{"id":"https://openalex.org/W2779888899","doi":"https://doi.org/10.1109/access.2017.2787563","title":"Anonymity for Bitcoin From Secure Escrow Address","display_name":"Anonymity for Bitcoin From Secure Escrow Address","publication_year":2017,"publication_date":"2017-12-27","ids":{"openalex":"https://openalex.org/W2779888899","doi":"https://doi.org/10.1109/access.2017.2787563","mag":"2779888899"},"language":"en","primary_location":{"id":"doi:10.1109/access.2017.2787563","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2787563","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2017.2787563","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5088075854","display_name":"Qi Wang","orcid":"https://orcid.org/0000-0002-6201-7890"},"institutions":[{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qi Wang","raw_affiliation_strings":["Department of Computer Science and Technology, East China Normal University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015211192","display_name":"Xiangxue Li","orcid":"https://orcid.org/0000-0002-1779-6178"},"institutions":[{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]},{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I66867065","display_name":"East China Normal University","ror":"https://ror.org/02n96ep67","country_code":"CN","type":"education","lineage":["https://openalex.org/I66867065"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiangxue Li","raw_affiliation_strings":["Department of Computer Science and Technology, East China Normal University, Shanghai, China","National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","Westone Cryptologic Research Center, Beijing, China","National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Technology, East China Normal University, Shanghai, China","institution_ids":["https://openalex.org/I66867065"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100417226","display_name":"Yu Yu","orcid":"https://orcid.org/0000-0002-9278-4521"},"institutions":[{"id":"https://openalex.org/I4210132990","display_name":"State Key Laboratory of Cryptology","ror":"https://ror.org/02pn5rj08","country_code":"CN","type":"government","lineage":["https://openalex.org/I4210132990"]},{"id":"https://openalex.org/I183067930","display_name":"Shanghai Jiao Tong University","ror":"https://ror.org/0220qvk04","country_code":"CN","type":"education","lineage":["https://openalex.org/I183067930"]},{"id":"https://openalex.org/I4210136859","display_name":"Xi\u2019an University of Posts and Telecommunications","ror":"https://ror.org/04jn0td46","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210136859"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yu Yu","raw_affiliation_strings":["Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","Westone Cryptologic Research Center, Beijing, China","National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Shanghai Jiao Tong University, Shanghai, China","institution_ids":["https://openalex.org/I183067930"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi\u2019an University of Posts and Telecommunications, Xi\u2019an, China","institution_ids":["https://openalex.org/I4210136859"]},{"raw_affiliation_string":"Westone Cryptologic Research Center, Beijing, China","institution_ids":["https://openalex.org/I4210132990"]},{"raw_affiliation_string":"National Engineering Laboratory for Wireless Security, Xi'an University of Posts and Telecommunications, Xi'an, China","institution_ids":["https://openalex.org/I4210136859"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5088075854"],"corresponding_institution_ids":["https://openalex.org/I66867065"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":4.8363,"has_fulltext":false,"cited_by_count":42,"citation_normalized_percentile":{"value":0.9573367,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"6","issue":null,"first_page":"12336","last_page":"12341"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.8438130617141724},{"id":"https://openalex.org/keywords/escrow","display_name":"Escrow","score":0.8371735215187073},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7951545119285583},{"id":"https://openalex.org/keywords/key-escrow","display_name":"Key escrow","score":0.7929797768592834},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7507892847061157},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.624257504940033},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5947351455688477},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.5165752172470093},{"id":"https://openalex.org/keywords/pseudonym","display_name":"Pseudonym","score":0.4927082359790802},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.4332287013530731},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.3213048577308655},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.08117708563804626}],"concepts":[{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.8438130617141724},{"id":"https://openalex.org/C167254554","wikidata":"https://www.wikidata.org/wiki/Q338451","display_name":"Escrow","level":2,"score":0.8371735215187073},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7951545119285583},{"id":"https://openalex.org/C205533965","wikidata":"https://www.wikidata.org/wiki/Q1367345","display_name":"Key