{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T22:18:10Z","timestamp":1771366690136,"version":"3.50.1"},"reference-count":44,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,1]],"date-time":"2022-09-01T00:00:00Z","timestamp":1661990400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2022,9,1]]},"DOI":"10.1109\/tdsc.2021.3078463","type":"journal-article","created":{"date-parts":[[2021,5,10]],"date-time":"2021-05-10T20:27:22Z","timestamp":1620678442000},"page":"2934-2951","source":"Crossref","is-referenced-by-count":14,"title":["Secure Deterministic Wallet and Stealth Address: Key-Insulated and Privacy-Preserving Signature Scheme With Publicly Derived Public Key"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9268-702X","authenticated-orcid":false,"given":"Zhen","family":"Liu","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4949-7738","authenticated-orcid":false,"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Wollongong, Wollongong, NSW, Australia"}]},{"given":"Duncan S.","family":"Wong","sequence":"additional","affiliation":[{"name":"CryptoBLK, Hong Kong"}]},{"given":"Khoa","family":"Nguyen","sequence":"additional","affiliation":[{"name":"School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7669-8922","authenticated-orcid":false,"given":"Huaxiong","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Physical and Mathematical Sciences, Nanyang Technological University, Singapore, Singapore"}]},{"given":"Xiaorong","family":"Ke","sequence":"additional","affiliation":[{"name":"Huawei Technologies Company, Ltd., Shenzhen, China"}]},{"given":"Yining","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Southern California, Los Angeles, CA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00025"},{"key":"ref2","article-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto","year":"2008"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref4","article-title":"Deterministic wallets","author":"Maxwell","year":"2011"},{"key":"ref5","article-title":"Electrum lightweight bitcoin wallet","year":"2011"},{"key":"ref6","article-title":"Bip32: Hierarchical deterministic wallets","author":"Wuille","year":"2012"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_27"},{"key":"ref8","article-title":"Cryptonote v 2.0","author":"van Saberhagen","year":"2013"},{"key":"ref9","article-title":"Stealth addresses","author":"Todd","year":"2014"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.5195\/ledger.2016.34"},{"key":"ref11","article-title":"Top 100 cryptocurrencies by market capitalization","year":"2018"},{"key":"ref12","article-title":"Fips pub 186\u20134","year":"2018"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_31"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46035-7_5"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_10"},{"key":"ref16","first-page":"325","article-title":"Linkable spontaneous anonymous group signature for ad hoc groups (extended abstract)","volume-title":"Proc. Australas. Conf. Inf. Secur. Privacy","author":"Liu"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"ref19","article-title":"Deterministic wallets, their advantages, and their understated flaws","author":"Buterin","year":"2013","journal-title":"Bitcoin Mag."},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.5220\/0006270005590566"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_32"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_33"},{"key":"ref25","article-title":"Signatures with flexible public key: A unified approach to privacy-preserving signatures (full version)","author":"Backes","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11818175_17"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14623-7_6"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-008-9028-8"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36492-7_20"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_2"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/11593447_28"},{"key":"ref34","article-title":"Identity-based signatures.","author":"Kiltz"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_4"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/11693383_22"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-57p1r3"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53018-4_20"},{"key":"ref43","article-title":"MCL: A portable and fast pairing-based cryptography library","author":"Shigeo","year":"2012"},{"key":"ref44","article-title":"PDPKS: Key-insulated and privacy-preserving signature scheme with publicly derived public key.","author":"Ke"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8858\/9872146\/09427142.pdf?arnumber=9427142","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,10]],"date-time":"2024-01-10T00:22:19Z","timestamp":1704846139000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9427142\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,1]]},"references-count":44,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2021.3078463","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"value":"1545-5971","type":"print"},{"value":"1941-0018","type":"electronic"},{"value":"2160-9209","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,9,1]]}}}