{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T04:13:15Z","timestamp":1746850395791,"version":"3.40.5"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T00:00:00Z","timestamp":1740441600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62102134","62172142"],"award-info":[{"award-number":["62102134","62172142"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Longmen Laboratory Frontier Exploration Project of Henan Province","award":["LMQYTSKT030","LMQYTSKT035"],"award-info":[{"award-number":["LMQYTSKT030","LMQYTSKT035"]}]},{"DOI":"10.13039\/501100002858","name":"China Postdoctoral Science Foundation","doi-asserted-by":"publisher","award":["2023M741041"],"award-info":[{"award-number":["2023M741041"]}],"id":[{"id":"10.13039\/501100002858","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Leading talents of science and technology in the Central Plain of China","award":["234200510018"],"award-info":[{"award-number":["234200510018"]}]},{"name":"Hainan Provincial Natural Science Foundation of China","award":["624QY578"],"award-info":[{"award-number":["624QY578"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,5]]},"DOI":"10.1007\/s12083-025-01913-0","type":"journal-article","created":{"date-parts":[[2025,2,25]],"date-time":"2025-02-25T06:29:21Z","timestamp":1740464961000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A ring signature scheme with linkability and traceability for blockchain-based medical data sharing system"],"prefix":"10.1007","volume":"18","author":[{"given":"Yalong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Muhua","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Ruijuan","family":"Zheng","sequence":"additional","affiliation":[]},{"given":"Qingtao","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Guo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,2,25]]},"reference":[{"issue":"24","key":"1913_CR1","doi-asserted-by":"publisher","first-page":"21377","DOI":"10.1109\/JIOT.2023.3287636","volume":"10","author":"J Liu","year":"2023","unstructured":"Liu J, Fan Y, Sun R, Liu L, Wu C, Mumtaz S (2023) Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system. IEEE Internet Things J 10(24):21377\u201321388. https:\/\/doi.org\/10.1109\/JIOT.2023.3287636","journal-title":"IEEE Internet Things J"},{"key":"1913_CR2","doi-asserted-by":"publisher","unstructured":"Azaria A, Ekblaw A, Vieira T, Lippman A (2016) Medrec: Using blockchain for medical data access and permission management. In: 2016 2nd International conference on open and big data (OBD), pp 25\u201330. https:\/\/doi.org\/10.1109\/OBD.2016.11. IEEE","DOI":"10.1109\/OBD.2016.11"},{"issue":"24","key":"1913_CR3","doi-asserted-by":"publisher","first-page":"21377","DOI":"10.1109\/JIOT.2023.3287636","volume":"10","author":"J Liu","year":"2023","unstructured":"Liu J, Fan Y, Sun R, Liu L, Wu C, Mumtaz S (2023) Blockchain-aided privacy-preserving medical data sharing scheme for e-healthcare system. IEEE Internet Things J 10(24):21377\u201321388. https:\/\/doi.org\/10.1109\/JIOT.2023.3287636","journal-title":"IEEE Internet Things J"},{"issue":"5","key":"1913_CR4","doi-asserted-by":"publisher","first-page":"8770","DOI":"10.1109\/JIOT.2019.2923525","volume":"6","author":"J Xu","year":"2019","unstructured":"Xu J, Xue K, Li S, Tian H, Hong J, Hong P, Yu N (2019) Healthchain: A blockchain-based privacy preserving scheme for large-scale health data. IEEE Internet Things J 6(5):8770\u20138781. https:\/\/doi.org\/10.1109\/JIOT.2019.2923525","journal-title":"IEEE Internet Things J"},{"key":"1913_CR5","doi-asserted-by":"publisher","unstructured":"Yaqoob I, Salah K, Jayaraman