{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T15:06:09Z","timestamp":1768835169633,"version":"3.49.0"},"reference-count":64,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2024,2]]},"DOI":"10.1007\/s10586-023-03969-0","type":"journal-article","created":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T11:37:39Z","timestamp":1676115459000},"page":"721-735","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An investigating study of blind and ID-based signcryption schemes for misuse risk protection and high performance computing"],"prefix":"10.1007","volume":"27","author":[{"given":"Shamsher","family":"Ullah","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Jiangbin","sequence":"additional","affiliation":[]},{"given":"Muhammad Tanveer","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Muhammad Wasif","family":"Sardar","sequence":"additional","affiliation":[]},{"given":"Muhammad Umar","family":"Farooq","sequence":"additional","affiliation":[]},{"given":"Salabat","family":"Khan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,11]]},"reference":[{"issue":"2","key":"3969_CR1","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1007\/s12083-020-01044-8","volume":"14","author":"S Ullah","year":"2021","unstructured":"Ullah, S., Din, N.: Blind signcryption scheme based on hyper elliptic curves cryptosystem. Peer-to-Peer Netw. Appl. 14(2), 917\u2013932 (2021)","journal-title":"Peer-to-Peer Netw. Appl."},{"key":"3969_CR2","unstructured":"Shamsherullah, N., Arif, U., I., Noor-Ul-Amin, R., U., Insaf, U.: Blind signcryption scheme based on hyper elliptic curve for untraceable payment system. In: Proc. 13th International Conference on Statistical Sciences 28, 337\u2013344 (2015)"},{"key":"3969_CR3","first-page":"1","volume":"11","author":"HF Yu","year":"2010","unstructured":"Yu, H.F., Zhao, H.X., Wang, Z.C., Yi, W.: Self-certified blind signcryption scheme based on ECC. Comput. Eng. 11, 1\u20138 (2010)","journal-title":"Comput. Eng."},{"key":"3969_CR4","unstructured":"Song, M.M., Zhang, Z., Xie, W.J.: Certificateless blind signcryption scheme without pairing. J. Guangxi Univ. Nationalities (Natural Science Edition) 1 (2011)"},{"key":"3969_CR5","doi-asserted-by":"crossref","unstructured":"Chaum, D.L.: Blind signatures for untraceable payments. pp. 199\u2013203 (1983)","DOI":"10.1007\/978-1-4757-0602-4_18"},{"key":"3969_CR6","doi-asserted-by":"publisher","DOI":"10.1155\/2017\/8981606","author":"CH Tsai","year":"2017","unstructured":"Tsai, C.H., Su, P.C.: An ECC-based blind signcryption scheme for multiple digital documents. Secur. Commun. Netw. (2017). https:\/\/doi.org\/10.1155\/2017\/8981606","journal-title":"Secur. Commun. Netw."},{"key":"3969_CR7","unstructured":"Xiao-lin, L.Z., Zhou, W., Jin, Y.: A proxy signature scheme based on hyperelliptic curve. J. Beijing Univ. Technol. 30, 8 (2009)"},{"issue":"3","key":"3969_CR8","first-page":"418","volume":"27","author":"C Yang","year":"2015","unstructured":"Yang, C.: Digital signature scheme based on secret sharing. J. Chongqing Univ. Posts Telecommun. (Natural Science Edition) 27(3), 418\u2013421 (2015)","journal-title":"J. Chongqing Univ. Posts Telecommun. (Natural Science Edition)"},{"key":"3969_CR9","doi-asserted-by":"crossref","unstructured":"Wei, L.F.: Design of hyperelliptic curve system digital signature in identity authentication. 