{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T20:28:22Z","timestamp":1771705702181,"version":"3.50.1"},"reference-count":47,"publisher":"Springer Science and Business Media LLC","issue":"15","license":[{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T00:00:00Z","timestamp":1652745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Key Project of Natural Science Research in Anhui Universities","award":["2020kfkc 185"],"award-info":[{"award-number":["2020kfkc 185"]}]},{"name":"Quality Project of Anhui Province","award":["2020kfkc 185"],"award-info":[{"award-number":["2020kfkc 185"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2022,10]]},"DOI":"10.1007\/s11227-022-04558-5","type":"journal-article","created":{"date-parts":[[2022,5,17]],"date-time":"2022-05-17T15:03:27Z","timestamp":1652799807000},"page":"17261-17283","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Blockchain-based mutual authentication protocol without CA"],"prefix":"10.1007","volume":"78","author":[{"given":"Yue","family":"Li","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mingcheng","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gaojian","family":"Xu","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2022,5,17]]},"reference":[{"key":"4558_CR1","unstructured":"Nakamoto S (2008) Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review p 21260"},{"issue":"2014","key":"4558_CR2","first-page":"1","volume":"151","author":"G Wood","year":"2014","unstructured":"Wood G et al (2014) Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014):1\u201332","journal-title":"Ethereum Project Yellow Paper"},{"key":"4558_CR3","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, et\u00a0al (2018) Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp 1\u201315","DOI":"10.1145\/3190508.3190538"},{"issue":"6","key":"4558_CR4","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/65.806987","volume":"13","author":"R Perlman","year":"1999","unstructured":"Perlman R (1999) An overview of pki trust models. IEEE Netw 13(6):38\u201343","journal-title":"IEEE Netw"},{"key":"4558_CR5","unstructured":"Adkins H (2011) An update on attempted man-in-the-middle attacks"},{"key":"4558_CR6","unstructured":"Ducklin P (2013) The turktrust ssl certificate fiasco-what really happened, and what happens next. SOPHOS 8"},{"key":"4558_CR7","unstructured":"Constantin L (2012) Trustwave admits issuing man-in-the-middle digital certificate; mozilla debates punishment. Comput World"},{"key":"4558_CR8","unstructured":"Keizer G (2011) Solo iranian hacker takes credit for comodo certificate attack. Comput World"},{"key":"4558_CR9","unstructured":"31-MAR-2011 U (2011) Comodo detected and thwarted an intrusion on 26-mar-2011. https:\/\/www.comodo.com\/Comodo-Fraud-Incident-2011-03-23.html"},{"key":"4558_CR10","unstructured":"Prins JR (2011) Diginotar certificate authority breach - operation blacktulip. https:\/\/tweakimg.net\/files\/upload\/Operation+Black+Tulip+v1.0.pdf"},{"key":"4558_CR11","unstructured":"O\u2019Brien D, Sleevi R, Whalley A (2017) Chrome plan to distrust symantec certificates. https:\/\/security.googleblog.com\/2017\/09\/chromes-plan-to-distrust-symantec.html"},{"issue":"135","key":"4558_CR12","first-page":"742","volume":"8","author":"S Kakei","year":"2020","unstructured":"Kakei S, Shiraishi Y, Mohri M et al (2020) Cross-certification towards distributed authentication infrastructure: a case of hyperledger fabric. IEEE Access 8(135):742\u2013757","journal-title":"IEEE Access"},{"issue":"4","key":"4558_CR13","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/s10207-020-00518-3","volume":"20","author":"T Sermpinis","year":"2021","unstructured":"Sermpinis T, Vlahavas G, Karasavvas K et al (2021) Detract: a decentralized, transparent, immutable and open pki certificate framework. Int J Inf Secur 20(4):553\u2013570","journal-title":"Int J Inf Secur"},{"issue":"2","key":"4558_CR14","doi-asserted-by":"publisher","first-page":"218","DOI":"10.23919\/TST.2017.7889643","volume":"22","author":"B Zhao","year":"2017","unstructured":"Zhao B, Xiao Y, Huang Y et al (2017) A private user data protection mechanism in trustzone architecture based on identity authentication. Tsinghua Sci Technol 22(2):218\u2013225","journal-title":"Tsinghua Sci Technol"},{"key":"4558_CR15","unstructured":"Blanchet B, Smyth B, Cheval V et\u00a0al (2018) Proverif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. Version From pp 