{"id":"https://openalex.org/W4387245256","doi":"https://doi.org/10.1109/tdsc.2023.3321051","title":"Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains","display_name":"Obfuscating Verifiable Random Functions for Proof-of-Stake Blockchains","publication_year":2023,"publication_date":"2023-10-02","ids":{"openalex":"https://openalex.org/W4387245256","doi":"https://doi.org/10.1109/tdsc.2023.3321051"},"language":"en","primary_location":{"id":"doi:10.1109/tdsc.2023.3321051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3321051","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101908672","display_name":"Yang Shi","orcid":"https://orcid.org/0000-0003-3905-2257"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Yang Shi","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107171106","display_name":"T. Luo","orcid":"https://orcid.org/0009-0002-3234-4230"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianyuan Luo","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5113013294","display_name":"Jingwen Liang","orcid":"https://orcid.org/0009-0000-5984-138X"},"institutions":[{"id":"https://openalex.org/I116953780","display_name":"Tongji University","ror":"https://ror.org/03rc6as71","country_code":"CN","type":"education","lineage":["https://openalex.org/I116953780"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jingwen Liang","raw_affiliation_strings":["School of Software Engineering, Tongji University, Shanghai, China"],"affiliations":[{"raw_affiliation_string":"School of Software Engineering, Tongji University, Shanghai, China","institution_ids":["https://openalex.org/I116953780"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027786039","display_name":"Man Ho Au","orcid":"https://orcid.org/0000-0003-2068-9530"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]},{"id":"https://openalex.org/I4210105229","display_name":"City University of Hong Kong, Shenzhen Research Institute","ror":"https://ror.org/00xc0ma20","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210105229"]},{"id":"https://openalex.org/I889458895","display_name":"University of Hong Kong","ror":"https://ror.org/02zhqgq86","country_code":"HK","type":"education","lineage":["https://openalex.org/I889458895"]}],"countries":["CN","HK"],"is_corresponding":false,"raw_author_name":"Man Ho Au","raw_affiliation_strings":["University of Hong Kong Shenzhen Institute of Research and Innovation, Shenzhen, Guangdong, China","Department of Computing, Hong Kong Polytechnic University, Hong Kong"],"affiliations":[{"raw_affiliation_string":"University of Hong Kong Shenzhen Institute of Research and Innovation, Shenzhen, Guangdong, China","institution_ids":["https://openalex.org/I4210105229","https://openalex.org/I889458895"]},{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100400376","display_name":"Xiapu Luo","orcid":"https://orcid.org/0000-0002-9082-3208"},"institutions":[{"id":"https://openalex.org/I14243506","display_name":"Hong Kong Polytechnic University","ror":"https://ror.org/0030zas98","country_code":"HK","type":"education","lineage":["https://openalex.org/I14243506"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Xiapu Luo","raw_affiliation_strings":["Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"],"affiliations":[{"raw_affiliation_string":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong","institution_ids":["https://openalex.org/I14243506"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5101908672"],"corresponding_institution_ids":["https://openalex.org/I116953780"],"apc_list":null,"apc_paid":null,"fwci":1.3605,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.85597705,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":96,"max":97},"biblio":{"volume":"21","issue":"4","first_page":"2982","last_page":"2996"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11614","display_name":"Cloud Data Security Solutions","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/verifiable-secret-sharing","display_name":"Verifiable secret