{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:54:57Z","timestamp":1764838497576,"version":"3.46.0"},"reference-count":30,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T00:00:00Z","timestamp":1762128000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,11,3]]},"DOI":"10.1109\/icumt67815.2025.11268559","type":"proceedings-article","created":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T18:40:02Z","timestamp":1764787202000},"page":"311-316","source":"Crossref","is-referenced-by-count":0,"title":["Distributed Participation to Threshold Signature Analyzed via Game Theory"],"prefix":"10.1109","author":[{"given":"Alessandro","family":"Buratto","sequence":"first","affiliation":[{"name":"University of Padova,Dept. Inf. Engineering (DEI),Padova,Italy"}]},{"given":"Sara","family":"Ricci","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Dept. Telecommunications (FEEC),Brno,Czech Republic"}]},{"given":"Petr","family":"Dzurenda","sequence":"additional","affiliation":[{"name":"Brno University of Technology,Dept. Telecommunications (FEEC),Brno,Czech Republic"}]},{"given":"Leonardo","family":"Badia","sequence":"additional","affiliation":[{"name":"University of Padova,Dept. Inf. Engineering (DEI),Padova,Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2022.3192978"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3359982"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/WCNC57260.2024.10570991"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SIN54109.2021.9699195"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3117452"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2917763"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-025-01958-1"},{"volume-title":"NIST First Call for Multi-Party Threshold Schemes","year":"2023","author":"Brandao","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-023-00198-1"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2019.1900002"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20901-7_2"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/359168.359176"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/ecjc.4430720906"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_10"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_15"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96884-1_24"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243859"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-16168-1_7"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/SP54263.2024.00057"},{"volume-title":"Threshold signatures","year":"2025","author":"Tkachenko","key":"ref21"},{"volume-title":"Threshold BLS signature for decentralized asset control","year":"2025","key":"ref22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICCWorkshops57953.2023.10283791"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2021.3065053"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2023.3298716"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2024.3504745"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2006.1593519"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/MedComNet62012.2024.10578206"},{"article-title":"Price of anarchy for green digital twin enabled logistics","volume-title":"Proc. IEEE Symp. Comp. Commun. (ISCC)","author":"Favero","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2019.2961995"}],"event":{"name":"2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)","start":{"date-parts":[[2025,11,3]]},"location":"Florence, Italy","end":{"date-parts":[[2025,11,5]]}},"container-title":["2025 17th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11268479\/11268547\/11268559.pdf?arnumber=11268559","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T08:50:35Z","timestamp":1764838235000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11268559\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icumt67815.2025.11268559","relation":{},"subject":[],"published":{"date-parts":[[2025,11,3]]}}}