escrow","level":4,"score":0.7929797768592834},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7507892847061157},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.624257504940033},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5947351455688477},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.5165752172470093},{"id":"https://openalex.org/C2776021475","wikidata":"https://www.wikidata.org/wiki/Q61002","display_name":"Pseudonym","level":2,"score":0.4927082359790802},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.4332287013530731},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3213048577308655},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.08117708563804626},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2017.2787563","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2787563","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:1cdcbb3f32104c0d8fe9a449fabad078","is_oa":true,"landing_page_url":"https://doaj.org/article/1cdcbb3f32104c0d8fe9a449fabad078","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 6, Pp 12336-12341 (2018)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2017.2787563","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2017.2787563","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G1608286277","display_name":null,"funder_award_id":"2017YFB0802003","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"},{"id":"https://openalex.org/G4851613470","display_name":null,"funder_award_id":"61472249","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G8755977098","display_name":null,"funder_award_id":"61472114","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G900134287","display_name":null,"funder_award_id":"61572192","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W69553326","https://openalex.org/W114041322","https://openalex.org/W154851090","https://openalex.org/W950848294","https://openalex.org/W1549409785","https://openalex.org/W1972614536","https://openalex.org/W1976646754","https://openalex.org/W1979215153","https://openalex.org/W1994130174","https://openalex.org/W2013613544","https://openalex.org/W2013686672","https://openalex.org/W2022932831","https://openalex.org/W2043007983","https://openalex.org/W2103647628","https://openalex.org/W2110326448","https://openalex.org/W2119422255","https://openalex.org/W2168970529","https://openalex.org/W2188776605","https://openalex.org/W2214897964","https://openalex.org/W2743496573","https://openalex.org/W2911825405","https://openalex.org/W4211068006","https://openalex.org/W4248175462","https://openalex.org/W6677934245"],"related_works":["https://openalex.org/W2358705460","https://openalex.org/W2350245913","https://openalex.org/W2019160124","https://openalex.org/W2524274420","https://openalex.org/W1859964688","https://openalex.org/W2111271832","https://openalex.org/W2391501929","https://openalex.org/W2382515391","https://openalex.org/W2088902377","https://openalex.org/W1537728868"],"abstract_inverted_index":{"Bitcoin":[0,19,40,53,161],"is":[1,82,90,100,123,155],"promoted":[2],"as":[3],"decentralized":[4,68],"cryptocurrency":[5],"by":[6,92],"using":[7],"pseudonym":[8],"to":[9,58,83],"achieve":[10],"anonymity.":[11],"Unfortunately,":[12],"numerous":[13],"seminal":[14],"works":[15],"have":[16],"demonstrated":[17],"that":[18,70],"only":[20],"offers":[21],"weak":[22],"anonymity":[23,74],"in":[24,52,75,119],"practice.":[25],"Indeed,":[26],"the":[27,45,80,94,103,133,138,141,159],"practical":[28],"technologies":[29],"of":[30,105,143],"clustering":[31],"and":[32,42,111,135,148],"flow":[33],"analysis":[34],"are":[35],"much":[36],"effective":[37],"for":[38,116],"tracing":[39],"transaction":[41,139],"thereby":[43],"revealing":[44],"owner":[46],"involved.":[47],"Otherwise":[48],"said,":[49],"user's":[50],"privacy":[51],"has":[54],"been":[55],"sadly":[56],"degenerated":[57],"be":[59,114],"linkable.":[60],"In":[61],"this":[62],"paper,":[63],"we":[64],"propose":[65],"a":[66,85],"completely":[67,156],"scheme":[69],"can":[71,112,130],"provide":[72],"full":[73],"Bitcoin.":[76,120],"The":[77,97,128],"idea":[78],"behind":[79],"output":[81],"exploit":[84],"secure":[86,107,124],"escrow":[87,98],"address,":[88],"which":[89],"consensual":[91],"all":[93],"involved":[95],"users.":[96],"address":[99],"generated":[101],"from":[102],"trick":[104],"cryptographically":[106],"distributed":[108],"key":[109],"generation":[110],"then":[113],"used":[115],"mixing":[117],"transactions":[118],"Our":[121],"protocol":[122,134],"against":[125],"malicious":[126],"adversaries.":[127],"users":[129],"jointly":[131],"perform":[132],"successfully":[136],"accomplish":[137],"without":[140],"help":[142],"any":[144],"(trusted)":[145],"third":[146],"party":[147],"no":[149],"extra":[150],"fees.":[151],"Besides,":[152],"our":[153],"proposal":[154],"compatible":[157],"with":[158],"current":[160],"architecture.":[162]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":13},{"year":2021,"cited_by_count":9},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
