{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T22:34:34Z","timestamp":1775774074587,"version":"3.50.1"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T00:00:00Z","timestamp":1685664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004629","name":"Ministry for Business Innovation and Employment","doi-asserted-by":"publisher","award":["UOAX1933"],"award-info":[{"award-number":["UOAX1933"]}],"id":[{"id":"10.13039\/501100004629","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Des. Codes Cryptogr."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s10623-023-01243-3","type":"journal-article","created":{"date-parts":[[2023,6,2]],"date-time":"2023-06-02T12:41:05Z","timestamp":1685709665000},"page":"3425-3456","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["Proving knowledge of isogenies: a survey"],"prefix":"10.1007","volume":"91","author":[{"given":"Ward","family":"Beullens","sequence":"first","affiliation":[]},{"given":"Luca","family":"De Feo","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7114-8377","authenticated-orcid":false,"given":"Steven D.","family":"Galbraith","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Petit","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,6,2]]},"reference":[{"key":"1243_CR1","doi-asserted-by":"crossref","unstructured":"Adams C., Farrell S., Kause T., Mononen T.: Internet X.509 public key infrastructure Certificate Management Protocol (CMP). https:\/\/www.rfc-editor.org\/rfc\/rfc4210 (2005).","DOI":"10.17487\/rfc4210"},{"key":"1243_CR2","unstructured":"Andrea B.: A post-quantum round-optimal oblivious PRF from isogenies. eprint 2023\/225 (2023)."},{"key":"1243_CR3","doi-asserted-by":"crossref","unstructured":"Basso A., Codogni G., Connolly D., De Feo L., Fouotsa T.B., Lido G.M., Morrison T., Panny L., Patranabis S., Wesolowski B.: Supersingular curves you can trust. In: Hazay C., Stam M. (eds.) EUROCRYPT 2023, vol. 14005 of Lecture Notes in Computer Science, pp. 405\u2013437. Springer (2023).","DOI":"10.1007\/978-3-031-30617-4_14"},{"key":"1243_CR4","doi-asserted-by":"crossref","unstructured":"Ben-Sasson E., Chiesa A., Riabzev M., Spooner N., Virza M., Ward N.P.: Aurora: transparent succinct arguments for R1CS. In: Ishai Y., Rijmen V. (eds.) Advances in Cryptology - EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19-23, 2019, Proceedings, Part I, vol. 11476 of Lecture Notes in Computer Science, pp. 103\u2013128. Springer (2019).","DOI":"10.1007\/978-3-030-17653-2_4"},{"issue":"1","key":"1243_CR5","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2140\/obs.2020.4.39","volume":"4","author":"DJ Bernstein","year":"2020","unstructured":"Bernstein D.J., De Feo L., Leroux A., Smith B.: Faster computation of isogenies of large prime degree. The Open Book Series 4(1), 39\u201355 (2020).","journal-title":"The Open Book Series"},{"key":"1243_CR6","doi-asserted-by":"crossref","unstructured":"Boldyreva A., Fischlin M., Palacio A., Warinschi B.: A closer look at PKI: Security and efficiency. In: Okamoto T., Wang X. (eds.) PKC 2007, vol. 4450 of LNCS, pp. 458\u2013475. Springer (2007).","DOI":"10.1007\/978-3-540-71677-8_30"},{"key":"1243_CR7","doi-asserted-by":"crossref","unstructured":"Beullens W., Kleinjung T., Vercauteren F.: CSI-FiSh: efficient isogeny based signatures through class group computations. In: Galbraith S.D., Moriai S. (eds.) ASIACRYPT 2019, vol. 11921 of Lecture Notes in Computer Science, pp. 227\u2013247. Springer (2019).","DOI":"10.1007\/978-3-030-34578-5_9"},{"key":"1243_CR8","doi-asserted-by":"crossref","unstructured":"Boneh D., Kogan D., Woo K.: Oblivious pseudorandom functions from isogenies. In: Moriai S., Wang H. (eds.) ASIACRYPT 2020, Part II, vol. 12492 of Lecture Notes in Computer Science, pp. 520\u2013550. Springer (2020).","DOI":"10.1007\/978-3-030-64834-3_18"},{"key":"1243_CR9","doi-asserted-by":"crossref","unstructured":"Castryck W., Decru T.: CSIDH on the surface. In: Ding J., Tillich J.