{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:10Z","timestamp":1758987610657,"version":"3.44.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Technology Research Project of Jiangxi Provincial Department of Education","award":["GJJ2204101"],"award-info":[{"award-number":["GJJ2204101"]}]},{"name":"Key Program of the Natural Science Foundation of Jiangxi Province","award":["20212ACB202003"],"award-info":[{"award-number":["20212ACB202003"]}]},{"name":"Jiangxi Province Key Laboratory of Multidimensional Intelligent Perception and Control","award":["2024SSY03161"],"award-info":[{"award-number":["2024SSY03161"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62466024, 61763017"],"award-info":[{"award-number":["62466024, 61763017"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01985-y","type":"journal-article","created":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T07:03:15Z","timestamp":1747983795000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Data security and access control method of blockchain with revocable attribute encryption in steel supply chain"],"prefix":"10.1007","volume":"18","author":[{"given":"Jie","family":"Gao","sequence":"first","affiliation":[]},{"given":"Xiaohong","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shaojiang","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,23]]},"reference":[{"issue":"7","key":"1985_CR1","doi-asserted-by":"publisher","first-page":"4884","DOI":"10.1007\/s11227-018-2644-7","volume":"76","author":"R Guo","year":"2020","unstructured":"Guo R, Li X, Zheng D, Zhang Y (2020) An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. J Supercomput 76(7):4884\u20134903","journal-title":"J Supercomput"},{"key":"1985_CR2","doi-asserted-by":"crossref","unstructured":"Zhang X, Du W, Moshayedi AJ (2023) A traceable and revocable multi-authority attribute-based access control scheme for mineral industry data secure storage in blockchain. J Supercomput 14743\u201314779. Springer","DOI":"10.1007\/s11227-023-05222-2"},{"key":"1985_CR3","doi-asserted-by":"publisher","first-page":"108040","DOI":"10.1016\/j.comcom.2024.108040","volume":"231","author":"J Lai","year":"2025","unstructured":"Lai J, Zhang X, Liu S, Zhong S, Moshayedi AJ (2025) Blockchain-based VANET edge computing-assisted cross-vehicle enterprise authentication scheme. Comput Commun 231:108040","journal-title":"Comput Commun"},{"key":"1985_CR4","doi-asserted-by":"crossref","unstructured":"Song Z, Zhang X, Liang M (2021) Reliable reputation review and secure energy transaction of microgrid community based on hybrid blockchain. Wireless Commun Mobile Comput 2021(1):9916735","DOI":"10.1155\/2021\/9916735"},{"issue":"1","key":"1985_CR5","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1186\/s13677-021-00273-3","volume":"11","author":"X Zhang","year":"2022","unstructured":"Zhang X, Song Z, Moshayedi AJ, IEEE Member (2022) Security scheduling and transaction mechanism of virtual power plants based on dual blockchains. J Cloud Comput 11(1):4","journal-title":"J Cloud Comput"},{"issue":"4","key":"1985_CR6","doi-asserted-by":"publisher","first-page":"2976","DOI":"10.1109\/JIOT.2020.3023920","volume":"8","author":"D Wang","year":"2020","unstructured":"Wang D, Zhang X (2020) Secure ride-sharing services based on a consortium blockchain. IEEE Internet Things J 8(4):2976\u20132991","journal-title":"IEEE Internet Things J"},{"key":"1985_CR7","doi-asserted-by":"publisher","first-page":"635","DOI":"10.1016\/j.future.2019.07.008","volume":"101","author":"A Yang","year":"2019","unstructured":"Yang A, Li Y, Liu C, Li J, Zhang Y, Wang J (2019) Research on logistics supply chain of iron and steel enterprises based on block chain technology. Future Gener Comput Syst 101:635\u2013645","journal-title":"Future Gener Comput Syst"},{"key":"1985_CR8","doi-asserted-by":"publisher","unstructured":"Han D, Pan N, Li K-C (2020) A traceable and revocable ciphertext-policy attribute-based encryption scheme based on privacy protection, IEEE, pp 316\u2013327. https:\/\/doi.org\/10.1109\/TDSC.2020.2977646.","DOI":"10.1109\/TDSC.2020.2977646"},{"key":"1985_CR9","doi-asserted-by":"publisher","first-page":"109198","DOI":"10.1016\/j.ijpe.2024.109198","volume":"271","author":"S