R, Al-Hammadi Y (2022) Blockchain for healthcare data management: opportunities, challenges, and future recommendations. Neural Computing and Applications, pp 1\u201316. https:\/\/doi.org\/10.1007\/s00521-020-05519-w","DOI":"10.1007\/s00521-020-05519-w"},{"issue":"23","key":"1913_CR6","doi-asserted-by":"publisher","first-page":"21115","DOI":"10.1109\/JIOT.2023.3284968","volume":"10","author":"Z Bao","year":"2023","unstructured":"Bao Z, He D, Wang H, Luo M, Peng C (2023) A group signature scheme with selective linkability and traceability for blockchain-based data sharing systems in e-health services. IEEE Internet Things J 10(23):21115\u201321128. https:\/\/doi.org\/10.1109\/JIOT.2023.3284968","journal-title":"IEEE Internet Things J"},{"key":"1913_CR7","doi-asserted-by":"publisher","first-page":"103290","DOI":"10.1016\/j.compind.2020.103290","volume":"122","author":"A Tandon","year":"2020","unstructured":"Tandon A, Dhir A, Islam AN, M\u00e4ntym\u00e4ki M (2020) Blockchain in healthcare: A systematic literature review, synthesizing framework and future research agenda. Comput Ind 122:103290. https:\/\/doi.org\/10.1016\/j.compind.2020.103290","journal-title":"Comput Ind"},{"issue":"1","key":"1913_CR8","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/TSC.2021.3114719","volume":"16","author":"M Wang","year":"2021","unstructured":"Wang M, Guo Y, Zhang C, Wang C, Huang H, Jia X (2021) Medshare: A privacy-preserving medical data sharing system by using blockchain. IEEE Trans Serv Comput 16(1):438\u2013451. https:\/\/doi.org\/10.1109\/TSC.2021.3114719","journal-title":"IEEE Trans Serv Comput"},{"issue":"1","key":"1913_CR9","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1109\/TNSE.2021.3101842","volume":"9","author":"L Tan","year":"2021","unstructured":"Tan L, Yu K, Shi N, Yang C, Wei W, Lu H (2021) Towards secure and privacy-preserving data sharing for covid-19 medical records: A blockchain-empowered approach. IEEE Trans Netw Sci Eng 9(1):271\u2013281. https:\/\/doi.org\/10.1109\/TNSE.2021.3101842","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"1913_CR10","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2020.102010","volume":"99","author":"H Huang","year":"2020","unstructured":"Huang H, Zhu P, Xiao F, Sun X, Huang Q (2020) A blockchain-based scheme for privacy-preserving and secure sharing of medical data. Computers & Security 99:102010. https:\/\/doi.org\/10.1016\/j.cose.2020.102010","journal-title":"Computers & Security"},{"key":"1913_CR11","doi-asserted-by":"publisher","first-page":"103117","DOI":"10.1016\/j.jisa.2022.103117","volume":"65","author":"J-S Lee","year":"2022","unstructured":"Lee J-S, Chew C-J, Liu J-Y, Chen Y-C, Tsai K-Y (2022) Medical blockchain: Data sharing and privacy preserving of ehr based on smart contract. J Inf Secur Appl 65:103117. https:\/\/doi.org\/10.1016\/j.jisa.2022.103117","journal-title":"J Inf Secur Appl"},{"key":"1913_CR12","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/j.future.2021.05.023","volume":"124","author":"Z Chen","year":"2021","unstructured":"Chen Z, Xu W, Wang B, Yu H (2021) A blockchain-based preserving and sharing system for medical data privacy. Futur Gener Comput Syst 124:338\u2013350. https:\/\/doi.org\/10.1016\/j.future.2021.05.023","journal-title":"Futur Gener Comput Syst"},{"issue":"3","key":"1913_CR13","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1007\/s12083-022-01303-w","volume":"15","author":"C Lai","year":"2022","unstructured":"Lai C, Ma Z, Guo R, Zheng D (2022) Secure medical data sharing scheme based on traceable ring signature and blockchain. Peer-to-Peer Netw Appl 