{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:49:37Z","timestamp":1770752977843,"version":"3.50.0"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T00:00:00Z","timestamp":1730160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T00:00:00Z","timestamp":1730160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Department of Computer Science and Engineering, S. V. National Institute of Technology, Surat, India","award":["SEED Money\/Research Grant"],"award-info":[{"award-number":["SEED Money\/Research Grant"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2025,2]]},"DOI":"10.1007\/s10207-024-00913-0","type":"journal-article","created":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T06:58:54Z","timestamp":1730185134000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Novel mechanism for anonymous reporting and anonymous rewarding using blockchain technology"],"prefix":"10.1007","volume":"24","author":[{"given":"Shriniwas","family":"Patil","sequence":"first","affiliation":[]},{"given":"Keyur","family":"Parmar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,10,29]]},"reference":[{"key":"913_CR1","first-page":"545","volume":"49","author":"ML Mitchell","year":"1993","unstructured":"Mitchell, M.L., Netter, J.M.: The role of financial economics in securities fraud cases: applications at the securities and exchange commission. Bus. Law. 49, 545 (1993)","journal-title":"Bus. Law."},{"key":"913_CR2","unstructured":"Knowledge at Wharton Staff: The whistleblower\u2019s dilemma: Do the risks outweigh the benefits? https:\/\/knowledge.wharton.upenn.edu\/article\/whistleblowers-in-business\/ (2024) Accessed 15 June 2023"},{"issue":"5","key":"913_CR3","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TSC.2016.2633260","volume":"12","author":"H Wang","year":"2016","unstructured":"Wang, H., He, D., Yu, J., Wang, Z.: Incentive and unconditionally anonymous identity-based public provable data possession. Trans. Serv. Comput. 12(5), 824 (2016). https:\/\/doi.org\/10.1109\/TSC.2016.2633260","journal-title":"Trans. Serv. Comput."},{"key":"913_CR4","doi-asserted-by":"publisher","unstructured":"Yang, X., Wu,W., Liu,J.K., Chen,X.: Lightweight Anonymous Authentication for AD HOC Group: A Ring Signature Approach, in Proceddings of the International Conference on Provable Security, vol. 9451, pp. 215\u2013226. Springer, Lecture Notes in Computer Science, Kanazawa, Japan, (2015) https:\/\/doi.org\/10.1007\/978-3-319-26059-4_12","DOI":"10.1007\/978-3-319-26059-4_12"},{"key":"913_CR5","doi-asserted-by":"crossref","unstructured":"Chu, C.K., Liu,J.K., Wong, J.W., Zhao, Y., Zhou,J.: Privacy-Preserving Smart Metering with Regional Statistics and Personal Enquiry Services, in Proceedings of the$${8th}$$SIGSAC Symposium on Information, Computer and Communications Security, pp. 369\u2013380. ASIA CCS \u201913 ACM, Hangzhou, China (2013) https:\/\/doi.org\/10.1145\/2484313.2484362","DOI":"10.1145\/2484313.2484362"},{"issue":"4","key":"913_CR6","doi-asserted-by":"publisher","first-page":"697","DOI":"10.1109\/TSG.2011.2140343","volume":"2","author":"Z Yang","year":"2011","unstructured":"Yang, Z., Yu, S., Lou, W., Liu, C.: $$ P^{2} $$: Privacy-preserving communication and precise reward architecture for V2G networks in smart grid. Trans. Smart Grid 2(4), 697 (2011). https:\/\/doi.org\/10.1109\/TSG.2011.2140343","journal-title":"Trans. Smart Grid"},{"key":"913_CR7","doi-asserted-by":"publisher","unstructured":"Sui,Z., Alyousef, A., de\u00a0Meer H.: IAA: Incentive-Based Anonymous Authentication Scheme in Smart Grids, in Proceedings of the International Conference on