Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169437
Xianfeng Li, Chongjian Xu, Qinglin Zhao
Blockchain-based cryptocurrencies enable decentralization in transaction systems. The transaction details of traditional cryptocurrencies, e.g. Bitcoin, are public to everyone, which can be a problem in confidential scenarios. To deal with the confidential problem, some current cryptocurrencies adopt confidential transactions to hide the details in proofs. Among all confidential transaction implementations, Bulletproof is the most efficient approach without a trusted setup. In this paper, we analyze Bulletproof’s design and show that the computation cost can be further reduced. Based on our analysis, we propose Shellproof, which is only half of the computation cost of Bulletproof. Experimental results show Shellproof can preserve the advantages of Bulletproof and is much more efficient than Bulletproof.
{"title":"Shellproof: More Efficient Zero-Knowledge Proofs for Confidential Transactions in Blockchain","authors":"Xianfeng Li, Chongjian Xu, Qinglin Zhao","doi":"10.1109/ICBC48266.2020.9169437","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169437","url":null,"abstract":"Blockchain-based cryptocurrencies enable decentralization in transaction systems. The transaction details of traditional cryptocurrencies, e.g. Bitcoin, are public to everyone, which can be a problem in confidential scenarios. To deal with the confidential problem, some current cryptocurrencies adopt confidential transactions to hide the details in proofs. Among all confidential transaction implementations, Bulletproof is the most efficient approach without a trusted setup. In this paper, we analyze Bulletproof’s design and show that the computation cost can be further reduced. Based on our analysis, we propose Shellproof, which is only half of the computation cost of Bulletproof. Experimental results show Shellproof can preserve the advantages of Bulletproof and is much more efficient than Bulletproof.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133160105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Correct-by-Construction Casper (CBC Casper) is an Ethereum candidate consensus protocol undergoing active design and development. We present a formalization of CBC Casper using the Coq proof assistant that includes a model of the consensus protocol and proofs of safety and non-triviality protocol properties. We leverage Coq's type classes to model CBC Casper at various levels of abstraction. In doing so, we 1) illuminate the assumptions that each protocol property depends on, and 2) reformulate the protocol in general, mathematical terms. We highlight two advantages of our approach: 1) from a proof engineering perspective, it enables a clean separation of concerns between theory and implementation; 2) from a protocol engineering perspective, it provides a rigorous, foundational understanding of the protocol conducive to finding and proving stronger properties. We detail one such new property: strong non-triviality.
{"title":"Formalizing Correct-by-Construction Casper in Coq","authors":"Elaine Li, Traian-Florin Serbanuta, Denisa Diaconescu, Vlad-Andrei Zamfir, Grigore Roşu","doi":"10.1109/ICBC48266.2020.9169468","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169468","url":null,"abstract":"Correct-by-Construction Casper (CBC Casper) is an Ethereum candidate consensus protocol undergoing active design and development. We present a formalization of CBC Casper using the Coq proof assistant that includes a model of the consensus protocol and proofs of safety and non-triviality protocol properties. We leverage Coq's type classes to model CBC Casper at various levels of abstraction. In doing so, we 1) illuminate the assumptions that each protocol property depends on, and 2) reformulate the protocol in general, mathematical terms. We highlight two advantages of our approach: 1) from a proof engineering perspective, it enables a clean separation of concerns between theory and implementation; 2) from a protocol engineering perspective, it provides a rigorous, foundational understanding of the protocol conducive to finding and proving stronger properties. We detail one such new property: strong non-triviality.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121373976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169410
P. Urien
This poster introduces the Crypto Terminal, a new open device for securing blockchain wallets. This device includes a processor, a touch screen, a removable smartcard, and a Bluetooth Low Energy (BLE) module. Smartcard is the core security, it manages cryptographic procedures and keys. The terminal is bare metal, i.e. its firmware and the BLE firmware can be erased and uploaded at anytime. The software integrity of the programmer that performs these operations is checked by an innovative integrity probe. A use case is illustrated with a smartphone.
