{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T15:19:22Z","timestamp":1762096762712,"version":"build-2065373602"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T00:00:00Z","timestamp":1698105600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,10,24]]},"DOI":"10.1109\/bcca58897.2023.10338880","type":"proceedings-article","created":{"date-parts":[[2023,12,11]],"date-time":"2023-12-11T19:51:48Z","timestamp":1702324308000},"page":"511-517","source":"Crossref","is-referenced-by-count":8,"title":["Secure and Decentralized Generation of Secret Random Numbers on the Blockchain"],"prefix":"10.1109","author":[{"given":"Pouria","family":"Fatemi","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology,Department of Computer Science and Engineering"}]},{"given":"Amir","family":"Goharshady","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology,Department of Computer Science and Engineering"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/blockchain.2019.00083"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/sp40000.2020.00003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/BLOC.2019.8751326"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.2139\/ssrn.3368483"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1186\/s41469-018-0038-1"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2019.02.001"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63688-7_12"},{"key":"ref8","article-title":"Game-theoretic randomness for proof-of-stake","author":"Cai","year":"2023","journal-title":"MARBLE"},{"key":"ref9","first-page":"1","article-title":"Trustless and bias-resistant game-theoretic distributed random-ness","year":"2023","journal-title":"ICBC"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0240693"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1089\/glr2.2017.2174"},{"key":"ref12","first-page":"421","article-title":"Betting on blockchain","volume":"17","author":"White","year":"2018","journal-title":"Colo. Tech. LJ"},{"key":"ref13","article-title":"Asparagus: Au-tomated synthesis of parametric gas upper-bounds for smart contracts","author":"Cai","year":"2023","journal-title":"OOPSLA"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.110923"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC56567.2023.10174876"},{"key":"ref16","first-page":"258","article-title":"Alleviating high gas costs by secure and trustless off-chain execution of smart contracts","year":"2023","journal-title":"SAC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89884-1_26"},{"issue":"2018","key":"ref18","first-page":"11:1","article-title":"Ergodic mean-payoff games for the analysis of attacks in crypto-currencies","volume":"118","author":"Chatterjee","journal-title":"CONCUR"},{"volume-title":"An introduction to mathematical cryptography","year":"2008","author":"Hoffstein","key":"ref19"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57048-8_5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/blockchain53845.2021.00021"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/blockchain55522.2022.00044"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297319"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/cybermatics_2018.2018.00231"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3297280.3297322"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/800070.802212"},{"key":"ref28","first-page":"387","article-title":"On distinguishing prime numbers from composite numbers (abstract)","author":"Adleman","year":"1980","journal-title":"FOCS"},{"volume-title":"RANDAO: A DAO working as RNG of Ethereum","year":"2019","key":"ref29"},{"volume-title":"Predicting random numbers in ethereum smart contracts","year":"2018","author":"Reutov","key":"ref30"},{"journal-title":"Ethereum StackExchange","article-title":"When can blockhash be safely used for a random number? when would it be unsafe?","year":"2016","key":"ref31"},{"journal-title":"Oraclize","article-title":"A scalable architecture for on-demand, untrusted delivery of entropy","year":"2019","key":"ref32"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(88)90005-0"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_25"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-17659-4_13"},{"key":"ref36","article-title":"Simple verifiable delay functions","author":"Pietrzak","year":"2018","journal-title":"ITCS"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SFFCS.1999.814584"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46497-7_5"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49096-9_14"},{"key":"ref41","article-title":"Winning the caucus race: Continuous leader election via public randomness","volume":"abs\/1801.07965","author":"Azouvi","year":"2018","journal-title":"CoRR"},{"key":"ref42","article-title":"Proofs-of-delay and random-ness beacons in ethereum","author":"B\u00fcnz","year":"2017","journal-title":"S&B"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61204-1_27"},{"key":"ref45","first-page":"573","article-title":"Ouroboros praos: An adaptively-secure, semi-synchronous proof-of-stake protocol","author":"David","year":"2017","journal-title":"IACR Cryptol. ePrint Arch"},{"key":"ref46","article-title":"DFINITY technology overview series, consensus system","volume":"abs\/1805.04548","author":"Hanke","year":"2018","journal-title":"CoRR"}],"event":{"name":"2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)","start":{"date-parts":[[2023,10,24]]},"location":"Kuwait, Kuwait","end":{"date-parts":[[2023,10,26]]}},"container-title":["2023 Fifth International Conference on Blockchain Computing and Applications (BCCA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10338825\/10338826\/10338880.pdf?arnumber=10338880","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,12,19]],"date-time":"2023-12-19T23:51:44Z","timestamp":1703029904000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10338880\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,24]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/bcca58897.2023.10338880","relation":{},"subject":[],"published":{"date-parts":[[2023,10,24]]}}}