{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,24]],"date-time":"2026-01-24T15:56:52Z","timestamp":1769270212210,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T00:00:00Z","timestamp":1625097600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,2]]},"DOI":"10.1007\/s11227-021-03830-4","type":"journal-article","created":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T11:02:45Z","timestamp":1625137365000},"page":"2503-2527","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A cloud-based mobile payment system using identity-based signature providing key revocation"],"prefix":"10.1007","volume":"78","author":[{"given":"Fatemeh","family":"Alidadi Shamsabadi","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6104-7759","authenticated-orcid":false,"given":"Shaghayegh","family":"Bakhtiari Chehelcheshmeh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,1]]},"reference":[{"key":"3830_CR1","doi-asserted-by":"publisher","first-page":"101910","DOI":"10.1016\/j.jretconser.2019.101910","volume":"52","author":"J Boden","year":"2020","unstructured":"Boden J, Maier E, Wilken R (2020) The effect of credit card versus mobile payment on convenience and consumers\u2019 willingness to pay. JRCS 52:101910. https:\/\/doi.org\/10.1016\/j.jretconser.2019.101910","journal-title":"JRCS"},{"key":"3830_CR2","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MITP.2014.40","volume":"16","author":"JT Isaac","year":"2014","unstructured":"Isaac JT, Zeadally S (2014) Secure mobile payment systems. IT Prof 16:36\u201343. https:\/\/doi.org\/10.1109\/MITP.2014.40","journal-title":"IT Prof"},{"key":"3830_CR3","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1016\/j.procs.2016.05.215","volume":"85","author":"A Bhardwaj","year":"2016","unstructured":"Bhardwaj A, Subrahmanyam GVB, Avasthi V, Sastry H (2016) Security Algorithms for cloud computing. Procedia Comput Sci 85:535\u2013542. https:\/\/doi.org\/10.1016\/j.procs.2016.05.215","journal-title":"Procedia Comput Sci"},{"key":"3830_CR4","doi-asserted-by":"publisher","first-page":"2558","DOI":"10.1007\/s11227-016-1945-y","volume":"73","author":"TBAK Verma","year":"2017","unstructured":"Verma TBAK (2017) Data security in mobile cloud computing paradigm: a survey, taxonomy and open research issues. J Supercomput 73:2558\u20132631. https:\/\/doi.org\/10.1007\/s11227-016-1945-y","journal-title":"J Supercomput"},{"key":"3830_CR5","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/s11227-010-0427-x","volume":"55","author":"R Tso","year":"2011","unstructured":"Tso R, Yi X, Huang X (2011) Efficient and short certificateless signatures secure against realistic adversaries. J Supercomput 55:173\u2013191. https:\/\/doi.org\/10.1007\/s11227-010-0427-x","journal-title":"J Supercomput"},{"key":"3830_CR6","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1007\/3-540-39568-7_5","volume":"84","author":"A Shamir","year":"1985","unstructured":"Shamir A (1985) Identity-based cryptosystems and signature schemes LNCS 84:47\u201353. https:\/\/doi.org\/10.1007\/3-540-39568-7_5","journal-title":"Identity-based cryptosystems and signature schemes LNCS"},{"key":"3830_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/MobileCloud.2014.41","author":"D Dev","year":"2014","unstructured":"Dev D, Baishnab KL (2014) A review and research towards mobile cloud computing. API. https:\/\/doi.org\/10.1109\/MobileCloud.2014.41","journal-title":"API"},{"key":"3830_CR8","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1016\/j.elerap.2015.07.006","volume":"14","author":"T Dahlberg","year":"2015","unstructured":"Dahlberg T, Guo J, Ondrus J (2015) A critical review of mobile payment research. Electron Commer Res Appl 14:265\u2013284. https:\/\/doi.org\/10.1016\/j.elerap.2015.07.006","journal-title":"Electron Commer Res