{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T22:41:20Z","timestamp":1758148880513,"version":"3.44.0"},"reference-count":48,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62372149","U23A20303","62572168"],"award-info":[{"award-number":["62372149","U23A20303","62572168"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"Anhui Provincial Natural Science Foundation","doi-asserted-by":"publisher","award":["2508085MF151"],"award-info":[{"award-number":["2508085MF151"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Key Laboratory of Knowledge Engineering with Big Data","award":["BigKEOpen2025-04"],"award-info":[{"award-number":["BigKEOpen2025-04"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3607250","type":"journal-article","created":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T17:43:39Z","timestamp":1757353419000},"page":"9477-9491","source":"Crossref","is-referenced-by-count":0,"title":["Threshold Signatures With Verifiably Timed Combining and Message-Dependent Tracing"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3553-0813","authenticated-orcid":false,"given":"Meng","family":"Li","sequence":"first","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"given":"Hanni","family":"Ding","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5256-3249","authenticated-orcid":false,"given":"Yifei","family":"Chen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4407-1762","authenticated-orcid":false,"given":"Yan","family":"Qiao","sequence":"additional","affiliation":[{"name":"Key Laboratory of Knowledge Engineering with Big Data, Ministry of Education, the School of Computer Science and Information Engineering, and the Intelligent Interconnected Systems Laboratory of Anhui Province, Hefei University of Technology, Hefei, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6313-4407","authenticated-orcid":false,"given":"Zijian","family":"Zhang","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Cyberspace Science and Technology, Beijing Institute of Technology, Beijing, China"}]},{"given":"Mauro","family":"Conti","sequence":"additional","affiliation":[{"name":"Department of Mathematics and the HIT Center, University of Padua, Padua, Italy"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34805-0_28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44987-6_10"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-92068-5_18"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560656"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2020.3017534"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2021.3130583"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2022.3192367"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/tkde.2023.3321712"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/tdsc.2024.3521396"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_3"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_19"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502017"},{"key":"ref13","first-page":"189","article-title":"MuSig2: Simple two-round Schnorr multisignatures","volume-title":"Proc. 41st Annu. Int. Cryptol. Conf.","author":"Nick"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-15985-5_19"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-97-5025-2_20"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2023.3347968"},{"volume":"1996","volume-title":"Timelock puzzles and timed-release crypto","author":"Rivest","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22792-9_3"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2017.59"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_10"},{"volume-title":"Timed-Release Crypto","year":"1993","key":"ref21"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44598-6_15"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2008","author":"Nakamoto","key":"ref23"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417263"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36334-4_18"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2484313.2484382"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2022.3217742"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2020.05.115"},{"volume-title":"Bitcoin: A Peer-to-Peer Electronic Cash System","year":"2009","author":"Nakamoto","key":"ref29"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2886932"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS60910.2024.00045"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46766-1_9"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85174-5_18"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2389959"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-26948-7_22"},{"volume-title":"Smart Contracts","year":"1994","author":"Szabo","key":"ref36"},{"volume-title":"Ethereum: A Secure Decentralised Generalised Transaction Ledger SHANGHAI VERSION 56b3dfd-2024-08-19","year":"2024","author":"Wood","key":"ref37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34621-8_22"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24660-2_6"},{"key":"ref40","first-page":"52","article-title":"Non-interactive zeroknowledge proof systems","volume-title":"Proc. 4th Annu. Int. Cryptol. Conf. (CRYPTO)","author":"De Santis"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1985.1057074"},{"key":"ref42","first-page":"557","article-title":"Inferring fine-grained control flow inside SGX enclaves with branch shadowing","volume-title":"Proc. 26th USENIX Secur. Symp.","author":"Lee"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363205"},{"key":"ref44","first-page":"451","article-title":"HybCache: Hybrid side-channel-resilient caches for trusted execution environments","volume-title":"Proc. 29th USENIX Secur. Symp.","author":"Dessouky"},{"key":"ref45","first-page":"663","article-title":"Frontal attack: Leaking control-flow in SGX via the CPU frontend","volume-title":"Proc. 30th USENIX Secur. Symp.","author":"Puddu"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47721-7_12"},{"volume-title":"Ethereum","key":"ref47"},{"key":"ref48","article-title":"How to simulate it\u2014A tutorial on the simulation proof technique","author":"Lindell","year":"2021","journal-title":"Tutorials on the Foundations of Cryptography: Dedicated to Oded Goldreich"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11153543.pdf?arnumber=11153543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,16]],"date-time":"2025-09-16T17:33:07Z","timestamp":1758043987000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11153543\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3607250","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"type":"print","value":"1556-6013"},{"type":"electronic","value":"1556-6021"}],"subject":[],"published":{"date-parts":[[2025]]}}}