{"id":"https://openalex.org/W4224262646","doi":"https://doi.org/10.1145/3523181.3523183","title":"Trusted blockchain of ring signature in TEE environment","display_name":"Trusted blockchain of ring signature in TEE environment","publication_year":2022,"publication_date":"2022-02-24","ids":{"openalex":"https://openalex.org/W4224262646","doi":"https://doi.org/10.1145/3523181.3523183"},"language":"en","primary_location":{"id":"doi:10.1145/3523181.3523183","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3523181.3523183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 3rd Asia Service Sciences and Software Engineering Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5002967937","display_name":"LuWei Bao","orcid":"https://orcid.org/0000-0002-9353-2203"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"LuWei Bao","raw_affiliation_strings":["School of Information Science and Engineering, Yunnan University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yunnan University, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5107966267","display_name":"Gehao Lu","orcid":"https://orcid.org/0000-0003-4678-6398"},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"GeHao Lu","raw_affiliation_strings":["School of Information Science and Engineering, Yunnan University, China"],"affiliations":[{"raw_affiliation_string":"School of Information Science and Engineering, Yunnan University, China","institution_ids":["https://openalex.org/I189210763"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5064916938","display_name":"LiYu Fu","orcid":null},"institutions":[{"id":"https://openalex.org/I189210763","display_name":"Yunnan University","ror":"https://ror.org/0040axw97","country_code":"CN","type":"education","lineage":["https://openalex.org/I189210763"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"LiYu Fu","raw_affiliation_strings":["Software college, Yunnan University, China"],"affiliations":[{"raw_affiliation_string":"Software college, Yunnan University, China","institution_ids":["https://openalex.org/I189210763"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5002967937"],"corresponding_institution_ids":["https://openalex.org/I189210763"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.04017408,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"8","last_page":"13"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10273","display_name":"IoT and Edge/Fog Computing","score":0.9689000248908997,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9649999737739563,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7699155211448669},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.7155713438987732},{"id":"https://openalex.org/keywords/smart-contract","display_name":"Smart contract","score":0.6421984434127808},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6387197375297546},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6231096982955933},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5849701166152954},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.5565928220748901},{"id":"https://openalex.org/keywords/bottleneck","display_name":"Bottleneck","score":0.5263969898223877},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.52208012342453},{"id":"https://openalex.org/keywords/ring-signature","display_name":"Ring signature","score":0.4968428909778595},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.4791830778121948},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.4762290120124817},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.4320683181285858},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4311530590057373},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.20650309324264526},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.20156294107437134},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.11138561367988586},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08926478028297424}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7699155211448669},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.7155713438987732},{"id":"https://openalex.org/C2779950589","wikidata":"https://www.wikidata.org/wiki/Q7544035","display_name":"Smart contract","level":3,"score":0.6421984434127808},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6387197375297546},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6231096982955933},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5849701166152954},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.5565928220748901},{"id":"https://openalex.org/C2780513914","wikidata":"https://www.wikidata.org/wiki/Q18210350","display_name":"Bottleneck","level":2,"score":0.5263969898223877},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.52208012342453},{"id":"https://openalex.org/C168941894","wikidata":"https://www.wikidata.org/wiki/Q3483645","display_name":"Ring signature","level":4,"score":0.4968428909778595},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.4791830778121948},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.4762290120124817},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.4320683181285858},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4311530590057373},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.20650309324264526},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.20156294107437134},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.11138561367988586},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08926478028297424},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3523181.3523183","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3523181.3523183","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2022 3rd Asia Service Sciences and Software Engineering Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":2,"referenced_works":["https://openalex.org/W2131869695","https://openalex.org/W4229815470"],"related_works":["https://openalex.org/W2166253510","https://openalex.org/W2144672683","https://openalex.org/W2387562563","https://openalex.org/W2127458842","https://openalex.org/W2950648054","https://openalex.org/W1966494590","https://openalex.org/W2118944796","https://openalex.org/W4313069937","https://openalex.org/W2366964182","https://openalex.org/W2011423695"],"abstract_inverted_index":{"Traditional":[0],"blockchain":[1,122],"system":[2],"has":[3],"two":[4],"problems:":[5],"poor":[6,59],"privacy":[7,125,139,167],"protection":[8],"and":[9,31,93,116,127,135,151,156,166],"scalability.":[10],"The":[11,24],"public":[12,41],"chain":[13,42,150],"discloses":[14],"all":[15],"information,":[16],"which":[17,55,80],"can":[18,71,95],"be":[19],"seen":[20],"by":[21],"every":[22],"node.":[23],"code":[25],"of":[26,64,133,169],"smart":[27,171],"contract":[28],"is":[29,34,43,47,81],"clear-text,":[30],"the":[32,40,87,91,97,101,131,142,145,149,153,163],"data":[33],"also":[35],"clear-text.":[36],"Every":[37],"node":[38],"in":[39],"untrustworthy,":[44],"so":[45],"it":[46,94],"necessary":[48],"to":[49,58,83,99,112,123,136],"design":[50],"a":[51,73,84],"complex":[52],"consistency":[53],"protocol,":[54],"often":[56],"leads":[57],"performance":[60,164],"(low":[61],"TPS),":[62],"waste":[63],"power,":[65],"or":[66],"lower":[67],"overall":[68],"credibility.":[69],"TEE":[70],"construct":[72],"trusted":[74,138],"execution":[75],"environment":[76],"Enclave":[77],"(safe":[78],"house),":[79],"similar":[82],"black":[85],"box,":[86],"outside":[88,98],"cannot":[89],"access":[90],"inside,":[92],"allow":[96],"authenticate":[100],"inside":[102],"reliably":[103],"through":[104],"remote":[105],"authentication.":[106],"This":[107],"paper":[108],"focuses":[109],"on":[110,148],"how":[111],"integrate":[113],"Intel":[114],"SGX":[115],"ring":[117],"signature":[118],"algorithm":[119],"into":[120],"traditional":[121,170],"realize":[124],"calculation":[126,140],"transaction.":[128],"To":[129],"protect":[130],"anonymity":[132],"traders":[134],"process":[137],"under":[141],"chain.":[143],"Through":[144],"cooperation":[146],"between":[147],"off":[152],"chain,":[154],"\"calculation\"":[155],"\"settlement\"":[157],"are":[158],"completely":[159],"decoupled,":[160],"thus":[161],"solving":[162],"bottleneck":[165],"problems":[168],"contracts.":[172]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
