{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T15:30:55Z","timestamp":1773156655372,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T00:00:00Z","timestamp":1732579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Innovation Program of Shanghai Municipal Education Commission","award":["2021-01-07-00-08-E00101"],"award-info":[{"award-number":["2021-01-07-00-08-E00101"]}]},{"name":"Innovation Program of Shanghai Municipal Education Commission","award":["2021-01-07-00-08-E00101"],"award-info":[{"award-number":["2021-01-07-00-08-E00101"]}]},{"name":"\"Digital Silk Road\" Shanghai International Joint Lab of Trustworthy Intelligent Software","award":["22510750100"],"award-info":[{"award-number":["22510750100"]}]},{"name":"\"Digital Silk Road\" Shanghai International Joint Lab of Trustworthy Intelligent Software","award":["22510750100"],"award-info":[{"award-number":["22510750100"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,1]]},"DOI":"10.1007\/s12083-024-01866-w","type":"journal-article","created":{"date-parts":[[2024,11,26]],"date-time":"2024-11-26T09:28:28Z","timestamp":1732613308000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A scalable identity management scheme via blockchain: Identity protection and traceability"],"prefix":"10.1007","volume":"18","author":[{"given":"Biao","family":"Ma","sequence":"first","affiliation":[]},{"given":"Haifeng","family":"Qian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,11,26]]},"reference":[{"issue":"3","key":"1866_CR1","doi-asserted-by":"publisher","first-page":"1817","DOI":"10.1109\/JIOT.2020.3017377","volume":"8","author":"Y Zhao","year":"2020","unstructured":"Zhao Y, Zhao J, Jiang L, Tan R, Niyato D, Li Z, Lyu L, Liu Y (2020) Privacy-preserving blockchain-based federated learning for iot devices. IEEE Internet of Things Journal. 8(3):1817\u20131829","journal-title":"IEEE Internet of Things Journal."},{"key":"1866_CR2","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.ins.2015.03.070","volume":"321","author":"D Wang","year":"2015","unstructured":"Wang D, Wang N, Wang P, Qing S (2015) Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences. 321:162\u2013178","journal-title":"Information Sciences."},{"key":"1866_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102731","volume":"166","author":"Y Liu","year":"2020","unstructured":"Liu Y, He D, Obaidat MS, Kumar N, Khan MK, Choo K-KR (2020) Blockchain-based identity management systems: A review. Journal of network and computer applications. 166:102731","journal-title":"Journal of network and computer applications."},{"key":"1866_CR4","doi-asserted-by":"publisher","first-page":"17","DOI":"10.3389\/fbloc.2019.00017","volume":"2","author":"G Goodell","year":"2019","unstructured":"Goodell G, Aste T (2019) A decentralized digital identity architecture. Frontiers in Blockchain. 2:17","journal-title":"Frontiers in Blockchain."},{"key":"1866_CR5","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. Decentralized business review"},{"issue":"1","key":"1866_CR6","doi-asserted-by":"publisher","first-page":"2","DOI":"10.3390\/logistics2010002","volume":"2","author":"K Francisco","year":"2018","unstructured":"Francisco K, Swanson D (2018) The supply chain has no clothes: Technology adoption of blockchain for supply chain transparency. Logistics. 2(1):2","journal-title":"Logistics."},{"issue":"7","key":"1866_CR7","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1080\/00207543.2018.1533261","volume":"57","author":"S Saberi","year":"2019","unstructured":"Saberi S, Kouhizadeh M, Sarkis J, Shen L (2019) Blockchain technology and its relationships to sustainable supply chain management. International journal of production research. 57(7):2117\u20132135","journal-title":"International journal of production research."},{"issue":"11","key":"1866_CR8","doi-asserted-by":"publisher","first-page":"7669","DOI":"10.1109\/TII.2021.3049141","volume":"17","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Aloqaily M, Yang H, Jararweh Y (2021) Blockchain-enhanced data sharing with traceable and direct revocation in iiot. IEEE transactions on industrial informatics. 17(11):7669\u20137678","journal-title":"IEEE transactions on industrial informatics."},{"issue":"10","key":"1866_CR9","doi-asserted-by":"publisher","first-page":"7059","DOI":"10.1109\/TII.2021.3084753","volume":"18","author":"W Wang","year":"2021","unstructured":"Wang W, Xu H, Alazab M, Gadekallu TR, Han Z, Su C (2021) Blockchain-based reliable and efficient certificateless signature for iiot devices. IEEE transactions on industrial informatics. 