sharing","score":0.8763146996498108},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7289356589317322},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3948199152946472},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.35794001817703247},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1602335274219513}],"concepts":[{"id":"https://openalex.org/C85847156","wikidata":"https://www.wikidata.org/wiki/Q59015987","display_name":"Verifiable secret sharing","level":3,"score":0.8763146996498108},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7289356589317322},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3948199152946472},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.35794001817703247},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1602335274219513},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/tdsc.2023.3321051","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tdsc.2023.3321051","pdf_url":null,"source":{"id":"https://openalex.org/S133795288","display_name":"IEEE Transactions on Dependable and Secure Computing","issn_l":"1545-5971","issn":["1545-5971","1941-0018","2160-9209"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320439","host_organization_name":"IEEE Computer Society","host_organization_lineage":["https://openalex.org/P4310320439","https://openalex.org/P4310319808"],"host_organization_lineage_names":["IEEE Computer Society","Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Dependable and Secure Computing","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7","score":0.8999999761581421}],"awards":[{"id":"https://openalex.org/G3234913861","display_name":null,"funder_award_id":"61972332","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G5642009191","display_name":null,"funder_award_id":"62172301","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"},{"id":"https://openalex.org/G7769662527","display_name":null,"funder_award_id":"22120210545","funder_id":"https://openalex.org/F4320335787","funder_display_name":"Fundamental Research Funds for the Central Universities"},{"id":"https://openalex.org/G8253333954","display_name":null,"funder_award_id":"61772371","funder_id":"https://openalex.org/F4320321001","funder_display_name":"National Natural Science Foundation of China"}],"funders":[{"id":"https://openalex.org/F4320321001","display_name":"National Natural Science Foundation of China","ror":"https://ror.org/01h0zpd94"},{"id":"https://openalex.org/F4320335787","display_name":"Fundamental Research Funds for the Central Universities","ror":null}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":61,"referenced_works":["https://openalex.org/W1498063506","https://openalex.org/W1532140623","https://openalex.org/W1551969482","https://openalex.org/W1554705736","https://openalex.org/W1561407045","https://openalex.org/W1981398410","https://openalex.org/W2001383953","https://openalex.org/W2014239329","https://openalex.org/W2075903118","https://openalex.org/W2084641398","https://openalex.org/W2098104887","https://openalex.org/W2108834246","https://openalex.org/W2148888468","https://openalex.org/W2169194339","https://openalex.org/W2343009295","https://openalex.org/W2468121714","https://openalex.org/W2484015479","https://openalex.org/W2568033790","https://openalex.org/W2604789199","https://openalex.org/W2728543642","https://openalex.org/W2739845435","https://openalex.org/W2763398287","https://openalex.org/W2766209351","https://openalex.org/W2794533297","https://openalex.org/W2794717484","https://openalex.org/W2795222609","https://openalex.org/W2798267696","https://openalex.org/W2801811971","https://openalex.org/W2882981146","https://openalex.org/W2888798936","https://openalex.org/W2889627320","https://openalex.org/W2890219821","https://openalex.org/W2890748062","https://openalex.org/W2903448660","https://openalex.org/W2906817823","https://openalex.org/W2908930990","https://openalex.org/W2920377835","https://openalex.org/W2932888730","https://openalex.org/W2933493434","https://openalex.org/W2943860641","https://openalex.org/W2944812228","https://openalex.org/W2947718647","https://openalex.org/W2957347123","https://openalex.org/W2963253427","https://openalex.org/W2963311060","https://openalex.