{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,29]],"date-time":"2026-03-29T17:53:02Z","timestamp":1774806782526,"version":"3.50.1"},"reference-count":51,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T00:00:00Z","timestamp":1569283200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61962011"],"award-info":[{"award-number":["61962011"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61562012"],"award-info":[{"award-number":["61562012"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Innovation Group Major Research Projects of Department of Education of Guizhou Province","award":["KY[2016]026"],"award-info":[{"award-number":["KY[2016]026"]}]},{"name":"Guizhou Provincial Science and Technology Foundation","award":["[2019]1434"],"award-info":[{"award-number":["[2019]1434"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soft Comput"],"published-print":{"date-parts":[[2020,1]]},"DOI":"10.1007\/s00500-019-04375-8","type":"journal-article","created":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T17:03:55Z","timestamp":1569344635000},"page":"281-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Anonymous certificateless multi-receiver encryption scheme for smart community management systems"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9688-1062","authenticated-orcid":false,"given":"Lunzhi","family":"Deng","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,24]]},"reference":[{"key":"4375_CR1","doi-asserted-by":"crossref","unstructured":"Al-Riyami S, Paterson K (2003) Certificateless public cryptography. In: Advances in cryptology-ASIACRYPT 2003, LNCS, vol 2894, pp 452\u2013473","DOI":"10.1007\/978-3-540-40061-5_29"},{"key":"4375_CR2","first-page":"134","volume-title":"Lecture Notes in Computer Science","author":"Joonsang Baek","year":"2005","unstructured":"Baek J, Safavi-Naini R, Susilo W (2005a) Certificateless public key encryption without pairing. In: International conference on information security 2005, LNCS, vol 3650, pp 134\u2013148"},{"key":"4375_CR3","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1007\/978-3-540-30580-4_26","volume-title":"Public Key Cryptography - PKC 2005","author":"Joonsang Baek","year":"2005","unstructured":"Baek J, Safavi-Naini R, Susilo, W (2005b) Efficient multi-receiver identity-based encryption and its application to broadcast encryption. In: International workshop on public key cryptography 2005, LNCS, vol 3386. pp 380\u2013397"},{"key":"4375_CR4","doi-asserted-by":"crossref","first-page":"394","DOI":"10.1007\/11941378_28","volume-title":"Progress in Cryptology - INDOCRYPT 2006","author":"Sanjit Chatterjee","year":"2006","unstructured":"Chatterjee S, Sarkar P (2006) Multi-receiver identity-based key encapsulation with shortened ciphertext. In: International conference on cryptology in India 2006, LNCS, vol 4329, pp 394-408"},{"issue":"1","key":"4375_CR5","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1007\/s11704-013-3090-6","volume":"8","author":"L Cheng","year":"2014","unstructured":"Cheng L, Wen Q, Jin Z, Zhang H (2014) Cryptanalysis and improvement of a certificateless encryption scheme in the standard model. Front Comput Sci-Chi 8(1):163\u2013173","journal-title":"Front Comput Sci-Chi"},{"issue":"4","key":"4375_CR6","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1093\/comjnl\/bxr086","volume":"55","author":"H Chien","year":"2012","unstructured":"Chien H (2012) Improved anonymous multi-receiver identity-based encryption. Comput J 55(4):439\u2013446","journal-title":"Comput J"},{"issue":"2","key":"4375_CR7","first-page":"223","volume":"18","author":"L Deng","year":"2017","unstructured":"Deng L, Zeng J, Wang X (2017) An improved certificateless encryption scheme for telecare medicine information systems. J Internet Technol 18(2):223\u2013227","journal-title":"J Internet Technol"},{"key":"4375_CR8","first-page":"1","volume":"e3796","author":"L Deng","year":"2018","unstructured":"Deng L, Yang Y, Gao