Pattanayak","year":"2024","unstructured":"Pattanayak S, Ramkumar M, Goswami M, Rana NP (2024) Blockchain technology and supply chain performance: the role of trust and relational capabilities. Int J Prod Econ 271:109198","journal-title":"Int J Prod Econ"},{"issue":"1","key":"1985_CR10","doi-asserted-by":"publisher","first-page":"3994","DOI":"10.1109\/TCE.2023.3279652","volume":"70","author":"J Zong","year":"2023","unstructured":"Zong J, Wang C, Shen J, Su C, Wang W (2023) ReLAC: revocable and lightweight access control with blockchain for smart consumer electronics. IEEE Trans Consumer Electron 70(1):3994\u20134004","journal-title":"IEEE Trans Consumer Electron"},{"issue":"3","key":"1985_CR11","first-page":"2864","volume":"19","author":"C Ge","year":"2021","unstructured":"Ge C, Susilo W, Baek J, Liu Z, Xia J, Fang L (2021) Revocable attribute-based encryption with data integrity in clouds. IEEE Trans Dependabl. Secure Comput 19(3):2864\u20132872","journal-title":"IEEE Trans Dependabl. Secure Comput"},{"issue":"1","key":"1985_CR12","doi-asserted-by":"publisher","first-page":"549","DOI":"10.1007\/s00170-021-08250-5","volume":"119","author":"Q Liu","year":"2022","unstructured":"Liu Q, Liu M, Wang Z, Yan F, Ma Y, Shen W (2022) A novel intelligent manufacturing mode with human-cyber-physical collaboration and fusion in the non-ferrous metal industry. Int J Adv Manuf Tech 119(1):549\u2013569","journal-title":"Int J Adv Manuf Tech"},{"issue":"4","key":"1985_CR13","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/s42524-020-0132-2","volume":"7","author":"Yili Ren","year":"2020","unstructured":"Ren Yili, Jia Liang, Su Jian, Gao Gang, Liu He (2020) Data sharing mechanism of various mineral resources based on blockchain. Front Eng Manag 7(4):592\u2013604","journal-title":"Front Eng Manag"},{"key":"1985_CR14","first-page":"102503","volume":"53","author":"S Banerjee","year":"2020","unstructured":"Banerjee S, Roy S, Odelu V, Das AK, Chattopadhyay S, Rodrigues JJPC, Park Y (2020) Multi-authority CP-ABE-based user access control scheme with constant-size key and ciphertext for IoT deployment. J Inf Secur Appl 53:102503","journal-title":"J Inf Secur Appl"},{"issue":"7","key":"1985_CR15","doi-asserted-by":"publisher","first-page":"4884","DOI":"10.1007\/s11227-018-2644-7","volume":"76","author":"R Guo","year":"2020","unstructured":"Guo R, Li X, Zheng D, Zhang Y (2020) An attribute-based encryption scheme with multiple authorities on hierarchical personal health record in cloud. J Supercomput 76(7):4884\u20134903","journal-title":"J Supercomput"},{"key":"1985_CR16","doi-asserted-by":"publisher","first-page":"1901","DOI":"10.1109\/TC.2023.3234210","volume":"72","author":"Y Guo","year":"2023","unstructured":"Guo Y, Lu Z, Ge H, Li J (2023) Revocable blockchain-aided attribute-based encryption with escrow-free in cloud storage. IEEE Trans Comput 72:1901\u20131912","journal-title":"IEEE Trans Comput"},{"issue":"1","key":"1985_CR17","doi-asserted-by":"publisher","first-page":"3781","DOI":"10.1109\/TCE.2024.3377107","volume":"70","author":"C Ruan","year":"2024","unstructured":"Ruan C, Hu C, Li X, Deng S, Liu Z, Yu J (2024) A revocable and fair outsourcing attribute-based access control scheme in metaverse. IEEE Trans Consumer Electron 70(1):3781\u20133791","journal-title":"IEEE Trans Consumer Electron"},{"issue":"16","key":"1985_CR18","doi-asserted-by":"publisher","first-page":"7036","DOI":"10.3390\/s23167036","volume":"23","author":"S Li","year":"2023","unstructured":"Li S, Zhou T, Yang H, Wang P (2023) Blockchain-based secure storage and access control scheme for supply chain ecological business data: a case study of the automotive industry. Sensors 23(16):7036","journal-title":"Sensors"},{"issue":"4","key":"1985_CR19","first-page":"2236","volume":"14","author":"Q Zhang","year":"2024","unstructured":"Zhang Q, Xu C, Zhong H, Gu C, Cui J (2024) IRevocable and efficient blockchain-based fine-grained access control against EDoS attacks in cloud storage. IEEE Trans Comput 14(4):2236\u20132247","journal-title":"IEEE Trans Comput"},{"key":"1985_CR20","doi-asserted-by":"publisher","first-page":"109335","DOI":"10.1016\/j.comnet.2022.109335","volume":"217","author":"W