{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T07:06:23Z","timestamp":1758265583484,"version":"3.41.0"},"reference-count":41,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T00:00:00Z","timestamp":1609804800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Central Universities of China","award":["2018JBZ103"],"award-info":[{"award-number":["2018JBZ103"]}]},{"name":"Major Scientific and Technological Innovation Projects of Shandong Province, China","award":["2019JZZY020128"],"award-info":[{"award-number":["2019JZZY020128"]}]},{"DOI":"10.13039\/501100001809","name":"Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61672092"],"award-info":[{"award-number":["61672092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"State Scholarship Fund of China","award":["201907090024"],"award-info":[{"award-number":["201907090024"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2021,2,28]]},"abstract":"<jats:p>In blockchain networks, reaching effective supervision while maintaining anonymity to the public has been an ongoing challenge. In existing solutions, certification authorities need to record all pairs of identities and pseudonyms, which is demanding and costly. This article proposed an account guarantee scheme to realize feasible supervision for existing anonymous blockchain networks with lower storage costs. Users are able to guarantee anonymous accounts with account guarantee key pairs generated from certificated polynomial functions, which inherently maintains one-to-n mapping certifications. Single or limited account guarantee key pairs do not leak privacy. Victims are able to request TCs to screen a cheater or disclose a cheater with enough fraud transactions by themselves. Detailed security and privacy analysis showed that the account guarantee scheme preserves user privacy and realizes feasible supervision. Experimental results demonstrated that the account guarantee scheme is efficient and practical.<\/jats:p>","DOI":"10.1145\/3406092","type":"journal-article","created":{"date-parts":[[2021,1,5]],"date-time":"2021-01-05T18:32:48Z","timestamp":1609871568000},"page":"1-19","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Account Guarantee Scheme"],"prefix":"10.1145","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6262-1847","authenticated-orcid":false,"given":"Lichen","family":"Cheng","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, China"}]},{"given":"Jiqiang","family":"Liu","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, China"}]},{"given":"Yi","family":"Jin","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, China"}]},{"given":"Yidong","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, China"}]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, China and Division of Computer, Electrical and Mathematical Sciences 8 Engineering (CEMSE), King Abdullah University of Science and Technology (KAUST), Saudi Arabia"}]}],"member":"320","published-online":{"date-parts":[[2021,1,5]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2014.36"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3186046"},{"key":"e_1_2_1_3_1","volume-title":"Polynomial-based modifiable blockchain structure for removing fraud transactions. Fut. Gen. Comput. Syst. 99 (Oct","author":"Cheng Lichen","year":"2019","unstructured":"Lichen Cheng , Jiqiang Liu , Chunhua Su , Kaitai Liang , Guangquan Xu , and Wei Wang . 2019. Polynomial-based modifiable blockchain structure for removing fraud transactions. Fut. Gen. Comput. Syst. 99 (Oct . 2019 ), 154--163. DOI:https:\/\/doi.org\/10.1016\/J.FUTURE.2019.04.028 Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, and Wei Wang. 2019. Polynomial-based modifiable blockchain structure for removing fraud transactions. Fut. Gen. Comput. Syst. 99 (Oct. 2019), 154--163. DOI:https:\/\/doi.org\/10.1016\/J.FUTURE.2019.04.028"},{"key":"e_1_2_1_4_1","volume-title":"SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs","author":"Cheng Lichen","year":"2019","unstructured":"Lichen Cheng , Jiqiang Liu , Guangquan Xu , Zonghua Zhang , Hao Wang , Hong-Ning Dai , Yulei Wu , and Wei Wang . 