{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,25]],"date-time":"2025-12-25T07:20:11Z","timestamp":1766647211525},"reference-count":15,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,8,1]],"date-time":"2019-08-01T00:00:00Z","timestamp":1564617600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1109\/iccchina.2019.8855900","type":"proceedings-article","created":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T21:03:16Z","timestamp":1570136596000},"page":"1006-1011","source":"Crossref","is-referenced-by-count":4,"title":["A Privacy-preserving Ethereum Lightweight Client Using PIR"],"prefix":"10.1109","author":[{"given":"Yankai","family":"Xie","sequence":"first","affiliation":[]},{"given":"Chi","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Lingbo","family":"Wei","sequence":"additional","affiliation":[]},{"given":"Yukun","family":"Niu","sequence":"additional","affiliation":[]},{"given":"Faxing","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jianqing","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Ethereum Yellow Paper","year":"0","author":"gavin","key":"ref10"},{"journal-title":"Ethereum Tor support in mist","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1995.492461"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2664168.2664181"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2015.7417246"},{"journal-title":"Etherscan io Ethereum chart and graph","year":"0","key":"ref15"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111245"},{"journal-title":"Data-Driven De-Anonymization in Bitcoin","year":"2015","author":"nick","key":"ref3"},{"journal-title":"Bite Bitcoin lightweight client privacy using trusted execution","year":"2018","author":"matetic","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"journal-title":"Ethereum lightweight client","year":"2018","author":"ray","key":"ref8"},{"journal-title":"Light ethereum subprotocol","year":"0","author":"felfoldi","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"journal-title":"Bitcoin and Blockchain Security[J]","year":"2016","author":"karame","key":"ref1"},{"journal-title":"Bip0037","year":"2012","author":"mike","key":"ref9"}],"event":{"name":"2019 IEEE\/CIC International Conference on Communications in China (ICCC)","start":{"date-parts":[[2019,8,11]]},"location":"Changchun, China","end":{"date-parts":[[2019,8,13]]}},"container-title":["2019 IEEE\/CIC International Conference on Communications in China (ICCC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8848288\/8855800\/08855900.pdf?arnumber=8855900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:51:48Z","timestamp":1658080308000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8855900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/iccchina.2019.8855900","relation":{},"subject":[],"published":{"date-parts":[[2019,8]]}}}