{"id":"https://openalex.org/W2888372991","doi":"https://doi.org/10.3390/cryptography2030018","title":"Provably Secure Covert Communication on Blockchain","display_name":"Provably Secure Covert Communication on Blockchain","publication_year":2018,"publication_date":"2018-08-20","ids":{"openalex":"https://openalex.org/W2888372991","doi":"https://doi.org/10.3390/cryptography2030018","mag":"2888372991"},"language":"en","primary_location":{"id":"doi:10.3390/cryptography2030018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030018","pdf_url":"https://www.mdpi.com/2410-387X/2/3/18/pdf?version=1534932709","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://www.mdpi.com/2410-387X/2/3/18/pdf?version=1534932709","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5083706088","display_name":"Juha Partala","orcid":"https://orcid.org/0000-0001-8181-5604"},"institutions":[{"id":"https://openalex.org/I98381234","display_name":"University of Oulu","ror":"https://ror.org/03yj89h83","country_code":"FI","type":"education","lineage":["https://openalex.org/I98381234"]}],"countries":["FI"],"is_corresponding":true,"raw_author_name":"Juha Partala","raw_affiliation_strings":["Physiological Signal Analysis Team, Center for Machine Vision and Signal Analysis, University of Oulu, P.O. Box 5000, FI-90014 Oulu, Finland"],"raw_orcid":"https://orcid.org/0000-0001-8181-5604","affiliations":[{"raw_affiliation_string":"Physiological Signal Analysis Team, Center for Machine Vision and Signal Analysis, University of Oulu, P.O. Box 5000, FI-90014 Oulu, Finland","institution_ids":["https://openalex.org/I98381234"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5083706088"],"corresponding_institution_ids":["https://openalex.org/I98381234"],"apc_list":{"value":1600,"currency":"CHF","value_usd":1732},"apc_paid":{"value":1600,"currency":"CHF","value_usd":1732},"fwci":12.7443,"has_fulltext":true,"cited_by_count":117,"citation_normalized_percentile":{"value":0.98634631,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":94,"max":100},"biblio":{"volume":"2","issue":"3","first_page":"18","last_page":"18"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9977999925613403,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10388","display_name":"Advanced Steganography and Watermarking Techniques","score":0.9959999918937683,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.9199014902114868},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7552084922790527},{"id":"https://openalex.org/keywords/random-oracle","display_name":"Random oracle","score":0.7528854608535767},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6073700189590454},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5930296182632446},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5577154159545898},{"id":"https://openalex.org/keywords/cryptocurrency","display_name":"Cryptocurrency","score":0.5454725027084351},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.526228666305542},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5221231579780579},{"id":"https://openalex.org/keywords/oracle","display_name":"Oracle","score":0.5046783685684204},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.45674625039100647},{"id":"https://openalex.org/keywords/cryptographic-protocol","display_name":"Cryptographic protocol","score":0.4112069308757782},{"id":"https://openalex.org/keywords/public-key-cryptography","display_name":"Public-key cryptography","score":0.30407941341400146},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.23824110627174377}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.9199014902114868},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7552084922790527},{"id":"https://openalex.org/C94284585","wikidata":"https://www.wikidata.org/wiki/Q228184","display_name":"Random oracle","level":4,"score":0.7528854608535767},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6073700189590454},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5930296182632446},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5577154159545898},{"id":"https://openalex.org/C180706569","wikidata":"https://www.wikidata.org/wiki/Q13479982","display_name":"Cryptocurrency","level":2,"score":0.5454725027084351},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.526228666305542},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5221231579780579},{"id":"https://openalex.org/C55166926","wikidata":"https://www.wikidata.org/wiki/Q2892946","display_name":"Oracle","level":2,"score":0.5046783685684204},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.45674625039100647},{"id":"https://openalex.org/C33884865","wikidata":"https://www.wikidata.org/wiki/Q1254335","display_name":"Cryptographic