2019 . SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs . IEEE Trans. Computat. Soc. Syst . (2019), 1--10. DOI:https:\/\/doi.org\/10.1109\/TCSS.2019.2904633 Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang. 2019. SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in IoVs. IEEE Trans. Computat. Soc. Syst. (2019), 1--10. DOI:https:\/\/doi.org\/10.1109\/TCSS.2019.2904633"},{"key":"e_1_2_1_5_1","unstructured":"Christian Cachin. 2016. Architecture of the Hyperledger Blockchain Fabric. Retrieved from https:\/\/www.zurich.ibm.com\/dccl\/papers\/cachin_dccl.pdf.  Christian Cachin. 2016. Architecture of the Hyperledger Blockchain Fabric. Retrieved from https:\/\/www.zurich.ibm.com\/dccl\/papers\/cachin_dccl.pdf."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2920987"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2017.2781227"},{"key":"e_1_2_1_8_1","unstructured":"Ethereum. 2018. Ethereum Project. Retrieved from https:\/\/www.ethereum.org\/.  Ethereum. 2018. Ethereum Project. Retrieved from https:\/\/www.ethereum.org\/."},{"key":"e_1_2_1_9_1","volume-title":"Bitcoin transaction graph analysis. arXiv","author":"Fleder Michael","year":"2015","unstructured":"Michael Fleder , Michael S. Kester , and Sudeep Pillai . 2015. Bitcoin transaction graph analysis. arXiv ( 2015 ), 1--8. arxiv:1502.01657v1 Michael Fleder, Michael S. Kester, and Sudeep Pillai. 2015. Bitcoin transaction graph analysis. arXiv (2015), 1--8. arxiv:1502.01657v1"},{"key":"e_1_2_1_10_1","unstructured":"Thomas Hardjono and Alex Pentland. 2019. Verifiable anonymous identities and access control in permissioned blockchains. Retrieved from http:\/\/connection.mit.edu\/wp-content\/uploads\/sites\/29\/2014\/12\/ChainAnchor-Identities-04172016.pdf.  Thomas Hardjono and Alex Pentland. 2019. Verifiable anonymous identities and access control in permissioned blockchains. Retrieved from http:\/\/connection.mit.edu\/wp-content\/uploads\/sites\/29\/2014\/12\/ChainAnchor-Identities-04172016.pdf."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1093\/imanum\/24.4.547"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2900238"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2956628"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2017.2777990"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2019.2903186"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TII.2019.2904049"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0165-0114(90)90124-O"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2976749.2978309"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.993400"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 397--411","author":"Miers Ian","year":"2013","unstructured":"Ian Miers , Christina Garman , Matthew Green , and Aviel D. Rubin . 2013. Zerocoin: Anonymous distributed e-cash from bitcoin . In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 397--411 . DOI:https:\/\/doi.org\/10.1109\/SP. 2013 .34 Ian Miers, Christina Garman, Matthew Green, and Aviel D. Rubin. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE, 397--411. DOI:https:\/\/doi.org\/10.1109\/SP.2013.34"},{"key":"e_1_2_1_21_1","unstructured":"Monero. 2018. Monero\u2014Secure private untraceable. Retrieved from https:\/\/getmonero.org\/.  Monero. 2018. Monero\u2014Secure private untraceable. Retrieved from https:\/\/getmonero.org\/."},{"key":"e_1_2_1_22_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Www.Bitcoin.Org","author":"Nakamoto Satoshi","year":"2008","unstructured":"Satoshi Nakamoto . 2008 . Bitcoin: A peer-to-peer electronic cash system. Www.Bitcoin.Org (2008). DOI:https:\/\/doi.org\/10.1007\/s10838-008-9062-0 arxiv:43543534534v343453. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. Www.Bitcoin.Org (2008). DOI:https:\/\/doi.org\/10.1007\/s10838-008-9062-0 arxiv:43543534534v343453."},{"key":"e_1_2_1_23_1","volume-title":"Anirban Basu, Shinsaku Kiyomoto, and Mohammad Shahriar Rahman.","author":"Omar Abdullah Al","year":"2019","unstructured":"Abdullah Al Omar , Md Zakirul Alam Bhuiyan , Anirban Basu, Shinsaku Kiyomoto, and Mohammad Shahriar Rahman. 