5\u201316"},{"issue":"16","key":"4558_CR16","doi-asserted-by":"publisher","first-page":"3713","DOI":"10.1002\/sec.1576","volume":"9","author":"C Wan","year":"2016","unstructured":"Wan C, Zhang J (2016) Identity-based key management for wireless sensor networks using lagrange interpolation. Secur Commun Netw 9(16):3713\u20133723","journal-title":"Secur Commun Netw"},{"issue":"3","key":"4558_CR17","doi-asserted-by":"publisher","first-page":"1497","DOI":"10.1007\/s11831-020-09426-0","volume":"28","author":"S Namasudra","year":"2021","unstructured":"Namasudra S, Deka GC, Johri P et al (2021) The revolution of blockchain: State-of-the-art and research challenges. Arch Comput Methods Eng 28(3):1497\u20131515. https:\/\/doi.org\/10.1007\/s11831-020-09426-0","journal-title":"Arch Comput Methods Eng"},{"key":"4558_CR18","doi-asserted-by":"publisher","DOI":"10.1111\/EXSY","author":"P Sharma","year":"2021","unstructured":"Sharma P, Moparthi NR, Namasudra S et al (2021) Blockchain-based iot architecture to secure healthcare system using identity-based encryption. Expert Syst. https:\/\/doi.org\/10.1111\/EXSY","journal-title":"Expert Syst"},{"issue":"8","key":"4558_CR19","doi-asserted-by":"publisher","first-page":"7916","DOI":"10.1007\/s11227-020-03570-x","volume":"77","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) Towards design and implementation of security and privacy framework for internet of medical things (iomt) by leveraging blockchain and ipfs technology. J Supercomput 77(8):7916\u20137955","journal-title":"J Supercomput"},{"key":"4558_CR20","doi-asserted-by":"publisher","DOI":"10.1109\/MCE.2021.3140048","author":"S Namasudra","year":"2022","unstructured":"Namasudra S, Sharma P, Crespo RG et al (2022) Blockchain-based medical certificate generation and verification for iot-based healthcare systems. IEEE Consum Electron Mag. https:\/\/doi.org\/10.1109\/MCE.2021.3140048","journal-title":"IEEE Consum Electron Mag"},{"key":"4558_CR21","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1016\/j.jpdc.2021.02.022","volume":"152","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R, Marchang N et al (2021) A secured distributed detection system based on ipfs and blockchain for industrial image and video data security. J Parallel Distrib Comput 152:128\u2013143","journal-title":"J Parallel Distrib Comput"},{"issue":"4","key":"4558_CR22","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1504\/IJWGS.2021.118398","volume":"17","author":"A Kumar","year":"2021","unstructured":"Kumar A, Abhishek K, Shah K et al (2021) A novel elliptic curve cryptography-based system for smart grid communication. Int J Web Grid Serv 17(4):321\u2013342","journal-title":"Int J Web Grid Serv"},{"issue":"3","key":"4558_CR23","doi-asserted-by":"publisher","first-page":"2326","DOI":"10.1109\/TNSE.2021.3089435","volume":"8","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Srivastava G et al (2021) Ppsf: a privacy-preserving and secure framework using blockchain-based machine-learning for iot-driven smart cities. IEEE Trans Netw Sci Eng 8(3):2326\u20132341","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"226","key":"4558_CR24","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1109\/access.2019.2898376","volume":"7","author":"Y Chen","year":"2019","unstructured":"Chen Y, Mart\u00ednez JF, Castillejo P et al (2019) A bilinear map pairing based authentication scheme for smart grid communications: pauth. IEEE Access 7(226):33\u201343. https:\/\/doi.org\/10.1109\/access.2019.2898376","journal-title":"IEEE Access"},{"key":"4558_CR25","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-020-02740-2","author":"TY Wu","year":"2021","unstructured":"Wu TY, Lee YQ, Chen CM et al (2021) An enhanced pairing-based authentication scheme for smart grid communications. J Ambient Intell Humaniz Comput. https:\/\/doi.org\/10.1007\/s12652-020-02740-2","journal-title":"J Ambient Intell Humaniz Comput"},{"issue":"1","key":"4558_CR26","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1016\/j.compeleceng.2006.11.005","volume":"34","author":"NY Lee","year":"2008","unstructured":"Lee NY, Wu CN, Wang CC (2008) Authenticated multiple key exchange protocols based on elliptic curves and bilinear pairings. Comput Electr Eng 34(1):12\u201320. https:\/\/doi.org\/10.1016\/j.compeleceng.2006.11.005","journal-title":"Comput Electr Eng"},{"issue":"2","key":"4558_CR27","doi-asserted-by":"publisher","first-page":"244","DOI":"10.1016\/j.cose.2009.08.006","volume":"29","author":"M