{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,15]],"date-time":"2024-09-15T04:33:14Z","timestamp":1726374794475},"reference-count":30,"publisher":"Informa UK Limited","issue":"1","license":[{"start":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T00:00:00Z","timestamp":1655164800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Connection Science"],"published-print":{"date-parts":[[2022,12,31]]},"DOI":"10.1080\/09540091.2022.2080181","type":"journal-article","created":{"date-parts":[[2022,6,14]],"date-time":"2022-06-14T12:50:19Z","timestamp":1655211019000},"page":"1751-1771","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["A blockchain-based transaction system with payment statistics and supervision"],"prefix":"10.1080","volume":"34","author":[{"given":"Liutao","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, People\u2019s Republic of China"},{"name":"Beijing Computing Center Co., Ltd, Beijing, People\u2019s Republic of China"}]},{"given":"Jiawan","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, People\u2019s Republic of China"},{"name":"Tianjin Cultural Heritage Conservation And Inheritance Engineering Technology Center and Key Research Center for Surface Monitoring and Analysis of Relics, State Administration of Cultural Heritage, Tianjin, People\u2019s Republic of China"}]},{"given":"Lin","family":"Zhong","sequence":"additional","affiliation":[{"name":"Beijing Computing Center Co., Ltd, Beijing, People\u2019s Republic of China"}]}],"member":"301","published-online":{"date-parts":[[2022,6,14]]},"reference":[{"key":"CIT0001","doi-asserted-by":"crossref","unstructured":"Androulaki, E., Barger, A., Bortnikov, V., Cachin, C., Christidis, K., De Caro, A., Enyeart, D., Ferris, C., Laventman, G., Manevich, Y., Muralidharan, S., Murthy, C., Nguyen, B., Sethi, M., Singh, G., Smith, K., Sorniotti, A., Stathakopoulou, C., Vukolic, M., Cocco, S. W. & Yellick, J. (2018). Hyperledger fabric: A distributed operating system for permissioned blockchains. EuroSys, 30, 1\u201330, 15.","DOI":"10.1145\/3190508.3190538"},{"key":"CIT0002","unstructured":"Ben-Sasson, E., Chiesa, A., Tromer, E. & Virza, M. (2014). Succinct non-Interactive zero Knowledge for a von Neumann Architecture. USENIX Security Symposium (pp. 781\u2013796)."},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Bissias, D. D., Ozisik, A. P., Levine, B. N., Liberatore, M. (2014). Sybil-resistant mixing for bitcoin. WPES (pp. 149\u2013158).","DOI":"10.1145\/2665943.2665955"},{"key":"CIT0004","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-007-9005-7"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B. & Shacham, H. (2001). Short signatures from the Weil pairing. ASIACRYPT (pp. 514\u2013532).","DOI":"10.1007\/3-540-45682-1_30"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"B\u00fcnz, B., Bootle, J., Boneh, D., Poelstra, A., Wuille, P. & Maxwell, G. (2018). Bulletproofs: Short proofs for confidential transactions and more. IEEE Symposium on Security and Privacy (pp. 315\u2013334).","DOI":"10.1109\/SP.2018.00020"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"Damg\u00e5rd, I. (2000). Efficient concurrent zero-knowledge in the auxiliary string model. EUROCRYPT (pp. 418\u2013430).","DOI":"10.1007\/3-540-45539-6_30"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Diament, T., Lee, H. K., Keromytis, A. D. & Yung, M. (2004). The dual receiver cryptosystem and its applications. CCS (pp. 330\u2013343).","DOI":"10.1145\/1030083.1030128"},{"key":"CIT0009","doi-asserted-by":"crossref","unstructured":"Feng, H., Liu, J., Wu, Q. & Li, Y. (2020). Traceable ring signatures with post-quantum Security. CT-RSA (pp. 442\u2013468).","DOI":"10.1007\/978-3-030-40186-3_19"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Fujisaki, E. & Suzuki, K. (2007). Traceable ring signature. Public Key Cryptography (pp. 181\u2013200).","DOI":"10.1007\/978-3-540-71677-8_13"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Groth, J. (2016). On the size of pairing-based non-interactive arguments. EUROCRYPT (2, pp. 