{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T07:59:49Z","timestamp":1770537589354,"version":"3.49.0"},"reference-count":78,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T00:00:00Z","timestamp":1710028800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T00:00:00Z","timestamp":1710028800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100008975","name":"Universitat de Les Illes Balears","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008975","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Electronic contract signing requires the design of protocols that guarantee that the exchange is fair. In the past 5 years, we have observed that trusted third parties (TTPs) can be replaced by blockchain. However, none of the analyzed blockchain-based solutions meets the abuse-freeness requirement (established by Garay et al. in 1999), i.e., that neither party has the power to decide whether the protocol terminates or aborts. In this article, we present the first blockchain-based contract signing protocol that meets the abuse-freeness requirement. We analyze the economic impact that the use of blockchain has on the participants of a contract signing, concluding that the solution is both technically feasible and cost effective.<\/jats:p>","DOI":"10.1007\/s10207-024-00818-y","type":"journal-article","created":{"date-parts":[[2024,3,10]],"date-time":"2024-03-10T14:01:16Z","timestamp":1710079276000},"page":"1963-1974","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Abuse-freeness in contract signing: a blockchain-based proposal"],"prefix":"10.1007","volume":"23","author":[{"given":"Josep-Llu\u00eds","family":"Ferrer-Gomila","sequence":"first","affiliation":[]},{"given":"M. Francisca","family":"Hinarejos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,3,10]]},"reference":[{"key":"818_CR1","unstructured":"Stackscale. ecommerce statistics and growth, May 2023"},{"key":"818_CR2","doi-asserted-by":"crossref","unstructured":"Zhou, J., Onieva, J.A., Lopez., J.: A synchronous multi-party contract signing protocol improving lower bound of steps. In Security and Privacy in Dynamic Environments: Proceedings of the IFIP TC-11 21st International Information Security Conference (SEC 2006), 22\u201324 May 2006, Karlstad, Sweden 21, pages 221\u2013232. Springer, 2006","DOI":"10.1007\/0-387-33406-8_19"},{"issue":"4","key":"818_CR3","doi-asserted-by":"publisher","first-page":"593","DOI":"10.1109\/49.839935","volume":"18","author":"N Asokan","year":"2000","unstructured":"Asokan, N., Shoup, V., Waidner, M.: Optimistic fair exchange of digital signatures. IEEE J. Sel. Areas Commun. 18(4), 593\u2013610 (2000)","journal-title":"IEEE J. Sel. Areas Commun."},{"key":"818_CR4","doi-asserted-by":"crossref","unstructured":"Bao, F., Wang, G., Zhou, J., Zhu, H.: Analysis and improvement of Micali\u2019s fair contract signing protocol. In Australasian Conference on Information Security and Privacy, pages 176\u2013187. Springer, 2004","DOI":"10.1007\/978-3-540-27800-9_16"},{"key":"818_CR5","doi-asserted-by":"crossref","unstructured":"Zhai, Y., Xu, G., Zhang, Y. A low-storage-TTP and abuse-free contract signing protocol based on the schnorr signature. In 2017 International Conference on Networking and Network Applications (NaNA), pages 279\u2013285. IEEE, 2017","DOI":"10.1109\/NaNA.2017.49"},{"key":"818_CR6","doi-asserted-by":"publisher","DOI":"10.1016\/j.apenergy.2020.116123","volume":"282","author":"A Esmat","year":"2021","unstructured":"Esmat, A., de Vos, M., Ghiassi-Farrokhfal, Y., Palensky, P., Epema, D.: A novel decentralized platform for peer-to-peer energy trading market with blockchain technology. Appl. Energy 282, 116123 (2021)","journal-title":"Appl. Energy"},{"issue":"3","key":"818_CR7","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MCOMSTD.0010.2200026","volume":"7","author":"S Wang","year":"2023","unstructured":"Wang, S., Sun, C.: Blockchain empowered dynamic spectrum sharing: standards, state of research and road ahead. IEEE Commun. Stand. Magaz. 