{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,16]],"date-time":"2025-07-16T12:57:08Z","timestamp":1752670628987,"version":"3.37.3"},"reference-count":53,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:00:00Z","timestamp":1649030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T00:00:00Z","timestamp":1649030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2022,5]]},"DOI":"10.1007\/s12083-022-01319-2","type":"journal-article","created":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T05:02:52Z","timestamp":1649048572000},"page":"1733-1756","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":22,"title":["BCAV: Blockchain-based certificateless authentication system for vehicular network"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-2302","authenticated-orcid":false,"given":"Ashish","family":"Tomar","sequence":"first","affiliation":[]},{"given":"Sachin","family":"Tripathi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,4]]},"reference":[{"issue":"2","key":"1319_CR1","doi-asserted-by":"publisher","first-page":"760","DOI":"10.1109\/TITS.2018.2818888","volume":"20","author":"Z Lu","year":"2018","unstructured":"Lu Z, Qu G, Liu Z (2018) A survey on recent advances in vehicular network security, trust, and privacy. IEEE Trans Intell Transp Syst 20(2):760\u2013776","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"6","key":"1319_CR2","doi-asserted-by":"publisher","first-page":"4207","DOI":"10.1007\/s11276-020-02325-z","volume":"26","author":"N Malik","year":"2020","unstructured":"Malik N, Nanda P, He X, Liu RP (2020) Vehicular networks with security and trust management solutions: proposed secured message exchange via blockchain technology. Wireless Netw 26(6):4207\u20134226","journal-title":"Wireless Netw"},{"key":"1319_CR3","doi-asserted-by":"publisher","first-page":"653","DOI":"10.32604\/cmc.2020.011264","volume":"65","author":"L Fei","year":"2020","unstructured":"Fei L, Jiayan Z, Jiaqi S, Szczerbicki E (2020) Deep Learning-Based Int","journal-title":"CMC-Computers Materials & Continua"},{"issue":"2","key":"1319_CR4","first-page":"393","volume":"21","author":"J Wang","year":"2020","unstructured":"Wang J, Yang Y, Wang T, Sherratt RS, Zhang J (2020) Big data service architecture: a survey. J Int Tech 21(2):393\u2013405","journal-title":"J Int Tech"},{"issue":"5","key":"1319_CR5","doi-asserted-by":"publisher","first-page":"1621","DOI":"10.1109\/TITS.2018.2827460","volume":"20","author":"J Cui","year":"2018","unstructured":"Cui J, Wei L, Zhang J, Xu Y, Zhong H (2018) An efficient message-authentication scheme based on edge computing for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 20(5):1621\u20131632","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1319_CR6","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1016\/j.adhoc.2016.02.017","volume":"44","author":"F Cunha","year":"2016","unstructured":"Cunha F, Villas L, Boukerche A, Maia G, Viana A, Mini RA, Loureiro AA (2016) Data communication in VANETs: Protocols, applications and challenges. Ad Hoc Netw 44:90\u2013103","journal-title":"Ad Hoc Netw"},{"issue":"12","key":"1319_CR7","doi-asserted-by":"publisher","first-page":"7408","DOI":"10.1109\/TITS.2020.3002096","volume":"22","author":"C Lin","year":"2021","unstructured":"Lin C, He D, Huang X, Kumar N, Choo K-KR (2021) BCPPA: A Blockchain-Based Conditional Privacy-Preserving Authentication Protocol for Vehicular Ad Hoc Networks. IEEE Trans Int Trans Syst 22(12):7408\u20137420","journal-title":"IEEE Trans Int Trans Syst"},{"key":"1319_CR8","doi-asserted-by":"crossref","unstructured":"Al-Riyami SS, Paterson KG (2003) Certificateless public key cryptography. In International conference on the theory and application of cryptology and information security (pp. 452-473). Springer, Berlin, Heidelberg","DOI":"10.1007\/978-3-540-40061-5_29"},{"issue":"3","key":"1319_CR9","doi-asserted-by":"publisher","first-page":"2972","DOI":"10.1109\/TVT.2019.2896018","volume":"68","author":"J