H\u00f6lbl","year":"2010","unstructured":"H\u00f6lbl M, Welzer T, Brumen B (2010) Two proposed identity-based three-party authenticated key agreement protocols from pairings. Comput Secur 29(2):244\u2013252. https:\/\/doi.org\/10.1016\/j.cose.2009.08.006","journal-title":"Comput Secur"},{"key":"4558_CR28","unstructured":"Zhao D, Peng H, Li S, et\u00a0al (2013) An efficient dynamic id based remote user authentication scheme using self-certified public keys for multi-server environment. arXiv preprint arXiv:1305.6350"},{"issue":"3","key":"4558_CR29","doi-asserted-by":"publisher","first-page":"1421","DOI":"10.1109\/tetc.2020.3005610","volume":"9","author":"Y Xu","year":"2020","unstructured":"Xu Y, Zhang C, Wang G et al (2020) A blockchain-enabled deduplicatable data auditing mechanism for network storage services. IEEE Trans Emerg Top Comput 9(3):1421\u20131432. https:\/\/doi.org\/10.1109\/tetc.2020.3005610","journal-title":"IEEE Trans Emerg Top Comput"},{"issue":"6","key":"4558_CR30","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.ipm.2020.102355","volume":"57","author":"Q Zhao","year":"2020","unstructured":"Zhao Q, Chen S, Liu Z et al (2020) Blockchain-based privacy-preserving remote data integrity checking scheme for iot information systems. Inf Process Manag 57(6):102\u2013355. https:\/\/doi.org\/10.1016\/j.ipm.2020.102355","journal-title":"Inf Process Manag"},{"key":"4558_CR31","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/080416","author":"N Ye","year":"2014","unstructured":"Ye N, Zhu Y, Rc Wang et al (2014) An efficient authentication and access control scheme for perception layer of internet of things. Appl Math Inf Sci. https:\/\/doi.org\/10.12785\/amis\/080416","journal-title":"Appl Math Inf Sci"},{"issue":"5","key":"4558_CR32","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1007\/s12083-020-01020-2","volume":"14","author":"W Wang","year":"2020","unstructured":"Wang W, Huang H, Zhang L et al (2020) Secure and efficient mutual authentication protocol for smart grid under blockchain. Peer-to-Peer Netw Appl 14(5):2681\u20132693. https:\/\/doi.org\/10.1007\/s12083-020-01020-2","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"4","key":"4558_CR33","doi-asserted-by":"publisher","first-page":"451","DOI":"10.1109\/TDSC.2015.2413415","volume":"13","author":"A Castiglione","year":"2016","unstructured":"Castiglione A, De Santis A, Masucci B (2016) Key indistinguishability versus strong key indistinguishability for hierarchical key assignment schemes. IEEE Trans Dependable Secure Comput 13(4):451\u2013460. https:\/\/doi.org\/10.1109\/TDSC.2015.2413415","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"4558_CR34","doi-asserted-by":"publisher","first-page":"2952","DOI":"10.1007\/s12083-021-01147-w","volume":"14","author":"G Xu","year":"2020","unstructured":"Xu G, Dong J, Ma C (2020) A certificateless encryption scheme based on blockchain. Peer-to-Peer Netw Appl 14(5):2952\u20132960. https:\/\/doi.org\/10.1007\/s12083-021-01147-w","journal-title":"Peer-to-Peer Netw Appl"},{"key":"4558_CR35","doi-asserted-by":"crossref","unstructured":"LaMacchia B, Lauter K, Mityagin A (2007) Stronger security of authenticated key exchange. In: International conference on provable security, Springer, pp 1\u201316","DOI":"10.1007\/978-3-540-75670-5_1"},{"issue":"17","key":"4558_CR36","doi-asserted-by":"publisher","first-page":"e3358.1","DOI":"10.1002\/dac.3358","volume":"30","author":"V Sureshkumar","year":"2017","unstructured":"Sureshkumar V, Amin R, Anitha R (2017) An enhanced bilinear pairing based authenticated key agreement protocol for multiserver environment. Int J Commun Syst 30(17):e3358.1-e3358.16. https:\/\/doi.org\/10.1002\/dac.3358","journal-title":"Int J Commun Syst"},{"issue":"9","key":"4558_CR37","doi-asserted-by":"publisher","first-page":"11041","DOI":"10.1007\/s11042-017-4996-z","volume":"77","author":"A Ruhul","year":"2017","unstructured":"Ruhul A, Islam SK, Pandi V et al (2017) A robust and efficient bilinear pairing based mutual authentication and session key verification over insecure communication. Multimed Tools Appl 77(9):11041\u201311066. https:\/\/doi.org\/10.1007\/s11042-017-4996-z","journal-title":"Multimed Tools Appl"},{"key":"4558_CR38","doi-asserted-by":"publisher","first-page":"2503","DOI":"10.1007\/s11227-021-03830-4","volume":"78","author":"AS Fatemeh","year":"2022","unstructured":"Fatemeh AS, Shaghayegh BC (2022) A cloud-based mobile payment system