15(3):1562\u20131576. https:\/\/doi.org\/10.1007\/s12083-022-01303-w","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1913_CR14","doi-asserted-by":"publisher","unstructured":"Rivest RL, Shamir A, Tauman Y (2001) How to leak a secret. In: Boyd C (ed.) Advances in Cryptology \u2014 ASIACRYPT 2001, pp 552\u2013565. Springer. https:\/\/doi.org\/10.1007\/3-540-45682-1_32","DOI":"10.1007\/3-540-45682-1_32"},{"issue":"5","key":"1913_CR15","doi-asserted-by":"publisher","first-page":"2349","DOI":"10.1007\/s12083-023-01532-7","volume":"16","author":"X Zhang","year":"2023","unstructured":"Zhang X, Lai J, Moshayedi AJ (2023) Traffic data security sharing scheme based on blockchain and traceable ring signature for vanets. Peer-to-Peer Netw Appl 16(5):2349\u20132366. https:\/\/doi.org\/10.1007\/s12083-023-01532-7","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1913_CR16","doi-asserted-by":"publisher","unstructured":"Yuen TH, Esgin MF, Liu JK, Au MH, Ding Z (2021) Dualring: Generic construction of ring signatures with efficient instantiations. In: Malkin T, Peikert C (eds.) Advances in Cryptology \u2013 CRYPTO 2021, pp 251\u2013281. Springer. https:\/\/doi.org\/10.1007\/978-3-030-84242-0_10","DOI":"10.1007\/978-3-030-84242-0_10"},{"key":"1913_CR17","doi-asserted-by":"publisher","unstructured":"Bootle J, Cerulli A, Chaidos P, Groth J, Petit C (2016) Efficient zero-knowledge arguments for arithmetic circuits in the discrete log setting. In: Fischlin M, Coron J-S (eds.) Advances in Cryptology \u2013 EUROCRYPT 2016, pp 327\u2013357. Springer. https:\/\/doi.org\/10.1007\/978-3-662-49896-5_12","DOI":"10.1007\/978-3-662-49896-5_12"},{"key":"1913_CR18","doi-asserted-by":"publisher","unstructured":"Bitansky N, Canetti R, Chiesa A, Tromer E (2013) Recursive composition and bootstrapping for snarks and proof-carrying data. In: Proceedings of the Forty-fifth Annual ACM symposium on theory of computing, pp 111\u2013120. https:\/\/doi.org\/10.1145\/2488608.2488623","DOI":"10.1145\/2488608.2488623"},{"key":"1913_CR19","doi-asserted-by":"publisher","unstructured":"Lee J (2021) Dory: Efficient, transparent arguments for generalised inner products and polynomial commitments. In: Nissim K, Waters B (eds.) Theory of Cryptography, pp 1\u201334. Springer. https:\/\/doi.org\/10.1007\/978-3-030-90453-1_1","DOI":"10.1007\/978-3-030-90453-1_1"},{"key":"1913_CR20","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1007\/s00145-014-9196-7","volume":"29","author":"M Abe","year":"2016","unstructured":"Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M (2016) Structure-preserving signatures and commitments to group elements. J Cryptol 29:363\u2013421. https:\/\/doi.org\/10.1007\/s00145-014-9196-7","journal-title":"J Cryptol"},{"issue":"7","key":"1913_CR21","doi-asserted-by":"publisher","first-page":"1366","DOI":"10.1109\/TKDE.2017.2781227","volume":"30","author":"TTA Dinh","year":"2018","unstructured":"Dinh TTA, Liu R, Zhang M, Chen G, Ooi BC, Wang J (2018) Untangling blockchain: A data processing view of blockchain systems. IEEE Trans Knowl Data Eng 30(7):1366\u20131385. https:\/\/doi.org\/10.1109\/TKDE.2017.2781227","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"4","key":"1913_CR22","doi-asserted-by":"publisher","first-page":"3796","DOI":"10.1109\/COMST.2019.2928178","volume":"21","author":"M Belotti","year":"2019","unstructured":"Belotti M, Bo\u017ei\u0107 N, Pujolle G, Secci S (2019) A vademecum on blockchain technologies: When, which, and how. IEEE Commun Surv & Tutorials 21(4):3796\u20133838. https:\/\/doi.org\/10.1109\/COMST.2019.2928178","journal-title":"IEEE Commun Surv & Tutorials"},{"key":"1913_CR23","doi-asserted-by":"publisher","unstructured":"Zeng S.