Cui","year":"2019","unstructured":"Cui J, Wu D, Zhang J, Xu Y, Zhong H (2019) An efficient authentication scheme based on semi-trusted authority in VANETs. IEEE Trans Veh Technol 68(3):2972\u20132986","journal-title":"IEEE Trans Veh Technol"},{"key":"1319_CR10","unstructured":"Nakamoto S (2019) Bitcoin: A peer-to-peer electronic cash system. Manubot"},{"issue":"3","key":"1319_CR11","doi-asserted-by":"publisher","first-page":"2365","DOI":"10.32604\/cmc.2020.011567","volume":"65","author":"J Wang","year":"2020","unstructured":"Wang J, Chen W, Wang L, Sherratt RS, Alfarraj O, Tolba A (2020) Data secure storage mechanism of sensor networks based on blockchain. CMC-Computers Materials & Continua 65(3):2365\u20132384","journal-title":"CMC-Computers Materials & Continua"},{"key":"1319_CR12","doi-asserted-by":"crossref","unstructured":"Chaudhary B, Singh K (2021) A Blockchain enabled location-privacy preserving scheme for vehicular ad-hoc networks. Peer-to-Peer Networking and Applications, 1\u201315","DOI":"10.1007\/s12083-021-01079-5"},{"issue":"3","key":"1319_CR13","doi-asserted-by":"publisher","first-page":"521","DOI":"10.32604\/csse.2021.014530","volume":"36","author":"J Zhang","year":"2021","unstructured":"Zhang J, Zhong S, Wang J, Yu X, Alfarraj O (2021) A storage optimization scheme for blockchain transaction databases. Comp Syst Sci Eng 36(3):521\u2013535","journal-title":"Comp Syst Sci Eng"},{"issue":"1","key":"1319_CR14","doi-asserted-by":"publisher","first-page":"39","DOI":"10.3233\/JCS-2007-15103","volume":"15","author":"M Raya","year":"2007","unstructured":"Raya M, Hubaux JP (2007) Securing vehicular ad hoc networks. J Comput Secur 15(1):39\u201368","journal-title":"J Comput Secur"},{"key":"1319_CR15","doi-asserted-by":"crossref","unstructured":"Lu R, Lin X, Zhu H, Ho PH, Shen X (2008) ECPP: Efficient conditional privacy preservation protocol for secure vehicular communications. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications (pp. 1229-1237). IEEE","DOI":"10.1109\/INFOCOM.2008.179"},{"issue":"9","key":"1319_CR16","doi-asserted-by":"publisher","first-page":"2467","DOI":"10.1109\/TITS.2016.2634623","volume":"18","author":"M Azees","year":"2017","unstructured":"Azees M, Vijayakumar P, Deboarh LJ (2017) EAAP: Efficient anonymous authentication with conditional privacy-preserving scheme for vehicular ad hoc networks. IEEE Trans Intell Transp Syst 18(9):2467\u20132476","journal-title":"IEEE Trans Intell Transp Syst"},{"key":"1319_CR17","doi-asserted-by":"crossref","unstructured":"Asghar M, Doss RRM, Pan L (2018) A scalable and efficient PKI based authentication protocol for VANETs. In 2018 28th International Telecommunication Networks and Applications Conference (ITNAC) (pp. 1-3). IEEE","DOI":"10.1109\/ATNAC.2018.8615224"},{"key":"1319_CR18","doi-asserted-by":"crossref","unstructured":"Zhang C, Lu R, Lin X, Ho PH, Shen X (2008) An efficient identity-based batch verification scheme for vehicular sensor networks. In IEEE INFOCOM 2008-The 27th Conference on Computer Communications (pp. 246-250). IEEE","DOI":"10.1109\/INFOCOM.2008.58"},{"issue":"9","key":"1319_CR19","doi-asserted-by":"publisher","first-page":"1227","DOI":"10.1109\/TPDS.2010.14","volume":"21","author":"J Sun","year":"2010","unstructured":"Sun J, Zhang C, Zhang Y, Fang Y (2010) An identity-based security system for user privacy in vehicular ad hoc networks. IEEE Trans Parallel Distrib Syst 21(9):1227\u20131239","journal-title":"IEEE Trans Parallel Distrib Syst"},{"issue":"8","key":"1319_CR20","doi-asserted-by":"publisher","first-page":"1851","DOI":"10.1007\/s11276-011-0383-2","volume":"17","author":"C Zhang","year":"2011","unstructured":"Zhang C, Ho PH, Tapolcai J (2011) On batch verification with group testing for vehicular communications. Wireless Netw 17(8):1851\u20131865","journal-title":"Wireless Netw"},{"issue":"6","key":"1319_CR21","doi-asserted-by":"publisher","first-page":"1441","DOI":"10.1007\/s11276-013-0543-7","volume":"19","author":"CC