using identity-based signature providing key revocation. J Supercomput 78:2503\u20132527. https:\/\/doi.org\/10.1007\/s11227-021-03830-4","journal-title":"J Supercomput"},{"issue":"4","key":"4558_CR39","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1049\/trit.2020.0073","volume":"5","author":"MK Doreswamy","year":"2020","unstructured":"Doreswamy MK, Hooshmand IG (2020) Feature selection approach using ensemble learning for network anomaly detection. CAAI Trans Intell Technol 5(4):283\u2013293. https:\/\/doi.org\/10.1049\/trit.2020.0073","journal-title":"CAAI Trans Intell Technol"},{"key":"4558_CR40","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2020.3046471","author":"S Namasudra","year":"2020","unstructured":"Namasudra S (2020) Fast and secure data accessing by using dna computing for the cloud environment. IEEE Trans Serv Comput. https:\/\/doi.org\/10.1109\/TSC.2020.3046471","journal-title":"IEEE Trans Serv Comput"},{"issue":"3","key":"4558_CR41","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1049\/trit.2020.0026","volume":"5","author":"S Ndichu","year":"2020","unstructured":"Ndichu S, Kim S, Ozawa S (2020) Deobfuscation, unpacking, and decoding of obfuscated malicious javascript for machine learning models detection performance improvement. CAAI Trans Intell Technol 5(3):184\u2013192","journal-title":"CAAI Trans Intell Technol"},{"issue":"1","key":"4558_CR42","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1049\/trit.2019.0048","volume":"5","author":"RM Alguliyev","year":"2020","unstructured":"Alguliyev RM, Aliguliyev RM, Sukhostat LV (2020) Efficient algorithm for big data clustering on single machine. CAAI Trans Intell Technol 5(1):9\u201314","journal-title":"CAAI Trans Intell Technol"},{"issue":"4","key":"4558_CR43","doi-asserted-by":"crossref","first-page":"e4222","DOI":"10.1002\/ett.4222","volume":"32","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) Dbtp2sf: a deep blockchain-based trustworthy privacy-preserving secured framework in industrial internet of things systems. Trans Emerg Telecommun Technol 32(4):e4222","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"6","key":"4558_CR44","doi-asserted-by":"crossref","first-page":"e4112","DOI":"10.1002\/ett.4112","volume":"32","author":"P Kumar","year":"2021","unstructured":"Kumar P, Kumar R, Gupta GP et al (2021) A distributed framework for detecting ddos attacks in smart contract-based blockchain-iot systems by leveraging fog computing. Trans Emerg Telecommun Technol 32(6):e4112","journal-title":"Trans Emerg Telecommun Technol"},{"issue":"107","key":"4558_CR45","first-page":"819","volume":"187","author":"R Kumar","year":"2021","unstructured":"Kumar R, Kumar P, Tripathi R et al (2021) Sp2f: a secured privacy-preserving framework for smart agricultural unmanned aerial vehicles. Comput Netw 187(107):819","journal-title":"Comput Netw"},{"issue":"2","key":"4558_CR46","doi-asserted-by":"publisher","first-page":"2321","DOI":"10.1007\/s12652-020-02346-8","volume":"12","author":"R Kumar","year":"2021","unstructured":"Kumar R, Tripathi R (2021) Scalable and secure access control policy for healthcare system using blockchain and enhanced bell-lapadula model. J Ambient Intell Humaniz Comput 12(2):2321\u20132338","journal-title":"J Ambient Intell Humaniz Comput"},{"key":"4558_CR47","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1007\/978-981-33-4859-2_24","volume-title":"Machine Learning and Information Processing","author":"R Kumar","year":"2021","unstructured":"Kumar R, Marchang N, Tripathi R (2021) Smdsb: Efficient off-chain storage model for data sharing in blockchain environment. Machine Learning and Information Processing. Springer, Singapore, pp 225\u2013240"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04558-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-022-04558-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-022-04558-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,21]],"date-time":"2023-11-21T18:55:51Z","timestamp":1700592951000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-022-04558-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,17]]},"references-count":47,"journal-issue":{"issue":"15","published-print":{"date-parts":[[2022,10]]}},"alternative-id":["4558"],"URL":"https:\/\/doi.org\/10.1007\/s11227-022-04558-5","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,17]]},"assertion":[{"value":"20 April 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}