7(3), 72\u201380 (2023)","journal-title":"IEEE Commun. Stand. Magaz."},{"key":"818_CR8","doi-asserted-by":"crossref","unstructured":"Garay, J.A., Jakobsson, M., MacKenzie, P.: Abuse-free optimistic contract signing. In Advances in Cryptology-CRYPTO\u201999: 19th Annual International Cryptology Conference Santa Barbara, California, USA, August 15\u201319, 1999 Proceedings 19, pages 449\u2013466. Springer, 1999","DOI":"10.1007\/3-540-48405-1_29"},{"key":"818_CR9","doi-asserted-by":"crossref","unstructured":"Garay, J.A., MacKenzie, P.: Abuse-free multi-party contract signing. In International Symposium on Distributed Computing, pages 151\u2013166. Springer, 1999","DOI":"10.1007\/3-540-48169-9_11"},{"key":"818_CR10","doi-asserted-by":"crossref","unstructured":"Chadha, R., Kanovich, M., Scedrov, A.: Inductive methods and contract-signing protocols. In Proceedings of the 8th ACM Conference on Computer and Communications Security, pages 176\u2013185, 2001","DOI":"10.1145\/501983.502008"},{"key":"818_CR11","doi-asserted-by":"crossref","unstructured":"Shmatikov, V., Mitchell, J.C.: Analysis of abuse-free contract signing. In Financial Cryptography: 4th International Conference, FC 2000 Anguilla, British West Indies, February 20\u201324, 2000 Proceedings 4, pages 174\u2013191. Springer, 2001","DOI":"10.1007\/3-540-45472-1_13"},{"key":"818_CR12","doi-asserted-by":"crossref","unstructured":"Kremer, S., Raskin, J.F.: Game analysis of abuse-free contract signing. In Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15, pages 206\u2013220. IEEE, 2002","DOI":"10.1109\/CSFW.2002.1021817"},{"issue":"2","key":"818_CR13","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1016\/S0304-3975(01)00141-4","volume":"283","author":"V Shmatikov","year":"2002","unstructured":"Shmatikov, V., Mitchell, H.C.: Finite-state analysis of two contract signing protocols. Theor. Comput. Sci. 283(2), 419\u2013450 (2002)","journal-title":"Theor. Comput. Sci."},{"key":"818_CR14","doi-asserted-by":"crossref","unstructured":"Chadha, R., Mitchell, J.C., Scedrov, A., Shmatikov, V.: Contract signing, optimism, and advantage. In International Conference on Concurrency Theory, pages 366\u2013382. Springer, 2003","DOI":"10.1007\/978-3-540-45187-7_24"},{"key":"818_CR15","doi-asserted-by":"crossref","unstructured":"Markowitch, O., Gollmann, D., Kremer, S.: On fairness in exchange protocols. In Information Security and Cryptology-ICISC 2002: 5th International Conference Seoul, Korea, November 28\u201329, 2002 Revised Papers 5, pages 451\u2013465. Springer, 2003","DOI":"10.1007\/3-540-36552-4_31"},{"key":"818_CR16","doi-asserted-by":"crossref","unstructured":"Wang, H., Guo, H., Yin, J., He, Q., Lin, M., Zhang, J.: Abuse-free item exchange. In Computational Science and Its Applications\u2013ICCSA 2005: International Conference, Singapore, May 9-12, 2005, Proceedings, Part IV 5, pages 1028\u20131035. Springer, 2005","DOI":"10.1007\/11424925_107"},{"issue":"1\u20132","key":"818_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1016\/j.tcs.2006.08.039","volume":"367","author":"M Backes","year":"2006","unstructured":"Backes, M., Datta, A., Derek, A., Mitchell, J.C., Turuani, M.: Compositional analysis of contract-signing protocols. Theor. Comput. Sci. 367(1\u20132), 33\u201356 (2006)","journal-title":"Theor. Comput. Sci."},{"issue":"1\u20132","key":"818_CR18","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/s10817-005-9019-5","volume":"36","author":"R Chadha","year":"2006","unstructured":"Chadha, R., Kremer, S., Scedrov, A.: Formal analysis of multiparty contract signing. J. Autom. Reason. 36(1\u20132), 39\u201383 (2006)","journal-title":"J. Autom. Reason."