{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T16:19:53Z","timestamp":1761581993511,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3407947.3407959","type":"proceedings-article","created":{"date-parts":[[2020,8,6]],"date-time":"2020-08-06T16:12:10Z","timestamp":1596730330000},"page":"42-49","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Groupchain"],"prefix":"10.1145","author":[{"given":"Chunpei","family":"Li","sequence":"first","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University"}]},{"given":"Li-e","family":"Wang","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University"}]},{"given":"Qingting","family":"Xu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University"}]},{"given":"Dongchen","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University"}]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University"}]},{"given":"Xianxian","family":"Li","sequence":"additional","affiliation":[{"name":"Guangxi Key Lab of Multi-source Information Mining &amp; Security, Guangxi Normal University"}]}],"member":"320","published-online":{"date-parts":[[2020,8,6]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system. Manubot.","author":"Nakamoto S.","year":"2019","unstructured":"Nakamoto , S. 2019 . Bitcoin: A peer-to-peer electronic cash system. Manubot. Nakamoto, S. 2019. Bitcoin: A peer-to-peer electronic cash system. Manubot."},{"key":"e_1_3_2_1_2_1","unstructured":"Buterin V. 2014. A next-generation smart contract and decentralized application platform. White paper 3--37.  Buterin V. 2014. A next-generation smart contract and decentralized application platform. White paper 3--37."},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 310--4.","author":"Cachin C.","year":"2016","unstructured":"Cachin , C. 2016 . Architecture of the hyperledger blockchain fabric . Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 310--4. Cachin, C. 2016. Architecture of the hyperledger blockchain fabric. Workshop on Distributed Cryptocurrencies and Consensus Ledgers. 310--4."},{"key":"e_1_3_2_1_4_1","unstructured":"Brown R. G. Carlyle J. Grigg I. and Hearn M. 2016. Corda: an introduction. R3 CEV August 1 15.  Brown R. G. Carlyle J. Grigg I. and Hearn M. 2016. Corda: an introduction. R3 CEV August 1 15."},{"key":"e_1_3_2_1_5_1","unstructured":"Yan L. Xiao Z. and Zhiming Z. 2016. Electronic cash system based on certificate-free group signature scheme. Communication Journal 184--190.  Yan L. Xiao Z. and Zhiming Z. 2016. Electronic cash system based on certificate-free group signature scheme. Communication Journal 184--190."},{"volume-title":"Untraceable electronic mail, return addresses and digital pseudonyms. In secure electronic voting, 211--219","author":"Chaum D.","key":"e_1_3_2_1_6_1","unstructured":"Chaum , D. 2003. Untraceable electronic mail, return addresses and digital pseudonyms. In secure electronic voting, 211--219 . Springer , Boston, MA . Chaum, D. 2003. Untraceable electronic mail, return addresses and digital pseudonyms. In secure electronic voting, 211--219. Springer, Boston, MA."},{"key":"e_1_3_2_1_7_1","unstructured":"Dash. 2017. Dash is digital cash [EB\/OL]. DOI=https:\/\/www.dash org\/.  Dash. 2017. Dash is digital cash [EB\/OL]. DOI=https:\/\/www.dash org\/."},{"volume-title":"Proceedings of the 2014 IEEE Symposium on Security and Privacy, 459--474","author":"Sasson E. B.","key":"e_1_3_2_1_8_1","unstructured":"Sasson , E. B. , Chiesa , A. , Garman , C. , Green , M. , Miers , I. , Tromer , E. , and Virza , M . 2014. Zerocash: Decentralized anonymous payments from bitcoin . In Proceedings of the 2014 IEEE Symposium on Security and Privacy, 459--474 . IEEE. Sasson, E. B., Chiesa, A., Garman, C., Green, M., Miers, I., Tromer, E., and Virza, M. 2014. Zerocash: Decentralized anonymous payments from bitcoin. In Proceedings of the 2014 IEEE Symposium on Security and Privacy, 459--474. IEEE."