{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T17:02:45Z","timestamp":1773939765928,"version":"3.50.1"},"reference-count":42,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T00:00:00Z","timestamp":1748476800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Hunan Provincial Degree and Postgraduate Teaching Reform Research Project of China","award":["2023JGSZ060"],"award-info":[{"award-number":["2023JGSZ060"]}]},{"name":"Hunan Provincial Degree and Postgraduate Teaching Reform Research Project of China","award":["2023JGSZ060"],"award-info":[{"award-number":["2023JGSZ060"]}]},{"name":"Hunan Provincial Degree and Postgraduate Teaching Reform Research Project of China","award":["2023JGSZ060"],"award-info":[{"award-number":["2023JGSZ060"]}]},{"name":"Changsha Natural Science Foundation","award":["kq2502073"],"award-info":[{"award-number":["kq2502073"]}]},{"name":"Changsha Natural Science Foundation","award":["kq2502073"],"award-info":[{"award-number":["kq2502073"]}]},{"name":"Changsha Natural Science Foundation","award":["kq2502073"],"award-info":[{"award-number":["kq2502073"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"DOI":"10.1007\/s11227-025-07436-y","type":"journal-article","created":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T06:12:50Z","timestamp":1748499170000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A consortium blockchain-based sealed electronic auction scheme utilizing attribute-based hybrid encryption"],"prefix":"10.1007","volume":"81","author":[{"given":"De-Pei","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Jian-Ping","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Hang","family":"Yao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,29]]},"reference":[{"key":"7436_CR1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2019.03.023","volume":"88","author":"R Alvarez","year":"2020","unstructured":"Alvarez R, Nojoumian M (2020) Comprehensive survey on privacy-preserving protocols for sealed-bid auctions. Comput Secur 88:101502. https:\/\/doi.org\/10.1016\/j.cose.2019.03.023","journal-title":"Comput Secur"},{"issue":"5","key":"7436_CR2","doi-asserted-by":"publisher","first-page":"302","DOI":"10.1109\/32.502223","volume":"22","author":"MK Franklin","year":"1996","unstructured":"Franklin MK, Reiter MK (1996) The design and implementation of a secure auction service. IEEE Trans Softw Eng 22(5):302\u2013312. https:\/\/doi.org\/10.1109\/32.502223","journal-title":"IEEE Trans Softw Eng"},{"issue":"4","key":"7436_CR3","first-page":"769","volume":"82","author":"H Kikuchi","year":"1999","unstructured":"Kikuchi H, Hakavy M, Tygar D (1999) Multi-round anonymous auction protocols. IEICE Trans Inf Syst 82(4):769\u2013777","journal-title":"IEICE Trans Inf Syst"},{"issue":"5","key":"7436_CR4","first-page":"659","volume":"30","author":"J Zhang","year":"2003","unstructured":"Zhang J, Wu Q, Wang Y (2003) A new electronic auction based on secret sharing. J Xidian Univ 30(5):659\u2013662","journal-title":"J Xidian Univ"},{"issue":"4","key":"7436_CR5","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/s10207-006-0001-y","volume":"5","author":"F Brandt","year":"2006","unstructured":"Brandt F (2006) How to obtain full privacy in auctions. Int J Inf Sec 5(4):201\u2013216. https:\/\/doi.org\/10.1007\/s10207-006-0001-y","journal-title":"Int J Inf Sec"},{"key":"7436_CR6","doi-asserted-by":"publisher","unstructured":"Brandt F, Sandholm T (2005) Efficient privacy-preserving protocols for multi-unit auctions. In: International Conference on Financial Cryptography and Data Security. Springer Berlin Heidelberg, pp 298\u2013312. https:\/\/doi.org\/10.1007\/11507","DOI":"10.1007\/11507"},{"issue":"11A","key":"7436_CR7","first-page":"187","volume":"28","author":"J Zhang","year":"2007","unstructured":"Zhang J, Ma L, Wang Y (2007) Sealed electronic auction solutions for complete privacy. J Commun 28(11A):187\u2013190","journal-title":"J Commun"},{"issue":"3","key":"7436_CR8","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1007\/s10796-008-9094-3","volume":"11","author":"CC Lee","year":"2009","unstructured":"Lee CC, Ho PF, Hwang MS (2009) A secure e-auction scheme based on group signatures. Inf Syst Front 11(3):335\u2013343. https:\/\/doi.org\/10.1007\/s10796-008-9094-3","journal-title":"Inf Syst Front"},{"issue":"1","key":"7436_CR9","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1007\/s10796-011-9312-2","volume":"15","author":"Y Sun","year":"2013","unstructured":"Sun Y, Sun Y, Luo M et al (2013) Comment on lee et al.