},{"key":"818_CR19","doi-asserted-by":"crossref","unstructured":"K\u00e4hler, D., K\u00fcsters, R., Wilke, T.: A dolev-yao-based definition of abuse-free protocols. In Automata, Languages and Programming: 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II 33, pages 95\u2013106. Springer, 2006","DOI":"10.1007\/11787006_9"},{"key":"818_CR20","unstructured":"Mukhamedov, A., Dermot Ryan, M.: Resolve-impossibility for a contract-signing protocol. In 19th IEEE Computer Security Foundations Workshop (CSFW\u201906), pages 7\u2013pp. IEEE, 2006"},{"issue":"3","key":"818_CR21","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1016\/j.entcs.2005.09.042","volume":"157","author":"S Orzan","year":"2006","unstructured":"Orzan, S., de Vink, E.: Multiparty contract signing over a reliable network. Electronic Notes Theor. Comput. Sci. 157(3), 27\u201341 (2006)","journal-title":"Electronic Notes Theor. Comput. Sci."},{"key":"818_CR22","doi-asserted-by":"crossref","unstructured":"Ruiz-Mart\u00ednez, A., Inmaculada Mar\u00edn-L\u00f3pez, C., Ba\u00f1o-L\u00f3pez, L., G\u00f3mez Skarmeta, A.F.: A new fair non-repudiation protocol for secure negotiation and contract signing. In Proceedings of the 2006 International Conference on Privacy, Security and Trust: Bridge the Gap Between PST Technologies and Business Services, pages 1\u201311, 2006","DOI":"10.1145\/1501434.1501454"},{"key":"818_CR23","doi-asserted-by":"crossref","unstructured":"Gao, W., Li, F., Xu, B.: An abuse-free optimistic fair exchange protocol based on bls signature. In 2008 International Conference on Computational Intelligence and Security, volume\u00a02, pages 278\u2013282. IEEE, 2008","DOI":"10.1109\/CIS.2008.44"},{"key":"818_CR24","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/s10207-008-0056-z","volume":"7","author":"K Imamoto","year":"2008","unstructured":"Imamoto, K., Zhou, J., Sakurai, K.: Achieving evenhandedness in certified email system for contract signing. Int. J. Inf. Secur. 7, 383\u2013394 (2008)","journal-title":"Int. J. Inf. Secur."},{"issue":"1","key":"818_CR25","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1456650.1456655","volume":"41","author":"JA Onieva","year":"2009","unstructured":"Onieva, J.A., Zhou, J., Lopez, J.: Multiparty nonrepudiation: a survey. ACM Comput. Surveys (CSUR) 41(1), 1\u201343 (2009)","journal-title":"ACM Comput. Surveys (CSUR)"},{"key":"818_CR26","doi-asserted-by":"crossref","unstructured":"Li, X., Wang, Z., Chen, L., Wang, Q.: A multi-party contract signing protocol and its formal analysis in strand space model. In 2009 First International Workshop on Education Technology and Computer Science, volume\u00a03, pages 556\u2013559. IEEE, 2009","DOI":"10.1109\/ETCS.2009.656"},{"key":"818_CR27","doi-asserted-by":"crossref","unstructured":"Chen, X., Zhang, F., Tian, H., Wu, Q., Mu, Y., Kim, J., Kim, K.: Three-round abuse-free optimistic contract signing with everlasting secrecy. In Financial Cryptography and Data Security: 14th International Conference, FC 2010, Tenerife, Canary Islands, January 25-28, 2010, Revised Selected Papers 14, pages 304\u2013311. Springer, 2010","DOI":"10.1007\/978-3-642-14577-3_23"},{"key":"818_CR28","doi-asserted-by":"crossref","unstructured":"Li, X., Zheng, Q.: Two-round multi-party contract signing. In 2010 Third International Conference on Knowledge Discovery and Data Mining, pages 486\u2013489. IEEE, 2010","DOI":"10.1109\/WKDD.2010.75"},{"issue":"10","key":"818_CR29","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1093\/comjnl\/bxs175","volume":"56","author":"G Draper-Gil","year":"2013","unstructured":"Draper-Gil, G., Ferrer-Gomila, J.L., Francisca Hinarejos, M., Zhou, J.: An asynchronous optimistic protocol for atomic multi-two-party contract signing. Comput. J. 56(10), 1258\u20131267 (2013)","journal-title":"Comput. J."},{"key":"818_CR30","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1007\/s00165-013-0283-6","volume":"26","author":"K Chatterjee","year":"2014","unstructured":"Chatterjee, K., Raman, V.: Assume-guarantee synthesis for digital contract signing. Formal Aspects Comput. 26, 825\u2013859 (2014)","journal-title":"Formal Aspects Comput."