemes. In: IEEE Symposium on Security and Privacy","DOI":"10.1109\/SP.2012.44"},{"issue":"1","key":"861_CR19","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1137\/0218012","volume":"18","author":"S Goldwasser","year":"1989","unstructured":"Goldwasser S, Micali S, Rackoff C (1989) The knowledge complexity of interactive proof systems. SIAM J Comput 18(1):186\u2013208","journal-title":"SIAM J Comput"},{"issue":"4","key":"861_CR20","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1137\/S0097539795284959","volume":"30","author":"S Micali","year":"2000","unstructured":"Micali S (2000) Computationally sound proofs. SIAM J Comput 30(4):1253\u20131298","journal-title":"SIAM J Comput"},{"issue":"3","key":"861_CR21","doi-asserted-by":"publisher","first-page":"501","DOI":"10.1145\/278298.278306","volume":"45","author":"S Arora","year":"1998","unstructured":"Arora S, Lund C, Motwani R, Sudan M, Szegedy M (1998) Proof verification and the hardness of approximation problems. J ACM (JACM) 45(3):501\u2013555","journal-title":"J ACM (JACM)"},{"key":"861_CR22","doi-asserted-by":"crossref","unstructured":"Ishai Y, Mahmoody M, Sahai A (2012) On efficient zero-knowledge PCPs. In: Theory of cryptography conference, pp 151\u2013168","DOI":"10.1007\/978-3-642-28914-9_9"},{"key":"861_CR23","doi-asserted-by":"crossref","unstructured":"Groth J (2010) Short non-interactive zero-knowledge proofs. In: International conference on the theory and application of cryptology and information security. Springer, Berlin, pp 341\u2013358","DOI":"10.1007\/978-3-642-17373-8_20"},{"key":"861_CR24","unstructured":"Ben-Sasson E, Chiesa A, Tromer E, Virza M (2014) Succinct non-interactive zero knowledge for a von Neumann architecture. In: USENIX Security Symposium (USENIX, Security), pp 781\u2013796"},{"issue":"2","key":"861_CR25","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MTS.2008.924862","volume":"27","author":"P Rotter","year":"2008","unstructured":"Rotter P, Daskala B, Compano R (2008) RFID implants: Opportunities and and challenges for identifying people. IEEE Technol Soc Mag 27(2):24\u201332","journal-title":"IEEE Technol Soc Mag"},{"key":"861_CR26","unstructured":"Microsoft (2009) Perimeter Firewall Design. [Online]. Available: https:\/\/docs.microsoft.com\/en-us\/previous-versions\/tn-archive\/cc700828(v=technet.10)"},{"key":"861_CR27","doi-asserted-by":"crossref","unstructured":"Gudgeon L, Moreno-Sanchez P, Roos S, McCorry P, Gervais A (2020) SoK: Layer-two blockchain protocols, financial cryptography and data security (FC)","DOI":"10.1007\/978-3-030-51280-4_12"},{"key":"861_CR28","unstructured":"Poon J, Dryja T (2016) The Bitcoin lightning network: scalable off-chain instant payments"},{"key":"861_CR29","unstructured":"The Raiden network. [Online]. Available: https:\/\/raiden.network\/"},{"key":"861_CR30","unstructured":"Poon J, Buterin V (2017) Plasma: scalable autonomous smart contracts, White paper"},{"key":"861_CR31","unstructured":"Teutsch J, Reitwie\u00dfner C. (2017) A scalable verification solution for blockchains. [Online]. Available: https:\/\/people.cs.uchicago.edu\/teutsch\/papers\/truebit.pdf"},{"key":"861_CR32","unstructured":"Kalodner H A, Goldfeder S, Chen X, Weinberg S M, Felten E W (2018) Arbitrum: scalable, private smart contracts. In: USENIX Security symposium"},{"key":"861_CR33","doi-asserted-by":"crossref","unstructured":"Gervais A, Karame G O, Gruber D, Capkun S (2014) On the privacy provisions of Bloom filters in lightweight Bitcoin clients. In: ACM annual computer security applications conference","DOI":"10.1145\/2664243.2664267"},{"key":"861_CR34","doi-asserted-by":"crossref","unstructured":"Reid F, Harrigan M (2013) An analysis of anonymity in the bitcoin system. In: Security and privacy in social networks, pp 197\u2013223","DOI":"10.1007\/978-1-4614-4139-7_10"},{"key":"861_CR35","doi-asserted-by":"crossref","unstructured":"Ben-Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin in IEEE Symposium on Security and Privacy","DOI":"10.1109\/SP.2014.36"},{"key":"861_CR36","doi-asserted-by":"crossref","unstructured":"Tran M, Luu L, Suk Kang M, Bentov I, Saxena P (2018) Obscuro: A bitcoin mixer using trusted execution environments. In: Annual computer security applications conference, pp 692\u2013701","DOI":"10.1145\/3274694.3274750"},{"key":"861_CR37","unstructured":"van Saberhagen N (2014) CryptoNote v2.0. [Online]. Available: https:\/\/github.com\/monero-project\/research-lab\/blob\/master\/whitepaper\/whitepaper.pdf"},{"key":"861_CR38","doi-asserted-by":"crossref","unstructured":"Rivest R L, Shamir A, Tauman Y (2001) How to leak a secret. In: ASIACRYPT","DOI":"10.1007\/3-540-45682-1_32"},{"key":"861_CR39","unstructured":"Merkle R C (1979) Secrecy, authentication, and public key systems. PhD thesis, Stanford"},{"key":"861_CR40","unstructured":"Gentry C (2009) A fully homomorphic encryption scheme, vol 20(9). Stanford: Stanford University"},{"key":"861_CR41","unstructured":"Beerliov\u00e1-Trub\u00edniov\u00e1 Z, Hirt M (2008) Perfectly-secure MPC with linear communication complexity in Theory of Cryptography (TCC)"},{"key":"861_CR42","doi-asserted-by":"crossref","unstructured":"Cheng R, et al. (2018) Ekiden: a platform for confidentiality-preserving, trustworthy, and performant smart contract execution, arXiv:1804.05141","DOI":"10.1109\/EuroSP.2019.00023"},{"key":"861_CR43","unstructured":"Basic Attention Token (BAT) (2018) [Online]. Available: https:\/\/whitepaper.io\/coin\/basic-attention-token"},{"key":"861_CR44","doi-asserted-by":"crossref","unstructured":"Vazirani A A, O\u2019Donoghue O, Brindley D, et al. (2020) Blockchain vehicles for efficient medical record management. NPJ Digital Medicine 3(1)","DOI":"10.1038\/s41746-019-0211-0"}],"container-title":["Annals of Telecommunications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00861-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12243-021-00861-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12243-021-00861-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,18]],"date-time":"2022-02-18T14:30:27Z","timestamp":1645194627000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12243-021-00861-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,5]]},"references-count":44,"journal-issue":{"issue":"1-2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["861"],"URL":"https:\/\/doi.org\/10.1007\/s12243-021-00861-z","relation":{},"ISSN":["0003-4347","1958-9395"],"issn-type":[{"type":"print","value":"0003-4347"},{"type":"electronic","value":"1958-9395"}],"subject":[],"published":{"date-parts":[[2021,6,5]]},"assertion":[{"value":"24 June 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 May 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 June 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}