Lee","year":"2013","unstructured":"Lee CC, Lai YM (2013) Toward a secure batch verification with group testing for VANET. Wireless Netw 19(6):1441\u20131449","journal-title":"Wireless Netw"},{"issue":"12","key":"1319_CR22","doi-asserted-by":"publisher","first-page":"2681","DOI":"10.1109\/TIFS.2015.2473820","volume":"10","author":"D He","year":"2015","unstructured":"He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Trans Inf Forensics Secur 10(12):2681\u20132691","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"6","key":"1319_CR23","doi-asserted-by":"publisher","first-page":"4146","DOI":"10.1109\/TII.2019.2948053","volume":"16","author":"Q Feng","year":"2019","unstructured":"Feng Q, He D, Zeadally S, Liang K (2019) BPAS: Blockchain-assisted privacy-preserving authentication system for vehicular ad hoc networks. IEEE Trans Industr Inf 16(6):4146\u20134155","journal-title":"IEEE Trans Industr Inf"},{"issue":"5","key":"1319_CR24","doi-asserted-by":"publisher","first-page":"1733","DOI":"10.1007\/s11276-014-0881-0","volume":"21","author":"M Bayat","year":"2015","unstructured":"Bayat M, Barmshoory M, Rahimi M, Aref MR (2015) A secure authentication scheme for VANETs with batch verification. Wireless Netw 21(5):1733\u20131743","journal-title":"Wireless Netw"},{"issue":"3","key":"1319_CR25","doi-asserted-by":"publisher","first-page":"516","DOI":"10.1109\/TITS.2016.2579162","volume":"18","author":"L Zhang","year":"2016","unstructured":"Zhang L, Wu Q, Domingo-Ferrer J, Qin B, Hu C (2016) Distributed aggregate privacy-preserving authentication in VANETs. IEEE Trans Intell Transp Syst 18(3):516\u2013526","journal-title":"IEEE Trans Intell Transp Syst"},{"issue":"4","key":"1319_CR26","doi-asserted-by":"publisher","first-page":"5373","DOI":"10.1109\/JSYST.2020.2977670","volume":"14","author":"Y Wang","year":"2020","unstructured":"Wang Y, Zhong H, Xu Y, Cui J, Wu G (2020) Enhanced security identity-based privacy-preserving authentication scheme supporting revocation for vanets. IEEE Syst J 14(4):5373\u20135383","journal-title":"IEEE Syst J"},{"key":"1319_CR27","unstructured":"Deng H, Qin Z, Wu Q, Guan Z, Yin H (2020) Revocable Attribute-based Data Storage in Mobile Clouds. IEEE Trans Serv Comput"},{"key":"1319_CR28","doi-asserted-by":"publisher","first-page":"3168","DOI":"10.1109\/TIFS.2020.2985532","volume":"15","author":"H Deng","year":"2020","unstructured":"Deng H, Qin Z, Wu Q, Guan Z, Deng RH, Wang Y, Zhou Y (2020) Identity-based encryption transformation for flexible sharing of encrypted data in public cloud. IEEE Trans Inf Forensics Secur 15:3168\u20133180","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"5","key":"1319_CR29","doi-asserted-by":"publisher","first-page":"1600","DOI":"10.1007\/s12083-020-00916-3","volume":"13","author":"S Wang","year":"2020","unstructured":"Wang S, Mao K, Zhan F, Liu D (2020) Hybrid conditional privacy-preserving authentication scheme for VANETs. Peer-to-Peer Netw Appl 13(5):1600\u20131615","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1319_CR30","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1016\/j.ins.2015.04.033","volume":"317","author":"SJ Horng","year":"2015","unstructured":"Horng SJ, Tzeng SF, Huang PH, Wang X, Li T, Khan MK (2015) An efficient certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. Inf Sci 317:48\u201366","journal-title":"Inf Sci"},{"key":"1319_CR31","doi-asserted-by":"crossref","unstructured":"Li J, Yuan H, Zhang Y (2015) Cryptanalysis and improvement of certificateless aggregate signature with conditional privacy-preserving for vehicular sensor networks. networks, 317, 48-66","DOI":"10.1016\/j.ins.2015.04.033"},{"issue":"1","key":"1319_CR32","doi-asserted-by":"publisher","first-page":"249","DOI":"10.32604\/cmc.2019.04088","volume":"58","author":"X Wang","year":"2019","unstructured":"Wang X, Jiang J, Zhao S, Bai L (2019) A fair blind signature scheme to revoke malicious vehicles in VANETs. Comput Mater Continua 58(1):249\u2013262","journal-title":"Comput