{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,26]],"date-time":"2025-11-26T04:31:40Z","timestamp":1764131500572,"version":"3.37.3"},"reference-count":26,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/OAPA.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61472249","61472114","61572192"],"award-info":[{"award-number":["61472249","61472114","61572192"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"crossref","award":["2017YFB0802003"],"award-info":[{"award-number":["2017YFB0802003"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"name":"International Science and Technology Cooperation and Exchange Projects of Shaanxi Province","award":["2016KW-038"],"award-info":[{"award-number":["2016KW-038"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2018]]},"DOI":"10.1109\/access.2017.2787563","type":"journal-article","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T19:30:05Z","timestamp":1514403005000},"page":"12336-12341","source":"Crossref","is-referenced-by-count":30,"title":["Anonymity for Bitcoin From Secure Escrow Address"],"prefix":"10.1109","volume":"6","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6201-7890","authenticated-orcid":false,"given":"Qi","family":"Wang","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1779-6178","authenticated-orcid":false,"given":"Xiangxue","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yu","family":"Yu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2695533.2695545"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s102070100002"},{"article-title":"Securing bitcoin wallets via a new DSA\/ECDSA threshold signature scheme","year":"2015","author":"bonneau","key":"ref12"},{"article-title":"System and method for emulating a multiple input, multiple output transmission channel","year":"2006","author":"erceg","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805780"},{"key":"ref15","article-title":"Coinjoin: Bitcoin privacy for the real world","author":"maxwell","year":"2013","journal-title":"Post on Bitcoin Forum"},{"journal-title":"Secure Distributed Key Generation for Discrete-Log Based Cryptosystems Journal of Cryptology","year":"1999","author":"gennaro","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1987.4"},{"key":"ref18","first-page":"187","article-title":"How to exchange secrets with oblivious transfer","author":"rabin","year":"2005","journal-title":"IACR Cryptology ePrint"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/358549.358563"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46803-6_13"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2504730.2504747"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45472-5_30"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-006-0347-3"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32946-3_29"},{"article-title":"Distributed storage on a P2P network architecture","year":"2002","author":"shteyn","key":"ref9"},{"key":"ref1","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"nakamoto","year":"2008","journal-title":"Consulted"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2517872.2517878"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44774-1_10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_25"},{"article-title":"CoinSwap: Transaction graph disjoint trustless trading","year":"2013","author":"maxwell","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11212-1_20"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31979-5_5"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8274985\/08240594.pdf?arnumber=8240594","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T03:00:17Z","timestamp":1633921217000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8240594\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/access.2017.2787563","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2018]]}}}