{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,15]],"date-time":"2026-05-15T14:00:43Z","timestamp":1778853643073,"version":"3.51.4"},"reference-count":46,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62372149"],"award-info":[{"award-number":["62372149"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U23A20303"],"award-info":[{"award-number":["U23A20303"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62002094"],"award-info":[{"award-number":["62002094"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2021YFB2701202"],"award-info":[{"award-number":["2021YFB2701202"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2024]]},"DOI":"10.1109\/tifs.2023.3347968","type":"journal-article","created":{"date-parts":[[2023,12,28]],"date-time":"2023-12-28T19:22:35Z","timestamp":1703791355000},"page":"2217-2230","source":"Crossref","is-referenced-by-count":16,"title":["Decentralized Threshold Signatures With Dynamically Private Accountability"],"prefix":"10.1109","volume":"19","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"first","affiliation":[{"name":"Key Laboratory of Knowledge Engineering With Big Data, Ministry of Education, the School of Computer Science and Information Engineering, the Anhui Province Key Laboratory of Industry Safety and Emergency Technology, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"given":"Hanni","family":"Ding","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering With Big Data, Ministry of Education, the School of Computer Science and Information Engineering, the Anhui Province Key Laboratory of Industry Safety and Emergency Technology, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"given":"Qing","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering With Big Data, Ministry of Education, the School of Computer Science and Information Engineering, the Anhui Province Key Laboratory of Industry Safety and Emergency Technology, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"given":"Mingwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering With Big Data, Ministry of Education, the School of Computer Science and Information Engineering, the Anhui Province Key Laboratory of Industry Safety and Emergency Technology, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4384-5786","authenticated-orcid":false,"given":"Weizhi","family":"Meng","sequence":"additional","affiliation":[{"name":"Department of Applied Mathematics and Computer Science, Cyber Security Section, Technical University of Denmark (DTU), Kongens Lyngby, Denmark"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6313-4407","authenticated-orcid":false,"given":"Zijian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8916-6645","authenticated-orcid":false,"given":"Xiaodong","family":"Lin","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Guelph, Guelph, ON, Canada"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_15"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92068-5_18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560656"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502017"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84242-0_8"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_3"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_19"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15985-5_19"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_24"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.38"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3130583"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_18"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36362-7_9"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_30"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2948618.2954330"},{"key":"ref19","volume-title":"Which Platforms Support Intel\u00ae Software Guard Extensions (Intel\u00ae SGX) SGX2?","year":"2023"},{"key":"ref20","first-page":"818","article-title":"Effcient batched oblivious PRF with applications to PSI","volume-title":"Proc. 23rd ACM Conf. Comput. Commun. Secur. (CCS)","author":"Kolesnikov"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45724-2_25"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-88428-4_10"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2017.122"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2019.00065"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-40061-5_33"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73549-6_116"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/11745853_23"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_18"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-29959-0_35"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_26"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73489-5_4"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1201\/9781351133036"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2487726.2488368"},{"key":"ref36","volume-title":"Intel\u00ae Software Guard Extensions"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3192367"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3204287"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134098"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/tnsm.2021.3098439"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2023.3321712"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2894727"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3236072"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3305916"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45539-6_31"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054015"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10206\/10319981\/10375550.pdf?arnumber=10375550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T06:05:02Z","timestamp":1709445902000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10375550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/tifs.2023.3347968","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024]]}}}