org/W2976763854","https://openalex.org/W3137752280","https://openalex.org/W3209227426","https://openalex.org/W4206959351","https://openalex.org/W4293057141","https://openalex.org/W4293195554","https://openalex.org/W4299879599","https://openalex.org/W4306406267","https://openalex.org/W4312298187","https://openalex.org/W6745143538","https://openalex.org/W6751596620","https://openalex.org/W6753443810","https://openalex.org/W6757163913","https://openalex.org/W6757932563","https://openalex.org/W6765204530","https://openalex.org/W6776308478"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2355730523","https://openalex.org/W152021879","https://openalex.org/W2072918937","https://openalex.org/W2365629437","https://openalex.org/W2023935927","https://openalex.org/W2348330439","https://openalex.org/W181049489"],"abstract_inverted_index":{"Blockchain":[0],"systems,":[1],"such":[2,10,66,290],"as":[3,11,62,67,259,291],"Bitcoin":[4],"and":[5,13,36,70,100,117,137,164,232,241,297],"Ethereum,":[6],"enable":[7],"new":[8],"applications,":[9],"cryptocurrencies":[12],"smart":[14],"contracts,":[15],"using":[16],"decentralized":[17],"consensus":[18],"without":[19],"trusted":[20],"authorities.":[21],"Since":[22,243],"the":[23,31,93,101,110,119,122,127,155,158,165,176,193,205,214,220,230,233,236,244,248,283],"most":[24],"widely":[25],"used":[26,258],"technique,":[27],"proof-of-work,":[28],"suffers":[29],"from":[30],"costs":[32],"of":[33,42,56,76,85,95,113,121,129,157,175,185,192,235,251],"high":[34],"latency":[35],"huge":[37],"energy":[38],"consumption,":[39],"a":[40,77,86,96,139,186,198,202,260],"number":[41],"blockchain":[43,103,187,265],"systems":[44,266],"based":[45,271],"on":[46,106,183,272,287],"proof-of-stake":[47,123,194,269],"techniques":[48],"have":[49],"been":[50,217],"proposed":[51,237,245],"in":[52,223],"recent":[53],"years,":[54],"many":[55],"which":[57],"use":[58],"verifiable":[59,78,97,114,134,142,238,252],"random":[60,79,98,115,135,143,160,177,239,253],"functions":[61,116,136],"fundamental":[63],"building":[64,261],"blocks,":[65],"Ouroboros,":[68],"Algorand,":[69],"Dfinity,":[71],"etc.":[72],"The":[73,277],"secret":[74,111,167,207],"key":[75,168,208,215],"function":[80,99,144,240],"scheme,":[81,89],"similar":[82],"to":[83,92,133],"that":[84,152,267,282],"digital":[87],"signature":[88],"is":[90],"critical":[91],"security":[94,234],"entire":[102],"system":[104],"built":[105],"it.":[107],"To":[108],"protect":[109],"keys":[112],"maintain":[118],"efficiency":[120],"protocol,":[124],"we":[125,148],"extend":[126],"objective":[128],"cryptographic":[130],"program":[131],"obfuscation":[132],"propose":[138,149],"novel":[140],"obfuscatable":[141],"scheme.":[145],"In":[146],"particular,":[147],"an":[150,170,224],"obfuscator":[151],"can":[153,256],"transform":[154],"implementation":[156,222],"scheme's":[159],"string":[161,178],"generation":[162,179],"algorithm":[163,180],"given":[166],"into":[169,219],"unintelligible":[171],"form.":[172],"Obfuscated":[173],"implementations":[174],"are":[181],"deployed":[182],"peers":[184],"for":[188,263],"supporting":[189],"normal":[190],"routines":[191],"protocol.":[195],"Even":[196],"if":[197],"hacker":[199],"has":[200,216],"controlled":[201],"peer's":[203],"host,":[204],"owner's":[206],"will":[209],"not":[210],"be":[211,257],"compromised":[212],"because":[213],"hardwired":[218],"obfuscated":[221],"\u201cencrypted":[225],"manner\u201d.":[226],"We":[227],"formally":[228],"prove":[229],"correctness":[231],"obfuscator.":[242],"scheme":[246,284],"supports":[247],"general":[249],"semantics":[250],"functions,":[254],"it":[255],"block":[262],"all":[264],"adopt":[268],"protocols":[270],"Verifiable":[273],"Random":[274],"Functions":[275],"(VRFs).":[276],"extensive":[278],"experimental":[279],"result":[280],"indicated":[281],"performs":[285],"well":[286],"various":[288],"platforms,":[289],"cloud":[292],"servers,":[293],"workstations,":[294],"PCs,":[295],"smartphones,":[296],"embedded":[298],"devices.":[299]},"counts_by_year":[{"year":2025,"cited_by_count":3}],"updated_date":"2026-04-09T08:11:56.329763","created_date":"2025-10-10T00:00:00"}