},{"key":"818_CR31","doi-asserted-by":"crossref","unstructured":"Ferradi, H., G\u00e9raud, R., Maimu\u0163, D., Naccache, D., Pointcheval, D.: Legally fair contract signing without keystones. In Applied Cryptography and Network Security: 14th International Conference, ACNS 2016, Guildford, UK, June 19-22, 2016. Proceedings 14, pages 175\u2013190. Springer, 2016","DOI":"10.1007\/978-3-319-39555-5_10"},{"key":"818_CR32","doi-asserted-by":"crossref","unstructured":"Mauw, S., Radomirovic, S., Dashti, M.T.: Minimal message complexity of asynchronous multi-party contract signing. In 2009 22nd IEEE Computer Security Foundations Symposium, pages 13\u201325. IEEE, 2009","DOI":"10.1109\/CSF.2009.15"},{"key":"818_CR33","doi-asserted-by":"crossref","unstructured":"Baum-Waidner, B., Waidner, M.: Round-optimal and abuse-free optimistic multi-party contract signing. In International Colloquium on Automata, Languages, and Programming, pages 524\u2013535. Springer, 2000","DOI":"10.1007\/3-540-45022-X_44"},{"key":"818_CR34","doi-asserted-by":"crossref","unstructured":"Gaber, T., Zhang, N.: Fair and abuse-free contract signing protocol supporting fair license reselling. In 2011 4th IFIP International Conference on New Technologies, Mobility and Security, pages 1\u20137. IEEE, 2011","DOI":"10.1109\/NTMS.2011.5721064"},{"key":"818_CR35","doi-asserted-by":"crossref","unstructured":"Onieva, J.A., Zhou, J., Lopez. J.: Attacking an asynchronous multi-party contract signing protocol. In Progress in Cryptology-INDOCRYPT 2005: 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005. Proceedings 6, pages 311\u2013321. Springer, 2005","DOI":"10.1007\/11596219_25"},{"key":"818_CR36","doi-asserted-by":"crossref","unstructured":"Mukhamedov, A., Ryan, M.: Improved multi-party contract signing. In Financial Cryptography and Data Security: 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers 11, pages 179\u2013191. Springer, 2007","DOI":"10.1007\/978-3-540-77366-5_17"},{"issue":"2\u20134","key":"818_CR37","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1016\/j.ic.2007.07.007","volume":"206","author":"A Mukhamedov","year":"2008","unstructured":"Mukhamedov, A., Ryan, M.A.: Fair multi-party contract signing using private contract signatures. Inf. Comput. 206(2\u20134), 272\u2013290 (2008)","journal-title":"Inf. Comput."},{"key":"818_CR38","doi-asserted-by":"crossref","unstructured":"Wang, Z., Huang, J., Wang, Y., Li, X., Sun, X., Wang, R.: A multi-party contract signing protocol and its implementation via trusted computing. In 2009 International Conference on Computational Science and Engineering, volume\u00a02, pages 727\u2013731. IEEE, 2009","DOI":"10.1109\/CSE.2009.78"},{"key":"818_CR39","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Zhang, C., Pang, J., Mauw, S.: Game-based verification of multi-party contract signing protocols. In Formal Aspects in Security and Trust: 6th International Workshop, FAST 2009, Eindhoven, The Netherlands, November 5-6, 2009, Revised Selected Papers 6, pages 186\u2013200. Springer, 2010","DOI":"10.1007\/978-3-642-12459-4_14"},{"key":"818_CR40","doi-asserted-by":"crossref","unstructured":"Kordy, B., Radomirovic, S.: Constructing optimistic multi-party contract signing protocols. In 2012 IEEE 25th Computer Security Foundations Symposium, pages 215\u2013229. IEEE, 2012","DOI":"10.1109\/CSF.2012.23"},{"key":"818_CR41","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1007\/s11334-012-0180-9","volume":"8","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Zhang, C., Pang, J., Mauw, S.: Game-based verification of contract signing protocols with minimal messages. Innovations Syst. Softw. Eng. 8, 111\u2013124 (2012)","journal-title":"Innovations Syst. Softw. Eng."