8878, 88,780X (2013)","DOI":"10.1117\/12.2031765"},{"key":"3969_CR10","doi-asserted-by":"crossref","unstructured":"Nelasa, A., Fedoronchak, T.: Usage of hyperelliptic curves in the digital signature protocol. pp. 51\u201353 (2006)","DOI":"10.1109\/TCSET.2006.4404442"},{"key":"3969_CR11","first-page":"16","volume":"117","author":"S Singh","year":"2015","unstructured":"Singh, S., Iqbal, M.S., Jaiswal, A.: Survey on techniques developed using digital signature: public key cryptography. Int. J. Comput. Appl. 117, 16 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"3969_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3233\/JCS-219000","volume":"30","author":"IA Obiri","year":"2022","unstructured":"Obiri, I.A., Xia, Q., Xia, H., Affum, E., Abla, S., Gao, J.: Personal health records sharing scheme based on attribute based signcryption with data integrity verifiable. J. Comput. Secur. 30, 1\u201334 (2022)","journal-title":"J. Comput. Secur."},{"key":"3969_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2020.101754","volume":"109","author":"Y Zhou","year":"2020","unstructured":"Zhou, Y., Guo, J., Li, F.: Certificateless public key encryption with cryptographic reverse firewalls. J. Syst. Architect. 109, 101754 (2020)","journal-title":"J. Syst. Architect."},{"key":"3969_CR14","volume-title":"Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations","author":"C Adams","year":"1999","unstructured":"Adams, C., Lloyd, S.: Understanding Public-Key Infrastructure: Concepts, Standards, and Deployment Considerations. Sams Publishing, Carmel (1999)"},{"key":"3969_CR15","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. pp. 47\u201353 (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"3969_CR16","doi-asserted-by":"crossref","unstructured":"Al-Riyami, S.S., Paterson, K.G.: Certificateless public key cryptography. pp. 452\u2013473 (2003)","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"1","key":"3969_CR17","first-page":"17","volume":"3","author":"T Balasubramanian","year":"2015","unstructured":"Balasubramanian, T.: Indian J. Res. Commun. Eng. (IJRCE) 3(1), 17\u201327 (2015)","journal-title":"Indian J. Res. Commun. Eng. (IJRCE)"},{"key":"3969_CR18","first-page":"440","volume":"3","author":"S Chaudhari","year":"2017","unstructured":"Chaudhari, S., Pahade, M., Bhat, S., Sawant, T., Jadhav, C.: A survey on methods of cryptography and data encryption. Methods Cryptogr. Data Encrypt. 3, 440\u201343 (2017)","journal-title":"Methods Cryptogr. Data Encrypt."},{"key":"3969_CR19","volume":"70","author":"S Ullah","year":"2022","unstructured":"Ullah, S., Jiangbin, Z., Hussain, M.T., Din, N., Ullah, F., Farooq, M.U.: A perspective trend of hyperelliptic curve cryptosystem for lighted weighted environments. J. Inf. Security Appl. 70, 103346 (2022)","journal-title":"J. Inf. Security Appl."},{"key":"3969_CR20","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: Digital signcryption or how to achieve cost(signature & encryption) $$<<$$ cost(signature) + cost(encryption) pp 165\u2013179 (1997)","DOI":"10.1007\/BFb0052234"},{"key":"3969_CR21","doi-asserted-by":"crossref","unstructured":"Zhang, P., Li, Y., Chi, H.: An elliptic curve signcryption scheme and its application. Wirel. Commun. Mobile Comput. 2022 (2022)","DOI":"10.1155\/2022\/7499836"},{"issue":"8","key":"3969_CR22","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1049\/el.2019.0032","volume":"55","author":"M Zia","year":"2019","unstructured":"Zia, M., Ali, R.: Cryptanalysis and improvement of blind signcryption scheme based on elliptic curve. Electron. Lett. 55(8), 457\u2013459 (2019)","journal-title":"Electron. Lett."