Internet Science, vol. 9089, pp. 133\u2013144. Springer, Lecture Notes in Computer Science, Brussels, Belgium (2015) https:\/\/doi.org\/10.1007\/978-3-319-18609-2_11","DOI":"10.1007\/978-3-319-18609-2_11"},{"issue":"10","key":"913_CR8","doi-asserted-by":"publisher","first-page":"200","DOI":"10.1109\/MCOM.2015.7295484","volume":"53","author":"D He","year":"2015","unstructured":"He, D., Chan, S., Guizani, M.: Privacy and incentive mechanisms in people-centric sensing networks. Commun. Magazine 53(10), 200 (2015). https:\/\/doi.org\/10.1109\/MCOM.2015.7295484","journal-title":"Commun. Magazine"},{"issue":"4","key":"913_CR9","doi-asserted-by":"publisher","first-page":"1514","DOI":"10.1109\/TEM.2019.2909529","volume":"67","author":"H Wang","year":"2019","unstructured":"Wang, H., He, D., Liu, Z., Guo, R.: Blockchain-based anonymous reporting scheme with anonymous rewarding. Trans. Eng. Manag. 67(4), 1514 (2019). https:\/\/doi.org\/10.1109\/TEM.2019.2909529","journal-title":"Trans. Eng. Manag."},{"key":"913_CR10","doi-asserted-by":"publisher","first-page":"65544","DOI":"10.1109\/ACCESS.2019.2915956","volume":"7","author":"S Zou","year":"2019","unstructured":"Zou, S., Xi, J., Wang, S., Lu, Y., Xu, G.: Reportcoin: a novel blockchain-based incentive anonymous reporting system. Access 7, 65544 (2019). https:\/\/doi.org\/10.1109\/ACCESS.2019.2915956","journal-title":"Access"},{"issue":"6","key":"913_CR11","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1109\/MNET.2018.1700269","volume":"32","author":"F Gao","year":"2018","unstructured":"Gao, F., Zhu, L., Shen, M., Sharif, K., Wan, Z., Ren, K.: A blockchain-based privacy-preserving payment mechanism for vehicle-to-grid networks. Network 32(6), 184 (2018). https:\/\/doi.org\/10.1109\/MNET.2018.1700269","journal-title":"Network"},{"issue":"2","key":"913_CR12","doi-asserted-by":"publisher","first-page":"3676","DOI":"10.1109\/JIOT.2018.2890213","volume":"6","author":"H Wang","year":"2019","unstructured":"Wang, H., Wang, Q., He, D., Li, Q., Liu, Z.: BBARS: blockchain-based anonymous rewarding scheme for v2g networks. Intnet Things J. 6(2), 3676 (2019). https:\/\/doi.org\/10.1109\/JIOT.2018.2890213","journal-title":"Intnet Things J."},{"issue":"12","key":"913_CR13","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1109\/MCOM.2017.1700879","volume":"55","author":"A Dorri","year":"2017","unstructured":"Dorri, A., Steger, M., Kanhere, S.S., Jurdak, R.: BlockChain: a distributed solution to automotive security and privacy. Commun. Magaz. 55(12), 119 (2017). https:\/\/doi.org\/10.1109\/MCOM.2017.1700879","journal-title":"Commun. Magaz."},{"issue":"7","key":"913_CR14","doi-asserted-by":"publisher","first-page":"2204","DOI":"10.1109\/TITS.2017.2777990","volume":"19","author":"L Li","year":"2018","unstructured":"Li, L., Liu, J., Cheng, L., Qiu, S., Wang, W., Zhang, X., Zhang, Z.: A privacy-preserving blockchain-based incentive announcement network for communications of smart vehicles. Trans. Intell. Trans. Syst. 19(7), 2204 (2018). https:\/\/doi.org\/10.1109\/TITS.2017.2777990","journal-title":"Trans. Intell. Trans. Syst."