{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:25:52Z","timestamp":1772119552145,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,12,11]],"date-time":"2017-12-11T00:00:00Z","timestamp":1512950400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"U.S. Department of Homeland Security","award":["2015-ST-061-BSH001"],"award-info":[{"award-number":["2015-ST-061-BSH001"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,12,11]]},"DOI":"10.1145\/3152824.3152825","type":"proceedings-article","created":{"date-parts":[[2017,11,30]],"date-time":"2017-11-30T17:01:06Z","timestamp":1512061266000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["EPBC"],"prefix":"10.1145","author":[{"given":"Lei","family":"Xu","sequence":"first","affiliation":[{"name":"University of Houston"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Lin","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Houston"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhimin","family":"Gao","sequence":"additional","affiliation":[{"name":"University of Houston"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Shouhuai","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Texas at San Antonio"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Weidong","family":"Shi","sequence":"additional","affiliation":[{"name":"University of Houston"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2017,12,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1315245.1315318"},{"key":"e_1_3_2_1_2_1","volume-title":"International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 480--494","author":"Bari\u0107 Niko","year":"1997","unstructured":"Niko Bari\u0107 and Birgit Pfitzmann . 1997 . Collision-free accumulators and fail-stop signature schemes without trees . In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 480--494 . Niko Bari\u0107 and Birgit Pfitzmann. 1997. Collision-free accumulators and fail-stop signature schemes without trees. In International Conference on the Theory and Applications of Cryptographic Techniques. Springer, 480--494."},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 274--285","author":"Benaloh Josh","year":"1993","unstructured":"Josh Benaloh and Michael De Mare . 1993 . One-way accumulators: A decentralized alternative to digital signatures . In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 274--285 . Josh Benaloh and Michael De Mare. 1993. One-way accumulators: A decentralized alternative to digital signatures. In Workshop on the Theory and Application of of Cryptographic Techniques. Springer, 274--285."},{"key":"e_1_3_2_1_4_1","volume-title":"On the central limit theorem for the prime divisor function. Amer. Math. Monthly","author":"Billingsley Patrick","year":"1969","unstructured":"Patrick Billingsley . 1969. On the central limit theorem for the prime divisor function. Amer. Math. Monthly ( 1969 ), 132--139. Patrick Billingsley. 1969. On the central limit theorem for the prime divisor function. Amer. Math. Monthly (1969), 132--139."},{"key":"e_1_3_2_1_5_1","volume-title":"Review of Bitcoin Scaling Proposals. In Scaling Bitcoin Workshop Phase","volume":"1","author":"Bishop Bryan","year":"2015","unstructured":"Bryan Bishop . 2015 . Review of Bitcoin Scaling Proposals. In Scaling Bitcoin Workshop Phase , Vol. 1 . Bryan Bishop. 2015. Review of Bitcoin Scaling Proposals. In Scaling Bitcoin Workshop Phase, Vol. 1."},{"key":"e_1_3_2_1_6_1","volume-title":"Advances in Cryptology-CRYPTO'97","author":"Boneh Dan","unstructured":"Dan Boneh and Matthew Franklin . 1997. Efficient generation of shared RSA keys . In Advances in Cryptology-CRYPTO'97 . Springer , 425. Dan Boneh and Matthew Franklin. 1997. Efficient generation of shared RSA keys. In Advances in Cryptology-CRYPTO'97. Springer, 425."},{"key":"e_1_3_2_1_7_1","volume-title":"A next-generation smart contract and decentralized application platform. white paper","author":"Buterin Vitalik","year":"2014","unstructured":"Vitalik Buterin . 2014. A next-generation smart contract and decentralized application platform. white paper ( 2014 ). Vitalik Buterin. 2014. A next-generation smart contract and decentralized application platform. white paper (2014)."},{"key":"e_1_3_2_1_8_1","unstructured":"Certivox Ltd. {n. d.}. MIRACL Cryptographic Library. ({n. d.}). https:\/\/libraries.docs.miracl.com\/miracl-user-manual\/about  Certivox Ltd. {n. d.}. MIRACL Cryptographic Library. ({n. d.