{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,20]],"date-time":"2026-02-20T19:17:13Z","timestamp":1771615033711,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"16","license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100004377","name":"The Hong Kong Polytechnic University","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100004377","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2025,12]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>Blockchain wallet manages decentralized identities in Web3, which allows users to identify themselves in a verifiable yet anonymous manner by digital signatures. However, native wallet scheme has been proven vulnerable to Sybil attacks in practice, where adversaries can easily create large numbers of controlled wallets at a low cost to undermine Web3 applications. To this end, many solutions are proposed for mitigating Sybil attacks. Nevertheless, they typically rely on either costly specialized biometric hardware or behavior-based heuristics that can be easily bypassed. In this paper, we introduce EdenDID, the first trinity-bound identity management system that uniquely binds human user, wallet address, and physical device into a unified framework. EdenDID combines edge-based video recognition, on-chain transactional activity analysis, and device computational power verification to establish a decentralized Proof-of-Trustworthiness consensus. The system provides compliant users with a trusted, verifiable credential to prove their unique identity. We prototype low-cost Eden Devices and deploy them on a Layer-2 blockchain network. Our experiments demonstrate the low end-to-end latency and robust resistance performance to Sybil attacks. Moreover, we present a case study to show how EdenDID can mitigate virtual-hardware fraud in DePIN, in which EdenDID successfully binds the user, wallet, and device uniquely, thus preventing users from binding multiple wallets or devices.<\/jats:p>","DOI":"10.1007\/s10586-025-05746-7","type":"journal-article","created":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T18:33:56Z","timestamp":1760726036000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["EdenDID: an edge computing and blockchain-based decentralized identity system for Web3 applications and DePIN"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0009-0008-2734-968X","authenticated-orcid":false,"given":"Hongbo","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2725-2529","authenticated-orcid":false,"given":"Jiannong","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1048-3299","authenticated-orcid":false,"given":"Yinfeng","family":"Cao","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0006-7125-1992","authenticated-orcid":false,"given":"Dongbin","family":"Bai","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1306-3185","authenticated-orcid":false,"given":"Jinwen","family":"Liang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9905-8952","authenticated-orcid":false,"given":"Ruidong","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"5746_CR1","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1016\/j.iotcps.2023.05.003","volume":"3","author":"PP Ray","year":"2023","unstructured":"Ray, P.P.: Web3: A comprehensive review on background, technologies, applications, zero-trust architectures, challenges and future directions. Internet of Things and Cyber-Physical Systems 3, 213\u2013248 (2023)","journal-title":"Internet of Things and Cyber-Physical Systems"},{"key":"5746_CR2","first-page":"717","volume":"2025","author":"Y Cao","year":"2025","unstructured":"Cao, Y., Cao, J., Bai, D., Wen, L., Liu, Y., Li, R.: Map the blockchain world: A trustless and scalable blockchain interoperability protocol for cross-chain applications. Proceedings of the ACM on Web Conference 2025, 717\u2013726 (2025)","journal-title":"Proceedings of the ACM on Web