\u2019s group signature and e-auction scheme. Inf Syst Front 15(1):133\u2013139. https:\/\/doi.org\/10.1007\/s10796-011-9312-2","journal-title":"Inf Syst Front"},{"key":"7436_CR10","first-page":"10","volume":"3440802","author":"CS Wright","year":"2008","unstructured":"Wright CS (2008) Bitcoin: A peer-to-peer electronic cash system. SSRN Electron J 3440802:10\u20132139","journal-title":"SSRN Electron J"},{"issue":"5","key":"7436_CR11","first-page":"969","volume":"41","author":"QF Shao","year":"2018","unstructured":"Shao QF, Jin CQ, Zhang Z et al (2018) Blockchain: architecture and research progress. Chin J Comput 41(5):969\u2013988","journal-title":"Chin J Comput"},{"issue":"13","key":"7436_CR12","doi-asserted-by":"publisher","first-page":"13909","DOI":"10.1007\/s11227-023-05155-w","volume":"79","author":"Z Ye","year":"2023","unstructured":"Ye Z, Chen CL, Weng W et al (2023) An anonymous and fair auction system based on blockchain. J Supercomput 79(13):13909\u201313951. https:\/\/doi.org\/10.1007\/s11227-023-05155-w","journal-title":"J Supercomput"},{"issue":"5","key":"7436_CR13","doi-asserted-by":"publisher","first-page":"4668","DOI":"10.1109\/TDSC.2024.3353540","volume":"21","author":"Z Zhang","year":"2024","unstructured":"Zhang Z, Lu X, Li M et al (2024) A blockchain-based privacy-preserving scheme for sealed-bid auction. IEEE Trans Depend Secur Comput 21(5):4668\u20134683. https:\/\/doi.org\/10.1109\/TDSC.2024.3353540","journal-title":"IEEE Trans Depend Secur Comput"},{"key":"7436_CR14","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109859","volume":"121","author":"S Swain","year":"2025","unstructured":"Swain S, Chouhan V (2025) A smart contract solution for transparent auctions on permissioned blockchain platform. Comput Electr Eng 121:109859. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109859","journal-title":"Comput Electr Eng"},{"issue":"06","key":"7436_CR15","doi-asserted-by":"publisher","first-page":"487","DOI":"10.13868\/j.cnki.jcr.000095","volume":"2","author":"J Lin","year":"2015","unstructured":"Lin J, Jing J, Zhang Q et al (2015) Recent research on PKI technologyis summarized. J Cryptol Res 2(06):487\u2013496. https:\/\/doi.org\/10.13868\/j.cnki.jcr.000095","journal-title":"J Cryptol Res"},{"key":"7436_CR16","doi-asserted-by":"publisher","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology \u2013 EUROCRYPT 2005, Springer, pp 457\u2013473. https:\/\/doi.org\/10.1007\/11426639_27","DOI":"10.1007\/11426639_27"},{"key":"7436_CR17","doi-asserted-by":"publisher","unstructured":"Goyal V, Pandey O, Sahai A, et\u00a0al. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In: Proceedings of the 13th ACM Conference on Computer and Communications Security. Association for Computing Machinery, pp 89-98. https:\/\/doi.org\/10.1145\/1180405.1180418","DOI":"10.1145\/1180405.1180418"},{"key":"7436_CR18","doi-asserted-by":"publisher","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), IEEE, pp 321\u2013334. https:\/\/doi.org\/10.1109\/SP.2007.11","DOI":"10.1109\/SP.2007.11"},{"issue":"1","key":"7436_CR19","first-page":"192","volume":"49","author":"L Chen","year":"2021","unstructured":"Chen L, Xiang F, Sun Z (2021) Research progress of blockchainsecurity technology based on attribute cryptosystem. Acta Electronica Sinica 49(1):192\u2013200","journal-title":"Acta Electronica Sinica"},{"key":"7436_CR20","doi-asserted-by":"publisher","unstructured":"Ma W, Ma J, Zhang Q, et\u00a0al. (2020) Attribute revocable data sharing scheme based on blockchain and cp-abe. In: Proceedings of the 4th International Conference on Computer Science and Application Engineering. Association for Computing Machinery, pp 1\u20137. https:\/\/doi.org\/10.1145\/3424978.3425019","DOI":"10.1145\/3424978.3425019"},{"key":"7436_CR21","doi-asserted-by":"publisher","first-page":"4132597","DOI":"10.1155\/2021\/4132597","volume":"1","author":"Y Ba","year":"2021","unstructured":"Ba Y, Hu X, Chen Y et al (2021) A blockchain-based CP-ABE scheme with partially hidden access structures. Secur Commun Netw 1:4132597. https:\/\/doi.org\/10.1155\/2021\/4132597","journal-title":"Secur Commun Netw"},{"key":"7436_CR22","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02922-6","author":"W Zhang","year":"2022","unstructured":"Zhang