18(10):7059\u20137067","journal-title":"IEEE transactions on industrial informatics."},{"issue":"4","key":"1866_CR10","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MITP.2017.3051335","volume":"19","author":"N Kshetri","year":"2017","unstructured":"Kshetri N (2017) Can blockchain strengthen the internet of things? IT professional. 19(4):68\u201372","journal-title":"IT professional."},{"key":"1866_CR11","doi-asserted-by":"crossref","unstructured":"Qi X, Zhang Z, Jin C, Zhou A (2020) Bft-store: Storage partition for permissioned blockchain via erasure coding. In: 2020 IEEE 36th International Conference on Data Engineering (ICDE), pp. 1926\u20131929","DOI":"10.1109\/ICDE48307.2020.00205"},{"issue":"04","key":"1866_CR12","doi-asserted-by":"publisher","first-page":"4124","DOI":"10.1109\/TKDE.2021.3136556","volume":"35","author":"Z Du","year":"2023","unstructured":"Du Z, Pang X, Qian H (2023) Partitionchain: A scalable and reliable data storage strategy for permissioned blockchain. IEEE Transactions on Knowledge & Data Engineering. 35(04):4124\u20134136","journal-title":"IEEE Transactions on Knowledge & Data Engineering."},{"issue":"3","key":"1866_CR13","first-page":"608","volume":"17","author":"Y Zhang","year":"2018","unstructured":"Zhang Y, Yu J, Hao R, Wang C, Ren K (2018) Enabling efficient user revocation in identity-based cloud storage auditing for shared big data. IEEE Transactions on Dependable and Secure Computing. 17(3):608\u2013619","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"issue":"2","key":"1866_CR14","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MSP.2008.49","volume":"6","author":"R Dhamija","year":"2008","unstructured":"Dhamija R, Dusseault L (2008) The seven flaws of identity management: Usability and security challenges. IEEE Security & Privacy. 6(2):24\u201329","journal-title":"IEEE Security & Privacy."},{"key":"1866_CR15","doi-asserted-by":"publisher","first-page":"75302","DOI":"10.1109\/ACCESS.2018.2882870","volume":"6","author":"J Carretero","year":"2018","unstructured":"Carretero J, Izquierdo-Moreno G, Vasile-Cabezas M, Garcia-Blas J (2018) Federated identity architecture of the european eid system. IEEE access. 6:75302\u201375326","journal-title":"IEEE access."},{"issue":"2","key":"1866_CR16","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1504\/IJBC.2020.109004","volume":"1","author":"MM ElGayyar","year":"2020","unstructured":"ElGayyar MM, ElYamany HF, Grolinger K, Capretz MA, Mir S (2020) Blockchain-based federated identity and auditing. International Journal of Blockchains and Cryptocurrencies. 1(2):179\u2013205","journal-title":"International Journal of Blockchains and Cryptocurrencies."},{"issue":"2","key":"1866_CR17","doi-asserted-by":"publisher","first-page":"889","DOI":"10.1109\/TDSC.2019.2903802","volume":"18","author":"BC Singh","year":"2019","unstructured":"Singh BC, Carminati B, Ferrari E (2019) Privacy-aware personal data storage (p-pds): Learning how to protect user privacy from external applications. IEEE Transactions on Dependable and Secure Computing. 18(2):889\u2013903","journal-title":"IEEE Transactions on Dependable and Secure Computing."},{"key":"1866_CR18","doi-asserted-by":"crossref","unstructured":"Alboaie S, Cosovan D (2017) Private data system enabling self-sovereign storage managed by executable choreographies. In: 17th IFIP International Conference on Distributed Applications and Interoperable Systems (DAIS), pp. 83\u201398 . Springer","DOI":"10.1007\/978-3-319-59665-5_6"},{"key":"1866_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102050","volume":"99","author":"X Yang","year":"2020","unstructured":"Yang X, Li W (2020) A zero-knowledge-proof-based digital identity management scheme in blockchain. Computers & Security. 99:102050","journal-title":"Computers & Security."},{"key":"1866_CR20","doi-asserted-by":"crossref","unstructured":"Augot D, Chabanne H, Cl\u00e9mot O, George W (2017) Transforming face-to-face identity proofing into anonymous digital identity using the bitcoin blockchain. In: 2017 15th Annual Conference on Privacy, Security and Trust (PST), pp. 25\u20132509. IEEE","DOI":"10.1109\/PST.2017.00014"},{"key":"1866_CR21","doi-asserted-by":"publisher","DOI":"10.1109\/9780470546345","volume-title":"Reed-Solomon Codes and Their Applications","author":"SB Wicker","year":"1999","unstructured":"Wicker SB, Bhargava VK (1999) Reed-Solomon Codes and Their Applications. John Wiley & Sons, USA"},{"issue":"6","key":"1866_CR22","doi-asserted-by":"publisher","first-page":"1079","DOI":"10.1016\/j.comcom.2008.12.042","volume":"32","author":"L Zhang","year":"2009","unstructured":"Zhang L, Zhang F (2009) A new certificateless aggregate signature scheme. Computer Communications. 