Conference"},{"key":"5746_CR3","unstructured":"Wang, Q., Li, R., Wang, Q., Chen, S., Ryan, M., Hardjono, T.: Exploring web3 from the view of blockchain (2022). arXiv preprint arXiv:2206.08821"},{"key":"5746_CR4","doi-asserted-by":"crossref","unstructured":"Huang, H., Wu, J., Zheng, Z., et\u00a0al.: From Blockchain to Web3 and Metaverse (Springer, 2023)","DOI":"10.1007\/978-981-99-3648-9"},{"issue":"26","key":"5746_CR5","doi-asserted-by":"publisher","first-page":"46","DOI":"10.7250\/csimq.2021-26.03","volume":"0","author":"JR Jensen","year":"2021","unstructured":"Jensen, J.R., von Wachter, V., Ross, O.: An introduction to decentralized finance (defi). Complex Systems Informatics and Modeling Quarterly 0(26), 46\u201354 (2021)","journal-title":"Complex Systems Informatics and Modeling Quarterly"},{"key":"5746_CR6","doi-asserted-by":"crossref","unstructured":"Harvey, C.R., Ramachandran, A., Santoro, J.: DeFi and the Future of Finance (John Wiley & Sons, 2021)","DOI":"10.2139\/ssrn.3711777"},{"key":"5746_CR7","doi-asserted-by":"crossref","unstructured":"Lin, Z., Wang, T., Shi, L., Zhang, S., Cao, B.: Decentralized physical infrastructure networks (depin): Challenges and opportunities. IEEE Network (2024)","DOI":"10.1109\/MNET.2024.3487924"},{"key":"5746_CR8","doi-asserted-by":"crossref","unstructured":"Cheng, S.: in Metaverse: Concept, Content and Context (Springer, 2023), pp. 1\u201323","DOI":"10.1007\/978-3-031-24359-2_1"},{"key":"5746_CR9","doi-asserted-by":"crossref","unstructured":"Cao, Y., Cao, J., Bai, D., Hu, Z., Wang, K., Zhang, M.: PolyVerse: An Edge Computing-Empowered Metaverse with Physical-to-Virtual Projection, in 2023 International Conference on Intelligent Metaverse Technologies & Applications (iMETA) (IEEE), pp. 1\u20138 (2023)","DOI":"10.1109\/iMETA59369.2023.10294558"},{"key":"5746_CR10","doi-asserted-by":"crossref","unstructured":"Al\u00a0Falahi, A., Alnuaimi, H., Alqaydi, M., Al\u00a0Shateri, N., Al\u00a0Ameri, S., Qbea\u2019h, M., Alrabaee, S.: From Challenges to Future Directions: A Metaverse Analysis, in 2024 2nd International Conference on Intelligent Metaverse Technologies & Applications (iMETA) (IEEE), pp. 34\u201343 (2024)","DOI":"10.1109\/iMETA62882.2024.10807918"},{"issue":"6","key":"5746_CR11","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/MCE.2022.3212570","volume":"12","author":"M Aloqaily","year":"2022","unstructured":"Aloqaily, M., Bouachir, O., Karray, F., Al Ridhawi, I., El Saddik, A.: Integrating digital twin and advanced intelligent technologies to realize the metaverse. IEEE Consumer Electronics Magazine 12(6), 47\u201355 (2022)","journal-title":"IEEE Consumer Electronics Magazine"},{"key":"5746_CR12","doi-asserted-by":"publisher","unstructured":"Yang, H., Song, R., Chen, B., Song, Y., Xiao, B.: MoDID: Decentralized Identity Management for Multiple Owners, in ICC 2024 - IEEE International Conference on Communications, pp. 2022\u20132027 (2024). https:\/\/doi.org\/10.1109\/ICC51166.2024.10622445","DOI":"10.1109\/ICC51166.2024.10622445"},{"issue":"2","key":"5746_CR13","doi-asserted-by":"publisher","first-page":"787","DOI":"10.1109\/SURV.2012.072412.00129","volume":"15","author":"J Torres","year":"2013","unstructured":"Torres, J., Nogueira, M., Pujolle, G.: A survey on identity management for the future network. IEEE Communications Surveys & Tutorials 15(2), 787\u2013802 (2013). https:\/\/doi.org\/10.1109\/SURV.2012.072412.00129","journal-title":"IEEE Communications Surveys & Tutorials"},{"key":"5746_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jbusres.2023.113945","volume":"163","author":"DW Allen","year":"2023","unstructured":"Allen, D.W., Berg, C., Lane, A.M.: Why airdrop cryptocurrency tokens? J. Bus. Res. 163, 113945 (2023)","journal-title":"J. Bus. Res."