{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,15]],"date-time":"2025-08-15T01:30:53Z","timestamp":1755221453238,"version":"3.43.0"},"reference-count":54,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"9","license":[{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,9,1]],"date-time":"2025-09-01T00:00:00Z","timestamp":1756684800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Parallel Distrib. Syst."],"published-print":{"date-parts":[[2025,9]]},"DOI":"10.1109\/tpds.2025.3577038","type":"journal-article","created":{"date-parts":[[2025,6,6]],"date-time":"2025-06-06T13:43:41Z","timestamp":1749217421000},"page":"1841-1856","source":"Crossref","is-referenced-by-count":0,"title":["Everything Distributed and Asynchronous: A Practical System for Key Management Service"],"prefix":"10.1109","volume":"36","author":[{"ORCID":"https:\/\/orcid.org\/0009-0007-0551-0455","authenticated-orcid":false,"given":"Zhaoyang","family":"Xie","sequence":"first","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5865-3408","authenticated-orcid":false,"given":"Haibin","family":"Zhang","sequence":"additional","affiliation":[{"name":"Region Institute, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1385-6807","authenticated-orcid":false,"given":"Sisi","family":"Duan","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5221-7549","authenticated-orcid":false,"given":"Chao","family":"Liu","sequence":"additional","affiliation":[{"name":"Region Institute, Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1366-8256","authenticated-orcid":false,"given":"Shengli","family":"Liu","sequence":"additional","affiliation":[{"name":"Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xuanji","family":"Meng","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0667-077X","authenticated-orcid":false,"given":"Yong","family":"Yu","sequence":"additional","affiliation":[{"name":"Shaanxi Normal University, Xi&#x2019;an, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0486-6413","authenticated-orcid":false,"given":"Fangguo","family":"Zhang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"given":"Boxin","family":"Zhao","sequence":"additional","affiliation":[{"name":"Zhongguancun Laboratory, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3277-3887","authenticated-orcid":false,"given":"Liehuang","family":"Zhu","sequence":"additional","affiliation":[{"name":"Beijing Institute of Technology, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3411-7947","authenticated-orcid":false,"given":"Tianqing","family":"Zhu","sequence":"additional","affiliation":[{"name":"City University of Macau, Macau, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN58367.2023.00059"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054113"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36288-6_3"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-004-0314-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-005-0318-0"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1093\/nsr\/nwac132"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3576915.3616633"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978399"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/3243734.3243812"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417262"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00063"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3293611.3331591"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2025.3568460"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3559348"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467914"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS54860.2022.00032"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3460120.3484808"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3423364"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833584"},{"key":"ref20","first-page":"5359","article-title":"Practical asynchronous high-threshold distributed key generation and distributed polynomial sampling","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Das"},{"key":"ref21","first-page":"5341","article-title":"WaterBEAR: Practical asynchronous BFT matching security guarantees of partially synchronous BFT","volume-title":"Proc. 32nd USENIX Secur. Symp.","author":"Zhang"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48910-X_16"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/11605805_15"},{"key":"ref24","article-title":"Practical asynchronous proactive secret sharing and key refresh","author":"G\u00fcnther","year":"2022","journal-title":"Cryptology ePrint Arch."},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363203"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167105"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1002\/sec.1651"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-77870-5_6"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2003.1258486"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_21"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-75670-5_14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/11596219_24"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611498"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-81652-0_2"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3548606.3560656"},{"key":"ref36","article-title":"How to prove Schnorr assuming Schnorr: Security of multi- and threshold signatures","author":"Crites","year":"2021","journal-title":"Cryptology ePrint Arch."},{"key":"ref37","article-title":"Distributed key generation in the wild","author":"Kate","year":"2012","journal-title":"Cryptology ePrint Arch."},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3431554"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/EuroSP57164.2023.00059"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-96-0894-2_9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-58723-8_8"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586124"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-64331-0_25"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/SP46214.2022.9833658"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/3558535.3559788"},{"key":"ref46","first-page":"4319","article-title":"Lakey: Efficient lattice-based distributed PRFs enable scalable distributed key management","volume-title":"Proc. 33rd USENIX Secur. Symp.","author":"Geihs"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40041-4_23"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586124"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90054-X"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/197917.198088"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48071-4_7"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48184-2_32"},{"author":"Duan","key":"ref53","article-title":"WaterBear BFT library"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84245-1_4"}],"container-title":["IEEE Transactions on Parallel and Distributed Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/71\/11083525\/11027576.pdf?arnumber=11027576","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,8]],"date-time":"2025-08-08T18:41:45Z","timestamp":1754678505000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11027576\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9]]},"references-count":54,"journal-issue":{"issue":"9"},"URL":"https:\/\/doi.org\/10.1109\/tpds.2025.3577038","relation":{},"ISSN":["1045-9219","1558-2183","2161-9883"],"issn-type":[{"type":"print","value":"1045-9219"},{"type":"electronic","value":"1558-2183"},{"type":"electronic","value":"2161-9883"}],"subject":[],"published":{"date-parts":[[2025,9]]}}}