{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T20:18:48Z","timestamp":1740169128827,"version":"3.37.3"},"reference-count":33,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2018YFB0804402"],"award-info":[{"award-number":["2018YFB0804402"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2019]]},"DOI":"10.1109\/access.2019.2952213","type":"journal-article","created":{"date-parts":[[2019,11,7]],"date-time":"2019-11-07T15:52:09Z","timestamp":1573141929000},"page":"174740-174749","source":"Crossref","is-referenced-by-count":13,"title":["DT-CP: A Double-TTPs-Based Contract-Signing Protocol With Lower Computational Cost"],"prefix":"10.1109","volume":"7","author":[{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-2079-0989","authenticated-orcid":false,"given":"Guangquan","family":"Xu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0002-7375-9152","authenticated-orcid":false,"given":"Yao","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Litao","family":"Jiao","sequence":"additional","affiliation":[]},{"given":"Emmanouil","family":"Panaousis","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/linproxy.fan.workers.dev:443\/https\/orcid.org\/0000-0003-0262-7678","authenticated-orcid":false,"given":"Kaitai","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Xiaotong","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2891581"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1109\/CC.2016.7559082","article-title":"Multilevel pattern mining architecture for automatic network monitoring in heterogeneous wireless communication networks","volume":"13","author":"qu","year":"2016","journal-title":"China Commun"},{"key":"ref31","first-page":"91","article-title":"Coverless information hiding method based on the chinese mathematical expression","volume":"18","author":"chen","year":"2017","journal-title":"J Internet Technol"},{"key":"ref30","first-page":"194","article-title":"Research on zero-knowledge proof protocol","volume":"10","author":"wang","year":"2013","journal-title":"Int J Comput Sci Issues"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872038"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/511446.511497"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45760-7_13"},{"key":"ref13","first-page":"326","article-title":"A certified e-mail system with receiver&#x2019;s selective usage of delivery authority","author":"imamoto","year":"2002","journal-title":"Proc Int Cryptol Conf CRYPTO"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-004-0063-7"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2847447"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872060"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-25645-0_27"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.05.022"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014120"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24676-3_23"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/49.839935"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_14"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2017.2734681"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30539-2_29"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/CNS.2014.6997516"},{"key":"ref5","first-page":"176","article-title":"Analysis and improvement of Micali&#x2019;s fair contract signing protocol","volume":"31","author":"bao","year":"2004","journal-title":"Proc Inf Secur Privacy"},{"key":"ref8","first-page":"200","article-title":"Practical and provably secure release of a secret and exchange of signatures","author":"damg\u00e5rd","year":"1993","journal-title":"Proc Workshop Theory Appl Cryptograph Techn"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/18.50372"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1587\/transcom.E98.B.190"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45455-1_26"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48405-1_29"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/947386.947387"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2009.2035972"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-006-9033-6"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2019.2894411"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/BF02351717"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14081-5_12"},{"article-title":"Trapdoor commitment schemes and their applications","year":"2001","author":"fischlin","key":"ref25"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/6287639\/8600701\/08894107.pdf?arnumber=8894107","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:32:19Z","timestamp":1641987139000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/8894107\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"references-count":33,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/access.2019.2952213","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2019]]}}}