},{"key":"5746_CR15","unstructured":"Liu, Z., Zhu, H.: Fighting sybils in airdrops (2022). arXiv preprint arXiv:2209.04603"},{"key":"5746_CR16","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-030-77070-9_15","volume":"4","author":"G Singh","year":"2021","unstructured":"Singh, G., Bhardwaj, G., Singh, S.V., Garg, V.: Biometric identification system: security and privacy concern. Artificial intelligence for a sustainable industry 4, 245\u2013264 (2021)","journal-title":"Artificial intelligence for a sustainable industry"},{"key":"5746_CR17","doi-asserted-by":"publisher","unstructured":"Mebrahtom, D., Hadish, S., Sbhatu, A., Aloqaily, M., Guizani, M.: Trust But Verify - Blockchain-Empowered Decentralized Authentication Schema on the Metaverse: A Self-Sovereign Identity Approach, in 2023 International Conference on Intelligent Metaverse Technologies I & Applications (iMETA), pp. 1\u20138 (2023).https:\/\/doi.org\/10.1109\/iMETA59369.2023.10294349","DOI":"10.1109\/iMETA59369.2023.10294349"},{"key":"5746_CR18","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107118","volume":"170","author":"C Wang","year":"2020","unstructured":"Wang, C., Wang, Y., Chen, Y., Liu, H., Liu, J.: User authentication on mobile devices: Approaches, threats and trends. Comput. Netw. 170, 107118 (2020)","journal-title":"Comput. Netw."},{"key":"5746_CR19","unstructured":"Humanity protocol. https:\/\/cfh.xyz (2024). Accessed: Apr 10, 2024"},{"key":"5746_CR20","unstructured":"The internet of humans. https:\/\/proofofhumanity.id (2024). Accessed: Apr 10, 2024"},{"key":"5746_CR21","unstructured":"PingIdentity. Pingidentity official website. https:\/\/www.pingidentity.com\/. Accessed: Apr 10,2024)"},{"key":"5746_CR22","unstructured":"Kavazi, D., Smirnov, V., Shilina, S., Li, M., Contreras, R., Gajera, H., Lavrenov, D., et\u00a0al.: Humanode whitepaper: You are [not] a bot (2021). arXiv preprint arXiv:2111.13189 (2021)"},{"key":"5746_CR23","unstructured":"For every human. https:\/\/worldcoin.org (2024). Accessed: Apr 10, 2024"},{"key":"5746_CR24","unstructured":"MixTrust. Mixtrust exchange. https:\/\/www.mixtrust.exchange (Accessed 2025). Accessed on April 21 (2025)"},{"issue":"1","key":"5746_CR25","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1109\/MSPEC.2023.10006664","volume":"60","author":"E Gent","year":"2023","unstructured":"Gent, E.: A cryptocurrency for the masses or a universal id?: Worldcoin aims to scan all the world\u2019s eyeballs. IEEE Spectr 60(1), 42\u201357 (2023)","journal-title":"IEEE Spectr"},{"issue":"9","key":"5746_CR26","doi-asserted-by":"publisher","first-page":"3005","DOI":"10.1109\/TPAMI.2020.3036338","volume":"43","author":"Z Yu","year":"2021","unstructured":"Yu, Z., Wan, J., Qin, Y., Li, X., Li, S.Z., Zhao, G.: Nas-fas: Static-dynamic central difference network search for face anti-spoofing. IEEE Trans. Pattern Anal. Mach. Intell. 43(9), 3005\u20133023 (2021). https:\/\/doi.org\/10.1109\/TPAMI.2020.3036338","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"5746_CR27","unstructured":"Gitcoin passport. https:\/\/support.gitcoin.co\/gitcoin-knowledge-base\/gitcoin-passport\/what-is-gitcoin-passport (2024). Accessed: Apr 10, 2024"},{"key":"5746_CR28","doi-asserted-by":"crossref","unstructured":"Fr\u00f6wis, M., B\u00f6hme, R.: The operational cost of Ethereum airdrops, in Data Privacy Management, Cryptocurrencies and Blockchain Technology: ESORICS 2019 International Workshops, DPM 2019 and CBT 2019, Luxembourg, September 26\u201327, 2019, Proceedings 14 (Springer, 2019), pp. 255\u2013270","DOI":"10.1007\/978-3-030-31500-9_17"},{"key":"5746_CR29","unstructured":"Delacour, E.. Enabling interactions between encointer local communities: Sketch of a global proof-of-personhood protocol (2023)"},{"key":"5746_CR30","unstructured":"Brenzikofer, A.: encointer\u2013local community cryptocurrencies with universal basic income (2019). arXiv preprint arXiv:1912.12141"},{"key":"5746_CR31","unstructured":"Proof of uniqueness. https:\/\/www.brightid.org (2024). Accessed: Apr 10, 