},{"issue":"6","key":"3969_CR23","doi-asserted-by":"publisher","first-page":"662","DOI":"10.1007\/s11859-008-0605-3","volume":"13","author":"X Yu","year":"2008","unstructured":"Yu, X., He, D.: A new efficient blind signcryption. Wuhan Univ. J. Nat. Sci. 13(6), 662\u2013664 (2008)","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"3969_CR24","unstructured":"Awasthi, A.K., Lal, S.: An efficient scheme for sensitive message transmission using blind signcryption. arXiv:cs\/0504095 (2005)"},{"key":"3969_CR25","doi-asserted-by":"crossref","unstructured":"Ullah, R., Umar, A.I., ul\u00a0Amin, I., et\u00a0al.: Blind signcryption scheme based on elliptic curves pp. 51\u201354 (2014)","DOI":"10.1109\/CIACS.2014.6861332"},{"key":"3969_CR26","unstructured":"Nasar, S.A.W., Javaid, Q., et\u00a0al.: Efficient signcryption schemes based on hyperelliptic curve cryptosystem. pp. 84\u201387 (2011)"},{"issue":"5","key":"3969_CR27","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","volume":"74","author":"SA Ch","year":"2015","unstructured":"Ch, S.A., Uddin, N., Sher, M., Ghani, A., Naqvi, H., Irshad, A.: An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools Appl. 74(5), 1711\u20131723 (2015)","journal-title":"Multimedia Tools Appl."},{"key":"3969_CR28","doi-asserted-by":"crossref","unstructured":"Nizamuddin, S.A.Ch., Sher, M.: Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. pp. 135\u2013142 (2012)","DOI":"10.1007\/978-3-642-29166-1_12"},{"key":"3969_CR29","doi-asserted-by":"crossref","unstructured":"Zheng, Y.: Signcryption and its applications in efficient public key solutions. pp. 291\u2013312 (1997)","DOI":"10.1007\/BFb0030430"},{"issue":"3","key":"3969_CR30","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1049\/el:20030190","volume":"39","author":"C Ma","year":"2003","unstructured":"Ma, C., Chen, K.: Publicly verifiable authenticated encryption. Electron. Lett. 39(3), 281\u2013282 (2003)","journal-title":"Electron. Lett."},{"key":"3969_CR31","doi-asserted-by":"crossref","unstructured":"Shin, J.B., Lee, K., Shim, K.: New dsa-verifiable signcryption schemes. pp. 35\u201347 (2002)","DOI":"10.1007\/3-540-36552-4_3"},{"key":"3969_CR32","unstructured":"Stallings, W.: Cryptography and network security principles and practices. 4th edition (2006)"},{"key":"3969_CR33","doi-asserted-by":"crossref","unstructured":"Nyberg, K., Rueppel, R.A.: Message recovery for signature schemes based on the discrete logarithm problem. pp. 182\u2013193 (1994)","DOI":"10.1007\/BFb0053434"},{"key":"3969_CR34","doi-asserted-by":"publisher","first-page":"546","DOI":"10.4028\/www.scientific.net\/AMM.20-23.546","volume":"20","author":"XW Zhou","year":"2010","unstructured":"Zhou, X.W.: Improved signcryption schemes based on hyper-elliptic curves cryptosystem. Appl. Mech. Mater. 20, 546\u2013552 (2010)","journal-title":"Appl. Mech. Mater."},{"key":"3969_CR35","doi-asserted-by":"publisher","DOI":"10.1155\/2022\/8930472","author":"M Shuaib","year":"2022","unstructured":"Shuaib, M., Hassan, N.H., Usman, S., Alam, S., Bhatia, S., Mashat, A., Kumar, A., Kumar, M.: Self-sovereign identity solution for blockchain-based land registry system: a comparison. Mobile Inf. Syst. (2022). https:\/\/doi.org\/10.1155\/2022\/8930472","journal-title":"Mobile Inf. Syst."},{"issue":"31","key":"3969_CR36","doi-asserted-by":"publisher","first-page":"22749","DOI":"10.1007\/s11042-020-09027-w","volume":"79","author":"S Ullah","year":"2020","unstructured":"Ullah, S., Li, X.Y., Lan, Z.: A novel trusted third party based signcryption scheme. Multimedia Tools Appl. 79(31), 22749\u201322769 (2020)","journal-title":"Multimedia Tools Appl."},{"key":"3969_CR37","unstructured":"Malone-Lee, J.: Identity-based signcryption, cryptology eprint archive. Report 98 (2002)"},{"key":"3969_CR38","doi-asserted-by":"crossref","unstructured":"Boneh, D., Franklin, M.: Identity-based encryption from the weil pairing. pp. 213\u2013229 (2001)","DOI":"10.1007\/3-540-44647-8_13"},{"issue":"1","key":"3969_CR39","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1016\/j.csi.2007.10.014","volume":"31","author":"Y Yu","year":"2009","unstructured":"Yu, Y., Yang, B., Sun, Y., Zhu, S.I.: Identity based signcryption scheme without random oracles. Comput. Stand. Interfaces 31(1), 56\u201362 (2009)","journal-title":"Comput. Stand. Interfaces"},{"issue":"3","key":"3969_CR40","doi-asserted-by":"publisher","first-page":"545","DOI":"10.1016\/j.compeleceng.2009.12.009","volume":"36","author":"Z Jin","year":"2010","unstructured":"Jin, Z., Wen, Q., Du, H.: An improved semantically-secure identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 36(3), 545\u2013552 (2010)","journal-title":"Comput. Electr. Eng."