{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:10Z","timestamp":1758987610097,"version":"3.44.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:00:00Z","timestamp":1747699200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T00:00:00Z","timestamp":1747699200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072249"],"award-info":[{"award-number":["62072249"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01987-w","type":"journal-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T11:28:01Z","timestamp":1747740481000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multi-layered retrieval integrity verification mechanism for blockchain oracle"],"prefix":"10.1007","volume":"18","author":[{"given":"Rui","family":"Wu","sequence":"first","affiliation":[]},{"given":"Long","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Guangmin","family":"Song","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Xinlong","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,20]]},"reference":[{"key":"1987_CR1","doi-asserted-by":"crossref","unstructured":"Hart SU, Jones C, Carvalho B (2024) Anticipate, automate, accelerate: A framework for blockchain in anticipatory action. Int J Disast Risk Reduction 112","DOI":"10.1016\/j.ijdrr.2024.104644"},{"key":"1987_CR2","doi-asserted-by":"crossref","unstructured":"Wen B, Wang Y, Ding Y, Zheng H, Qin B, Yang C (2023) Security and privacy protection technologies in securing blockchain applications. Inf Sci 645","DOI":"10.1016\/j.ins.2023.119322"},{"issue":"4","key":"1987_CR3","doi-asserted-by":"publisher","first-page":"1874","DOI":"10.3934\/mbe.2019091","volume":"16","author":"Y Ren","year":"2019","unstructured":"Ren Y, Leng Y, Cheng Y, Wang J (2019) Secure data storage based on blockchain and coding in edge computing. Math Biosci Eng 16(4):1874\u20131892","journal-title":"Math Biosci Eng"},{"key":"1987_CR4","doi-asserted-by":"crossref","unstructured":"Liang W, Liu Y, Yang C, Xie S, Li K, Susilo W (2024) On identity, transaction, and smart contract privacy on permissioned and permissionless blockchain: A comprehensive survey. ACM Comput Surv 56(12):1\u201335","DOI":"10.1145\/3676164"},{"issue":"7","key":"1987_CR5","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3594542","volume":"20","author":"Y Ren","year":"2024","unstructured":"Ren Y, Lv Z, Xiong NN, Wang J (2024) Hcnct: A cross-chain interaction scheme for the blockchain-based metaverse. ACM Trans Multimed Comput Commun Appl 20(7):1\u201323","journal-title":"ACM Trans Multimed Comput Commun Appl"},{"key":"1987_CR6","doi-asserted-by":"crossref","unstructured":"Lawal O, Nawari NO (2023) Blockchain and city information modeling (cim): A new approach of transparency and efficiency. J Inf Technol Constr 28","DOI":"10.36680\/j.itcon.2023.037"},{"key":"1987_CR7","doi-asserted-by":"crossref","unstructured":"Kang L (2021) Street architecture landscape design based on wireless internet of things and gis system. Microprocess Microsyst 80","DOI":"10.1016\/j.micpro.2020.103362"},{"key":"1987_CR8","doi-asserted-by":"crossref","unstructured":"Yu H, Wang H (2022) Elliptic curve threshold signature scheme for blockchain. J Inf Secur Appl 70","DOI":"10.1016\/j.jisa.2022.103345"},{"issue":"11","key":"1987_CR9","doi-asserted-by":"publisher","first-page":"8154","DOI":"10.1109\/JIOT.2021.3125190","volume":"9","author":"K Yu","year":"2021","unstructured":"Yu K, Tan L, Yang C, Choo KKR, Bashir AK, Rodrigues JJ, Sato T (2021) A blockchain-based shamir\u2019s threshold cryptography scheme for data protection in industrial internet of things settings. IEEE Internet Things J 9(11):8154\u20138167","journal-title":"IEEE Internet Things J"},{"key":"1987_CR10","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1016\/j.future.2020.09.019","volume":"115","author":"Y Ren","year":"2021","unstructured":"Ren Y, Leng Y, Qi J, Sharma PK, Wang J, Almakhadmeh Z, Tolba A (2021) Multiple cloud storage mechanism based on blockchain in smart homes. Futur Gener Comput Syst 115:304\u2013313","journal-title":"Futur Gener Comput Syst"},{"key":"1987_CR11","doi-asserted-by":"crossref","unstructured":"Dey K, Shekhawat U (2021) Blockchain for sustainable e-agriculture: Literature review, architecture for data management, and implications. J Clean Prod 316","DOI":"10.1016\/j.jclepro.2021.128254"},{"issue":"10","key":"1987_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3567582","volume":"55","author":"A Pasdar","year":"2023","unstructured":"Pasdar A, Lee YC, Dong Z (2023) Connect api with blockchain: A survey on blockchain oracle