-P. (eds.) PQCrypto 2020, vol. 12100 of Lecture Notes in Computer Science, pp. 111\u2013129. Springer (2020).","DOI":"10.1007\/978-3-030-44223-1_7"},{"key":"1243_CR10","doi-asserted-by":"crossref","unstructured":"Castryck W., Decru T.: An efficient key recovery attack on SIDH. In: Hazay C., Stam M. (eds.) EUROCRYPT 2023, vol. 14008 of Lecture Notes in Computer Science, pp. 423\u2013447. Springer, Cham (2023).","DOI":"10.1007\/978-3-031-30589-4_15"},{"issue":"1","key":"1243_CR11","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s00145-007-9002-x","volume":"22","author":"DX Charles","year":"2009","unstructured":"Charles D.X., Lauter K.E., Goren E.Z.: Cryptographic hash functions from expander graphs. J. Cryptol. 22(1), 93\u2013113 (2009).","journal-title":"J. Cryptol."},{"key":"1243_CR12","doi-asserted-by":"crossref","unstructured":"Cong K., Lai Y.F., Levin S.: Efficient isogeny proofs using generic techniques. In: Tibouchi M., Wang X. (eds.) ACNS 2023, LNCS. Springer, eprint 2023\/037 (2023).","DOI":"10.1007\/978-3-031-33491-7_10"},{"key":"1243_CR13","doi-asserted-by":"crossref","unstructured":"Castryck W., Lange T., Martindale C., Panny L., Renes J.: CSIDH: an efficient post-quantum commutative group action. In: Peyrin T., Galbraith S.D. (eds.) ASIACRYPT 2018, vol. 11274 of Lecture Notes in Computer Science, pp. 395\u2013427. Springer, Cham (2018).","DOI":"10.1007\/978-3-030-03332-3_15"},{"key":"1243_CR14","doi-asserted-by":"crossref","unstructured":"Costello C.: B-SIDH: Supersingular Isogeny Diffie-Hellman using twisted torsion. In: Moriai S., Wang H. (eds.) ASIACRYPT 2020, vol. 12492 of Lecture Notes in Computer Science, pp. 440\u2013463. Springer, Cham (2020).","DOI":"10.1007\/978-3-030-64834-3_15"},{"key":"1243_CR15","unstructured":"Couveignes J.-M.: Hard homogeneous spaces. eprint 2006\/291 (2006)."},{"key":"1243_CR16","doi-asserted-by":"publisher","first-page":"441","DOI":"10.1007\/978-3-030-99277-4_21","volume-title":"Selected Areas in Cryptography","author":"J Chavez-Saab","year":"2022","unstructured":"Chavez-Saab J., Rodr\u00edguez-Henr\u00edquez F., Tibouchi M.: Verifiable isogeny walks: towards an isogeny-based postquantum VDF. In: Altawy R., H\u00fclsing A. (eds.) Selected Areas in Cryptography, pp. 441\u2013460. Springer, Cham (2022)."},{"key":"1243_CR17","doi-asserted-by":"crossref","unstructured":"De Feo L., Dobson S., Galbraith S.D., Zobernig L.: SIDH proof of knowledge. In: Agrawal S., Lin D. (eds.) ASIACRYPT 2022, Proceedings, Part II, vol. 13792 of Lecture Notes in Computer Science, pp. 310\u2013339. Springer (2022).","DOI":"10.1007\/978-3-031-22966-4_11"},{"key":"1243_CR18","doi-asserted-by":"crossref","unstructured":"De Feo L., Galbraith S.D.: SeaSign: compact isogeny signatures from class group actions. In: Ishai Y., Rijmen V. (eds.) EUROCRYPT 2019, vol. 11478 of Lecture Notes in Computer Science, pp. 759\u2013789. Springer (2019).","DOI":"10.1007\/978-3-030-17659-4_26"},{"issue":"3","key":"1243_CR19","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1515\/jmc-2012-0015","volume":"8","author":"L De Feo","year":"2014","unstructured":"De Feo L., Jao D., Pl\u00fbt J.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. J. Math. Cryptol. 8(3), 209\u2013247 (2014).","journal-title":"J. Math. Cryptol."