{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T20:10:05Z","timestamp":1747339805756,"version":"3.40.5"},"reference-count":32,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072305","62132013","62325207"],"award-info":[{"award-number":["62072305","62132013","62325207"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Special Fund for Key Technologies in Blockchain of Shanghai Scientific and Technological Committee","award":["23511100300"],"award-info":[{"award-number":["23511100300"]}]},{"name":"Singapore Ministry of Education (MOE) Academic Research Fund (AcRF) Tier 1"},{"name":"Lee Kong Chian Fellowship awarded by Singapore Management University"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Dependable and Secure Comput."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1109\/tdsc.2024.3520828","type":"journal-article","created":{"date-parts":[[2024,12,23]],"date-time":"2024-12-23T19:43:23Z","timestamp":1734983003000},"page":"2624-2641","source":"Crossref","is-referenced-by-count":0,"title":["HDWSA2: A Secure Hierarchical Deterministic Wallet Supporting Stealth Address and Signature Aggregation"],"prefix":"10.1109","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8761-183X","authenticated-orcid":false,"given":"Xin","family":"Yin","sequence":"first","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9268-702X","authenticated-orcid":false,"given":"Zhen","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4949-7738","authenticated-orcid":false,"given":"Guomin","family":"Yang","sequence":"additional","affiliation":[{"name":"Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8107-5909","authenticated-orcid":false,"given":"Guoxing","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5079-4556","authenticated-orcid":false,"given":"Haojin","family":"Zhu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423361"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180453"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44647-8_13"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39200-9_26"},{"article-title":"One-time and interactive aggregate signatures from lattices","year":"2020","author":"Boneh","key":"ref5"},{"key":"ref6","article-title":"Deterministic wallets, their advantages and their understated flaws","author":"Buterin","year":"2013","journal-title":"Bitcoin Mag."},{"year":"2011","key":"ref7","article-title":"Untraceable transactions which can contain a secure message are inevitable"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-75539-3_24"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484807"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354236"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2021.3136556"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/DESEC.2018.8625151"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-019-00476-5"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_17"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_31"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-78375-8_7"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3488932.3524128"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP.2019.00025"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3078463"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-65411-5_16"},{"year":"2023","key":"ref22","article-title":"Fips pub 186-5"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.5195\/LEDGER.2016.34"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"article-title":"Cryptonote v 2.0","year":"2013","author":"van Saberhagen","key":"ref25"},{"article-title":"Stealth addresses. Post on Bitcoin development mailing list","year":"2014","author":"Todd","key":"ref26"},{"article-title":"The PBC go wrapper","year":"2018","author":"Unger","key":"ref27"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_7"},{"article-title":"BIP32: Hierarchical deterministic wallets","year":"2012","author":"Wuille","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-17140-6_5"},{"key":"ref31","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-17140-6_5","article-title":"Secure hierarchical deterministic wallet supporting stealth address","volume-title":"Cryptol. ePrint Arch.","author":"Yin","year":"2022"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2008.12.042"}],"container-title":["IEEE Transactions on Dependable and Secure Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/8858\/10992672\/10812034.pdf?arnumber=10812034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,15]],"date-time":"2025-05-15T19:37:39Z","timestamp":1747337859000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10812034\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5]]},"references-count":32,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tdsc.2024.3520828","relation":{},"ISSN":["1545-5971","1941-0018","2160-9209"],"issn-type":[{"type":"print","value":"1545-5971"},{"type":"electronic","value":"1941-0018"},{"type":"electronic","value":"2160-9209"}],"subject":[],"published":{"date-parts":[[2025,5]]}}}