},{"key":"818_CR42","doi-asserted-by":"crossref","unstructured":"Heidarvand, S., Villar, J.L.: A fair and abuse-free contract signing protocol from boneh-boyen signature. In Public Key Infrastructures, Services and Applications: 7th European Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised Selected Papers 7, pages 125\u2013140. Springer, 2011","DOI":"10.1007\/978-3-642-22633-5_9"},{"key":"818_CR43","doi-asserted-by":"crossref","unstructured":"Chatterjee, K., Raman, V.: Synthesizing protocols for digital contract signing. In International Workshop on Verification, Model Checking, and Abstract Interpretation, pages 152\u2013168. Springer, 2012","DOI":"10.1007\/978-3-642-27940-9_11"},{"key":"818_CR44","doi-asserted-by":"publisher","first-page":"174740","DOI":"10.1109\/ACCESS.2019.2952213","volume":"7","author":"X Guangquan","year":"2019","unstructured":"Guangquan, X., Zhang, Y., Jiao, L., Panaousis, E., Liang, K., Wang, H., Li, X.: DT-CP: A double-TTPs-based contract-signing protocol with lower computational cost. IEEE Access 7, 174740\u2013174749 (2019)","journal-title":"IEEE Access"},{"issue":"1","key":"818_CR45","doi-asserted-by":"publisher","first-page":"158","DOI":"10.1109\/TIFS.2009.2035972","volume":"5","author":"G Wang","year":"2009","unstructured":"Wang, G.: An abuse-free fair contract-signing protocol based on the RSA signature. IEEE Trans. Inf. Forensics Secur. 5(1), 158\u2013168 (2009)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"818_CR46","first-page":"177","volume":"29","author":"KP Thooyamani","year":"2014","unstructured":"Thooyamani, K.P., Udayakumar, R., Khanaa, V.: A novel ruin gratis fair digital contract signing protocol based on RSA signature. World Appl. Sci. J. 29, 177\u2013180 (2014)","journal-title":"World Appl. Sci. J."},{"key":"818_CR47","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1016\/j.ins.2018.05.022","volume":"476","author":"G Xu","year":"2019","unstructured":"Xu, G., Zhang, Y., Sangaiah, A.K., Li, X., Castiglione, A., Zheng, X.: CSP-E2: an abuse-free contract signing protocol with low-storage TTP for energy-efficient electronic transaction ecosystems. Inf. Sci. 476, 505\u2013515 (2019)","journal-title":"Inf. Sci."},{"key":"818_CR48","doi-asserted-by":"crossref","unstructured":"Draper-Gil, G., Ferrer-Gomila, J.L., Francisca Hinarejos, M., Zhou, J.: On the efficiency of multi-party contract signing protocols. In Information Security: 18th International Conference, ISC 2015, Trondheim, Norway, September 9-11, 2015, Proceedings 18, pages 227\u2013243. Springer, 2015","DOI":"10.1007\/978-3-319-23318-5_13"},{"issue":"6","key":"818_CR49","doi-asserted-by":"publisher","first-page":"062331","DOI":"10.1103\/PhysRevA.84.062331","volume":"84","author":"N Paunkovi\u0107","year":"2011","unstructured":"Paunkovi\u0107, N., Bouda, J., Mateus, P.: Fair and optimistic quantum contract signing. Phys. Rev. A 84(6), 062331 (2011)","journal-title":"Phys. Rev. A"},{"issue":"1","key":"818_CR50","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1049\/iet-ifs.2012.0277","volume":"9","author":"AA Al-Saggaf","year":"2015","unstructured":"Al-Saggaf, A.A., Ghouti, L.: Efficient abuse-free fair contract-signing protocol based on an ordinary crisp commitment scheme. IET Inf. Secur. 9(1), 50\u201358 (2015)","journal-title":"IET Inf. Secur."},{"key":"818_CR51","doi-asserted-by":"crossref","unstructured":"Rajasree, R.S., Pede, S.V: An abuse-free optimistic signature exchange protocol using block cipher. In 2015 International Conference on Computing Communication Control and Automation, pages 256\u2013260. IEEE, 2015","DOI":"10.1109\/ICCUBEA.2015.55"},{"issue":"9","key":"818_CR52","doi-asserted-by":"publisher","first-page":"821","DOI":"10.3390\/e21090821","volume":"21","author":"P Yadav","year":"2019","unstructured":"Yadav, P., Mateus, P., Paunkovi\u0107, N., Souto, A.: Quantum contract signing with entangled pairs. Entropy 21(9), 821 (2019)","journal-title":"Entropy"},{"key":"818_CR53","doi-asserted-by":"crossref","unstructured":"K\u00e4hler, D., K\u00fcsters, R.: Constraint solving for contract-signing protocols. In International Conference on Concurrency Theory, pages 233\u2013247. Springer, 2005","DOI":"10.1007\/11539452_20"},{"key":"818_CR54","doi-asserted-by":"crossref","unstructured":"K\u00e4hler, D., K\u00fcsters, R., Wilke, T.: