{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T16:13:22Z","timestamp":1730304802334,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/wcsp.2019.8928072","type":"proceedings-article","created":{"date-parts":[[2019,12,27]],"date-time":"2019-12-27T17:06:26Z","timestamp":1577466386000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["APRNET: Achieving Privacy-Preserving Real-Name Authentication over Blockchain for Online Services"],"prefix":"10.1109","author":[{"given":"Ye","family":"Xu","sequence":"first","affiliation":[]},{"given":"Bin","family":"Cao","sequence":"additional","affiliation":[]},{"given":"Rongxing","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Qinyu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICBDA.2019.8713188"},{"key":"ref11","first-page":"325","article-title":"Evaluating 2-dnf formulas on ciphertexts","author":"boneh","year":"0","journal-title":"Theory of Cryptography Conference"},{"key":"ref12","first-page":"56","article-title":"Short signatures without random oracles","author":"boneh","year":"0","journal-title":"International Conference on the Theory and Applications of Cryptographic Techniques"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1007\/10722028_23","article-title":"A one round protocol for tripartite diffie-hellman","author":"joux","year":"0","journal-title":"Algorithmic Number Theory First International Symposium"},{"journal-title":"Handbook of Applied Cryptography","year":"1997","author":"menezes","key":"ref14"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/SPW.2015.27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICMSS.2010.5578416"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/CIC.2018.00-45"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.10299"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-016-0574-6"},{"key":"ref7","first-page":"1","article-title":"A blockchain-based approach to health information exchange networks","volume":"1","author":"peterson","year":"0","journal-title":"Proc NIST Workshop Blockchain Healthcare"},{"journal-title":"Bitcoin A Peer-to-Peer Electronic Cash System","year":"2008","author":"nakamoto","key":"ref2"},{"key":"ref1","first-page":"1","article-title":"Real-name registration rules and the fading digital anonymity in china","volume":"25","author":"lee","year":"2016","journal-title":"Pac Rim L & Pol'y J"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/OBD.2016.11"}],"event":{"name":"2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)","start":{"date-parts":[[2019,10,23]]},"location":"Xi'an, China","end":{"date-parts":[[2019,10,25]]}},"container-title":["2019 11th International Conference on Wireless Communications and Signal Processing (WCSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8914721\/8927844\/08928072.pdf?arnumber=8928072","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T05:16:13Z","timestamp":1598246173000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8928072\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/wcsp.2019.8928072","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}