W, Zhang Z, Xiong H et al (2022) PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system. J Ambient Intell Human Comput. https:\/\/doi.org\/10.1007\/s12652-021-02922-6","journal-title":"J Ambient Intell Human Comput"},{"issue":"9","key":"7436_CR23","doi-asserted-by":"publisher","first-page":"4384","DOI":"10.3390\/s23094384","volume":"23","author":"H Ma","year":"2023","unstructured":"Ma H, Zhou D, Li P et al (2023) EVOAC-HP: An efficient and verifiable outsourced access control scheme with hidden policy. Sensors 23(9):4384. https:\/\/doi.org\/10.3390\/s23094384","journal-title":"Sensors"},{"key":"7436_CR24","doi-asserted-by":"publisher","DOI":"10.3390\/s23198038","author":"R Hu","year":"2023","unstructured":"Hu R, Ma Z, Li L et al (2023) An access control scheme based on blockchain and ciphertext policy-attribute based encryption. Sensors. https:\/\/doi.org\/10.3390\/s23198038","journal-title":"Sensors"},{"key":"7436_CR25","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103696","volume":"84","author":"H Wang","year":"2023","unstructured":"Wang H, Liang J, Ding Y et al (2023) Ciphertext-policy attribute-based encryption supporting policy-hiding and cloud auditing in smart health. Comput Stand Interfaces 84:103696. https:\/\/doi.org\/10.1016\/j.csi.2022.103696","journal-title":"Comput Stand Interfaces"},{"key":"7436_CR26","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysarc.2023.102982","volume":"143","author":"J Xue","year":"2023","unstructured":"Xue J, Shi L, Zhang W et al (2023) Poly-ABE: A traceable and revocable fully hidden policy CP-ABE scheme for integrated demand response in multi-energy systems. J Syst Archit 143:102982. https:\/\/doi.org\/10.1016\/j.sysarc.2023.102982","journal-title":"J Syst Archit"},{"key":"7436_CR27","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2024.103936","volume":"92","author":"Y Dai","year":"2025","unstructured":"Dai Y, Xue L, Yang B et al (2025) A traceable and revocable decentralized attribute-based encryption scheme with fully hidden access policy for cloud-based smart healthcare. Comput Stand Interfaces 92:103936. https:\/\/doi.org\/10.1016\/j.csi.2024.103936","journal-title":"Comput Stand Interfaces"},{"key":"7436_CR28","doi-asserted-by":"publisher","first-page":"36924","DOI":"10.1109\/ACCESS.2024.3370155","volume":"12","author":"CL Chen","year":"2024","unstructured":"Chen CL, Zhan WB, Tsaur WJ et al (2024) Constructing a secure charity NFT auction platform using Fisco Bcos blockchain for enhancing transparency and traceability. IEEE Access 12:36924\u201336941. https:\/\/doi.org\/10.1109\/ACCESS.2024.3370155","journal-title":"IEEE Access"},{"key":"7436_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.jclepro.2023.140285","volume":"436","author":"S Yu","year":"2024","unstructured":"Yu S, Wei Z, Sun G et al (2024) A double auction mechanism for virtual power plants based on blockchain sharding consensus and privacy preservation. J Clean Prod 436:140285","journal-title":"J Clean Prod"},{"issue":"3","key":"7436_CR30","doi-asserted-by":"publisher","first-page":"82","DOI":"10.23919\/PCMP.2023.000038","volume":"9","author":"S Cui","year":"2024","unstructured":"Cui S, Xu S, Hu F et al (2024) A consortium blockchain-enabled double auction mechanism for peer-to-peer energy trading among prosumers. Protect Control Mod Power Syst 9(3):82\u201397. https:\/\/doi.org\/10.23919\/PCMP.2023.000038","journal-title":"Protect Control Mod Power Syst"},{"issue":"13","key":"7436_CR31","doi-asserted-by":"publisher","first-page":"13909","DOI":"10.1007\/s11227-023-05155-w","volume":"79","author":"Z Ye","year":"2023","unstructured":"Ye Z, Chen CL, Weng W et al (2023) An anonymous and fair auction system based on blockchain. J Supercomput 79(13):13909\u201313951","journal-title":"J Supercomput"},{"key":"7436_CR32","doi-asserted-by":"publisher","first-page":"2370","DOI":"10.1109\/TIFS.2024.3350330","volume":"19","author":"H Dou","year":"2024","unstructured":"Dou H, Dan Z, Xu P et al (2024) Dynamic searchable symmetric encryption with strong security and robustness. IEEE Trans Inf Forensics Secur 19:2370\u20132384","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"4","key":"7436_CR33","doi-asserted-by":"publisher","DOI":"10.3788\/COL202422.040602","volume":"22","author":"L Jiang","year":"2024","unstructured":"Jiang L, Liu B, Ren J et al (2024) High-security multi-constellation