Mater Continua"},{"issue":"2","key":"1319_CR33","first-page":"725","volume":"63","author":"L Cui","year":"2020","unstructured":"Cui L, Gang W, Xiaofeng S, Feng Z, Liang Z (2020) An efficient certificateless aggregate signature scheme designed for VANET. Comp Mat Continua 63(2):725\u2013742","journal-title":"Comp Mat Continua"},{"issue":"8","key":"1319_CR34","doi-asserted-by":"publisher","first-page":"2500","DOI":"10.1016\/j.adhoc.2013.05.015","volume":"11","author":"Q Wang","year":"2013","unstructured":"Wang Q, Chen H, Xie L, Wang K (2013) One-way hash chain-based self-healing group key distribution scheme with collusion resistance capability in wireless sensor networks. Ad Hoc Netw 11(8):2500\u20132511","journal-title":"Ad Hoc Netw"},{"key":"1319_CR35","doi-asserted-by":"crossref","unstructured":"Lu Z, Wang Q, Qu G, Zhang H, Liu Z (2019) A blockchain-based privacy-preserving authentication scheme for vanets. IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 27(12), 2792-2801","DOI":"10.1109\/TVLSI.2019.2929420"},{"key":"1319_CR36","doi-asserted-by":"publisher","first-page":"117716","DOI":"10.1109\/ACCESS.2019.2936575","volume":"7","author":"D Zheng","year":"2019","unstructured":"Zheng D, Jing C, Guo R, Gao S, Wang L (2019) A traceable blockchain-based access authentication system with privacy preservation in VANETs. IEEE Access 7:117716\u2013117726","journal-title":"IEEE Access"},{"key":"1319_CR37","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.jpdc.2020.11.003","volume":"149","author":"Z Xu","year":"2021","unstructured":"Xu Z, Liang W, Li KC, Xu J, Jin H (2021) A blockchain-based roadside unit-assisted authentication and key agreement protocol for internet of vehicles. J Parallel Dist Comput 149:29\u201339","journal-title":"J Parallel Dist Comput"},{"issue":"3","key":"1319_CR38","doi-asserted-by":"publisher","first-page":"1386","DOI":"10.1109\/TETC.2020.2978866","volume":"9","author":"C Wang","year":"2021","unstructured":"Wang C, Shen J, Lai J-F, Liu J (2021) B-TSCA: Blockchain Assisted Trustworthiness Scalable Computation for V2I Authentication in VANETs. IEEE Trans Emerg Topics Comput 9(3):1386\u20131396","journal-title":"IEEE Trans Emerg Topics Comput"},{"key":"1319_CR39","doi-asserted-by":"crossref","unstructured":"Ren Y, Li X, Sun SF, Yuan X, Zhang X (2021) Privacy-preserving batch verification signature scheme based on blockchain for Vehicular Ad-Hoc Networks. J Info Sec Appl 58:102698","DOI":"10.1016\/j.jisa.2020.102698"},{"issue":"1","key":"1319_CR40","first-page":"1","volume":"21","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhong S, Wang T, Chao HC, Wang J (2020) Blockchain-based systems and applications: a survey. J Int Tech 21(1):1\u201314","journal-title":"J Int Tech"},{"key":"1319_CR41","doi-asserted-by":"crossref","unstructured":"Bagga P, Sutrala AK, Das AK, Vijayakumar P (2021) Blockchain-based batch authentication protocol for Internet of Vehicles. J Syst Architect 113:101877","DOI":"10.1016\/j.sysarc.2020.101877"},{"issue":"11","key":"1319_CR42","doi-asserted-by":"publisher","first-page":"10283","DOI":"10.1109\/TVT.2017.2718101","volume":"66","author":"J Cui","year":"2017","unstructured":"Cui J, Zhang J, Zhong H, Xu Y (2017) SPACF: A secure privacy-preserving authentication scheme for VANET with cuckoo filter. IEEE Trans Veh Technol 66(11):10283\u201310295","journal-title":"IEEE Trans Veh Technol"},{"issue":"1","key":"1319_CR43","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1109\/TVT.2010.2089544","volume":"60","author":"JL Huang","year":"2010","unstructured":"Huang JL, Yeh LY, Chien HY (2010) ABAKA: An anonymous batch authenticated and key agreement scheme for value-added services in vehicular ad hoc networks. IEEE Trans Veh Technol 60(1):248\u2013262","journal-title":"IEEE Trans Veh Technol"},{"key":"1319_CR44","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/j.ins.2018.10.021","volume":"476","author":"H Zhong","year":"2019","unstructured":"Zhong H, Han