{"title":"Crypto Terminal: A New Open Device For Securing Blockchain Wallets","authors":"P. Urien","doi":"10.1109/ICBC48266.2020.9169410","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169410","url":null,"abstract":"This poster introduces the Crypto Terminal, a new open device for securing blockchain wallets. This device includes a processor, a touch screen, a removable smartcard, and a Bluetooth Low Energy (BLE) module. Smartcard is the core security, it manages cryptographic procedures and keys. The terminal is bare metal, i.e. its firmware and the BLE firmware can be erased and uploaded at anytime. The software integrity of the programmer that performs these operations is checked by an innovative integrity probe. A use case is illustrated with a smartphone.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116259530","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169471
Artem Barger, Yacov Manevich, Hagar Meir
Permissioned blockchains are networks with identifiable participants. A prominent example is Hyperledger Fabric, that introduces the execute-order-validate architecture. The execution phase enables defining application level trust assumption by setting an endorsement policy, namely a set of rules that define the peers (affiliated with organizations) who provide attestation of transaction correctness. Since the organizations hosting those peers might collude or be compromised, the number of organizations required by the endorsement policy is often increased to reduce susceptibility to attacks. However, doing so impairs the performance of the system and is impractical in networks comprising of a large number of organizations. In this paper we propose an alternative endorsement protocol that hardens the system’s security without hindering performance. We provide a quantitative analysis of the suggested technique, and show that by incorporating verified randomness in endorsement policies, attacks that are based on collusion or malicious peers are effectively mitigated with overwhelming probability.
{"title":"Hardening Permissioned Blockchains with Verifiable Randomness","authors":"Artem Barger, Yacov Manevich, Hagar Meir","doi":"10.1109/ICBC48266.2020.9169471","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169471","url":null,"abstract":"Permissioned blockchains are networks with identifiable participants. A prominent example is Hyperledger Fabric, that introduces the execute-order-validate architecture. The execution phase enables defining application level trust assumption by setting an endorsement policy, namely a set of rules that define the peers (affiliated with organizations) who provide attestation of transaction correctness. Since the organizations hosting those peers might collude or be compromised, the number of organizations required by the endorsement policy is often increased to reduce susceptibility to attacks. However, doing so impairs the performance of the system and is impractical in networks comprising of a large number of organizations. In this paper we propose an alternative endorsement protocol that hardens the system’s security without hindering performance. We provide a quantitative analysis of the suggested technique, and show that by incorporating verified randomness in endorsement policies, attacks that are based on collusion or malicious peers are effectively mitigated with overwhelming probability.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"90 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126251140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/icbc48266.2020.9169459
{"title":"ICBC 2020 Keynotes","authors":"","doi":"10.1109/icbc48266.2020.9169459","DOIUrl":"https://doi.org/10.1109/icbc48266.2020.9169459","url":null,"abstract":"","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121740498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169392
A. Majumdar, Govind Mohan
The world is being transformed by the onset of new high speed 5G Technologies that open the possibility of IoT networks at scale. This demands delivery guarantees and coordinated distributed communications that are resistant to damage and can self-heal under adversity. The speed of change is increasing with increased automation, artificial intelligence, information from multiple sources, integrated systems of systems and emerging quantum technologies. Current distributed consensus checking mechanisms are computationally intensive and fail to scale along with these changes because of the complexity of proof of work calculations or the unnecessary need to bind in domain specific elements such as cryptocurrencies. Furthermore, these mechanisms are brittle in that small changes in messages can cause restarts or failure of integrity checks, or they introduce domain specific elements (e.g. monetary design that has little to do with integrity). We propose distributed ledgers as a pure technology coupled with a strong proof protocol for exchanges, called "Proof of Integrity" without any need for cryptocurrencies or other domain specific elements. Proof of Integrity provides distributed data guarantees and operational continuity through adversity or breakdowns while creating a reliable and trustworthy layer for the application specificity of domain specific elements.