},{"issue":"3","key":"913_CR15","doi-asserted-by":"publisher","first-page":"3162","DOI":"10.1109\/TSG.2018.2819663","volume":"10","author":"G Liang","year":"2019","unstructured":"Liang, G., Weller, S.R., Luo, F., Zhao, J., Dong, Z.Y.: Distributed blockchain-based data protection framework for modern power systems against cyber attacks. Trans. Smart Grid 10(3), 3162 (2019). https:\/\/doi.org\/10.1109\/TSG.2018.2819663","journal-title":"Trans. Smart Grid"},{"issue":"5","key":"913_CR16","doi-asserted-by":"publisher","first-page":"840","DOI":"10.1109\/TDSC.2016.2616861","volume":"15","author":"NZ Aitzhan","year":"2018","unstructured":"Aitzhan, N.Z., Svetinovic, D.: Security and privacy in decentralized energy trading through multi-signatures, blockchain and anonymous messaging streams, transactions on dependable and secure. Computing 15(5), 840 (2018). https:\/\/doi.org\/10.1109\/TDSC.2016.2616861","journal-title":"Computing"},{"key":"913_CR17","doi-asserted-by":"publisher","unstructured":"Al-Riyami,S.S. , Paterson,K.G.: Certificateless Public Key Cryptography, in Proceddings of ASIACRYPT: Advances in Cryptology, International Conference on the Theory and Application of Cryptology and Information Security, vol. 2894, pp. 452\u2013473. Springer, Taipei, Taiwan (2003) https:\/\/doi.org\/10.1007\/978-3-540-40061-5_29","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"1","key":"913_CR18","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1016\/0167-4048(82)90028-1","volume":"1","author":"M Willett","year":"1982","unstructured":"Willett, M.: A tutorial on public key cryptography. Computers Sec. 1(1), 72 (1982). https:\/\/doi.org\/10.1016\/0167-4048(82)90028-1","journal-title":"Computers Sec."},{"issue":"2","key":"913_CR19","doi-asserted-by":"publisher","first-page":"120","DOI":"10.1145\/359340.359342","volume":"21","author":"RL Rivest","year":"1978","unstructured":"Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120 (1978). https:\/\/doi.org\/10.1145\/359340.359342","journal-title":"Commun. ACM"},{"key":"913_CR20","doi-asserted-by":"publisher","unstructured":"Fujisaki, E., Suzuki, K.: Traceable Ring Signature, in Proceddings of the International Workshop on Public Key Cryptography, vol. 4450, pp. 181\u2013200. Springer, Beijing, China (2007) https:\/\/doi.org\/10.1007\/978-3-540-71677-8_13","DOI":"10.1007\/978-3-540-71677-8_13"},{"issue":"1","key":"913_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/BF00195207","volume":"7","author":"O Goldreich","year":"1994","unstructured":"Goldreich, O., Oren, Y.: Definitions and properties of zero-knowledge proof systems. J. Cryptol. 7(1), 1 (1994). https:\/\/doi.org\/10.1007\/BF00195207","journal-title":"J. Cryptol."},{"key":"913_CR22","doi-asserted-by":"publisher","first-page":"102050","DOI":"10.1016\/j.cose.2020.102050","volume":"99","author":"X Yang","year":"2020","unstructured":"Yang, X., Li, W.: A zero-knowledge-proof-based digital identity management scheme in blockchain. Comput. Sec. 99, 102050 (2020). https:\/\/doi.org\/10.1016\/j.cose.2020.102050","journal-title":"Comput. Sec."},{"key":"913_CR23","doi-asserted-by":"crossref","unstructured":"Saraswat,V., Pandey, S.K.: How to Leak a Secret and Reap the Rewards Too, in International Conference on Cryptology and Information Security in Latin America, pp. 348\u2013367 Springer (2014)","DOI":"10.1007\/978-3-319-16295-9_19"},{"key":"913_CR24","unstructured":"Szabo.N.: Smart contracts (1994). https:\/\/www.fon.hum.uva.nl\/rob\/Courses\/InformationInSpeech\/CDROM\/Literature\/LOTwinterschool2006\/szabo.best.vwh.net\/smart.contracts.html"},{"key":"913_CR25","doi-asserted-by":"publisher","unstructured":"N. Szabo, Formalizing and securing relationships on public networks, First monday 2(9) (1997). https:\/\/doi.org\/10.5210\/fm.v2i9.548","DOI":"10.5210\/fm.v2i9.548"},{"key":"913_CR26","doi-asserted-by":"publisher","unstructured":"Mohanta, B.K., Panda, S.S. , Jena,D.: An Overview of Smart Contract and Use Cases in Blockchain Technology,in 2018 9th International Conference on Computing, Communication and Networking Technologies (ICCCNT) (2018), pp. 