Deciding properties of contract-signing protocols. In Annual Symposium on Theoretical Aspects of Computer Science, pages 158\u2013169. Springer, 2005","DOI":"10.1007\/978-3-540-31856-9_13"},{"key":"818_CR55","doi-asserted-by":"crossref","unstructured":"K\u00fcsters, R., Schnoor, H., Truderung, T.: A formal definition of online abuse-freeness. In International Conference on Security and Privacy in Communication Systems, pages 484\u2013497. Springer, 2010","DOI":"10.1007\/978-3-642-16161-2_28"},{"key":"818_CR56","doi-asserted-by":"crossref","unstructured":"Yang, K., Wu, Y., Chen, Y.: A blockchain-based scalable electronic contract signing system. In 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, Physical & Social Computing (CPSCom) and IEEE Smart Data (SmartData) and IEEE Congress on Cybermatics (Cybermatics), pages 343\u2013348. IEEE, 2022","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics55523.2022.00081"},{"key":"818_CR57","doi-asserted-by":"publisher","first-page":"9473","DOI":"10.1109\/ACCESS.2021.3049562","volume":"9","author":"L Guo","year":"2021","unstructured":"Guo, L., Liu, Q., Shi, K., Gao, Y., Luo, J., Chen, J.: A blockchain-driven electronic contract management system for commodity procurement in electronic power industry. IEEE Access 9, 9473\u20139480 (2021)","journal-title":"IEEE Access"},{"key":"818_CR58","doi-asserted-by":"crossref","unstructured":"Mut-Puigserver, M., Magdalena Payeras-Capell\u00e0, M., Cabot-Nadal, M.: Blockchain-based contract signing protocol for confidential contracts. In 2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA), pages 1\u20136. IEEE, 2019","DOI":"10.1109\/AICCSA47632.2019.9035363"},{"key":"818_CR59","doi-asserted-by":"publisher","first-page":"142","DOI":"10.1016\/j.ins.2020.05.054","volume":"535","author":"L Zhang","year":"2020","unstructured":"Zhang, L., Zhang, H., Jia, Yu., Xian, H.: Blockchain-based two-party fair contract signing scheme. Inf. Sci. 535, 142\u2013155 (2020)","journal-title":"Inf. Sci."},{"key":"818_CR60","doi-asserted-by":"crossref","unstructured":"Wang, D., Li, Q., Li, F., Zhang, Q., Xu, B.: Privacy-awareness fair contract signing protocol based on blockchain. In Cyberspace Safety and Security: 11th International Symposium, CSS 2019, Guangzhou, China, December 1\u20133, 2019, Proceedings, Part I 11, pages 274\u2013278. Springer, 2019","DOI":"10.1007\/978-3-030-37337-5_22"},{"issue":"8","key":"818_CR61","doi-asserted-by":"publisher","first-page":"e0273424","DOI":"10.1371\/journal.pone.0273424","volume":"17","author":"W Xiong","year":"2022","unstructured":"Xiong, W., Yangcheng, H.: Delegate contract signing mechanism based on smart contract. PLoS ONE 17(8), e0273424 (2022)","journal-title":"PLoS ONE"},{"key":"818_CR62","doi-asserted-by":"crossref","unstructured":"Zhang, T., Wang, Y., Ding, Y., Jiang, X., Liang, H., Wang, H.: Privacy-preserving blockchain-based contract signing with multi-party supervision. Transactions on Emerging Telecommunications Technologies, page e4710, 2022","DOI":"10.1002\/ett.4710"},{"key":"818_CR63","doi-asserted-by":"crossref","unstructured":"Tian, H., He, J., Fu, L.: Contract coin: Toward practical contract signing on blockchain. In Information Security Practice and Experience: 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13\u201315, 2017, Proceedings 13, pages 43\u201361. Springer, 2017","DOI":"10.1007\/978-3-319-72359-4_3"},{"key":"818_CR64","doi-asserted-by":"crossref","unstructured":"Huang, H., Li, K.C., Chen, X.: A fair three-party contract singing protocol based on blockchain. In Cyberspace Safety and Security: 9th International Symposium, CSS 2017, Xi\u2019an China, October 23\u201325, 2017, Proceedings, pages 72\u201385. Springer, 2017","DOI":"10.1007\/978-3-319-69471-9_6"},{"issue":"22","key":"818_CR65","doi-asserted-by":"publisher","first-page":"e4469","DOI":"10.1002\/cpe.4469","volume":"31","author":"H Huang","year":"2019","unstructured":"Huang, H., Li, K.