{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:18:42Z","timestamp":1759133922697},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,5]]},"DOI":"10.1109\/bloc.2019.8751352","type":"proceedings-article","created":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T23:44:06Z","timestamp":1562024646000},"page":"440-446","source":"Crossref","is-referenced-by-count":9,"title":["Private Transaction Retrieval for Lightweight Bitcoin Client"],"prefix":"10.1109","author":[{"given":"Yankai","family":"Xie","sequence":"first","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lingbo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yukun","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Faxing","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"The number of Tor node","year":"0","key":"ref10"},{"journal-title":"The number of Bitcoin node","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111245"},{"key":"ref13","article-title":"An algorithmic framework for differentially private data analysis on trusted processors","author":"allen","year":"2018","journal-title":"arXiv preprint arXiv 1807 00736"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3065913.3065915"},{"key":"ref15","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-60876-1_1","article-title":"Malware guard extension: Using SGX to conceal cache attacks","author":"schwarz","year":"2017","journal-title":"Detection of Intrusions and Malware and Vulnerability Assessment"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1109\/SP.2015.45","article-title":"Controlled-channel attacks: Deterministic side channels for untrusted operating systems","author":"xu","year":"2015","journal-title":"2015 IEEE Symposium on Security and Privacy (SP)"},{"key":"ref17","article-title":"Foreshadow: Extracting the keys to the Intel SGX kingdom with transient out-of-order execution","author":"van bulck","year":"2018","journal-title":"Proceedings of the 27th USENIX Security Symposium USENIX Association"},{"journal-title":"Private information retrieval by keywords","year":"1997","author":"chor","key":"ref18"},{"key":"ref19","article-title":"A fast multi-server, multi-block private information retrieval protocol","author":"wang","year":"2015","journal-title":"Global Communications Conference (GLOBECOM) 2015 IEEE"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/PIMRC.2017.8292537"},{"journal-title":"Bip0037","year":"2012","author":"mike","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"journal-title":"Bite Bitcoin lightweight client privacy using trusted execution","year":"2018","author":"matetic","key":"ref5"},{"journal-title":"Bip0158","year":"2017","author":"olaoluwa","key":"ref8"},{"journal-title":"Bip0157","year":"2017","author":"olaoluwa","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.15"},{"journal-title":"Data-Driven De-Anonymization in Bitcoin","year":"2015","author":"nick","key":"ref1"},{"key":"ref20","article-title":"Raid-pir: Practical multi-server pir","author":"demmler","year":"2014","journal-title":"Proceedings of the 30th Annual Computer Security Applications Conference"},{"journal-title":"Confirmation of Bitcoin transaction","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"journal-title":"Bitcoin and Blockchain Security[J]","year":"2016","author":"karame","key":"ref24"},{"journal-title":"blockchain info","year":"2017","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData.2017.153"},{"journal-title":"Bitcoin outputs today","year":"0","key":"ref25"}],"event":{"name":"2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2019,5,14]]},"location":"Seoul, Korea (South)","end":{"date-parts":[[2019,5,17]]}},"container-title":["2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8744142\/8751228\/08751352.pdf?arnumber=8751352","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T03:11:21Z","timestamp":1657854681000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8751352\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/bloc.2019.8751352","relation":{},"subject":[],"published":{"date-parts":[[2019,5]]}}}