{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:36:12Z","timestamp":1766504172516,"version":"3.37.3"},"reference-count":38,"publisher":"Elsevier BV","issue":"4","license":[{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2024,12,1]],"date-time":"2024-12-01T00:00:00Z","timestamp":1733011200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T00:00:00Z","timestamp":1725926400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by-nc-nd\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["High-Confidence Computing"],"published-print":{"date-parts":[[2024,12]]},"DOI":"10.1016\/j.hcc.2024.100271","type":"journal-article","created":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T22:01:47Z","timestamp":1726178507000},"page":"100271","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":8,"title":["Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain"],"prefix":"10.1016","volume":"4","author":[{"given":"Jing","family":"Tian","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1023-6549","authenticated-orcid":false,"given":"Yanqi","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Xiaoyi","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Xuan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ruonan","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.hcc.2024.100271_b1","doi-asserted-by":"crossref","DOI":"10.1016\/j.ins.2023.119322","article-title":"Security and privacy protection technologies in securing blockchain applications","volume":"645","author":"Wen","year":"2023","journal-title":"Inform. Sci."},{"issue":"5","key":"10.1016\/j.hcc.2024.100271_b2","doi-asserted-by":"crossref","first-page":"2934","DOI":"10.1109\/TDSC.2021.3078463","article-title":"Secure deterministic wallet and stealth address: Key-insulated and privacy-preserving signature scheme with publicly derived public key","volume":"19","author":"Liu","year":"2022","journal-title":"IEEE Trans. Depend. Secur. Comput."},{"key":"10.1016\/j.hcc.2024.100271_b3","series-title":"International Conference on Information Technology: Coding and Computing (ITCC\u201904), Volume 1, April 5-7, 2004, Las Vegas, Nevada, USA","first-page":"124","article-title":"Identity-based threshold signature scheme from the bilinear pairings","author":"Baek","year":"2004"},{"key":"10.1016\/j.hcc.2024.100271_b4","series-title":"Advances in Cryptology, Proceedings of CRYPTO \u201984, Santa Barbara, California, USA, August 19-22, 1984, Proceedings","first-page":"47","article-title":"Identity-based cryptosystems and signature schemes","volume":"vol. 196","author":"Shamir","year":"1984"},{"year":"2004","series-title":"Security proofs for identity-based identification and signature schemes","author":"Bellare","key":"10.1016\/j.hcc.2024.100271_b5"},{"key":"10.1016\/j.hcc.2024.100271_b6","series-title":"Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography","first-page":"310","article-title":"Efficient identity based signature schemes based on pairings","author":"Hess","year":"2002"},{"key":"10.1016\/j.hcc.2024.100271_b7","doi-asserted-by":"crossref","unstructured":"Y. Gu, Z. Shen, An Accountable Anonymous Voting Scheme Based on One-time Ring Signature, in: 2023 3rd International Conference on Frontiers of Electronics, Information and Computation Technologies, ICFEICT, 2023, pp. 51\u201357.","DOI":"10.1109\/ICFEICT59519.2023.00019"},{"key":"10.1016\/j.hcc.2024.100271_b8","doi-asserted-by":"crossref","unstructured":"Y. Yang, Z. Wei, M. Huang, Accountable Policy-Based Sanitizable Signature for Medical Data Sharing, in: Proceedings of the 2022 12th International Conference on Communication and Network Security, 2022.","DOI":"10.1145\/3586102.3586114"},{"key":"10.1016\/j.hcc.2024.100271_b9","series-title":"5th International Conference on BioMedical Engineering and Informatics, BMEI 2012, Chongqing, China, October 16-18, 2012","first-page":"1312","article-title":"Fuzzy identity-based threshold signature scheme based on bilinear maps","author":"Wang","year":"2012"},{"key":"10.1016\/j.hcc.2024.100271_b10","doi-asserted-by":"crossref","unstructured":"Y.-j. Geng, F.