32(6):1079\u20131085","journal-title":"Computer Communications."},{"key":"1866_CR23","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s004460050050","volume":"11","author":"D Malkhi","year":"1998","unstructured":"Malkhi D, Reiter M (1998) Byzantine quorum systems. Distributed computing. 11:203\u2013213","journal-title":"Byzantine quorum systems. Distributed computing."},{"key":"1866_CR24","doi-asserted-by":"crossref","unstructured":"Lamport L, Shostak R, Pease M (2019) The byzantine generals problem. In: Concurrency: the Works of Leslie Lamport, pp. 203\u2013226","DOI":"10.1145\/3335772.3335936"},{"key":"1866_CR25","doi-asserted-by":"crossref","unstructured":"Almadhoun R, Kadadha M, Alhemeiri M, Alshehhi M, Salah K (2018) A user authentication scheme of iot devices using blockchain-enabled fog nodes. In: 2018 IEEE\/ACS 15th International Conference on Computer Systems and Applications (AICCSA), pp. 1\u20138. IEEE","DOI":"10.1109\/AICCSA.2018.8612856"},{"key":"1866_CR26","first-page":"1","volume":"2021","author":"S Gao","year":"2021","unstructured":"Gao S, Su Q, Zhang R, Zhu J, Sui Z, Wang J (2021) A privacy-preserving identity authentication scheme based on the blockchain. Security and Communication Networks. 2021:1\u201310","journal-title":"Security and Communication Networks."},{"key":"1866_CR27","doi-asserted-by":"crossref","unstructured":"He D, Zeadally S, Xu B, Huang X (2015) An efficient identity-based conditional privacy-preserving authentication scheme for vehicular ad hoc networks. IEEE Transactions on Information Forensics and Security. 10(12):2681\u20132691","DOI":"10.1109\/TIFS.2015.2473820"},{"issue":"2","key":"1866_CR28","first-page":"241","volume":"13","author":"Z Cui","year":"2020","unstructured":"Cui Z, Fei X, Zhang S, Cai X, Cao Y, Zhang W, Chen J (2020) A hybrid blockchain-based identity authentication scheme for multi-wsn. IEEE Transactions on Services Computing. 13(2):241\u2013251","journal-title":"IEEE Transactions on Services Computing."},{"key":"1866_CR29","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102050","volume":"99","author":"X Yang","year":"2020","unstructured":"Yang X, Li W (2020) A zero-knowledge-proof-based digital identity management scheme in blockchain. Computers & Security. 99:102050","journal-title":"Computers & Security."},{"key":"1866_CR30","doi-asserted-by":"crossref","unstructured":"Zhuang C, Dai Q, Zhang Y (2022) Bcppt: A blockchain-based privacy-preserving and traceability identity management scheme for intellectual property. Peer-to-Peer Networking and Applications. 15(1):724\u2013738","DOI":"10.1007\/s12083-021-01277-1"},{"key":"1866_CR31","unstructured":"Zhang G, Wang R (2019) Blockchain shard storage model based on threshold secret sharing. Journal of Computer Applications. 39(9):2617\u20132622"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01866-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-024-01866-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-024-01866-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T09:32:57Z","timestamp":1747474377000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-024-01866-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,26]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2025,1]]}},"alternative-id":["1866"],"URL":"https:\/\/doi.org\/10.1007\/s12083-024-01866-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,11,26]]},"assertion":[{"value":"21 November 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 September 2024","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 November 2024","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"This work does not involve any work related to ethics.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethics Approval"}},{"value":"All authors have no competing interests to declare that are relevant to the content of this article.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of Interest"}},{"value":"All the authors agree to publication in Peer-to-Peer Networking and Applications.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"18"}}