{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T16:10:02Z","timestamp":1755879002743,"version":"3.44.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,5,24]],"date-time":"2024-05-24T00:00:00Z","timestamp":1716508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Key Research and Development and Promotion Program of He?nan Province","award":["222102210069"],"award-info":[{"award-number":["222102210069"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,5,24]]},"DOI":"10.1145\/3670105.3670135","type":"proceedings-article","created":{"date-parts":[[2024,7,29]],"date-time":"2024-07-29T18:29:36Z","timestamp":1722277776000},"page":"182-185","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Blockchain Query Framework Based on Trusted Execution Environment"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-4867-9356","authenticated-orcid":false,"given":"Yufan","family":"Zhang","sequence":"first","affiliation":[{"name":"Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-3940-3140","authenticated-orcid":false,"given":"Yaojiang","family":"Wu","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-8438-0500","authenticated-orcid":false,"given":"Junjie","family":"Wang","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6239-3029","authenticated-orcid":false,"given":"Bokun","family":"Liu","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9644-3812","authenticated-orcid":false,"given":"Aodi","family":"Liu","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3927-4669","authenticated-orcid":false,"given":"Xiaowei","family":"Chen","sequence":"additional","affiliation":[{"name":"Information Engineering University, China"}]}],"member":"320","published-online":{"date-parts":[[2024,7,29]]},"reference":[{"issue":"4","key":"e_1_3_2_1_1_1","first-page":"1","article-title":"Survey on blockchain technology and its application prospect","volume":"44","author":"He P","year":"2017","unstructured":"He P, Yu G, Zhang YF, Bao YB. Survey on blockchain technology and its application prospect. Computer Science, 2017,44(4):1\u22127","journal-title":"Computer Science"},{"issue":"4","key":"e_1_3_2_1_2_1","first-page":"481","article-title":"The state of the art and future trends","volume":"42","author":"Yuan Y","year":"2016","unstructured":"Yuan Y, Wang FY. Blockchain: The state of the art and future trends. Acta Automatic Sinica, 2016,42(4):481\u2212494","journal-title":"Acta Automatic Sinica"},{"unstructured":"World economic forum survey. 2016. http:\/\/www.coinfox.info\/news\/3184-world-economic-forum-survey-10-of-global-gdp-maybe-stored-with-blockchain-technology-by-2027","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of the DASFAA (2).","author":"Li Y","year":"2017","unstructured":"Li Y, Zheng K, YanY, Liu Q, Zhou XF. EtherQL: A query layer for blockchain system. In: Proc. of the DASFAA (2). 2017. 556\u2212567."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.1007\/978-3-319-55699-4_34"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1145\/3299869.3300083"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of IEEE ICDE","author":"Zhang C.","year":"2019","unstructured":"C. Zhang, C. Xu, J. Xu, Y. Tang, and B. Choi, \u201cGem\u02c62-tree: A gasefficient structure for authenticated range queries in blockchain,\u201din Proc. of IEEE ICDE, 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of USENIX NSDI","author":"Gupta N.","year":"2016","unstructured":"T. Gupta, N. Crooks, W. Mulhern, S. T. V. Setty, L. Alvisi, and M. Walfish, \u201cScalable and private media consumption with popcorn,\u201d in Proc. of USENIX NSDI, 2016."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1109\/SP.2012.36"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1515\/popets-2016-0010"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1007\/11863908_4"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/293347.293350"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1109\/INFOCOM.2018.8485838"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.2478\/popets-2019-0010"},{"issue":"1","key":"e_1_3_2_1_15_1","first-page":"1","article-title":"Survey on blockchain-based security services","volume":"34","author":"Wang L P","year":"2021","unstructured":"Wang L P, \"Survey on blockchain-based security services.\" Journal of Software 34, no. 1 (2021): 1-32.","journal-title":"Journal of Software"},{"unstructured":"V. Costan and S. Devadas \u201cIntel sgx explained \u201d Cryptology ePrint Archive Report 2016\/086 2016.","key":"e_1_3_2_1_16_1"},{"issue":"10","key":"e_1_3_2_1_17_1","first-page":"2099","article-title":"Data privacypreserving for blockchain: state of the art and trends[J]","volume":"58","author":"Wang C X","year":"2021","unstructured":"Wang C X, Cheng J C, Sang X X, Data privacypreserving for blockchain: state of the art and trends[J]. Journal of Computer Research and Development, 2021, 58(10): 2099-2119.","journal-title":"Journal of Computer Research and Development"},{"key":"e_1_3_2_1_18_1","volume-title":"California, USA August 23\u201327","author":"Koblitz","year":"1998","unstructured":"Koblitz, Neal. \"An elliptic curve implementation of the finite field digital signature algorithm.\" Advances in Cryptology\u2014CRYPTO'98: 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23\u201327, 1998 Proceedings 18. Springer Berlin Heidelberg, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/2976749.2978326"}],"event":{"acronym":"CNIOT 2024","name":"CNIOT 2024: 2024 5th International Conference on Computing, Networks and Internet of Things","location":"Tokyo Japan"},"container-title":["Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670105.3670135","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3670105.3670135","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T15:49:34Z","timestamp":1755877774000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3670105.3670135"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,5,24]]},"references-count":19,"alternative-id":["10.1145\/3670105.3670135","10.1145\/3670105"],"URL":"https:\/\/doi.org\/10.1145\/3670105.3670135","relation":{},"subject":[],"published":{"date-parts":[[2024,5,24]]},"assertion":[{"value":"2024-07-29","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}