-y. Chen, An Efficient Identity-Based Threshold Signature, in: 2010 International Conference on Internet Technology and Applications, 2010, pp. 1\u20133, http:\/\/dx.doi.org\/10.1109\/ITAPP.2010.5566632.","DOI":"10.1109\/ITAPP.2010.5566632"},{"key":"10.1016\/j.hcc.2024.100271_b11","first-page":"73","article-title":"Efficient identity-based threshold signature scheme from bilinear pairings in the standard model","author":"Gao","year":"2012","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100271_b12","first-page":"1459","article-title":"Identity-based threshold signatures from isogenies","author":"Atapoor","year":"2023","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"4","key":"10.1016\/j.hcc.2024.100271_b13","doi-asserted-by":"crossref","first-page":"1711","DOI":"10.1109\/TCSS.2022.3232173","article-title":"IdenMultiSig: Identity-based decentralized multi-signature in internet of things","volume":"10","author":"Liu","year":"2023","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"10.1016\/j.hcc.2024.100271_b14","doi-asserted-by":"crossref","unstructured":"P. Wei, B. Xia, A New ID-Based Threshold Proxy Signature Scheme, in: 2021 IEEE International Conference on Artificial Intelligence and Computer Applications, ICAICA, 2021, pp. 1005\u20131008, http:\/\/dx.doi.org\/10.1109\/ICAICA52286.2021.9498100.","DOI":"10.1109\/ICAICA52286.2021.9498100"},{"key":"10.1016\/j.hcc.2024.100271_b15","series-title":"Smart Card Research and Advanced Applications VI, IFIP 18th World Computer Congress, TC8\/WG8.8 & TC11\/WG11.2 Sixth International Conference on Smart Card Research and Advanced Applications","first-page":"271","article-title":"Accountable ring signatures: A smart card approach","volume":"vol. 153","author":"Xu","year":"2004"},{"key":"10.1016\/j.hcc.2024.100271_b16","first-page":"643","article-title":"Short accountable ring signatures based on DDH","author":"Bootle","year":"2015","journal-title":"IACR Cryptol. ePrint Arch."},{"issue":"9","key":"10.1016\/j.hcc.2024.100271_b17","doi-asserted-by":"crossref","first-page":"16422","DOI":"10.1109\/JIOT.2024.3353458","article-title":"PEACS: A privacy-enhancing and accountable car sharing system","volume":"11","author":"Liu","year":"2024","journal-title":"IEEE Internet Things J."},{"issue":"4","key":"10.1016\/j.hcc.2024.100271_b18","doi-asserted-by":"crossref","first-page":"752","DOI":"10.1109\/TMC.2019.2901463","article-title":"A signature scheme with unlinkable-yet-accountable pseudonymity for privacy-preserving crowdsensing","volume":"19","author":"Sucasas","year":"2020","journal-title":"IEEE Trans. Mob. Comput."},{"issue":"3","key":"10.1016\/j.hcc.2024.100271_b19","doi-asserted-by":"crossref","first-page":"2711","DOI":"10.1109\/TCC.2022.3224440","article-title":"Blockchain-based accountable auditing with multi-ownership transfer","volume":"11","author":"Shen","year":"2023","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.hcc.2024.100271_b20","series-title":"Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part I","first-page":"23","article-title":"Compact accountable ring signatures in the plain model","volume":"vol. 14526","author":"Khuc","year":"2023"},{"key":"10.1016\/j.hcc.2024.100271_b21","first-page":"174","article-title":"Short group signatures","author":"Boneh","year":"2004","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100271_b22","series-title":"Information Security and Privacy, 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings","first-page":"455","article-title":"An efficient group signature scheme from bilinear maps","volume":"vol. 3574","author":"Furukawa","year":"2005"},{"key":"10.1016\/j.hcc.2024.100271_b23","series-title":"Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw","first-page":"614","article-title":"Foundations of group signatures: Formal definitions, simplified requirements, and a construction based on general assumptions","volume":"vol. 2656","author":"Bellare","year":"2003"},{"key":"10.1016\/j.hcc.2024.100271_b24","series-title":"CCS 2001, Proceedings of the 8th ACM Conference on Computer and Communications Security, Philadelphia, Pennsylvania, USA, November 6-8, 2001","first-page":"245","article-title":"Accountable-subgroup multisignatures: extended abstract","author":"Micali","year":"2001"},{"key":"10.1016\/j.hcc.2024.100271_b25","series-title":"Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part II","first-page":"435","article-title":"Compact multi-signatures for smaller blockchains","volume":"vol. 