2019 . Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Fut. Gen. Comput. Syst . 95 (June 2019), 511--521. DOI:https:\/\/doi.org\/10.1016\/j.future.2018.12.044 Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Mohammad Shahriar Rahman. 2019. Privacy-friendly platform for healthcare data in cloud based on blockchain environment. Fut. Gen. Comput. Syst. 95 (June 2019), 511--521. DOI:https:\/\/doi.org\/10.1016\/j.future.2018.12.044"},{"key":"e_1_2_1_24_1","unstructured":"Serguei Popov. 2018. The Tangle. Retrieved from https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf.  Serguei Popov. 2018. The Tangle. Retrieved from https:\/\/assets.ctfassets.net\/r1dr6vzfxhev\/2t4uxvsIqk0EUau6g2sw0g\/45eae33637ca92f85dd9f4a3a218e1ec\/iota1_4_3.pdf."},{"key":"e_1_2_1_25_1","unstructured":"Ripple. 2018. Ripple\u2014One Frictionless Experience to Send Money Globally | Ripple. Retrieved from https:\/\/ripple.com\/.  Ripple. 2018. Ripple\u2014One Frictionless Experience to Send Money Globally | Ripple. Retrieved from https:\/\/ripple.com\/."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2890507"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0025-5718-1995-1297477-5"},{"key":"e_1_2_1_28_1","unstructured":"David Schwartz Noah Youngs and Arthur Britto. 2014. The ripple protocol consensus algorithm. Retrieved from https:\/\/ripple.com\/files\/ripple_consensus_whitepaper.pdf.  David Schwartz Noah Youngs and Arthur Britto. 2014. The ripple protocol consensus algorithm. Retrieved from https:\/\/ripple.com\/files\/ripple_consensus_whitepaper.pdf."},{"key":"e_1_2_1_29_1","volume-title":"Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Guojon Wang.","author":"Rahman Mohammad Shahriar","year":"2020","unstructured":"Mohammad Shahriar Rahman , Abdullah Al Omar , Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Guojon Wang. 2020 . Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans. Eng. Manag . (2020). DOI:https:\/\/doi.org\/10.1109\/TEM.2019.2960829 Mohammad Shahriar Rahman, Abdullah Al Omar, Md Zakirul Alam Bhuiyan, Anirban Basu, Shinsaku Kiyomoto, and Guojon Wang. 2020. Accountable cross-border data sharing using blockchain under relaxed trust assumption. IEEE Trans. Eng. Manag. (2020). DOI:https:\/\/doi.org\/10.1109\/TEM.2019.2960829"},{"key":"e_1_2_1_30_1","volume-title":"Bitiodine: Extracting intelligence from the bitcoin network. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)","author":"Spagnuolo Michele","year":"2014","unstructured":"Michele Spagnuolo , Federico Maggi , and Stefano Zanero . 2014 . Bitiodine: Extracting intelligence from the bitcoin network. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) , Vol. 8437 . Springer Verlag , 457--468. DOI:https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29 Michele Spagnuolo, Federico Maggi, and Stefano Zanero. 2014. Bitiodine: Extracting intelligence from the bitcoin network. In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 8437. Springer Verlag, 457--468. DOI:https:\/\/doi.org\/10.1007\/978-3-662-45472-5_29"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2911265"},{"key":"e_1_2_1_32_1","unstructured":"Buterin Vitalik. 2016. CRITICAL UPDATE Re: DAO Vulnerability\u2014Ethereum Blog. Retrieved from https:\/\/blog.ethereum.org\/2016\/06\/17\/critical-update-re-dao-vulnerability\/.  Buterin Vitalik. 2016. CRITICAL UPDATE Re: DAO Vulnerability\u2014Ethereum Blog. Retrieved from https:\/\/blog.ethereum.org\/2016\/06\/17\/critical-update-re-dao-vulnerability\/."},{"key":"e_1_2_1_33_1","volume-title":"Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Fut. Gen. Comput. Syst. 78 (Jan","author":"Wang Wei","year":"2018","unstructured":"Wei Wang , Yuanyuan Li , Xing Wang , Jiqiang Liu , and Xiangliang Zhang . 2018. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Fut. Gen. Comput. Syst. 78 (Jan . 2018 ), 987--994. DOI:https:\/\/doi.org\/10.1016\/j.future.2017.01.019 Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, and Xiangliang Zhang. 2018. Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Fut. Gen. Comput. Syst. 78 (Jan. 2018), 987--994. DOI:https:\/\/doi.org\/10.1016\/j.future.2017.01.019"},{"key":"e_1_2_1_34_1","volume-title":"BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511 (Feb","author":"Wang Wei","year":"2020","unstructured":"Wei Wang , Yaoyao Shang , Yongzhong He , Yidong Li , and Jiqiang Liu . 2020. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511 (Feb . 2020 ), 284--296. DOI:https:\/\/doi.org\/10.1016\/j.ins.2019.09.024 Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, and Jiqiang Liu. 2020. BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Inf. Sci. 511 (Feb. 2020), 284--296. DOI:https:\/\/doi.org\/10.1016\/j.ins.2019.09.024"},{"key":"e_1_2_1_35_1","article-title":"ContractWard: Automated vulnerability detection models for ethereum smart contracts","author":"Wang Wei","year":"2020","unstructured":"Wei Wang , Jingjing Song , Guangquan Xu , Yidong Li , Hao Wang , and Chunhua Su . 2020 . ContractWard: Automated vulnerability detection models for ethereum smart contracts . IEEE Trans. Netw. Sci. Eng. ( Jan. 2020), 1--1. DOI:https:\/\/doi.org\/10.1109\/tnse.2020.2968505 Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, and Chunhua Su. 2020. ContractWard: Automated vulnerability detection models for ethereum smart contracts. IEEE Trans. Netw. Sci. Eng. (Jan. 2020), 1--1. DOI:https:\/\/doi.org\/10.1109\/tnse.2020.2968505","journal-title":"IEEE Trans. Netw. Sci. Eng."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2014.2353996"},{"key":"e_1_2_1_37_1","first-page":"8","article-title":"Effective Android malware detection with a hybrid model based on deep autoencoder and convolutional neural network","volume":"10","author":"Wang Wei","year":"2019","unstructured":"Wei Wang , Mengxue Zhao , and Jigang Wang . 2019 . Effective Android malware detection with a hybrid model based on deep autoencoder and convolutional neural network . J. Amb. Intell. Humaniz. Comput. 10 , 8 (Aug. 2019), 3035--3043. DOI:https:\/\/doi.org\/10.1007\/s12652-018-0803-6 Wei Wang, Mengxue Zhao, and Jigang Wang. 2019. Effective Android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. J. Amb. Intell. Humaniz. Comput. 10, 8 (Aug. 2019), 3035--3043. DOI:https:\/\/doi.org\/10.1007\/s12652-018-0803-6","journal-title":"J. Amb. Intell. Humaniz. Comput."},{"volume-title":"M. D. F. R. S. and of the Institute of Bononia, Lucasian Professor of Mathematics in the University of Cambridge. Philos. Trans. Roy. Soc.","author":"Waring E.","key":"e_1_2_1_38_1","unstructured":"E. Waring . 1779. Problems concerning Interpolations. By Edward Waring , M. D. F. R. S. and of the Institute of Bononia, Lucasian Professor of Mathematics in the University of Cambridge. Philos. Trans. Roy. Soc. London 69, 0 ( Jan . 1779), 59--67. DOI:https:\/\/doi.org\/10.1098\/rstl.1779.0008 E. Waring. 1779. Problems concerning Interpolations. By Edward Waring, M. D. F. R. S. and of the Institute of Bononia, Lucasian Professor of Mathematics in the University of Cambridge. Philos. Trans. Roy. Soc. London 69, 0 (Jan. 1779), 59--67. DOI:https:\/\/doi.org\/10.1098\/rstl.1779.0008"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2922538"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2871706"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJWGS.2018.095647"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3406092","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3406092","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:52Z","timestamp":1750195912000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3406092"}},"subtitle":["Making Anonymous Accounts Supervised in Blockchain"],"short-title":[],"issued":{"date-parts":[[2021,1,5]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2021,2,28]]}},"alternative-id":["10.1145\/3406092"],"URL":"https:\/\/doi.org\/10.1145\/3406092","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2021,1,5]]},"assertion":[{"value":"2019-12-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2020-06-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2021-01-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}