Akram","year":"2022","unstructured":"Akram W, Mahmood K, Li X, Sadiq M, Lv Z, Chaudhry SA (2022) An energy-efficient and secure identity based RFID authentication scheme for vehicular cloud computing. Comput Netw 217:109335","journal-title":"Comput Netw"},{"issue":"6","key":"1985_CR21","first-page":"1832","volume":"4","author":"SC Krishnan","year":"2024","unstructured":"Krishnan SC (2024) AI-HybridChain: picturized authentication and drl based access control method with secure two fold revocation for ensuring cloud computing security. Future Gener Comput Syst 4(6):1832\u20131843","journal-title":"Future Gener Comput Syst"},{"issue":"5","key":"1985_CR22","doi-asserted-by":"publisher","first-page":"e7941","DOI":"10.1002\/cpe.7941","volume":"36","author":"G Zhao","year":"2024","unstructured":"Zhao G, He H, Di B, Wu T (2024) ERSChain: towards secure and flexible educational resource sharing using consortium blockchain and revocable ciphertext-policy attribute-based encryption. Concurr Comput Pract Exper 36(5):e7941","journal-title":"Concurr Comput Pract Exper"},{"issue":"11","key":"1985_CR23","doi-asserted-by":"publisher","first-page":"9774","DOI":"10.1002\/int.23009","volume":"37","author":"V Koe","year":"2022","unstructured":"Koe V, Arthur S, Chen Q, Tang J, Ai S, Yan H, Zhang S, Wong DS (2022) Outsourcing multiauthority access control revocation and computations over medical data to mobile cloud. Int J Intell Syst 37(11):9774\u20139797","journal-title":"Int J Intell Syst"},{"issue":"8","key":"1985_CR24","doi-asserted-by":"publisher","first-page":"101658","DOI":"10.1016\/j.jksuci.2023.101658","volume":"35","author":"X Hou","year":"2023","unstructured":"Hou X, Zhang L, Wu Q, Rezaeibagha F (2023) Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain. J King Saud Univ Comput Inf Sci 35(8):101658","journal-title":"J King Saud Univ Comput Inf Sci"},{"issue":"2","key":"1985_CR25","doi-asserted-by":"publisher","first-page":"1745","DOI":"10.1109\/TNSM.2022.3185237","volume":"20","author":"S Liu","year":"2022","unstructured":"Liu S, Yu J, Chen L, Chai B (2022) Blockchain-assisted comprehensive key management in CP-ABE for cloud-stored data. IEEE Trans Netw Serv Manag 20(2):1745\u20131758","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"7","key":"1985_CR26","doi-asserted-by":"publisher","first-page":"1691","DOI":"10.3390\/electronics12071691","volume":"12","author":"B Xie","year":"2023","unstructured":"Xie B, Zhou Y-P, Yi X-Y, Wang C-Y (2023) An improved multi-authority attribute access control scheme base on blockchain and elliptic curve for efficient and secure data sharing. Electronics 12(7):1691","journal-title":"Electronics"},{"issue":"5","key":"1985_CR27","first-page":"1600","volume":"13","author":"T Liu","year":"2023","unstructured":"Liu T, Li Z, Ji Y, Chang J (2023) Efficient key-escrow-free and vehicle-revocable data sharing protocol for vehicular ad hoc network. IEEE Internet Things J 13(5):1600\u20131615","journal-title":"IEEE Internet Things J"},{"key":"1985_CR28","doi-asserted-by":"publisher","first-page":"101854","DOI":"10.1016\/j.sysarc.2020.101854","volume":"112","author":"X Qin","year":"2021","unstructured":"Qin X, Huang Y, Yang Z, Li X (2021) A blockchain-based access control scheme with multiple attribute authorities for secure cloud data sharing. J Syst Arch 112:101854","journal-title":"J Syst Arch"},{"issue":"2","key":"1985_CR29","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.dcan.2019.04.003","volume":"6","author":"R Shrestha","year":"2020","unstructured":"Shrestha R, Bajracharya R, Shrestha AP, Nam SY (2020) A new type of blockchain for secure message exchange in VANET. Digital Commun Netw 6(2):177\u2013186","journal-title":"Digital Commun Netw"},{"issue":"2","key":"1985_CR30","doi-asserted-by":"publisher","first-page":"80","DOI":"10.3390\/info14020080","volume":"14","author":"IS Farahat","year":"2023","unstructured":"Farahat IS, Aladrousy W, Elhoseny M, Elmougy S, Tolba AE (2023) Secure medical blockchain model. Information 14(2):80","journal-title":"Information"},{"issue":"5","key":"1985_CR31","doi-asserted-by":"publisher","first-page":"793","DOI":"10.1007\/s11082-024-06656-5","volume":"56","author":"M