shaping modulation with asymmetric encryption. Chin Opt Lett 22(4):040602","journal-title":"Chin Opt Lett"},{"key":"7436_CR34","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2024.100689","volume":"55","author":"W Liu","year":"2025","unstructured":"Liu W, You L, Shao Y et al (2025) From accuracy to approximation: a survey on approximate homomorphic encryption and its applications. Comput Sci Rev 55:100689","journal-title":"Comput Sci Rev"},{"issue":"1","key":"7436_CR35","doi-asserted-by":"publisher","first-page":"5974","DOI":"10.1038\/s41598-025-89597-7","volume":"15","author":"S Mo","year":"2025","unstructured":"Mo S, Feng W, Huang M et al (2025) Two-factor authentication for intellectual property transactions based on improved zero-knowledge proof. Sci Rep 15(1):5974","journal-title":"Sci Rep"},{"issue":"1","key":"7436_CR36","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3638763","volume":"27","author":"L Chen","year":"2024","unstructured":"Chen L, Dong C, Newton CJ et al (2024) Sphinx-in-the-head: group signatures from symmetric primitives. ACM Trans Privacy Secur 27(1):1\u201335","journal-title":"ACM Trans Privacy Secur"},{"issue":"3","key":"7436_CR37","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s00145-024-09505-6","volume":"37","author":"V Shoup","year":"2024","unstructured":"Shoup V, Smart NP (2024) Lightweight asynchronous verifiable secret sharing with optimal resilience. J Cryptol 37(3):27","journal-title":"J Cryptol"},{"key":"7436_CR38","doi-asserted-by":"publisher","unstructured":"Blass EO, Kerschbaum F (2018) Strain: A secure auction for blockchains. In: Computer Security - ESORICS 2018. Springer International Publishing, pp 87\u2013110. https:\/\/doi.org\/10.1007\/978-3-319-99073-6_5","DOI":"10.1007\/978-3-319-99073-6_5"},{"issue":"03","key":"7436_CR39","doi-asserted-by":"publisher","first-page":"491","DOI":"10.13868\/j.cnki.jcr.000607","volume":"10","author":"X Liu","year":"2023","unstructured":"Liu X, Yang D, Qiu Q et al (2023) Sealed bidding auction with no trusted auctioneer on blockchain. J Cryptol Res 10(03):491\u2013505. https:\/\/doi.org\/10.13868\/j.cnki.jcr.000607","journal-title":"J Cryptol Res"},{"issue":"1","key":"7436_CR40","doi-asserted-by":"publisher","first-page":"01","DOI":"10.5121\/ijait.2019.9101","volume":"9","author":"J Xiong","year":"2019","unstructured":"Xiong J, Wang Q (2019) Anonymous auction protocol based on time-released encryption atop consortium blockchain. Int J Adv Inf Technol 9(1):01\u201316. https:\/\/doi.org\/10.5121\/ijait.2019.9101","journal-title":"Int J Adv Inf Technol"},{"key":"7436_CR41","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3468018","author":"J Li","year":"2025","unstructured":"Li J, Zhang E, Han J et al (2025) PH-MG-ABE: A flexible policy-hidden multi-group attribute-based encryption scheme for secure cloud storage. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3468018","journal-title":"IEEE Internet Things J"},{"issue":"3","key":"7436_CR42","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2024.101969","volume":"36","author":"Z Ren","year":"2024","unstructured":"Ren Z, Yan E, Chen T et al (2024) Blockchain-based CP-ABE data sharing and privacy-preserving scheme using distributed KMS and zero-knowledge proof. J King Saud Univ Comput Inf Sci 36(3):101969. https:\/\/doi.org\/10.1016\/j.jksuci.2024.101969","journal-title":"J King Saud Univ Comput Inf Sci"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07436-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11227-025-07436-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-025-07436-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T06:12:52Z","timestamp":1748499172000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11227-025-07436-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,29]]},"references-count":42,"journal-issue":{"issue":"8","published-online":{"date-parts":[[2025,6]]}},"alternative-id":["7436"],"URL":"https:\/\/doi.org\/10.1007\/s11227-025-07436-y","relation":{},"ISSN":["1573-0484"],"issn-type":[{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,29]]},"assertion":[{"value":"11 May 2025","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 May 2025","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors have no relevant financial or non-financial interests to disclose.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"914"}}