11273","author":"Boneh","year":"2018"},{"key":"10.1016\/j.hcc.2024.100271_b26","first-page":"18","article-title":"Pairing-based accountable subgroup multi-signatures with verifiable group setup","author":"Agirtas","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100271_b27","series-title":"Information Systems Security - 19th International Conference, ICISS 2023, Raipur, India, December 16-20, 2023, Proceedings","first-page":"295","article-title":"Verifiable timed accountable subgroup multi-signatures","volume":"vol. 14424","author":"Ozden","year":"2023"},{"key":"10.1016\/j.hcc.2024.100271_b28","first-page":"824","article-title":"Accountable tracing signatures","author":"Kohlweiss","year":"2014","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100271_b29","first-page":"1251","article-title":"Accountable tracing signatures from lattices","author":"Ling","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100271_b30","series-title":"10th International Conference on Availability, Reliability and Security, ARES 2015, Toulouse, France, August 24-27, 2015","first-page":"60","article-title":"Accountable redactable signatures","author":"P\u00f6hls","year":"2015"},{"issue":"1","key":"10.1016\/j.hcc.2024.100271_b31","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1109\/TDSC.2020.2998135","article-title":"Authenticated data redaction with accountability and transparency","volume":"19","author":"Ma","year":"2022","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"10.1016\/j.hcc.2024.100271_b32","first-page":"1636","article-title":"Threshold signatures with private accountability","author":"Boneh","year":"2022","journal-title":"IACR Cryptol. ePrint Arch."},{"year":"2022","series-title":"Proactive refresh for accountable threshold signatures","author":"Boneh","key":"10.1016\/j.hcc.2024.100271_b33"},{"key":"10.1016\/j.hcc.2024.100271_b34","first-page":"1793","article-title":"Accountable multi-signatures with constant size public keys","volume":"2023","author":"Boneh","year":"2023","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"10.1016\/j.hcc.2024.100271_b35","doi-asserted-by":"crossref","first-page":"2217","DOI":"10.1109\/TIFS.2023.3347968","article-title":"Decentralized threshold signatures with dynamically private accountability","volume":"19","author":"Li","year":"2024","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"year":"2011","series-title":"Structure preserving CCA secure encryption and its application to oblivious third parties","author":"Camenisch","key":"10.1016\/j.hcc.2024.100271_b36"},{"key":"10.1016\/j.hcc.2024.100271_b37","series-title":"Advances in Cryptology - CRYPTO \u201986, Santa Barbara, California, USA, 1986, Proceedings","first-page":"186","article-title":"How to prove yourself: Practical solutions to identification and signature problems","volume":"vol. 263","author":"Fiat","year":"1986"},{"key":"10.1016\/j.hcc.2024.100271_b38","first-page":"1377","article-title":"Fiat-Shamir transformation of multi-round interactive proofs","author":"Attema","year":"2021","journal-title":"IACR Cryptol. ePrint Arch."}],"container-title":["High-Confidence Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000746?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S2667295224000746?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,12,21]],"date-time":"2024-12-21T20:39:25Z","timestamp":1734813565000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S2667295224000746"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12]]},"references-count":38,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,12]]}},"alternative-id":["S2667295224000746"],"URL":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100271","relation":{},"ISSN":["2667-2952"],"issn-type":[{"type":"print","value":"2667-2952"}],"subject":[],"published":{"date-parts":[[2024,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Identity-based threshold (multi) signature with private accountability for privacy-preserving blockchain","name":"articletitle","label":"Article Title"},{"value":"High-Confidence Computing","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.hcc.2024.100271","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2024 The Author(s). Published by Elsevier B.V. on behalf of Shandong University.","name":"copyright","label":"Copyright"}],"article-number":"100271"}}