R, Chen Y (2018) Certificateless short signature scheme from pairing in the standard model. Int J Commun Syst e3796:1\u20138","journal-title":"Int J Commun Syst"},{"key":"4375_CR9","doi-asserted-by":"crossref","first-page":"87162","DOI":"10.1109\/ACCESS.2019.2923697","volume":"7","author":"L Deng","year":"2019","unstructured":"Deng L, Yang Y, Gao R (2019) Certificateless short aggregate signature scheme for mobile devices. IEEE Access 7:87162\u201387168","journal-title":"IEEE Access"},{"key":"4375_CR10","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1007\/978-3-540-78440-1_20","volume-title":"Public Key Cryptography \u2013 PKC 2008","author":"Alexander W. Dent","year":"2008","unstructured":"Dent A, Libert B, Paterson K (2008) Certificateless encryption schemes strongly secure in the standard model. In: International workshop on public key cryptography 2008, LNCS, vol 4939, pp 344\u2013359"},{"issue":"9","key":"4375_CR11","doi-asserted-by":"crossref","first-page":"1239","DOI":"10.1109\/TC.2010.23","volume":"59","author":"C Fan","year":"2010","unstructured":"Fan C, Huang L, Ho P (2010) Anonymous multireceiver identity-based encryption. IEEE Tran Comput 59(9):1239\u20131249","journal-title":"IEEE Tran Comput"},{"key":"4375_CR12","doi-asserted-by":"crossref","unstructured":"Gao R, Zeng J, Deng L (2018) Efficient certificateless anonymous multi-Receiver encryption scheme without bilinear parings. Math Probl Eng, 1486437, 13 pages","DOI":"10.1155\/2018\/1486437"},{"issue":"5","key":"4375_CR13","doi-asserted-by":"crossref","first-page":"9965","DOI":"10.1007\/s10916-013-9965-0","volume":"37","author":"R Guo","year":"2013","unstructured":"Guo R, Wen Q, Shi H, Jin Z, Zhang H (2013) An efficient and provably secure certificateless public key encryption scheme for telecare medicine information systems. J Med Syst 37(5):9965","journal-title":"J Med Syst"},{"issue":"13","key":"4375_CR14","doi-asserted-by":"crossref","first-page":"2214","DOI":"10.1002\/sec.1165","volume":"8","author":"SK Hafizul","year":"2015","unstructured":"Hafizul SK, Muhammad K, Ali M, Al (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Secur Commun Netw 8(13):2214\u20132231","journal-title":"Secur Commun Netw"},{"issue":"5","key":"4375_CR15","doi-asserted-by":"crossref","first-page":"841","DOI":"10.1007\/s00779-017-1053-x","volume":"21","author":"K He","year":"2017","unstructured":"He K, Weng J, Mao Y, Yuan H (2017a) Anonymous identity-based broadcast encryption technology for smart city information system. Pers Ubiquitous Comput 21(5):841\u2013853","journal-title":"Pers Ubiquitous Comput"},{"issue":"22","key":"4375_CR16","doi-asserted-by":"crossref","first-page":"6801","DOI":"10.1007\/s00500-016-2231-x","volume":"21","author":"D He","year":"2017","unstructured":"He D, Wang H, Wang L, Shen J, Yang X (2017b) Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput 21(22):6801\u20136810","journal-title":"Soft Comput"},{"key":"4375_CR17","doi-asserted-by":"crossref","unstructured":"Huang Q, Wong D (2007) Generic certificateless encryption in the standard model. In: International workshop on security 2007, LNCS, vol 4752, pp 278\u2013291","DOI":"10.1007\/978-3-540-75651-4_19"},{"issue":"4","key":"4375_CR18","doi-asserted-by":"crossref","first-page":"2602","DOI":"10.1109\/JSYST.2015.2451193","volume":"11","author":"Y Hung","year":"2017","unstructured":"Hung Y, Huang S, Tseng Y, Tsai T (2017) Efficient anonymous multireceiver certificateless encryption. IEEE Syst J 11(4):2602\u20132613","journal-title":"IEEE Syst J"},{"issue":"4","key":"4375_CR19","doi-asserted-by":"crossref","first-page":"296","DOI":"10.1016\/j.inffus.2011.03.003","volume":"13","author":"J Hur","year":"2012","unstructured":"Hur J, Park C, Hwang S (2012) Privacy-preserving identity-based broadcast encryption. Inf Fusion 13(4):296\u2013303","journal-title":"Inf Fusion"},{"issue":"3","key":"4375_CR20","first-page":"463","volume":"14","author":"Y Hwang","year":"2008","unstructured":"Hwang