{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T01:18:51Z","timestamp":1740100731699,"version":"3.37.3"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,4,10]],"date-time":"2022-04-10T00:00:00Z","timestamp":1649548800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/100006190","name":"Research and Development","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006190","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,4,10]]},"DOI":"10.1109\/wcnc51071.2022.9771976","type":"proceedings-article","created":{"date-parts":[[2022,5,16]],"date-time":"2022-05-16T20:45:39Z","timestamp":1652733939000},"page":"1533-1538","source":"Crossref","is-referenced-by-count":3,"title":["Hybrid Smart Contracts for Privacy-Preserving-Aware Insurance Compensation"],"prefix":"10.1109","author":[{"given":"Sheng","family":"Cao","sequence":"first","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China"}]},{"given":"Qian","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China"}]},{"given":"Dongdong","family":"Wang","sequence":"additional","affiliation":[{"name":"No.15 Research Institute of China Electronics Technology Group Corporation"}]},{"given":"Peng","family":"Xiangli","sequence":"additional","affiliation":[{"name":"The Fifth Electronic Research Institute of MIIT,China"}]},{"given":"Xiaosong","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Electronic Science and Technology of China,School of Computer Science and Engineering, Center for Cyber Security,China"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149326"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.55"},{"article-title":"Ekiden: A platform for confidentiality-preserving, trustworthy, and performant smart contract execution","year":"2018","author":"cheng","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59013-0_30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2020.102397"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38348-9_37"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63715-0_20"},{"key":"ref18","first-page":"1076","article-title":"Fractal: Post-quantum and transparent recursive proofs from holography","volume":"2019","author":"chiesa","year":"2019","journal-title":"Eurocrypt"},{"key":"ref19","first-page":"953","article-title":"Plonk: Permutations over lagrange-bases for oecumenical noninteractive arguments of knowledge","volume":"2019","author":"gabizon","year":"2019","journal-title":"IACR Cryptology ePrint Archive"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363222"},{"article-title":"Blockchain is empowering the future of insurance","year":"2016","author":"wang","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.001.1900173"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCC.2018.011791712"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.101966"},{"key":"ref7","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"wood","year":"2014","journal-title":"Ethereum project"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2019.02.038"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102407"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/Blockchain.2019.00015"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3339817"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978326"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45721-1_26"},{"year":"2018","key":"ref24","article-title":"Libsnark performance information for preprocessing zk-snark for r1cs relation"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/Cybermatics_2018.2018.00199"}],"event":{"name":"2022 IEEE Wireless Communications and Networking Conference (WCNC)","start":{"date-parts":[[2022,4,10]]},"location":"Austin, TX, USA","end":{"date-parts":[[2022,4,13]]}},"container-title":["2022 IEEE Wireless Communications and Networking Conference (WCNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9771381\/9771540\/09771976.pdf?arnumber=9771976","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,20]],"date-time":"2022-06-20T21:18:09Z","timestamp":1655759889000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9771976\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,10]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/wcnc51071.2022.9771976","relation":{},"subject":[],"published":{"date-parts":[[2022,4,10]]}}}