Appl"},{"key":"3830_CR9","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-1-4757-0602-4_18","volume":"199","author":"D Chaum","year":"1983","unstructured":"Chaum D (1983) Blind signatures for untraceable payments. Adv Crypto 199:199\u2013203. https:\/\/doi.org\/10.1007\/978-1-4757-0602-4_18","journal-title":"Adv Crypto"},{"key":"3830_CR10","doi-asserted-by":"publisher","first-page":"160","DOI":"10.1016\/S0167-4048(03)00214-1","volume":"22","author":"C Chang","year":"2003","unstructured":"Chang C, Lai Y (2003) A flexible date-attachment scheme on e-cash. Comput Secur 22:160\u2013166. https:\/\/doi.org\/10.1016\/S0167-4048(03)00214-1","journal-title":"Comput Secur"},{"key":"3830_CR11","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.elerap.2005.12.001","volume":"6","author":"WS Juang","year":"2007","unstructured":"Juang WS (2007) D-cash: a flexible pre-paid e-cash scheme for date-attachment. Electron Commer Res Appl 6:74\u201380. https:\/\/doi.org\/10.1016\/j.elerap.2005.12.001","journal-title":"Electron Commer Res Appl"},{"key":"3830_CR12","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1016\/j.csi.2008.02.002","volume":"31","author":"C Fan","year":"2009","unstructured":"Fan C, Guan DJ, Wang C, Lin D (2009) Cryptanalysis of Lee-Hwang-Yang blind signature scheme. Comput Stand Interfaces 31:319\u2013320. https:\/\/doi.org\/10.1016\/j.csi.2008.02.002","journal-title":"Comput Stand Interfaces"},{"key":"3830_CR13","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1007\/3-540-39799-X_40","volume":"218","author":"Y Desmedt","year":"1985","unstructured":"Desmedt Y, Odlyzko AM (1985) A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes. LNCS 218:516\u2013522. https:\/\/doi.org\/10.1007\/3-540-39799-X_40","journal-title":"LNCS"},{"key":"3830_CR14","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MITP.2007.41","volume":"9","author":"LD Bisel","year":"2007","unstructured":"Bisel LD (2007) The role of SSL in Cybersecurity. IT Prof 9:22\u201325. https:\/\/doi.org\/10.1109\/MITP.2007.41","journal-title":"IT Prof"},{"key":"3830_CR15","doi-asserted-by":"publisher","unstructured":"Guan HJ (2009) The Research of SET-Based Electronic Payment System Model. 2009 Int Conf E-bus Inf Syst Secur EBISS 2009. https:\/\/doi.org\/10.1109\/EBISS.2009.5138128.","DOI":"10.1109\/EBISS.2009.5138128"},{"key":"3830_CR16","unstructured":"Frisby W, Moench B, Recht B, Ristenpart T (2012) Security Analysis of Smartphone Point-of-Sale Systems. Woot, pp 1\u20133. http:\/\/dl.acm.org\/citation.cfm?id=2372399.2372403."},{"key":"3830_CR17","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1016\/j.elerap.2015.05.001","volume":"14","author":"FY Leu","year":"2015","unstructured":"Leu FY, Huang YL, Wang SM (2015) A secure M-Commerce system based on credit card transaction. Electron Commer Res Appl 14:351\u2013360. https:\/\/doi.org\/10.1016\/j.elerap.2015.05.001","journal-title":"Electron Commer Res Appl"},{"key":"3830_CR18","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/s11277-015-2738-y","volume":"85","author":"R Mart\u00ednez-Pel\u00e1ez","year":"2015","unstructured":"Mart\u00ednez-Pel\u00e1ez R, Toral-Cruz H, Ruiz J, Velarde-Alvarado P (2015) P2PM-pay: person to person mobile payment scheme controlled by expiration date. Wirel Pers Commun 85:289\u2013304. https:\/\/doi.org\/10.1007\/s11277-015-2738-y","journal-title":"Wirel Pers Commun"},{"key":"3830_CR19","doi-asserted-by":"publisher","first-page":"1437","DOI":"10.4304\/jcp.7.6.1437-1444","volume":"7","author":"M Hou","year":"2012","unstructured":"Hou M, Xu Q, Lin F (2012) An efficient certificate revocation and verification scheme from multi-Hashing. Compute 7:1437\u20131444. https:\/\/doi.org\/10.4304\/jcp.7.6.1437-1444","journal-title":"J Compute"},{"key":"3830_CR20","doi-asserted-by":"publisher","first-page":"102356","DOI":"10.1016\/j.jisa.2019.06.012","volume":"48","author":"Q Hu","year":"2019","unstructured":"Hu