}). https:\/\/libraries.docs.miracl.com\/miracl-user-manual\/about"},{"key":"e_1_3_2_1_9_1","volume-title":"Blockchains and Smart Contracts for the Internet of Things","author":"Christidis Konstantinos","year":"2016","unstructured":"Konstantinos Christidis and Michael Devetsikiotis . 2016. Blockchains and Smart Contracts for the Internet of Things . IEEE Access ( 2016 ). Konstantinos Christidis and Michael Devetsikiotis. 2016. Blockchains and Smart Contracts for the Internet of Things. IEEE Access (2016)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/647993.742131"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-53357-4_8"},{"key":"e_1_3_2_1_12_1","volume-title":"The sybil attack. Peer-to-peer Systems","author":"Douceur John","year":"2002","unstructured":"John Douceur . 2002. The sybil attack. Peer-to-peer Systems ( 2002 ), 251--260. John Douceur. 2002. The sybil attack. Peer-to-peer Systems (2002), 251--260."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.2307\/2371483"},{"key":"e_1_3_2_1_14_1","volume-title":"https:\/\/browser.geekbench.com\/","author":"Browser Geekbench","year":"2017","unstructured":"Geekbench. 2017. Geekbench Browser . ( 2017 ). https:\/\/browser.geekbench.com\/ Geekbench. 2017. Geekbench Browser. (2017). https:\/\/browser.geekbench.com\/"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2664243.2664267"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978341"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/648026.744658"},{"key":"e_1_3_2_1_18_1","unstructured":"Mike Hearn and Matt Corallo. 2012. BIP 37: Connection Bloom filtering. (2012). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0037. mediawiki  Mike Hearn and Matt Corallo. 2012. BIP 37: Connection Bloom filtering. (2012). https:\/\/github.com\/bitcoin\/bips\/blob\/master\/bip-0037. mediawiki"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2013.34"},{"key":"e_1_3_2_1_21_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system.","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. (2008). Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008)."},{"key":"e_1_3_2_1_22_1","first-page":"269","article-title":"Accumulating Composites and Improved Group Signing","volume":"2003","author":"Tsudik Gene","year":"2003","unstructured":"Gene Tsudik and Shouhuai Xu . 2003 . Accumulating Composites and Improved Group Signing . In Advances in Cryptology - ASIACRYPT 2003. 269 -- 286 . Gene Tsudik and Shouhuai Xu. 2003. Accumulating Composites and Improved Group Signing. In Advances in Cryptology - ASIACRYPT 2003. 269--286.","journal-title":"Advances in Cryptology - ASIACRYPT"},{"key":"e_1_3_2_1_23_1","volume-title":"International Workshop on Open Problems in Network Security. Springer, 112--125","author":"Vukoli\u0107 Marko","year":"2015","unstructured":"Marko Vukoli\u0107 . 2015 . The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication . In International Workshop on Open Problems in Network Security. Springer, 112--125 . Marko Vukoli\u0107. 2015. The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication. In International Workshop on Open Problems in Network Security. Springer, 112--125."},{"key":"e_1_3_2_1_24_1","volume-title":"Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151","author":"Wood Gavin","year":"2014","unstructured":"Gavin Wood . 2014 . Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014). Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151 (2014)."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1943513.1943546"}],"event":{"name":"Middleware '17: 18th International Middleware Conference","location":"Las Vegas Nevada","acronym":"Middleware '17"},"container-title":["Proceedings of the 1st Workshop on Scalable and Resilient Infrastructures for Distributed Ledgers"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152824.3152825","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3152824.3152825","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:11:19Z","timestamp":1750212679000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3152824.3152825"}},"subtitle":["&lt;u&gt;E&lt;\/u&gt;fficient &lt;u&gt;P&lt;\/u&gt;ublic &lt;u&gt;B&lt;\/u&gt;lockchain &lt;u&gt;C&lt;\/u&gt;lient for lightweight users"],"short-title":[],"issued":{"date-parts":[[2017,12,11]]},"references-count":24,"alternative-id":["10.1145\/3152824.3152825","10.1145\/3152824"],"URL":"https:\/\/doi.org\/10.1145\/3152824.3152825","relation":{},"subject":[],"published":{"date-parts":[[2017,12,11]]},"assertion":[{"value":"2017-12-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}