},{"volume-title":"Proceedings of the 2013 IEEE Symposium on Security and Privacy, 397--411","author":"Miers I.","key":"e_1_3_2_1_9_1","unstructured":"Miers , I. , Garman , C. , Green , M. , and Rubin , A. D . 2013. Zerocoin: Anonymous distributed e-cash from bitcoin . In Proceedings of the 2013 IEEE Symposium on Security and Privacy, 397--411 . IEEE. Miers, I., Garman, C., Green, M., and Rubin, A. D. 2013. Zerocoin: Anonymous distributed e-cash from bitcoin. In Proceedings of the 2013 IEEE Symposium on Security and Privacy, 397--411. IEEE."},{"volume-title":"Proceedings of the 2016 IEEE symposium on security and privacy (SP), 839--858","author":"Kosba A.","key":"e_1_3_2_1_10_1","unstructured":"Kosba , A. , Miller , A. , Shi , E. , Wen , Z. , and Papamanthou , C . 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts . In Proceedings of the 2016 IEEE symposium on security and privacy (SP), 839--858 . IEEE. Kosba, A., Miller, A., Shi, E., Wen, Z., and Papamanthou, C. 2016. Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In Proceedings of the 2016 IEEE symposium on security and privacy (SP), 839--858. IEEE."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"A note on chain reactions in traceability in cryptonote 2.0. Research Bulletin MRL-0001","volume":"1","author":"Noether S.","year":"2014","unstructured":"Noether , S. , Noether , S. , and Mackenzie , A. 2014 . A note on chain reactions in traceability in cryptonote 2.0. Research Bulletin MRL-0001 . Monero Research Lab , 1 , 1 -- 8 . Noether, S., Noether, S., and Mackenzie, A. 2014. A note on chain reactions in traceability in cryptonote 2.0. Research Bulletin MRL-0001. Monero Research Lab, 1, 1--8.","journal-title":"Monero Research Lab"},{"volume-title":"Proceedings of the European Symposium on Research in Computer Security. 456--474","author":"Sun S. F.","key":"e_1_3_2_1_12_1","unstructured":"Sun , S. F. , Au , M. H. , Liu , J. K. , and Yuen , T. H . 2017. RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero . In Proceedings of the European Symposium on Research in Computer Security. 456--474 . Springer, Cham. Sun, S. F., Au, M. H., Liu, J. K., and Yuen, T. H. 2017. RingCT 2.0: A compact accumulator-based (linkable ring signature) protocol for blockchain cryptocurrency Monero. In Proceedings of the European Symposium on Research in Computer Security. 456--474. Springer, Cham."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Zhang L. Li H. Li Y. Yu Y. Au M. H. and Wang B.C. 2019. An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Generation Computer Systems. 29--38.  Zhang L. Li H. Li Y. Yu Y. Au M. H. and Wang B.C. 2019. An efficient linkable group signature for payer tracing in anonymous cryptocurrencies. Future Generation Computer Systems. 29--38.","DOI":"10.1016\/j.future.2019.05.081"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"Huang H. Chen X. and Wang J. 2020. Blockchain-based multiple groups data sharing with anonymity and traceability. Science China Information Sciences 63--3.  Huang H. Chen X. and Wang J. 2020. Blockchain-based multiple groups data sharing with anonymity and traceability. Science China Information Sciences 63--3.","DOI":"10.1007\/s11432-018-9781-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-013-9994-8"},{"volume-title":"The Paillier cryptosystem: a look into the cryptosystem and its potential application","author":"O'Keeffe M.","key":"e_1_3_2_1_16_1","unstructured":"O'Keeffe , M. 2008. The Paillier cryptosystem: a look into the cryptosystem and its potential application . College of New Jersey . O'Keeffe, M. 2008. The Paillier cryptosystem: a look into the cryptosystem and its potential application. College of New Jersey."},{"key":"e_1_3_2_1_17_1","unstructured":"Zong H. and Huang C. L. 2016. Efficient group signature scheme with revocation. J. Commun 18--24.  Zong H. and Huang C. L. 2016. Efficient group signature scheme with revocation. J. Commun 18--24."