protocol","level":3,"score":0.4112069308757782},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.30407941341400146},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.23824110627174377},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.3390/cryptography2030018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030018","pdf_url":"https://www.mdpi.com/2410-387X/2/3/18/pdf?version=1534932709","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:21e91ed06d214cc986ea24882663b274","is_oa":true,"landing_page_url":"https://doaj.org/article/21e91ed06d214cc986ea24882663b274","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by-sa","license_id":"https://openalex.org/licenses/cc-by-sa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography, Vol 2, Iss 3, p 18 (2018)","raw_type":"article"},{"id":"pmh:oai:mdpi.com:/2410-387X/2/3/18/","is_oa":true,"landing_page_url":"http://doi.org/10.3390/cryptography2030018","pdf_url":null,"source":{"id":"https://openalex.org/S4306400947","display_name":"MDPI (MDPI AG)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I4210097602","host_organization_name":"Multidisciplinary Digital Publishing Institute (Switzerland)","host_organization_lineage":["https://openalex.org/I4210097602"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Cryptography","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.3390/cryptography2030018","is_oa":true,"landing_page_url":"https://doi.org/10.3390/cryptography2030018","pdf_url":"https://www.mdpi.com/2410-387X/2/3/18/pdf?version=1534932709","source":{"id":"https://openalex.org/S4210223320","display_name":"Cryptography","issn_l":"2410-387X","issn":["2410-387X"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310310987","host_organization_name":"Multidisciplinary Digital Publishing Institute","host_organization_lineage":["https://openalex.org/P4310310987"],"host_organization_lineage_names":["Multidisciplinary Digital Publishing Institute"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.5,"display_name":"Partnerships for the goals","id":"https://metadata.un.org/sdg/17"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320321855","display_name":"Tekes","ror":"https://ror.org/02ag8cq23"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2888372991.pdf","grobid_xml":"https://content.openalex.org/works/W2888372991.grobid-xml"},"referenced_works_count":23,"referenced_works":["https://openalex.org/W1507330542","https://openalex.org/W1559136758","https://openalex.org/W2013686672","https://openalex.org/W2043007983","https://openalex.org/W2116050022","https://openalex.org/W2151413173","https://openalex.org/W2392113277","https://openalex.org/W2402551606","https://openalex.org/W2482484368","https://openalex.org/W2485318698","https://openalex.org/W2489255716","https://openalex.org/W2522448907","https://openalex.org/W2531399364","https://openalex.org/W2555782333","https://openalex.org/W2620284884","https://openalex.org/W2741248492","https://openalex.org/W2790401422","https://openalex.org/W2803736556","https://openalex.org/W3099386058","https://openalex.org/W4211068006","https://openalex.org/W4251449056","https://openalex.org/W4300349690","https://openalex.org/W4302584559"],"related_works":["https://openalex.org/W4366411693","https://openalex.org/W3211641817","https://openalex.org/W3164717803","https://openalex.org/W4389915954","https://openalex.org/W3123387860","https://openalex.org/W4291291739","https://openalex.org/W2915579847","https://openalex.org/W3110645133","https://openalex.org/W4321377877","https://openalex.org/W4394604524"],"abstract_inverted_index":{"Blockchain":[0],"is":[1,15],"a":[2,11,48,59,67,71,82,100,110],"public":[3],"open":[4,33],"ledger":[5],"that":[6,84,95,119],"provides":[7],"data":[8,45],"integrity":[9,40],"in":[10,125],"distributed":[12],"manner.":[13],"It":[14],"the":[16,43,92,104,126,131],"underlying":[17,132],"technology":[18],"of":[19,25,35,61,108],"cryptocurrencies":[20],"and":[21,80,106],"an":[22],"increasing":[23],"number":[24],"related":[26],"applications,":[27],"such":[28,109],"as":[29],"smart":[30],"contracts.":[31],"The":[32],"nature":[34],"blockchain":[36,74,93],"together":[37],"with":[38],"strong":[39],"guarantees":[41],"on":[42,77,113],"stored":[44],"makes":[46],"it":[47],"compelling":[49],"platform":[50],"for":[51,103,130],"covert":[52,64],"communication.":[53],"In":[54],"this":[55,123],"paper,":[56],"we":[57,117],"suggest":[58],"method":[60,121],"securely":[62],"embedding":[63],"messages":[65],"into":[66],"blockchain.":[68],"We":[69,97],"formulate":[70,99],"simplified":[72],"ideal":[73],"model":[75,129],"based":[76,112],"existing":[78],"implementations":[79],"devise":[81],"protocol":[83,111],"enables":[85],"two":[86],"parties":[87],"to":[88],"covertly":[89],"communicate":[90],"through":[91],"following":[94],"model.":[96],"also":[98],"rigorous":[101],"definition":[102,124],"security":[105],"covertness":[107],"computational":[114],"indistinguishability.":[115],"Finally,":[116],"show":[118],"our":[120],"satisfies":[122],"random":[127],"oracle":[128],"cryptographic":[133],"hash":[134],"function.":[135]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":19},{"year":2024,"cited_by_count":28},{"year":2023,"cited_by_count":22},{"year":2022,"cited_by_count":15},{"year":2021,"cited_by_count":15},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