Q, Asghar MR, Brownlee N (2019) Checking certificate revocation efficiently using certificate revocation guard. JISA 48:102356. https:\/\/doi.org\/10.1016\/j.jisa.2019.06.012","journal-title":"JISA"},{"key":"3830_CR21","doi-asserted-by":"publisher","first-page":"758","DOI":"10.1016\/j.procs.2012.06.097","volume":"10","author":"JT Isaac","year":"2012","unstructured":"Isaac JT, Zeadally S (2012) An anonymous secure payment protocol in a payment gateway centric model. Procedia Comput Sci 10:758\u2013765. https:\/\/doi.org\/10.1016\/j.procs.2012.06.097","journal-title":"Procedia Comput Sci"},{"key":"3830_CR22","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1016\/j.jss.2015.07.023","volume":"116","author":"JH Yang","year":"2016","unstructured":"Yang JH, Lin PY (2016) A mobile payment mechanism with anonymity for cloud computing. J Syst Softw 116:69\u201374. https:\/\/doi.org\/10.1016\/j.jss.2015.07.023","journal-title":"J Syst Softw"},{"key":"3830_CR23","doi-asserted-by":"publisher","unstructured":"Paar C, Pelzl J (2010) Understanding cryptography A textbook for students and practitioners. Springer, Heidelberg, pp 1\u2013239. https:\/\/doi.org\/10.1007\/978-3-642-04101-3.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"3830_CR24","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.csi.2016.11.012","volume":"54","author":"Zhen Qin","year":"2017","unstructured":"Qin Zhen, Sun J, Wahaballa A, Zheng W, Xiong H, Qin Zhiguang (2017) A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput Stand Interfaces 54:55\u201360. https:\/\/doi.org\/10.1016\/j.csi.2016.11.012","journal-title":"Comput Stand Interfaces"},{"key":"3830_CR25","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1093\/comjnl\/bxr097","volume":"55","author":"X Huang","year":"2012","unstructured":"Huang X, Mu Y, Susilo W, Wong DS, Wu W (2012) Certificateless signatures: new schemes and security models. Comput J 55:457\u2013474. https:\/\/doi.org\/10.1093\/comjnl\/bxr097","journal-title":"Comput J"},{"key":"3830_CR26","doi-asserted-by":"publisher","unstructured":"Zhang C, Lu R, Lin X, Ho PH, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. API, pp 816\u2013824. https:\/\/doi.org\/10.1109\/INFOCOM.2008.58.","DOI":"10.1109\/INFOCOM.2008.58"},{"key":"3830_CR27","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1016\/j.csi.2017.09.008","volume":"56","author":"Y Liao","year":"2018","unstructured":"Liao Y, He Y, Li F, Zhou S (2018) Analysis of a mobile payment protocol with outsourced verification in cloud server and the improvement. Comput Stand Interfaces 56:101\u2013106. https:\/\/doi.org\/10.1016\/j.csi.2017.09.008","journal-title":"Comput Stand Interfaces"},{"key":"3830_CR28","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1504\/IJACT.2008.017047","volume":"1","author":"X Boyen","year":"2008","unstructured":"Boyen X (2008) A tapestry of identity-based encryption: practical frameworks compared. IJACT 1:3\u201321. https:\/\/doi.org\/10.1504\/IJACT.2008.017047","journal-title":"IJACT"},{"key":"3830_CR29","doi-asserted-by":"publisher","unstructured":"Penttinen JTJ (2017) Wireless communications security: solution for the Internet of Things. Wiley Online Library, pp 189\u2013206. https:\/\/doi.org\/10.1002\/9781119084402.","DOI":"10.1002\/9781119084402"},{"key":"3830_CR30","doi-asserted-by":"publisher","first-page":"740","DOI":"10.1016\/j.csi.2008.09.016","volume":"31","author":"Y Fu","year":"2009","unstructured":"Fu Y, Chen CS, Zhou H (2009) Smart phone for mobile commerce. Comput Stand Interfaces 31:740\u2013747. https:\/\/doi.org\/10.1016\/j.csi.2008.09.016","journal-title":"Comput Stand Interfaces"},{"key":"3830_CR31","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/j.csi.2015.08.002","volume":"44","author":"MC Rodr\u00edguez-Hern\u00e1ndez","year":"2015","unstructured":"Rodr\u00edguez-Hern\u00e1ndez