{"title":"Distributed Fractionalized Data Networks For Data Integrity","authors":"A. Majumdar, Govind Mohan","doi":"10.1109/ICBC48266.2020.9169392","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169392","url":null,"abstract":"The world is being transformed by the onset of new high speed 5G Technologies that open the possibility of IoT networks at scale. This demands delivery guarantees and coordinated distributed communications that are resistant to damage and can self-heal under adversity. The speed of change is increasing with increased automation, artificial intelligence, information from multiple sources, integrated systems of systems and emerging quantum technologies. Current distributed consensus checking mechanisms are computationally intensive and fail to scale along with these changes because of the complexity of proof of work calculations or the unnecessary need to bind in domain specific elements such as cryptocurrencies. Furthermore, these mechanisms are brittle in that small changes in messages can cause restarts or failure of integrity checks, or they introduce domain specific elements (e.g. monetary design that has little to do with integrity). We propose distributed ledgers as a pure technology coupled with a strong proof protocol for exchanges, called \"Proof of Integrity\" without any need for cryptocurrencies or other domain specific elements. Proof of Integrity provides distributed data guarantees and operational continuity through adversity or breakdowns while creating a reliable and trustworthy layer for the application specificity of domain specific elements.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114894418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169436
Sheng-Nan Li, Zhao Yang, C. Tessone
The Bitcoin system keeps its ledger consistent in a blockchain by solving cryptographic problems, in a method called "Proof-of-Work". The conventional wisdom asserts that the mining protocol is incentive-compatible. However, Eyal and Sirer in 2014 have discovered a mining attack strategy called selfish mining (SM), in which a miner (or a mining pool) publishes the blocks it mines selectively instead of immediately. SM strategy would have the impact of wasting resources of honest miners. Scholars proposed various extensions of the SM strategy and approaches to defense the SM attack. Whether selfish mining occurs in practice or not, has been subject of extensive debate. For the first time, in this paper we propose a method to identify selfish miners by detecting anomalies in the properties of consecutive blocks’ statistics. Furthermore, we extend our method to detect the mining cartels, in which miners secretly get together and share timely information. Our results provide evidence that these strategic behaviors take place in practice.
{"title":"Mining blocks in a row: A statistical study of fairness in Bitcoin mining","authors":"Sheng-Nan Li, Zhao Yang, C. Tessone","doi":"10.1109/ICBC48266.2020.9169436","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169436","url":null,"abstract":"The Bitcoin system keeps its ledger consistent in a blockchain by solving cryptographic problems, in a method called \"Proof-of-Work\". The conventional wisdom asserts that the mining protocol is incentive-compatible. However, Eyal and Sirer in 2014 have discovered a mining attack strategy called selfish mining (SM), in which a miner (or a mining pool) publishes the blocks it mines selectively instead of immediately. SM strategy would have the impact of wasting resources of honest miners. Scholars proposed various extensions of the SM strategy and approaches to defense the SM attack. Whether selfish mining occurs in practice or not, has been subject of extensive debate. For the first time, in this paper we propose a method to identify selfish miners by detecting anomalies in the properties of consecutive blocks’ statistics. Furthermore, we extend our method to detect the mining cartels, in which miners secretly get together and share timely information. Our results provide evidence that these strategic behaviors take place in practice.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130691513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169444
Song Hua, Shenbin Zhang, Bingfeng Pi, Jun Sun, K. Yamashita, Yoshihide Nomura
Blockchain, as a distributed ledger technology, becomes more and more popular in both industry and academia. Hyperledger Fabric is permissioned blockchain platform hosted by Linux foundation. Fabric has various components such as peer, ordering service, chaincode and state database. The structure of Fabric network is very complicated to provide reliable permissioned blockchain service. Generally, developers must deal with hundreds of parameters to configure a network. That will cause many reasonableness problems in configurations. In this paper, we focus on how to detect reasonableness problems in Fabric configurations. Firstly, we discuss and provide a reasonableness problem knowledge database based on the perspectives of functionality, security and performance. Secondly, we implemented a detect tool for reasonableness check to Fabric. Finally, we collect 108 sample networks as the testing dataset in the experiment. The result shows our tool can help developers to locate reasonableness problems and understand their network better.