Venkatesan","year":"2024","unstructured":"Venkatesan M, Mani P (2024) Development of secure and authentic access controlling techniques using the pushback request response (PRR) approach for blockchain healthcare applications. Opt Quantum Electron 56(5):793","journal-title":"Opt Quantum Electron"},{"issue":"8","key":"1985_CR32","doi-asserted-by":"publisher","first-page":"10772","DOI":"10.1007\/s11227-021-04293-3","volume":"78","author":"V Ezhil Arasi","year":"2022","unstructured":"Ezhil Arasi V, Indra Gandhi K, Kulothungan K (2022) Auditable attribute-based data access control using blockchain in cloud storage. J Supercomput 78(8):10772\u201310798","journal-title":"J Supercomput"},{"key":"1985_CR33","doi-asserted-by":"publisher","unstructured":"Wang C, Wu W, Chen F, Shu H, Zhang J, Zhang Y, Wang T, Xie D, Zhao C (2024) A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing, Springer, IET information security, p 5559522. https:\/\/doi.org\/10.1049\/2024\/5559522","DOI":"10.1049\/2024\/5559522"},{"key":"1985_CR34","doi-asserted-by":"publisher","first-page":"1868","DOI":"10.1109\/TIFS.2022.3173412","volume":"17","author":"Meiyan Xiao","year":"2022","unstructured":"Xiao Meiyan, Li Hongbo, Huang Qiong, Shui Yu, Susilo Willy (2022) Attribute-based hierarchical access control with extendable policy. IEEE Trans Inf Forensics Secur 17:1868\u20131883","journal-title":"IEEE Trans Inf Forensics Secur"},{"issue":"1","key":"1985_CR35","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1186\/s13677-024-00608-w","volume":"13","author":"G Liu","year":"2024","unstructured":"Liu G, Xie H, Wang W, Huang H (2024) A secure and efficient electronic medical record data sharing scheme based on blockchain and proxy re-encryption. J Cloud Comput 13(1):44","journal-title":"J Cloud Comput"},{"issue":"1","key":"1985_CR36","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/s00145-007-9011-9","volume":"22","author":"A Bender","year":"2009","unstructured":"Bender A, Katz J, Morselli R (2009) Ring signatures: stronger definitions, and constructions without random oracles. J Cryptol 22(1):60\u201379","journal-title":"J Cryptol"},{"issue":"1","key":"1985_CR37","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1093\/ietfec\/e91-a.1.83","volume":"91","author":"E Fujisaki","year":"2008","unstructured":"Fujisaki E, Suzuki K (2008) Traceable ring signature. IEICE Trans Fundam Electron Commun Comput Sci 91(1):83\u201393","journal-title":"IEICE Trans Fundam Electron Commun Comput Sci"},{"key":"1985_CR38","first-page":"102669","volume":"55","author":"S Bouakkaz","year":"2020","unstructured":"Bouakkaz S, Semchedine F (2020) A certificateless ring signature scheme with batch verification for applications in VANET. J Inf Secur Appl 55:102669","journal-title":"J Inf Secur Appl"},{"key":"1985_CR39","doi-asserted-by":"crossref","unstructured":"Mao X, You L, Cao C, Hu G, Hu L (2021) Linkable Ring Signature Scheme Using Biometric Cryptosystem and NIZK and Its Application. Secur Commun Netw 2021","DOI":"10.1155\/2021\/7266564"},{"issue":"3","key":"1985_CR40","doi-asserted-by":"publisher","first-page":"1562","DOI":"10.1007\/s12083-022-01303-w","volume":"15","author":"C Lai","year":"2022","unstructured":"Lai C, Ma ZM, Guo RG, Zheng D (2022) Secure medical data sharing scheme based on traceable ring signature and blockchain. Peer-to-Peer Network Appl 15(3):1562\u20131576","journal-title":"Peer-to-Peer Network Appl"},{"key":"1985_CR41","unstructured":"Datawallet (2024). https:\/\/www.datawallet.com\/eth-gas-fees Accessed: 2024-Oct-01"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01985-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01985-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01985-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:21Z","timestamp":1758986481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01985-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1985"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01985-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,23]]},"assertion":[{"value":"20 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"186"}}