-C., Chen, X.: Blockchain-based fair three-party contract signing protocol for fog computing. Concurr. Comput.: Pract. Exp. 31(22), e4469 (2019)","journal-title":"Concurr. Comput.: Pract. Exp."},{"key":"818_CR66","doi-asserted-by":"crossref","unstructured":"Zhang, Q., Gao, J., Qin, Q., Wang, C., Yin, K.: Futuretext: a blockchain-based contract signing prototype with security and convenience. In Proceedings of the 3rd ACM International Symposium on Blockchain and Secure Critical Infrastructure, pages 77\u201383, 2021","DOI":"10.1145\/3457337.3457844"},{"issue":"2","key":"818_CR67","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1587\/transinf.2021BCP0011","volume":"105","author":"T Zhang","year":"2022","unstructured":"Zhang, T., Wang, Y., Ding, Y., Qianhong, W., Liang, H., Wang, H.: Multi-party electronic contract signing protocol based on blockchain. IEICE Trans. Inf. Syst. 105(2), 264\u2013271 (2022)","journal-title":"IEICE Trans. Inf. Syst."},{"key":"818_CR68","doi-asserted-by":"publisher","first-page":"100869","DOI":"10.1016\/j.elerap.2019.100869","volume":"36","author":"JL Ferrer-Gomila","year":"2019","unstructured":"Ferrer-Gomila, J.L., Francisca Hinarejos, M., Isern-Deya, A.P.: A fair contract signing protocol with blockchain support. Electron. Commerce Res. Appl. 36, 100869 (2019)","journal-title":"Electron. Commerce Res. Appl."},{"issue":"12","key":"818_CR69","doi-asserted-by":"publisher","first-page":"1457","DOI":"10.3390\/electronics10121457","volume":"10","author":"JL Ferrer-Gomila","year":"2021","unstructured":"Ferrer-Gomila, J.L., Francisca Hinarejos, M.: A multi-party contract signing solution based on blockchain. Electronics 10(12), 1457 (2021)","journal-title":"Electronics"},{"key":"818_CR70","unstructured":"Wood, G.: Ethereum: a secure decentralised generalised transaction ledger EIP-150 revision (759dccd - 2017-08-07), 2017"},{"key":"818_CR71","unstructured":"Ethereum.org. Smart Contracts Languages. Accessed on 1 August 2023"},{"key":"818_CR72","unstructured":"Nomic Foundation. Ethereum development environment for professionals. Accessed on 1 August 2023"},{"key":"818_CR73","unstructured":"Ether Gas Reporter. A Mocha reporter for Ethereum test suites. https:\/\/github.com\/cgewecke\/eth-gas-reporter. Accessed on 1 August 2023"},{"key":"818_CR74","unstructured":"Etherscan. Block Explorer and Analytics Platform for Ethereum. https:\/\/etherscan.io\/. Accessed on 1 August 2023"},{"key":"818_CR75","unstructured":"CoinMarketCap. Price-tracking website for cryptoassets. Accessed on 1 August 2023"},{"key":"818_CR76","unstructured":"Polygon technology. Ethereum\u2019s Internet of Blockchains. https:\/\/polygon.technology\/. Accessed on 1 August 2023"},{"key":"818_CR77","doi-asserted-by":"crossref","unstructured":"Rescorla, E.: The Transport Layer Security (TLS) Protocol Version 1.3. RFC 8446, August 2018","DOI":"10.17487\/RFC8446"},{"key":"818_CR78","doi-asserted-by":"crossref","unstructured":"Schaad, J., Ramsdell, B.C., Turner, S.: Secure\/Multipurpose Internet Mail Extensions (S\/MIME) Version 4.0 Message Specification. RFC 8551, April 2019","DOI":"10.17487\/RFC8551"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00818-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00818-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00818-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T01:59:37Z","timestamp":1731549577000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00818-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3,10]]},"references-count":78,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,6]]}},"alternative-id":["818"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00818-y","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3,10]]},"assertion":[{"value":"10 March 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest related to this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The research does not involve human participants or animals.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}}]}}