Y, Liu J, Chow S (2008) Certificateless public key encryption secure against malicious KGC attacks in the standard model. J Univers Comput Sci 14(3):463\u2013480","journal-title":"J Univers Comput Sci"},{"issue":"3","key":"4375_CR21","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1587\/transcom.E96.B.891","volume":"E96B","author":"I Kim","year":"2013","unstructured":"Kim I, Hwang S (2013) An optimal identity-based broadcast encryption scheme for wireless sensor networks. IEICE Trans Commun E96B(3):891\u2013895","journal-title":"IEICE Trans Commun"},{"issue":"1\u20132","key":"4375_CR22","first-page":"27","volume":"14","author":"I Kim","year":"2012","unstructured":"Kim I, Hwang S, Kim S (2012) An efficient anonymous identity-based broadcast encryption for large-scale wireless sensor networks. Ad Hoc Sens Wirel Netw 14(1\u20132):27\u201339","journal-title":"Ad Hoc Sens Wirel Netw"},{"issue":"3","key":"4375_CR23","doi-asserted-by":"crossref","first-page":"679","DOI":"10.1109\/TIFS.2014.2388156","volume":"10","author":"J Kim","year":"2015","unstructured":"Kim J, Susilo W, Au M, Seberry J (2015) Adaptively secure identity-based broadcast encryption with a constant-sized ciphertext. IEEE Trans Inf Forensics Secur 10(3):679\u2013693","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"8","key":"4375_CR24","doi-asserted-by":"crossref","first-page":"1240","DOI":"10.1093\/comjnl\/bxy062","volume":"61","author":"J Lai","year":"2018","unstructured":"Lai J, Mu Y, Guo F, Jiang P, Ma S (2018) Identity-based broadcast encryption for inner products. Comput J 61(8):1240\u20131251","journal-title":"Comput J"},{"key":"4375_CR25","doi-asserted-by":"crossref","first-page":"177","DOI":"10.1016\/j.ins.2017.11.008","volume":"429","author":"J Li","year":"2018","unstructured":"Li J, Yu Q, Zhang Y (2018) Identity-based broadcast encryption with continuous leakage resilience. Inf Sci 429:177\u2013193","journal-title":"Inf Sci"},{"key":"4375_CR26","doi-asserted-by":"crossref","first-page":"474","DOI":"10.1007\/11745853_31","volume-title":"Public Key Cryptography - PKC 2006","author":"Beno\u00eet Libert","year":"2006","unstructured":"Libert B, Quisquater J (2006) On constructing certificateless cryptosystems from identity based encryption. In: International workshop on public key cryptography, LNCS, vol 3958, pp 474\u2013490"},{"issue":"2","key":"4375_CR27","first-page":"391","volume":"39","author":"C Meshram","year":"2018","unstructured":"Meshram C, Li X (2018) New efficient key authentication protocol for public key cryptosystem using DL over multiplicative group. J Inf Optim Sci 39(2):391\u2013400","journal-title":"J Inf Optim Sci"},{"issue":"3","key":"4375_CR28","doi-asserted-by":"crossref","first-page":"471","DOI":"10.15388\/Informatica.2017.139","volume":"28","author":"C Meshram","year":"2017","unstructured":"Meshram C, Tseng Y, Lee C, Meshram S (2017a) An IND-ID-CPA secure ID-based cryptographic protocol using GDLP and IFP. Informatica Lithuan 28(3):471\u2013484","journal-title":"Informatica Lithuan"},{"issue":"24","key":"4375_CR29","doi-asserted-by":"crossref","first-page":"7285","DOI":"10.1007\/s00500-016-2440-3","volume":"21","author":"C Meshram","year":"2017","unstructured":"Meshram C, Lee C, Li C, Chen C (2017b) A secure key authentication scheme for cryptosystems based on GDLP and IFP. Soft Comput 21(24):7285\u20137291","journal-title":"Soft Comput"},{"issue":"6","key":"4375_CR30","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1049\/iet-net.2018.0019","volume":"7","author":"C Meshram","year":"2018","unstructured":"Meshram C, Powar P, Obaidat M, Lee C, Meshram S (2018) Efficient online\/offline IBSS protocol using partial discrete logarithm for WSNs. IET Netw 7(6):363\u2013367","journal-title":"IET Netw"},{"key":"4375_CR31","doi-asserted-by":"publisher","DOI":"10.1007\/s00500-019-03855-1","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee C, Meshram S, Khan M (2019a) An identity-based