{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:56:54Z","timestamp":1771232214101,"version":"3.50.1"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031877650","type":"print"},{"value":"9783031877667","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-87766-7_8","type":"book-chapter","created":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:09:55Z","timestamp":1744603795000},"page":"81-94","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Implementation of\u00a0Two-Signature Security on\u00a0an\u00a0Identity Storage Smart Contract"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Maldonado-Ruiz","sequence":"first","affiliation":[]},{"given":"Chan Yeong","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Elina","family":"Jankovskaja","sequence":"additional","affiliation":[]},{"given":"Karima","family":"Sadykova","sequence":"additional","affiliation":[]},{"given":"Messilva","family":"Mazari","sequence":"additional","affiliation":[]},{"given":"Jenny","family":"Torres","sequence":"additional","affiliation":[]},{"given":"Nour","family":"El Madhoun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,4,15]]},"reference":[{"key":"8_CR1","unstructured":"Wood, G.: Ethereum: A Secure Decentralized Generalized Transaction Ledger. Ethereum Project Yellow Paper, pp. 1\u201332 (2018)"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Di Francesco Maesa, D., Mori, P.: Blockchain 3.0 applications survey. J. Parallel Distrib. Comput. 138, 99\u2013114 (2020)","DOI":"10.1016\/j.jpdc.2019.12.019"},{"key":"8_CR3","doi-asserted-by":"publisher","unstructured":"Maldonado-Ruiz, D., Torres, J., El Madhoun, N., Badra, M.: Current trends in blockchain implementations on the paradigm of public key infrastructure: a survey. IEEE Access 10 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3145156","DOI":"10.1109\/ACCESS.2022.3145156"},{"key":"8_CR4","doi-asserted-by":"publisher","unstructured":"Maldonado-Ruiz, D., Torres, J., El Madhoun, N., Badra, M.: An innovative and decentralized identity framework based on blockchain technology. In: 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), pp.\u00a01\u20138. IEEE (2021). https:\/\/doi.org\/10.1109\/NTMS49979.2021.9432656. https:\/\/ieeexplore.ieee.org\/document\/9432656\/","DOI":"10.1109\/NTMS49979.2021.9432656"},{"key":"8_CR5","doi-asserted-by":"publisher","unstructured":"Maldonado-Ruiz, D., Pulval-Dady, A., Shi, Y., Wang, Z., El Madhoun, N., Torres, J.: Nestedchain: \u201cblockchain-inside-a-blockchain\u201d new generation prototype. Ann. Telecommun. 1\u201319 (2024). https:\/\/doi.org\/10.1007\/s12243-024-01030-8. https:\/\/link.springer.com\/10.1007\/s12243-024-01030-8","DOI":"10.1007\/s12243-024-01030-8"},{"key":"8_CR6","doi-asserted-by":"publisher","first-page":"138657","DOI":"10.1109\/ACCESS.2019.2941153","volume":"7","author":"Z Cai","year":"2019","unstructured":"Cai, Z., Qu, J., Liu, P., Yu, J.: A blockchain smart contract based on light-weighted quantum blind signature. IEEE Access 7, 138657\u2013138668 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2941153","journal-title":"IEEE Access"},{"key":"8_CR7","doi-asserted-by":"publisher","unstructured":"Lin, K.P., Chang, Y.W., Wei, Z.H., Shen, C.Y., Chang, M.Y.: A smart contract-based mobile ticketing system with multi-signature and blockchain. In: 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE), pp. 231\u2013232 (2019). https:\/\/doi.org\/10.1109\/GCCE46687.2019.9015425","DOI":"10.1109\/GCCE46687.2019.9015425"},{"key":"8_CR8","doi-asserted-by":"publisher","unstructured":"Li, Q., Yi, W., Zhao, X., Yin, H., Gerasimov, I.: Representative ring signature algorithm based on smart contract. Sensors 22 (2022). https:\/\/doi.org\/10.3390\/s22186805","DOI":"10.3390\/s22186805"},{"key":"8_CR9","doi-asserted-by":"publisher","unstructured":"Laan, B.V.D., Ersoy, O., Erkin, Z.: Muscle: authenticated external data retrieval from multiple sources for smart contracts. In: Proceedings of the 34th ACM\/SIGAPP Symposium on Applied Computing (2019). https:\/\/doi.org\/10.1145\/3297280.3297320","DOI":"10.1145\/3297280.3297320"},{"key":"8_CR10","doi-asserted-by":"publisher","unstructured":"Ferrer-Gomila, J., Hinarejos, M.F.: A multi-party contract signing solution based on blockchain. Electronics (2021). https:\/\/doi.org\/10.3390\/electronics10121457","DOI":"10.3390\/electronics10121457"},{"key":"8_CR11","doi-asserted-by":"publisher","unstructured":"Reniers, V., et al.: Authenticated and auditable data sharing via smart contract. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing, SAC 2020, pp. 324\u2013331. Association for Computing Machinery, New York (2020). https:\/\/doi.org\/10.1145\/3341105.3373957","DOI":"10.1145\/3341105.3373957"},{"key":"8_CR12","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ins.2020.05.054","volume":"535","author":"L Zhang","year":"2020","unstructured":"Zhang, L., Zhang, H., Yu, J., Xian, H.: Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535, 142\u2013155 (2020). https:\/\/doi.org\/10.1016\/j.ins.2020.05.054","journal-title":"Inf. Sci."},{"key":"8_CR13","doi-asserted-by":"publisher","unstructured":"Sakharkar, R., Singh, D.B.: Ethereum application for product anti-counterfeiting. Int. J. Sci. Res. Eng. Manag. 06 (2022). https:\/\/doi.org\/10.55041\/IJSREM16683. https:\/\/ijsrem.com\/download\/ethereum-application-for-product-anti-counterfeiting\/","DOI":"10.55041\/IJSREM16683"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advanced Information Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-87766-7_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,14]],"date-time":"2025-04-14T04:10:01Z","timestamp":1744603801000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-87766-7_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031877650","9783031877667"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-87766-7_8","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"value":"2367-4512","type":"print"},{"value":"2367-4520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 April 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"AINA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Advanced Information Networking and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Barcelona","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Spain","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 April 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 April 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"39","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aina0","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/aina\/2025\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}