},{"key":"1243_CR20","doi-asserted-by":"crossref","unstructured":"De Feo L., Kohel D., Leroux A., Petit C., Wesolowski B.: SQISign: compact post-quantum signatures from quaternions and isogenies. In: Moriai S., Wang H. (eds.) ASIACRYPT 2020, vol. 12491 of Lecture Notes in Computer Science, pp. 64\u201393. Springer (2020).","DOI":"10.1007\/978-3-030-64837-4_3"},{"key":"1243_CR21","doi-asserted-by":"crossref","unstructured":"De\u00a0Feo L., Kieffer J., Smith B.: Towards practical key exchange from ordinary isogeny graphs. In: Peyrin T., Galbraith S.D. (eds.) Advances in Cryptology - ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2\u20136, 2018, Proceedings, Part III, vol. 11274 of Lecture Notes in Computer Science, pp. 365\u2013394. Springer (2018).","DOI":"10.1007\/978-3-030-03332-3_14"},{"key":"1243_CR22","doi-asserted-by":"crossref","unstructured":"De\u00a0Feo L., Leroux A., Longa P., Wesolowski B.: New algorithms for the Deuring correspondence\u2014towards practical and secure SQISign signatures. In: Hazay C., Stam M. (eds.) EUROCRYPT 2023 Proceedings, Part V, vol. 14008 of Lecture Notes in Computer Science, pp. 659\u2013690. Springer (2023).","DOI":"10.1007\/978-3-031-30589-4_23"},{"key":"1243_CR23","doi-asserted-by":"crossref","unstructured":"Decru T., Panny L., Vercauteren F.: Faster SeaSign signatures through improved rejection sampling. In: Ding J., Steinwandt R. (eds.) PQCrypto 2019, vol. 11505 of Lecture Notes in Computer Science, pp. 271\u2013285. Springer (2019).","DOI":"10.1007\/978-3-030-25510-7_15"},{"key":"1243_CR24","doi-asserted-by":"crossref","unstructured":"Eisentr\u00e4ger K., Hallgren S., Lauter K.E., Morrison T., Petit C.: Supersingular isogeny graphs and endomorphism rings: Reductions and solutions. In: Nielsen J.B., Rijmen V. (eds.) EUROCRYPT 2018, vol. 10822 of Lecture Notes in Computer Science, pp. 329\u2013368 (2018).","DOI":"10.1007\/978-3-319-78372-7_11"},{"key":"1243_CR25","doi-asserted-by":"crossref","unstructured":"Eisentr\u00e4ger K., Hallgren S., Leonardi C., Morrison T., Park J.: Computing endomorphism rings of supersingular elliptic curves and connections to path-finding in isogeny graphs. In: Proceedings of the Fourteenth Algorithmic Number Theory Symposium, vol.\u00a04 of Open Book Ser. , pp. 215\u2013232. Math. Sci. Publ., Berkeley (2020).","DOI":"10.2140\/obs.2020.4.215"},{"key":"1243_CR26","doi-asserted-by":"crossref","unstructured":"Fouotsa T.B., Moriya T., Petit C.: M-SIDH and MD-SIDH: countering SIDH attacks by masking information. In: Hazay C., Stam M. (eds.) EUROCRYPT 2023, vol. 14008 of Lecture Notes in Computer Science, pp. 282\u2013309. Springer, Cham (2023).","DOI":"10.1007\/978-3-031-30589-4_10"},{"key":"1243_CR27","doi-asserted-by":"crossref","unstructured":"Fouotsa T.B., Petit C. (eds.) A new adaptive attack on SIDH. In: Galbraith S.D. (eds.) Topics in Cryptology \u2013 CT-RSA 2022, vol. 13161 of Lecture Notes in Computer Science, pp. 322\u2013344. Springer, Cham (2022).","DOI":"10.1007\/978-3-030-95312-6_14"},{"key":"1243_CR28","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139012843","volume-title":"Mathematics of Public Key Cryptography","author":"SD Galbraith","year":"2012","unstructured":"Galbraith S.D.: Mathematics of Public Key Cryptography. Cambridge University Press, Cambridge (2012)."},{"issue":"3","key":"1243_CR29","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1145\/116825.116852","volume":"38","author":"O Goldreich","year":"1991","unstructured":"Goldreich O., Micali S., Wigderson A.: Proofs that yield nothing but their validity for all languages in NP have zero-knowledge proof systems. J. ACM 38(3), 691\u2013729 (1991).","journal-title":"J. ACM"},{"key":"1243_CR30","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511546891","volume-title":"Foundations of Cryptography: Basic Tools","author":"O Goldreich","year":"2001","unstructured":"Goldreich O.: Foundations of Cryptography: Basic Tools. Cambridge University Press, Cambridge (2001)."},{"issue":"1","key":"1243_CR31","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/s00145-019-09316-0","volume":"33","author":"SD Galbraith","year":"2020","unstructured":"Galbraith S.D., Petit C., Silva J.: Identification protocols and signature schemes based on supersingular isogeny problems. J. Cryptol. 