MC, Ilarri S (2015) Pull-based recommendations in mobile environments. Comput Stand Interfaces 44:185\u2013204. https:\/\/doi.org\/10.1016\/j.csi.2015.08.002","journal-title":"Comput Stand Interfaces"},{"key":"3830_CR32","doi-asserted-by":"publisher","first-page":"4617","DOI":"10.1007\/s11227-018-2546-8","volume":"75","author":"S Park","year":"2019","unstructured":"Park S, Lee I (2019) Enhanced signature RTD transaction scheme based on Chebyshev polynomial for mobile payments service in IoT device environment. J Supercomput 75:4617\u20134637. https:\/\/doi.org\/10.1007\/s11227-018-2546-8","journal-title":"J Supercomput"},{"key":"3830_CR33","doi-asserted-by":"publisher","first-page":"705","DOI":"10.1016\/j.procs.2016.04.156","volume":"83","author":"M Badra","year":"2016","unstructured":"Badra M, Badra RB (2016) A lightweight security protocol for NFC-based mobile payments. Procedia Comput Sci 83:705\u2013711. https:\/\/doi.org\/10.1016\/j.procs.2016.04.156","journal-title":"Procedia Comput Sci"},{"key":"3830_CR34","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1007\/s11227-013-1051-3","volume":"70","author":"J Ning","year":"2014","unstructured":"Ning J, Ming L, Yang H (2014) An anonymous e-rental protocol based on ID-based cryptography and NFC. J Supercomput 70:31\u201353. https:\/\/doi.org\/10.1007\/s11227-013-1051-3","journal-title":"J Supercomput"},{"key":"3830_CR35","doi-asserted-by":"publisher","first-page":"713","DOI":"10.1007\/s11277-016-3646-5","volume":"94","author":"JH Yang","year":"2017","unstructured":"Yang JH (2017) An electronic transaction mechanism using mobile devices for cloud computing. Wirel Pers Commun 94:713\u2013724. https:\/\/doi.org\/10.1007\/s11277-016-3646-5","journal-title":"Wirel Pers Commun"},{"key":"3830_CR36","doi-asserted-by":"publisher","first-page":"2945","DOI":"10.1109\/ACCESS.2017.2676021","volume":"5","author":"X Jia","year":"2017","unstructured":"Jia X, He D, Zeadally S, Li LI (2017) Efficient revocable ID-based signature with cloud revocation server. API 5:2945\u20132954. https:\/\/doi.org\/10.1109\/ACCESS.2017.2676021","journal-title":"API"},{"key":"3830_CR37","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1561\/3300000004","volume":"1","author":"B Blanchet","year":"2016","unstructured":"Blanchet B (2016) Modeling and verifying security protocols with the applied Pi Calculus and ProVerif. Foundations Trends Priv Secur 1:1\u2013135. https:\/\/doi.org\/10.1561\/3300000004","journal-title":"Foundations Trends Priv Secur"},{"key":"3830_CR38","unstructured":"Blanchet B, Smyth B, Cheval V, Sylvestre M (2017) Automatic cryptographic protocol verifier, user manual and tutorial. http:\/\/www.cs.bham.ac.uk\/~bas\/papers\/ProVerif-manual-version-1.98pl1.pdf."},{"key":"3830_CR39","doi-asserted-by":"publisher","first-page":"296","DOI":"10.1007\/978-3-642-25516-8_18","volume":"7089","author":"M Scott","year":"2011","unstructured":"Scott M (2011) On the Efficient Implementation of Pairing-Based Protocols. LNCS 7089:296\u2013308. https:\/\/doi.org\/10.1007\/978-3-642-25516-8_18","journal-title":"LNCS"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03830-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-021-03830-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-021-03830-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T11:30:08Z","timestamp":1643023808000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-021-03830-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,1]]},"references-count":39,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,2]]}},"alternative-id":["3830"],"URL":"https:\/\/doi.org\/10.1007\/s11227-021-03830-4","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,7,1]]},"assertion":[{"value":"19 April 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 July 2021","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}