305\u2013326).","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"key":"CIT0013","doi-asserted-by":"crossref","unstructured":"Koshy, P., Koshy, D. & McDaniel, P. D. (2014). An analysis of anonymity in bitcoin using P2P network traffic. Financial Cryptography (pp. 469\u2013485).","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"CIT0014","unstructured":"Maxwell G. (2013). Coinjoin: Bitcoin privacy for the real world. https:\/\/bitcointalk.org\/index.php"},{"key":"CIT0015","doi-asserted-by":"crossref","unstructured":"Meiklejohn, S., Pomarole, M., Jordan, G., Levchenko, K., McCoy, D., Voelker, G. M. & Savage, S. (2013). A fistful of bitcoins: Characterizing payments among men with no names. Internet Measurement Conference (pp. 127\u2013140).","DOI":"10.1145\/2504730.2504747"},{"key":"CIT0016","doi-asserted-by":"crossref","unstructured":"Miers, I., Garman, C., Green, M. & Rubin, A. D. (2013). Zerocoin: Anonymous distributed e-cash from bitcoin. IEEE Symposium on Security and Privacy (pp. 397\u2013411).","DOI":"10.1109\/SP.2013.34"},{"key":"CIT0017","doi-asserted-by":"crossref","unstructured":"Miller, A., Xia, Y., Croman, K., Shi, E. & Song, D. (2016). The honey badger of BFT protocols. CCS (pp. 31\u201342).","DOI":"10.1145\/2976749.2978399"},{"key":"CIT0018","author":"Moser M.","year":"2019","journal-title":"Preprint"},{"key":"CIT0019","unstructured":"Nakamoto, S. (2019). \u201cBitcoin: A peer-to-peer electronic cash system\u201d."},{"key":"CIT0020","first-page":"1098","volume":"2015","author":"Noether S.","year":"2015","journal-title":"IACR Cryptol. EPrint Arch"},{"key":"CIT0021","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.34"},{"key":"CIT0022","doi-asserted-by":"crossref","unstructured":"Reid, F. & Harrigan, M. (2011). An analysis of anonymity in the bitcoin system. SocialCom\/PASSAT (pp. 1318\u20131326).","DOI":"10.1109\/PASSAT\/SocialCom.2011.79"},{"key":"CIT0023","doi-asserted-by":"crossref","unstructured":"Ruffing, T., Moreno-Sanchez, P. & Kate, A. (2014). CoinShuffle: Practical decentralized coin mixing for bitcoin. ESORICS (2, pp. 345\u2013364).","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"CIT0024","unstructured":"Wang, Q., Li, R., Wang, Q. & Chen, S. (2021). \u201cNon-fungible token (NFT): Overview, evaluation, opportunities and challenges,\u201d arXiv preprint arXiv:2105.07447."},{"key":"CIT0025","doi-asserted-by":"publisher","DOI":"10.3390\/app11031085"},{"issue":"2014","key":"CIT0026","first-page":"1","volume":"151","author":"Wood G.","year":"2014","journal-title":"Ethereum Project Yellow Paper"},{"key":"CIT0027","first-page":"412","volume":"2018","author":"Wust K.","year":"2018","journal-title":"IACR Cryptol. EPrint Arch"},{"key":"CIT0028","unstructured":"Zhao, C. (2014). Graph-based forensic investigation of bitcoin transactions."},{"key":"CIT0029","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2960526"},{"key":"CIT0030","doi-asserted-by":"crossref","unstructured":"Ziegeldorf, J. H., Grossmann, F., Henze, M., Inden, N. & Wehrle, K. (2015). CoinParty: Secure multi-party mixing of bitcoins. CODASPY (pp. 75\u201386).","DOI":"10.1145\/2699026.2699100"}],"container-title":["Connection Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/09540091.2022.2080181","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,17]],"date-time":"2023-04-17T15:57:44Z","timestamp":1681747064000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/09540091.2022.2080181"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,14]]},"references-count":30,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2022,12,31]]}},"alternative-id":["10.1080\/09540091.2022.2080181"],"URL":"https:\/\/doi.org\/10.1080\/09540091.2022.2080181","relation":{},"ISSN":["0954-0091","1360-0494"],"issn-type":[{"value":"0954-0091","type":"print"},{"value":"1360-0494","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,6,14]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ccos20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2021-12-13","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-17","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-06-14","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}