{"title":"Reasonableness discussion and analysis for Hyperledger Fabric configuration","authors":"Song Hua, Shenbin Zhang, Bingfeng Pi, Jun Sun, K. Yamashita, Yoshihide Nomura","doi":"10.1109/ICBC48266.2020.9169444","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169444","url":null,"abstract":"Blockchain, as a distributed ledger technology, becomes more and more popular in both industry and academia. Hyperledger Fabric is permissioned blockchain platform hosted by Linux foundation. Fabric has various components such as peer, ordering service, chaincode and state database. The structure of Fabric network is very complicated to provide reliable permissioned blockchain service. Generally, developers must deal with hundreds of parameters to configure a network. That will cause many reasonableness problems in configurations. In this paper, we focus on how to detect reasonableness problems in Fabric configurations. Firstly, we discuss and provide a reasonableness problem knowledge database based on the perspectives of functionality, security and performance. Secondly, we implemented a detect tool for reasonableness check to Fabric. Finally, we collect 108 sample networks as the testing dataset in the experiment. The result shows our tool can help developers to locate reasonableness problems and understand their network better.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129837882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169401
Rishi Saket, N. Singh, Pankaj Dayama, Vinayaka Pandit
We consider a new class of business-to-business (B2B) blockchain applications that require the execution of specific subroutines to simultaneously satisfy authenticity, compliance, and anonymity. Existing blockchain smart contract protocols do not, either directly or with minor modifications, ensure all the three properties. We present the ACAn smart contract protocol guaranteeing authenticity and compliance over a set of anonymous (unlinkable) subroutine executions. ACAn achieves this through a novel combination of zero-knowledge proofs and multiple Merkle-Tree commitments. We specifically focus on implementing ACAn on Hyperledger Fabric, a popular platform for B2B blockchain applications, which processes transactions in the execute-order-commit framework. The latter, however, leads to performance degradation due to read-write conflicts arising out of multiple clients independently executing the ACAn protocol. We propose enhancements to Hyperledger Fabric’s smart contract API to support deferred changes to the shared ledger, allowing us to adapt ACAn so that such conflicts are effectively resolved. Our work provides evidence of significant performance gains due to the proposed enhancements, as well as experimental evaluation of the protocol’s privacy preserving components.
{"title":"Smart Contract Protocol for Authenticity and Compliance with Anonymity on Hyperledger Fabric","authors":"Rishi Saket, N. Singh, Pankaj Dayama, Vinayaka Pandit","doi":"10.1109/ICBC48266.2020.9169401","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169401","url":null,"abstract":"We consider a new class of business-to-business (B2B) blockchain applications that require the execution of specific subroutines to simultaneously satisfy authenticity, compliance, and anonymity. Existing blockchain smart contract protocols do not, either directly or with minor modifications, ensure all the three properties. We present the ACAn smart contract protocol guaranteeing authenticity and compliance over a set of anonymous (unlinkable) subroutine executions. ACAn achieves this through a novel combination of zero-knowledge proofs and multiple Merkle-Tree commitments. We specifically focus on implementing ACAn on Hyperledger Fabric, a popular platform for B2B blockchain applications, which processes transactions in the execute-order-commit framework. The latter, however, leads to performance degradation due to read-write conflicts arising out of multiple clients independently executing the ACAn protocol. We propose enhancements to Hyperledger Fabric’s smart contract API to support deferred changes to the shared ledger, allowing us to adapt ACAn so that such conflicts are effectively resolved. Our work provides evidence of significant performance gains due to the proposed enhancements, as well as experimental evaluation of the protocol’s privacy preserving components.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134296490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2020-05-01DOI: 10.1109/ICBC48266.2020.9169431
Victor Ermolaev, Indrek Klangberg, Y. Madhwal, Silver Vapper, Sjoerd Wels, Y. Yanovich
In modern and interconnected world, information is accumulatively stored digitally, making the process of exchanging, gathering and querying the information much easier. Continuously, it has introduced new challenges about how to ensure its consistency and reliability due to the sheer volume of data. A blockchain-based information system can provide an incorruptible record of history, enabling better auditing and data management practices. The paper describes how to combine an Exonum blockchain and a Neo4j graph database into a system that can provide a verifiable audit trail of data integrity and its modifications for information stored in a graph database.
{"title":"Incorruptible Auditing: Blockchain-Powered Graph Database Management","authors":"Victor Ermolaev, Indrek Klangberg, Y. Madhwal, Silver Vapper, Sjoerd Wels, Y. Yanovich","doi":"10.1109/ICBC48266.2020.9169431","DOIUrl":"https://doi.org/10.1109/ICBC48266.2020.9169431","url":null,"abstract":"In modern and interconnected world, information is accumulatively stored digitally, making the process of exchanging, gathering and querying the information much easier. Continuously, it has introduced new challenges about how to ensure its consistency and reliability due to the sheer volume of data. A blockchain-based information system can provide an incorruptible record of history, enabling better auditing and data management practices. The paper describes how to combine an Exonum blockchain and a Neo4j graph database into a system that can provide a verifiable audit trail of data integrity and its modifications for information stored in a graph database.","PeriodicalId":420845,"journal":{"name":"2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126884517","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}