encryption technique using subtree for fuzzy user data sharing under cloud computing environment. Soft Comput. \nhttps:\/\/doi.org\/10.1007\/s00500-019-03855-1","journal-title":"Soft Comput"},{"issue":"3","key":"4375_CR32","doi-asserted-by":"crossref","first-page":"747","DOI":"10.1007\/s00500-018-3112-2","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Li C, Meshram S (2019b) An efficient online\/offline ID-based short signature procedure using extended chaotic maps. Soft Comput 23(3):747\u2013753","journal-title":"Soft Comput"},{"issue":"16","key":"4375_CR33","doi-asserted-by":"crossref","first-page":"6937","DOI":"10.1007\/s00500-018-3332-5","volume":"23","author":"C Meshram","year":"2019","unstructured":"Meshram C, Lee C, Meshram S, Li C (2019c) An efficient ID-based cryptographic transformation model for extended chaotic-map-based cryptosystem. Soft Comput 23(16):6937\u20136946","journal-title":"Soft Comput"},{"issue":"5","key":"4375_CR34","first-page":"531","volume":"13","author":"Y Ming","year":"2016","unstructured":"Ming Y, Wang Y (2016) Identity based broadcast encryption with group of prime order. Int Arab J Inf Technol 13(5):531\u2013541","journal-title":"Int Arab J Inf Technol"},{"issue":"1","key":"4375_CR35","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1587\/transfun.E92.A.329","volume":"92","author":"J Park","year":"2009","unstructured":"Park J, Lee D (2009) Security analysis of a multireceiver identity-based key encapsulation mechanism. IEICE Trans Fundam Electron Commun Comput Sci 92(1):329\u2013331","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"issue":"4","key":"4375_CR36","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1007\/s10207-013-0215-8","volume":"13","author":"S Reza","year":"2014","unstructured":"Reza S, Ron S, Josef P (2014) Lattice-based certificateless public-key encryption in the standard model. Int J Inf Secur 13(4):315\u2013333","journal-title":"Int J Inf Secur"},{"key":"4375_CR37","unstructured":"Shamir A (1984) Identity-based cryptosystem and signature scheme. In: Advances in cryptology-crypto 1984. LNCS, vol 196, pp 47\u201353"},{"key":"4375_CR38","doi-asserted-by":"crossref","unstructured":"Shen L, Zhang F, Sun Y, Li S (2012) Cryptanalysis of a certificateless encryption scheme in the standard model. In: Fourth international conference on intelligent networking and collaborative systems 2012, pp 329\u2013333","DOI":"10.1109\/iNCoS.2012.68"},{"issue":"10","key":"4375_CR39","doi-asserted-by":"crossref","first-page":"2005","DOI":"10.1007\/s11432-010-4076-8","volume":"53","author":"Y Sun","year":"2010","unstructured":"Sun Y, Li H (2010) Short-ciphertext and BDH-based CCA2 secure certificateless encryption. Sci China Inf Sci 53(10):2005\u20132015","journal-title":"Sci China Inf Sci"},{"key":"4375_CR40","doi-asserted-by":"crossref","unstructured":"Sun Y, Zhang F, Baek J (2007) Strongly secure certificateless public key encryption without pairing, In: International conference on cryptology and network security 2007, LNCS, vol 4856, pp 194\u2013208","DOI":"10.1007\/978-3-540-76969-9_13"},{"issue":"1","key":"4375_CR41","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1049\/iet-ifs.2010.0252","volume":"6","author":"H Wang","year":"2012","unstructured":"Wang H, Zhang Y, Xiong H, Qin B (2012) Cryptanalysis and improvements of an anonymous multi-receiver identity-based encryption scheme. IET Inf Secur 6(1):20\u201327","journal-title":"IET Inf Secur"},{"issue":"11","key":"4375_CR42","doi-asserted-by":"crossref","first-page":"1641","DOI":"10.1002\/sec.861","volume":"7","author":"H Wang","year":"2014","unstructured":"Wang H, Zeng H, Choo K (2014) MDMR-IBE: efficient multiple domain multi-receiver identity-based encryption. Secur Commun Netw 7(11):1641\u20131651","journal-title":"Secur Commun Netw"},{"issue":"12","key":"4375_CR43","doi-asserted-by":"crossref","first-page":"e0143975","DOI":"10.1371\/journal.pone.0143975","volume":"10","author":"K