1\u20134. https:\/\/doi.org\/10.1109\/ICCCNT.2018.8494045","DOI":"10.1109\/ICCCNT.2018.8494045"},{"key":"913_CR27","doi-asserted-by":"publisher","unstructured":"Chaum,D., van Heijst, E., Pfitzmann,B.: Cryptographically Strong Undeniable Signatures, Unconditionally Secure For The Signer , in Proceddings of CRYPTO 91: Advances in Cryptology, Annual International Cryptology Conference, pp. 470\u2013484. Springer, Santa Barbara, USA (1991) https:\/\/doi.org\/10.1007\/3-540-46766-1_38","DOI":"10.1007\/3-540-46766-1_38"},{"issue":"4","key":"913_CR28","doi-asserted-by":"publisher","first-page":"469","DOI":"10.1109\/TIT.1985.1057074","volume":"31","author":"T ElGamal","year":"1985","unstructured":"ElGamal, T.: A public key cryptosystem and a signature scheme based on discrete logarithms. Trans. Inf. Theory 31(4), 469 (1985). https:\/\/doi.org\/10.1109\/TIT.1985.1057074","journal-title":"Trans. Inf. Theory"},{"key":"913_CR29","doi-asserted-by":"publisher","unstructured":"Fiat,A., Shamir, A.: How to Prove Yourself: Practical Solutions to Identification and Signature Problems, in Proceedings of CRYPTO 86: Advances in Cryptology, Conference on the Theory and Application of Cryptographic Techniques, pp. 186\u2013194. Springer, Santa Barbara, USA, (1986). https:\/\/doi.org\/10.1007\/3-540-47721-7_12","DOI":"10.1007\/3-540-47721-7_12"},{"key":"913_CR30","doi-asserted-by":"publisher","first-page":"100032","DOI":"10.1016\/j.csa.2023.100032","volume":"2","author":"SB Far","year":"2024","unstructured":"Far, S.B., Asaar, M.R.: A blockchain-based anonymous reporting system with no central authority: architecture and protocol. Cyber Secur. Appl. 2, 100032 (2024). https:\/\/doi.org\/10.1016\/j.csa.2023.100032","journal-title":"Cyber Secur. Appl."},{"key":"913_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.sysarc.2023.102985","volume":"143","author":"R Shi","year":"2023","unstructured":"Shi, R., Yang, Y., Feng, H., Yuan, F., Xie, H., Zhang, J.: Practical blockchain-based privacy-preserving reporting system with rewards. J. Syst. Architect. 143, 1 (2023). https:\/\/doi.org\/10.1016\/j.sysarc.2023.102985","journal-title":"J. Syst. Architect."},{"issue":"3","key":"913_CR32","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1007\/s12599-017-0467-3","volume":"59","author":"M Nofer","year":"2017","unstructured":"Nofer, M., Gomber, P., Hinz, O., Schiereck, D.: Blockchain. Bus. Inf. Syst. Eng. 59(3), 183 (2017). https:\/\/doi.org\/10.1007\/s12599-017-0467-3","journal-title":"Bus. Inf. Syst. Eng."},{"key":"913_CR33","doi-asserted-by":"publisher","unstructured":"Chaum,D., Fiat,A., Naor,M.: Untraceable Electronic Cash, in Proceddings of CRYPTO 88: Advances in Cryptology, Conference on the Theory and Application of Cryptography, vol. 403, pp. 319\u2013327. Springer, Lecture Notes in Computer Science, Santa Barbara, USA, (1988) https:\/\/doi.org\/10.1007\/0-387-34799-2_25","DOI":"10.1007\/0-387-34799-2_25"},{"key":"913_CR34","doi-asserted-by":"publisher","unstructured":"Chaum, D.: Blind Signatures for Untraceable Payments, in Proceddings of CRYPTO 83: Advances in Cryptology, Conference on the Theory and Application of Cryptography, pp. 199\u2013203. Springer, Santa Barbara, USA (1983) https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"913_CR35","doi-asserted-by":"publisher","unstructured":"Chaum, D.: Blind Signature System, in Proceddings of CRYPTO 84: Advances in Cryptology, Conference on the Theory and Application of Cryptography, pp. 153\u2013153. Springer, Santa Barbara, USA, (1984) https:\/\/doi.org\/10.1007\/978-1-4684-4730-9_14","DOI":"10.1007\/978-1-4684-4730-9_14"},{"key":"913_CR36","doi-asserted-by":"publisher","unstructured":"S.