},{"issue":"1","key":"3969_CR41","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1587\/transfun.E94.A.268","volume":"94","author":"F Li","year":"2011","unstructured":"Li, F., Liao, Y., Qin, Z.: Analysis of an identity-based signcryption scheme in the standard model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94(1), 268\u2013269 (2011)","journal-title":"IEICE Trans. Fundam. Electron. Commun. Comput. Sci."},{"key":"3969_CR42","doi-asserted-by":"crossref","unstructured":"Selvi, S.S.D., Vivek, S.S., Vinayagamurthy, D., Rangan, C.P.: Id based signcryption scheme in standard model pp. 35\u201352 (2012)","DOI":"10.1007\/978-3-642-33272-2_4"},{"key":"3969_CR43","unstructured":"Ji-kai, T.: An efficient id-based signcryption scheme. Microelectr. Comput. (2010)"},{"key":"3969_CR44","doi-asserted-by":"crossref","unstructured":"Shamir, A.: Identity-based cryptosystems and signature schemes. pp. 47\u201353 (1984)","DOI":"10.1007\/3-540-39568-7_5"},{"key":"3969_CR45","doi-asserted-by":"crossref","unstructured":"Barreto, P.S., Libert, B., McCullagh, N., Quisquater, J.J.: Efficient and provably-secure identity-based signatures and signcryption from bilinear maps. pp. 515\u2013532 (2005)","DOI":"10.1007\/11593447_28"},{"key":"3969_CR46","first-page":"383","volume":"2003","author":"X Boyen","year":"2003","unstructured":"Boyen, X.: Multipurpose identity-based signcryption: a swiss army knife for identity-based cryptography. Cryptology 2003, 383\u2013399 (2003)","journal-title":"Cryptology"},{"key":"3969_CR47","doi-asserted-by":"crossref","unstructured":"Chen, L., Malone-Lee, J.: Improved identity-based signcryption. pp. 362\u2013379 (2005)","DOI":"10.1007\/978-3-540-30580-4_25"},{"key":"3969_CR48","doi-asserted-by":"crossref","unstructured":"Chow, S.S., Yiu, S.M., Hui, L.C., Chow, K.: Efficient forward and provably secure id-based signcryption scheme with public verifiability and public ciphertext authenticity. pp. 352\u2013369 (2003)","DOI":"10.1007\/978-3-540-24691-6_26"},{"key":"3969_CR49","first-page":"23","volume":"2003","author":"B Libert","year":"2003","unstructured":"Libert, B., Quisquater, J.J.: New identity based signcryption schemes from pairings. IACR Cryptol. 2003, 23 (2003)","journal-title":"IACR Cryptol."},{"issue":"9","key":"3969_CR50","first-page":"1641","volume":"29","author":"FG Li","year":"2006","unstructured":"Li, F.G., Hu, Y.P., Li, G.: An efficient identity-based signcryption scheme. Chin. J. Comput. 29(9), 1641 (2006)","journal-title":"Chin. J. Comput."},{"key":"3969_CR51","first-page":"150","volume":"6","author":"B Nayak","year":"2017","unstructured":"Nayak, B.: A secure id-based signcryption scheme based on elliptic curve cryptography. Int. J. Comput. Intell. Stud. 6, 150\u2013156 (2017)","journal-title":"Int. J. Comput. Intell. Stud."},{"key":"3969_CR52","doi-asserted-by":"crossref","unstructured":"Libert, B., Quisquater, J.: A new identity based signcryption scheme from pairings. pp. 155\u2013158 (2003)","DOI":"10.1109\/ITW.2003.1216718"},{"key":"3969_CR53","doi-asserted-by":"crossref","unstructured":"Pandey, S.K., Barua, R.: Construction of identity-based signcryption schemes. pp. 1\u201314 (2010)","DOI":"10.1007\/978-3-642-17955-6_1"},{"key":"3969_CR54","first-page":"66","volume":"2003","author":"D Nalla","year":"2003","unstructured":"Nalla, D., Reddy, K.C.: Signcryption scheme for identity-based cryptosystems. IACR Cryptol. 