Xu","year":"2015","unstructured":"Xu K, Liao Y, Qiao L, Liu Z, Yang X (2015) An identity-based (IDB) broadcast encryption scheme with personalized messages (BEPM). PLoS ONE 10(12):e0143975","journal-title":"PLoS ONE"},{"issue":"4","key":"4375_CR44","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1049\/iet-ifs.2012.0257","volume":"7","author":"X Yan","year":"2013","unstructured":"Yan X, Gong P, Bai Z, Wang J, Li P (2013) New certificateless public key encryption scheme without pairing. IET Inf Secur 7(4):271\u2013276","journal-title":"IET Inf Secur"},{"issue":"4","key":"4375_CR45","doi-asserted-by":"crossref","first-page":"645","DOI":"10.1002\/dac.2693","volume":"28","author":"J Zhang","year":"2015","unstructured":"Zhang J, Mao J (2015) An improved anonymous multi-receiver identity-based encryption scheme. Int J Commun Syst 28(4):645\u2013658","journal-title":"Int J Commun Syst"},{"issue":"3","key":"4375_CR46","doi-asserted-by":"crossref","first-page":"410","DOI":"10.1109\/JSYST.2012.2221893","volume":"7","author":"M Zhang","year":"2013","unstructured":"Zhang M, Takagi T (2013) Efficient constructions of anonymous multireceiver encryption protocol and their deployment in group e-mail system with privacy preservation. IEEE Syst J 7(3):410\u2013419","journal-title":"IEEE Syst J"},{"issue":"4","key":"4375_CR47","doi-asserted-by":"crossref","first-page":"452","DOI":"10.1016\/S1007-0214(09)70101-4","volume":"14","author":"G Zhang","year":"2009","unstructured":"Zhang G, Wang X (2009) Certificateless encryption scheme secure in standard model. Tsinghua Sci Technol 14(4):452\u2013459","journal-title":"Tsinghua Sci Technol"},{"issue":"2","key":"4375_CR48","first-page":"428","volume":"5","author":"L Zhang","year":"2011","unstructured":"Zhang L, Wu Q, Hu Y (2011) New constructions of identity-based broadcast encryption without random oracles. KSII Trans Internet Inf 5(2):428\u2013439","journal-title":"KSII Trans Internet Inf"},{"issue":"1\u20132","key":"4375_CR49","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1016\/j.mcm.2011.01.004","volume":"55","author":"L Zhang","year":"2012","unstructured":"Zhang L, Hub Y, Wu Q (2012) Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math Comput Model Dyn 55(1\u20132):12\u201318","journal-title":"Math Comput Model Dyn"},{"issue":"3","key":"4375_CR50","doi-asserted-by":"crossref","first-page":"708","DOI":"10.1016\/j.jss.2011.09.045","volume":"85","author":"X Zhao","year":"2012","unstructured":"Zhao X, Zhang F (2012) Fully CCA2 secure identity-based broadcast encryption with black-box accountable authority. J Syst Softw 85(3):708\u2013716","journal-title":"J Syst Softw"},{"key":"4375_CR51","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1016\/j.ipl.2017.09.012","volume":"130","author":"Y Zhou","year":"2018","unstructured":"Zhou Y, Yang B (2018) Leakage-resilient CCA2-secure certificateless public-key encryption scheme without bilinear pairing. Inf Process Lett 130:16\u201324","journal-title":"Inf Process Lett"}],"container-title":["Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04375-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s00500-019-04375-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s00500-019-04375-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,22]],"date-time":"2020-09-22T23:13:20Z","timestamp":1600816400000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s00500-019-04375-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,24]]},"references-count":51,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,1]]}},"alternative-id":["4375"],"URL":"https:\/\/doi.org\/10.1007\/s00500-019-04375-8","relation":{},"ISSN":["1432-7643","1433-7479"],"issn-type":[{"value":"1432-7643","type":"print"},{"value":"1433-7479","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,9,24]]},"assertion":[{"value":"24 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"The author declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}