\u00a0Haber, W.S. Stornetta, How to Time-Stamp a Digital Document,in Proceedings of CRYPTO 90: Advances in Cryptology, Conference on the Theory and Application of Cryptography, vol. 537, pp. 437\u2013455. Springer, Lecture Notes in Computer Science, Santa Barbara, USA, (1990) https:\/\/doi.org\/10.1007\/3-540-38424-3_32","DOI":"10.1007\/3-540-38424-3_32"},{"key":"913_CR37","unstructured":"Nakamoto,S.: Bitcoin: A peer-to-peer electronic cash system, Decentralized Business Review (2008)"},{"key":"913_CR38","doi-asserted-by":"publisher","unstructured":"M.\u00a0Chase, S.\u00a0Meiklejohn, G.\u00a0Zaverucha, Algebraic MACs and Keyed-Verification Anonymous Credentials, in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (ACM, 2014), pp. 1205\u20131216. https:\/\/doi.org\/10.1145\/2660267.2660328","DOI":"10.1145\/2660267.2660328"},{"issue":"3","key":"913_CR39","doi-asserted-by":"publisher","first-page":"362","DOI":"10.1006\/jcss.1999.1694","volume":"61","author":"M Bellare","year":"2000","unstructured":"Bellare, M., Kilian, J., Rogaway, P.: The security of the cipher block chaining message authentication code. J. Comput. Syst. Sci. 61(3), 362 (2000). https:\/\/doi.org\/10.1006\/jcss.1999.1694","journal-title":"J. Comput. Syst. Sci."},{"issue":"1","key":"913_CR40","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson, D., Menezes, A., Vanstone, S.: The elliptic curve digital signature algorithm (ECDSA). Int. J. Inf. Secur. 1(1), 36 (2001). https:\/\/doi.org\/10.1007\/s102070100002","journal-title":"Int. J. Inf. Secur."},{"issue":"11","key":"913_CR41","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang, S., Ouyang, L., Yuan, Y., Ni, X., Han, X., Wang, F.Y.: Blockchain-Enabled Smart Contracts: Architecture. Appl. Future Trends Trans. Syst. Man Cybernet: Syst. 49(11), 2266 (2019). https:\/\/doi.org\/10.1109\/TSMC.2019.2895123","journal-title":"Appl. Future Trends Trans. Syst. Man Cybernet: Syst."},{"key":"913_CR42","doi-asserted-by":"crossref","unstructured":"Caronni,G.: Walking the Web of Trust,in Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000) (2000), pp. 153\u2013158. 10.1109\/ENABL.2000.883720","DOI":"10.1109\/ENABL.2000.883720"},{"key":"913_CR43","unstructured":"Buterin, V.: On Public and Private Blockchains. https:\/\/blog.ethereum.org\/2015\/08\/07\/on-public-and-private-blockchains\/. Accessed 15 June 2023"},{"key":"913_CR44","unstructured":"National Institute of Standards and Technology (NIST). Hash Functions. https:\/\/csrc.nist.gov\/projects\/hash-functions. Accessed 03 October 2024"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00913-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00913-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00913-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T05:15:57Z","timestamp":1739337357000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00913-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,29]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,2]]}},"alternative-id":["913"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00913-0","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"value":"1615-5262","type":"print"},{"value":"1615-5270","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,10,29]]},"assertion":[{"value":"29 October 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no Conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"Data sharing not applicable to this article as no datasets were generated or analyzed during the current study.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Data sharing"}}],"article-number":"2"}}