S, Cui J, Zhang J, Xu Y (2019) Privacy-preserving authentication scheme with full aggregation in VANET. Inf Sci 476:211\u2013221","journal-title":"Inf Sci"},{"key":"1319_CR45","doi-asserted-by":"crossref","unstructured":"Ali I, Gervais M, Ahene E, Li F (2019) A blockchain-based certificateless public key signature scheme for vehicle-to-infrastructure communication in VANETs. J Syst Architect 99:101636","DOI":"10.1016\/j.sysarc.2019.101636"},{"issue":"1","key":"1319_CR46","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1109\/JSYST.2020.2966526","volume":"15","author":"Q Mei","year":"2020","unstructured":"Mei Q, Xiong H, Chen J, Yang M, Kumari S, Khan MK (2020) Efficient certificateless aggregate signature with conditional privacy preservation in IoV. IEEE Syst J 15(1):245\u2013256","journal-title":"IEEE Syst J"},{"key":"1319_CR47","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1016\/j.adhoc.2018.01.001","volume":"71","author":"X Jia","year":"2018","unstructured":"Jia X, He D, Liu Q, Choo KKR (2018) An efficient provably-secure certificateless signature scheme for Internet-of-Things deployment. Ad Hoc Netw 71:78\u201387","journal-title":"Ad Hoc Netw"},{"issue":"5","key":"1319_CR48","doi-asserted-by":"publisher","first-page":"9064","DOI":"10.1109\/JIOT.2019.2927089","volume":"6","author":"NB Gayathri","year":"2019","unstructured":"Gayathri NB, Thumbur G, Kumar PR, Rahman MZU, Reddy PV (2019) Efficient and secure pairing-free certificateless aggregate signature scheme for healthcare wireless medical sensor networks. IEEE Internet Things J 6(5):9064\u20139075","journal-title":"IEEE Internet Things J"},{"key":"1319_CR49","doi-asserted-by":"crossref","unstructured":"Pointcheval D, Stern J (1996) Security proofs for signature schemes. In International Conference on the Theory and Applications of Cryptographic Techniques (pp. 387-398). Springer, Berlin, Heidelberg","DOI":"10.1007\/3-540-68339-9_33"},{"key":"1319_CR50","unstructured":"Crypto++ Library 8.4 | Free C++ Class Library of Cryptographic Schemes (2021)\u00a0https:\/\/www.cryptopp.com\/. Accessed 2 Mar 2021"},{"key":"1319_CR51","unstructured":"PBC Library - Pairing-Based Cryptography - About (2021)\u00a0https:\/\/crypto.stanford.edu\/pbc\/. Accessed 2 Mar 2021"},{"issue":"3","key":"1319_CR52","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/s12243-020-00751-w","volume":"75","author":"GR Carrara","year":"2020","unstructured":"Carrara GR, Burle LM, Medeiros DS, de Albuquerque CVN, Mattos DM (2020) Consistency, availability, and partition tolerance in blockchain: a survey on the consensus mechanism over peer-to-peer networking. Ann Telecommun 75(3):163\u2013174","journal-title":"Ann Telecommun"},{"issue":"2","key":"1319_CR53","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1016\/j.icte.2019.08.001","volume":"6","author":"S Zhang","year":"2020","unstructured":"Zhang S, Lee JH (2020) Analysis of the main consensus protocols of blockchain. ICT express 6(2):93\u201397","journal-title":"ICT express"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01319-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-022-01319-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-022-01319-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,26]],"date-time":"2022-04-26T07:59:37Z","timestamp":1650959977000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-022-01319-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,4]]},"references-count":53,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,5]]}},"alternative-id":["1319"],"URL":"https:\/\/doi.org\/10.1007\/s12083-022-01319-2","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2022,4,4]]},"assertion":[{"value":"7 September 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 March 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"We have no conflict of interest to declare that are relevant to the content of this article.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflicts of interests"}}]}}