2024"},{"key":"5746_CR32","doi-asserted-by":"crossref","unstructured":"Fett, D., Campbell, B., Bradley, J., Lodderstedt, T., Jones, M.B., Waite, D.: Oauth 2.0 demonstrating proof of possession (dpop). RFC 9449 (2023)","DOI":"10.17487\/RFC9449"},{"key":"#cr-split#-5746_CR33.1","doi-asserted-by":"crossref","unstructured":"Bindel, N., Cremers, C., Zhao, M., FIDO2, CTAP 2.1, and WebAuthn 2: Provable security and post-quantum instantiation, in 2023 IEEE Symposium on Security and Privacy","DOI":"10.1109\/SP46215.2023.10179454"},{"key":"#cr-split#-5746_CR33.2","unstructured":"(SP) (IEEE), pp. 1471-1490 (2023)"},{"issue":"3","key":"5746_CR34","doi-asserted-by":"publisher","DOI":"10.3390\/fi13030062","volume":"13","author":"C Antal","year":"2021","unstructured":"Antal, C., Cioara, T., Anghel, I., Antal, M., Salomie, I.: Distributed ledger technology review and decentralized applications development guidelines. Future Internet 13(3), 62 (2021)","journal-title":"Future Internet"},{"key":"5746_CR35","doi-asserted-by":"crossref","unstructured":"Cao, Y., Cao, J., Du, B., Li, R.: Decentralized digital twin networks. IEEE Communications Magazine (2025)","DOI":"10.1109\/MCOM.002.2400739"},{"key":"5746_CR36","doi-asserted-by":"publisher","first-page":"26258","DOI":"10.1109\/ACCESS.2023.3257029","volume":"11","author":"VT Truong","year":"2023","unstructured":"Truong, V.T., Le, L., Niyato, D.: Blockchain meets metaverse and digital asset management: A comprehensive survey. Ieee Access 11, 26258\u201326288 (2023)","journal-title":"Ieee Access"},{"key":"5746_CR37","doi-asserted-by":"crossref","unstructured":"Cao, Y., Cao, J., Cui, Z., Bai, D., Zhang, M., Wen, L.: PolyTwin: Edge Blockchain-empowered Trustworthy Digital Twin Network for Metaverse, in The 2nd Annual IEEE International Conference on Metaverse Computing, Networking, and Applications (MetaCom 2024) (IEEE, 2024)","DOI":"10.1109\/MetaCom62920.2024.00026"},{"key":"5746_CR38","doi-asserted-by":"crossref","unstructured":"Suratkar, S., Shirole, M., Bhirud, S.: Cryptocurrency wallet: A review, in 2020 4th international conference on computer, communication and signal processing (ICCCSP), pp. 1\u20137 (IEEE, 2020)","DOI":"10.1109\/ICCCSP49186.2020.9315193"},{"issue":"10","key":"5746_CR39","doi-asserted-by":"publisher","first-page":"5715","DOI":"10.1109\/TII.2019.2921566","volume":"15","author":"S Zhang","year":"2019","unstructured":"Zhang, S., Lee, J.H.: Double-spending with a sybil attack in the bitcoin decentralized network. IEEE Transactions on Industrial Informatics 15(10), 5715\u20135722 (2019)","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"5746_CR40","doi-asserted-by":"publisher","first-page":"76153","DOI":"10.1109\/ACCESS.2021.3081998","volume":"9","author":"M Iqbal","year":"2021","unstructured":"Iqbal, M., Matulevi\u010dius, R.: Exploring sybil and double-spending risks in blockchain systems. IEEE Access 9, 76153\u201376177 (2021)","journal-title":"IEEE Access"},{"key":"5746_CR41","unstructured":"W3C. Decentralized identifiers (dids) v1.0 (2025). https:\/\/www.w3.org\/TR\/did-core\/. Accessed: 2025-04-12"},{"issue":"4","key":"5746_CR42","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1109\/MCOMSTD.2019.9031542","volume":"3","author":"O Avellaneda","year":"2019","unstructured":"Avellaneda, O., Bachmann, A., Barbir, A., Brenan, J., Dingle, P., Duffy, K.H., Maler, E., Reed, D., Sporny, M.: Decentralized identity: Where did it come from and where is it going? IEEE Communications Standards Magazine 3(4), 10\u201313 (2019)","journal-title":"IEEE Communications Standards Magazine"},{"issue":"5","key":"5746_CR43","doi-asserted-by":"publisher","first-page":"19","DOI":"10.33166\/AETiC.2020.05.002","volume":"4","author":"O Dib","year":"2020","unstructured":"Dib, O., Rababah, B.: Decentralized identity systems: Architecture, challenges, solutions and future directions. Annals of Emerging Technologies in Computing (AETiC) 4(5), 19\u201340 (2020)","journal-title":"Annals of Emerging Technologies in Computing (AETiC)"},{"key":"5746_CR44","doi-asserted-by":"crossref","unstructured":"Groth, J.: On the size of pairing-based non-interactive arguments, in Advances in Cryptology\u2013EUROCRYPT 2016: 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, Proceedings, Part II 35 (Springer, 2016), pp. 305\u2013326 (2016)","DOI":"10.1007\/978-3-662-49896-5_11"},{"key":"5746_CR45","doi-asserted-by":"crossref","unstructured":"Zhang, M., Shen, X., Cao, J., Cui, Z., Jiang, S.: Edgeshard: Efficient llm inference via collaborative edge computing. IEEE Internet of Things Journal (2024)","DOI":"10.1109\/JIOT.2024.3524255"},{"key":"5746_CR46","first-page":"1755","volume":"10","author":"DE King","year":"2009","unstructured":"King, D.E.: Dlib-ml: A machine learning toolkit. J. Mach. Learn. Res. 10, 1755\u20131758 (2009)","journal-title":"J. Mach. Learn. Res."},{"key":"5746_CR47","unstructured":"Modern face recognition with deep learning. https:\/\/github.com\/ageitgey\/face_recognition (2017). Accessed: Apr 13, 2017"},{"key":"5746_CR48","doi-asserted-by":"publisher","unstructured":"Wu, T., Li, M., Qu, Y., Wang, H., Wei, Z., Cao, J.: Joint uav deployment and edge association for energy-efficient federated learning. IEEE Transactions on Cognitive Communications and Networking pp. 1\u20131 (2025). https:\/\/doi.org\/10.1109\/TCCN.2025.3543365","DOI":"10.1109\/TCCN.2025.3543365"},{"key":"5746_CR49","doi-asserted-by":"crossref","unstructured":"Gennaro, R., Jarecki, S., Krawczyk, H., Rabin, T.: Secure distributed key generation for discrete-log based cryptosystems, in Advances in Cryptology EUROCRYPT 99: International Conference on the Theory and Application of Cryptographic Techniques Prague, Czech Republic, May 2\u20136, Proceedings 18 (Springer, 1999), pp. 295\u2013310 (1999)","DOI":"10.1007\/3-540-48910-X_21"},{"key":"5746_CR50","doi-asserted-by":"crossref","unstructured":"Gurkan, K., Jovanovic, P., Maller, M., Meiklejohn, S., Stern, G., Tomescu, A.: Aggregatable distributed key generation, in Annual International Conference on the Theory and Applications of Cryptographic Techniques, pp. 147\u2013176 (Springer, 2021)","DOI":"10.1007\/978-3-030-77870-5_6"},{"key":"5746_CR51","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s00145-004-0314-9","volume":"17","author":"D Boneh","year":"2004","unstructured":"Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. Journal of Cryptology 17, 297\u2013319 (2004)","journal-title":"Journal of Cryptology"},{"key":"5746_CR52","doi-asserted-by":"crossref","unstructured":"Bacho, R., Loss, J.: On the adaptive security of the threshold BLS signature scheme, in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 193\u2013207 (2022)","DOI":"10.1145\/3548606.3560656"},{"key":"5746_CR53","doi-asserted-by":"crossref","unstructured":"Boldyreva, A.: Threshold signatures, multisignatures and blind signatures based on the gap-Diffie-Hellman-group signature scheme, in International Workshop on Public Key Cryptography (Springer, 2002), pp. 31\u201346","DOI":"10.1007\/3-540-36288-6_3"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05746-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-025-05746-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-025-05746-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,3]],"date-time":"2025-12-03T14:16:17Z","timestamp":1764771377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-025-05746-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"references-count":54,"journal-issue":{"issue":"16","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["5746"],"URL":"https:\/\/doi.org\/10.1007\/s10586-025-05746-7","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"30 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 August 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 October 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"1048"}}