33(1), 130\u2013175 (2020).","journal-title":"J. Cryptol."},{"key":"1243_CR32","doi-asserted-by":"crossref","unstructured":"Galbraith S.D., Petit C., Shani B., Ti Y.B.: On the security of supersingular isogeny cryptosystems. In: Cheon J.H., Takagi T. (eds.) ASIACRYPT 2016, vol. 10031 of Lecture Notes in Computer Science, pp. 63\u201391 (2016).","DOI":"10.1007\/978-3-662-53887-6_3"},{"key":"1243_CR33","unstructured":"Ghantous W., Katsumata S., Pintore F., Veroni M.: Collisions in supersingular isogeny graphs and the SIDH-based identification protocol. Cryptology ePrint Archive, Report 2021\/1051 (2021). https:\/\/eprint.iacr.org\/2021\/1051"},{"key":"1243_CR34","unstructured":"Jao D., Azarderakhsh R., Campagna M., Costello C., De Feo L., Hess B., Jalali A., Koziel B., LaMacchia B., Longa P., Naehrig M., Renes J., Soukharev V., Urbanik D., Pereira G., Karabina K., Hutchinson A.: Supersingular isogeny key encapsulation. Submission to the NIST Post-Quantum Standardization project (2017)."},{"key":"1243_CR35","doi-asserted-by":"crossref","unstructured":"Jao D., De\u00a0Feo L.: Towards quantum-resistant cryptosystems from supersingular elliptic curve isogenies. In: Yang B.-Y. (eds.) Post-Quantum Cryptography, vol. 7071 of Lecture Notes in Computer Science, pp. 19\u201334. Springer, Berlin (2011).","DOI":"10.1007\/978-3-642-25405-5_2"},{"key":"1243_CR36","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1112\/S1461157014000151","volume":"17A","author":"D Kohel","year":"2014","unstructured":"Kohel D., Lauter K., Petit C., Tignol J.-P.: On the quaternion $$\\ell $$-isogeny path problem. LMS J. Comput. Math. 17A, 418\u2013432 (2014).","journal-title":"LMS J. Comput. Math."},{"key":"1243_CR37","doi-asserted-by":"crossref","unstructured":"Kiltz E., Lyubashevsky V., Schaffner C.: A concrete treatment of Fiat-Shamir signatures in the quantum random-oracle model. In: Nielsen J.B., Rijmen V. (eds.) EUROCRYPT 2018, vol. 10822 of Lecture Notes in Computer Science, pp. 552\u2013586. Springer (2018).","DOI":"10.1007\/978-3-319-78372-7_18"},{"key":"1243_CR38","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1007\/978-3-642-17373-8_11","volume-title":"ASIACRYPT 2010","author":"A Kate","year":"2010","unstructured":"Kate A., Zaverucha G.M., Goldberg I.: Constant-size commitments to polynomials and their applications. In: Abe M. (ed.) ASIACRYPT 2010, pp. 177\u2013194. Springer, Berlin (2010)."},{"issue":"4","key":"1243_CR39","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1145\/146585.146605","volume":"39","author":"C Lund","year":"1992","unstructured":"Lund C., Fortnow L., Karloff H., Nisan N.: Algebraic methods for interactive proof systems. J. ACM 39(4), 859\u2013868 (1992).","journal-title":"J. ACM"},{"key":"1243_CR40","doi-asserted-by":"crossref","unstructured":"Lyubashevsky V.: Fiat-Shamir with aborts: applications to lattice and factoring-based signatures. In: ASIACRYPT, vol. 5912 of Lecture Notes in Computer Science, pp. 598\u2013616. Springer (2009).","DOI":"10.1007\/978-3-642-10366-7_35"},{"issue":"4","key":"1243_CR41","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1137\/S0097539795284959","volume":"30","author":"S Micali","year":"2000","unstructured":"Micali S.: Computationally sound proofs. SIAM J. Comput. 30(4), 1253\u20131298 (2000).","journal-title":"SIAM J. Comput."},{"key":"1243_CR42","doi-asserted-by":"crossref","unstructured":"Maino L., Martindale C., Panny L., Pope G., Wesolowski B.: A direct key recovery attack on SIDH. In: Hazay C., Stam M. (eds.) EUROCRYPT 2023, vol. 14008 of Lecture Notes in Computer Science, pp. 448\u2013471. Springer, Cham (2023).","DOI":"10.1007\/978-3-031-30589-4_16"},{"key":"1243_CR43","unstructured":"Petit C., Smith S.: An improvement to the quaternion analogue of the l-isogeny path problem. Poster Presentation at MathCrypt2018 (2018)."