2003, 66 (2003)","journal-title":"IACR Cryptol."},{"key":"3969_CR55","first-page":"84","volume":"2008","author":"S Lal","year":"2008","unstructured":"Lal, S., Kushwah, P.: Id based generalized signcryption. IACR Cryptol. 2008, 84 (2008)","journal-title":"IACR Cryptol."},{"key":"3969_CR56","doi-asserted-by":"crossref","unstructured":"Lai, X., Huang, X., He, D.: An ID-based efficient signcryption key encapsulation scheme. pp. 1\u20136 (2008)","DOI":"10.1109\/ISBAST.2008.4547635"},{"key":"3969_CR57","doi-asserted-by":"crossref","unstructured":"Ch, S.A., Amin, N., et\u00a0al.: Signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. pp. 244\u2013247 (2011)","DOI":"10.1109\/HONET.2011.6149826"},{"key":"3969_CR58","doi-asserted-by":"crossref","unstructured":"Ch, S.A., Sher, M., et\u00a0al.: Public verifiable signcryption schemes with forward secrecy based on hyperelliptic curve cryptosystem. pp. 135\u2013142 (2012)","DOI":"10.1007\/978-3-642-29166-1_12"},{"issue":"5","key":"3969_CR59","doi-asserted-by":"publisher","first-page":"1711","DOI":"10.1007\/s11042-014-2283-9","volume":"74","author":"SA Ch","year":"2015","unstructured":"Ch, S.A., Sher, M., Ghani, A., Naqvi, H., Irshad, A., et al.: An efficient signcryption scheme with forward secrecy and public verifiability based on hyper elliptic curve cryptography. Multimedia Tools Appl. 74(5), 1711\u20131723 (2015)","journal-title":"Multimedia Tools Appl."},{"key":"3969_CR60","unstructured":"Premalatha, J., Sathya, K., Rajasekar, V.: Secure signcryption on hyperelliptic curve with sensor based random number"},{"issue":"7","key":"3969_CR61","first-page":"1","volume":"4","author":"P Kumar","year":"2013","unstructured":"Kumar, P., Singh, A., Tyagi, A.D.: Implementation of hyperelliptic curve based signcryption approach. Int. J. Sci. Eng. Res. 4(7), 1\u201315 (2013)","journal-title":"Int. J. Sci. Eng. Res."},{"issue":"3","key":"3969_CR62","first-page":"121","volume":"11","author":"R Ganesan","year":"2010","unstructured":"Ganesan, R., Gobi, M., Vivekanandan, K.: A novel digital envelope approach for a secure e-commerce channel. Int. J. Netw. Secur. 11(3), 121\u2013127 (2010)","journal-title":"Int. J. Netw. Secur."},{"key":"3969_CR63","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/s00145-004-0311-z","volume":"17","author":"P Barreto","year":"2004","unstructured":"Barreto, P., Lynn, B., Scott, M.: Efficient implementation of pairing-based cryptosystems. J. Cryptol. 17, 321\u2013334 (2004). https:\/\/doi.org\/10.1007\/s00145-004-0311-z","journal-title":"J. Cryptol."},{"key":"3969_CR64","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2022.103280","volume":"69","author":"K Dey","year":"2022","unstructured":"Dey, K., Debnath, S.K., St\u0103nic\u0103, P., Srivastava, V.: A post-quantum signcryption scheme using isogeny based cryptography. J. Inf. Secur. Appl. 69, 103280 (2022). https:\/\/doi.org\/10.1016\/j.jisa.2022.103280","journal-title":"J. Inf. Secur. Appl."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-03969-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-023-03969-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-023-03969-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,14]],"date-time":"2024-10-14T00:15:11Z","timestamp":1728864911000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-023-03969-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,11]]},"references-count":64,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,2]]}},"alternative-id":["3969"],"URL":"https:\/\/doi.org\/10.1007\/s10586-023-03969-0","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,11]]},"assertion":[{"value":"3 June 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 November 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}