},{"volume-title":"Proceedings of the Annual International Cryptology Conference, 255--270","author":"Ateniese G.","key":"e_1_3_2_1_18_1","unstructured":"Ateniese , G. , Camenisch , J. , Joye , M. , and Tsudik , G . 2000. A practical and provably secure coalition-resistant group signature scheme . In Proceedings of the Annual International Cryptology Conference, 255--270 . Springer, Berlin, Heidelberg. Ateniese, G., Camenisch, J., Joye, M., and Tsudik, G. 2000. A practical and provably secure coalition-resistant group signature scheme. In Proceedings of the Annual International Cryptology Conference, 255--270. Springer, Berlin, Heidelberg."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/501983.502015"},{"key":"e_1_3_2_1_20_1","unstructured":"Xinglan Z. 2009. Efficient group signature scheme. Application research of Computers 4276--4278.  Xinglan Z. 2009. Efficient group signature scheme. Application research of Computers 4276--4278."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-46416-6_22"},{"key":"e_1_3_2_1_22_1","article-title":"Summary of research on blockchain privacy protection","author":"Lihuang Z.","year":"2017","unstructured":"Lihuang , Z. , Feng , G. , Meng , S. , Yandong , L. , and Baokun , Z. 2017 . Summary of research on blockchain privacy protection . Journal of Computer Research and Deveopment, 2170--2186. Lihuang, Z., Feng, G., Meng, S., Yandong, L., and Baokun, Z. 2017. Summary of research on blockchain privacy protection. Journal of Computer Research and Deveopment, 2170--2186.","journal-title":"Journal of Computer Research and Deveopment, 2170--2186."},{"volume-title":"Blockchain regulation and governance in Europe","author":"Finck M.","key":"e_1_3_2_1_23_1","unstructured":"Finck , M. 2018. Blockchain regulation and governance in Europe . Cambridge University Press . Finck, M. 2018. Blockchain regulation and governance in Europe. Cambridge University Press."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-2230.12399"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Cao S. Cong L. W. and Yang B. 2018. Auditing and blockchains: Pricing misstatements and regulation. Misstatements and Regulation.  Cao S. Cong L. W. and Yang B. 2018. Auditing and blockchains: Pricing misstatements and regulation. Misstatements and Regulation.","DOI":"10.2139\/ssrn.3248002"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Ouaddah A. Elkalam A. A. and Ouahman A. A. 2017. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer Cham. 523--53.  Ouaddah A. Elkalam A. A. and Ouahman A. A. 2017. Towards a novel privacy-preserving access control model based on blockchain technology in IoT. In Europe and MENA Cooperation Advances in Information and Communication Technologies. Springer Cham. 523--53.","DOI":"10.1007\/978-3-319-46568-5_53"}],"event":{"name":"HP3C 2020: 2020 4th International Conference on High Performance Compilation, Computing and Communications","sponsor":["Xi'an Jiaotong-Liverpool University Xi'an Jiaotong-Liverpool University","City University of Hong Kong City University of Hong Kong","Guangdong University of Technology Guangdong University of Technology"],"location":"Guangzhou China","acronym":"HP3C 2020"},"container-title":["Proceedings of the 2020 4th International Conference on High Performance Compilation, Computing and Communications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407947.3407959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3407947.3407959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:58Z","timestamp":1750199938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3407947.3407959"}},"subtitle":["A Blockchain Model with Privacy-preservation and Supervision"],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":26,"alternative-id":["10.1145\/3407947.3407959","10.1145\/3407947"],"URL":"https:\/\/doi.org\/10.1145\/3407947.3407959","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-08-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}