},{"key":"1243_CR44","doi-asserted-by":"crossref","unstructured":"Robert D.: Breaking SIDH in polynomial time. In: Hazay C., Stam M. (eds.) EUROCRYPT 2023, vol. 14008 of Lecture Notes in Computer Science, pp. 472\u2013503. Springer, Cham (2023).","DOI":"10.1007\/978-3-031-30589-4_17"},{"key":"1243_CR45","unstructured":"Rostovtsev A., Stolbunov A.: Public-key cryptosystem based on isogenies. IACR Cryptol. ePrint Arch., 145 (2006)."},{"key":"1243_CR46","doi-asserted-by":"crossref","unstructured":"Silverman J.H.: The Arithmetic of Elliptic Curves, vol. 106 of Graduate Texts in Mathematics, 2nd ed. Springer, Dordrecht (2009).","DOI":"10.1007\/978-0-387-09494-6"},{"key":"1243_CR47","doi-asserted-by":"crossref","unstructured":"Unruh D.: Non-interactive zero-knowledge proofs in the quantum random oracle model. In: Oswald E., Fischlin M. (eds.) EUROCRYPT 2015, vol. 9057 of Lecture Notes in Computer Science, pp. 755\u2013784. Springer (2015).","DOI":"10.1007\/978-3-662-46803-6_25"},{"key":"1243_CR48","first-page":"A238","volume":"273","author":"J V\u00e9lu","year":"1971","unstructured":"V\u00e9lu J.: Isog\u00e9nies entre courbes elliptiques. Comptes Rendus de l\u2019Acad\u00e9mie des Sciences de Paris 273, A238\u2013A241 (1971).","journal-title":"Comptes Rendus de l\u2019Acad\u00e9mie des Sciences de Paris"},{"key":"1243_CR49","doi-asserted-by":"crossref","unstructured":"Voight J.: Quaternion Algebras, vol. 288. Springer Graduate Text Math. (2021).","DOI":"10.1007\/978-3-030-56694-4"},{"key":"1243_CR50","doi-asserted-by":"publisher","DOI":"10.1201\/9781420071474","volume-title":"Elliptic Curves: Number Theory and Cryptography","author":"LC Washington","year":"2008","unstructured":"Washington L.C.: Elliptic Curves: Number Theory and Cryptography, 2nd edn CRC Press, Boca Raton (2008).","edition":"2"},{"key":"1243_CR51","doi-asserted-by":"crossref","unstructured":"Waterhouse W.C.: Abelian varieties over finite fields. Annales scientifiques de l\u2019\u00c9cole Normale Sup\u00e9rieure, Ser. 4 2(4), 521\u2013560 (1969).","DOI":"10.24033\/asens.1183"},{"key":"1243_CR52","doi-asserted-by":"crossref","unstructured":"Wesolowski B.: The supersingular isogeny path and endomorphism ring problems are equivalent. In: 2021 IEEE 62nd Annual Symposium on Foundations of Computer Science (FOCS), pp. 1100\u20131111 (2022).","DOI":"10.1109\/FOCS52979.2021.00109"},{"key":"1243_CR53","doi-asserted-by":"crossref","unstructured":"Yoo Y., Azarderakhsh R., Jalali A., Jao D., Soukharev V.: A post-quantum digital signature scheme based on supersingular isogenies. In: International Conference on Financial Cryptography and Data Security, vol. 10322 of Lecture Notes in Computer Science, pp. 163\u2013181. Springer, New York (2017).","DOI":"10.1007\/978-3-319-70972-7_9"}],"container-title":["Designs, Codes and Cryptography"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01243-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10623-023-01243-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10623-023-01243-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,24]],"date-time":"2023-10-24T19:15:22Z","timestamp":1698174922000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10623-023-01243-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6,2]]},"references-count":53,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1243"],"URL":"https:\/\/doi.org\/10.1007\/s10623-023-01243-3","relation":{},"ISSN":["0925-1022","1573-7586"],"issn-type":[{"value":"0925-1022","type":"print"},{"value":"1573-7586","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,6,2]]},"assertion":[{"value":"30 July 2022","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 January 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 April 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 June 2023","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}