-Q, Huo R, Huang T, Liu J, Wang S, Feng W (2020) Survey of blockchain: principle, progress and application. J Commun 41(1):134\u2013151. https:\/\/doi.org\/10.11959\/j.issn.1000-436x.2020027","DOI":"10.11959\/j.issn.1000-436x.2020027"},{"key":"1913_CR24","doi-asserted-by":"publisher","unstructured":"Sheth H, Dattani J (2020) Chapter 14 - overview of blockchain technology concepts, pp 349\u2013371. https:\/\/doi.org\/10.1016\/B978-0-12-819816-2.00014-9","DOI":"10.1016\/B978-0-12-819816-2.00014-9"},{"issue":"6","key":"1913_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1109\/MIC.2022.3209804","volume":"26","author":"TV Doan","year":"2022","unstructured":"Doan TV, Psaras Y, Ott J, Bajpai V (2022) Toward decentralized cloud storage with ipfs: opportunities, challenges, and future considerations. IEEE Internet Comput 26(6):7\u201315. https:\/\/doi.org\/10.1109\/MIC.2022.3209804","journal-title":"IEEE Internet Comput"},{"key":"1913_CR26","doi-asserted-by":"publisher","unstructured":"Chen Y, Li H, Li K, Zhang J (2017) An improved p2p file system scheme based on ipfs and blockchain. In: 2017 IEEE international conference on big data (Big Data), pp 2652\u20132657. https:\/\/doi.org\/10.1109\/BigData.2017.8258226. IEEE","DOI":"10.1109\/BigData.2017.8258226"},{"key":"1913_CR27","doi-asserted-by":"publisher","unstructured":"Vimal S, Srivatsa S (2019) A new cluster p2p file sharing system based on ipfs and blockchain technology. Journal of Ambient Intelligence and Humanized Computing, pp 1\u20137. https:\/\/doi.org\/10.1007\/s12652-019-01453-5","DOI":"10.1007\/s12652-019-01453-5"},{"key":"1913_CR28","doi-asserted-by":"publisher","unstructured":"Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Cramer R (ed.) Advances in Cryptology \u2013 EUROCRYPT 2005, pp 457\u2013473. Springer. https:\/\/doi.org\/10.1007\/11426639_27","DOI":"10.1007\/11426639_27"},{"key":"1913_CR29","doi-asserted-by":"crossref","unstructured":"Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP\u201907), pp 321\u2013334. IEEE","DOI":"10.1109\/SP.2007.11"},{"key":"1913_CR30","doi-asserted-by":"crossref","unstructured":"Bellare M, Desai A, Jokipii E, Rogaway P (1997) A concrete security treatment of symmetric encryption. In: Proceedings 38th annual symposium on foundations of computer science, pp 394\u2013403. IEEE","DOI":"10.1109\/SFCS.1997.646128"},{"key":"1913_CR31","doi-asserted-by":"publisher","unstructured":"Barreto PSLM, Naehrig M (2006) Pairing-friendly elliptic curves of prime order. In: Preneel B, Tavares S (eds.) Selected Areas in Cryptography, pp 319\u2013331. Springer. https:\/\/doi.org\/10.1007\/11693383_22","DOI":"10.1007\/11693383_22"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01913-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01913-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01913-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,10]],"date-time":"2025-05-10T02:30:50Z","timestamp":1746844250000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01913-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,25]]},"references-count":31,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2025,5]]}},"alternative-id":["1913"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01913-0","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,2,25]]},"assertion":[{"value":"11 September 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 January 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 February 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interest"}}],"article-number":"103"}}