implementation. ACM Comput Surv 55(10):1\u201339","journal-title":"ACM Comput Surv"},{"issue":"8","key":"1987_CR13","doi-asserted-by":"publisher","first-page":"3947","DOI":"10.1109\/TVT.2011.2162972","volume":"60","author":"ME Mahmoud","year":"2011","unstructured":"Mahmoud ME, Shen X (2011) An integrated stimulation and punishment mechanism for thwarting packet dropping attack in multihop wireless networks. IEEE Trans Veh Technol 60(8):3947\u20133962","journal-title":"IEEE Trans Veh Technol"},{"key":"1987_CR14","doi-asserted-by":"crossref","unstructured":"Berdik D, Otoum S, Schmidt N, Porter D, Jararweh Y (2021) A survey on blockchain for information systems management and security. Inf Process Manag 58(1)","DOI":"10.1016\/j.ipm.2020.102397"},{"issue":"1","key":"1987_CR15","doi-asserted-by":"publisher","first-page":"5","DOI":"10.14358\/PERS.86.1.5","volume":"86","author":"AF Mendi","year":"2020","unstructured":"Mendi AF, \u00c7abuk A (2020) Blockchain applications in geographical information systems. Photogramm Eng Remote Sens 86(1):5\u201310","journal-title":"Photogramm Eng Remote Sens"},{"key":"1987_CR16","doi-asserted-by":"crossref","unstructured":"Sun L, Wang Y, Ren Y, Xia F (2024) Path signature-based xai-enabled network time series classification. Sci China Inf Sci 67(7)","DOI":"10.1007\/s11432-023-3978-y"},{"key":"1987_CR17","doi-asserted-by":"crossref","unstructured":"Hu P, Chu X, Zuo K, Ni T, Xie D, Shen Z, Chen F, Luo Y (2024) Security-enhanced data sharing scheme with location privacy preservation for internet of vehicles. IEEE Trans Veh Technol","DOI":"10.1109\/TVT.2024.3393302"},{"issue":"9","key":"1987_CR18","doi-asserted-by":"publisher","first-page":"9728","DOI":"10.1109\/TKDE.2023.3249279","volume":"35","author":"H Wu","year":"2023","unstructured":"Wu H, Li Z, Song R, Xiao B (2023) Enabling privacy-preserving and efficient authenticated graph queries on blockchain-assisted clouds. IEEE Trans Knowl Data Eng 35(9):9728\u20139742","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"3","key":"1987_CR19","doi-asserted-by":"publisher","first-page":"291","DOI":"10.3233\/JCS-2003-11302","volume":"11","author":"P Devanbu","year":"2003","unstructured":"Devanbu P, Gertz M, Martel C, Stubblebine SG (2003) Authentic data publication over the internet. J Comput Secur 11(3):291\u2013314","journal-title":"J Comput Secur"},{"key":"1987_CR20","doi-asserted-by":"crossref","unstructured":"Pang H, Tan KL (2004) Authenticating query results in edge computing. In: Proceedings. 20th international conference on data engineering, IEEE, pp 560\u2013571","DOI":"10.1109\/ICDE.2004.1320027"},{"key":"1987_CR21","doi-asserted-by":"crossref","unstructured":"Nuckolls G (2005) Verified query results from hybrid authentication trees. In: Data and applications security XIX: 19th Annual IFIP WG 11.3 working conference on data and applications security, Storrs, CT, USA, August 7-10, 2005. Proceedings 19, Springer, pp 84\u201398","DOI":"10.1007\/11535706_7"},{"key":"1987_CR22","doi-asserted-by":"crossref","unstructured":"Mykletun E, Narasimha M, Tsudik G (2006) Authentication and integrity in outsourced databases. ACM Trans Storage (TOS) 2(2):107\u2013138","DOI":"10.1145\/1149976.1149977"},{"key":"1987_CR23","doi-asserted-by":"crossref","unstructured":"Narasimha M, Tsudik G (2006) Authentication of outsourced databases using signature aggregation and chaining. In: International conference on database systems for advanced applications, Springer, pp 420\u2013436","DOI":"10.1007\/11733836_30"},{"key":"1987_CR24","doi-asserted-by":"crossref","unstructured":"Papadopoulos D, Papadopoulos S, Triandopoulos N (2014) Taking authenticated range queries to arbitrary dimensions. In: Proceedings of the 2014 ACM SIGSAC conference on computer and communications security, pp 819\u2013830","DOI":"10.1145\/2660267.2660373"},{"issue":"7","key":"1987_CR25","doi-asserted-by":"publisher","first-page":"529","DOI":"10.14778\/2536349.2536353","volume":"6","author":"S Bajaj","year":"2013","unstructured":"Bajaj S, Sion R (2013) Correctdb: Sql engine with practical query authentication. Proc VLDB Endowment 6(7):529\u2013540","journal-title":"Proc VLDB Endowment"},{"key":"1987_CR26","volume":"39","author":"J Chen","year":"2024","unstructured":"Chen J, Wang Z, Srivastava G, Alghamdi TA, Khan F, Kumari S, Xiong H (2024) Industrial blockchain threshold signatures in federated learning for unified space-air-ground-sea model training. J Ind Inf Integr 39:100593","journal-title":"J Ind Inf Integr"},{"key":"1987_CR27","doi-asserted-by":"crossref","unstructured":"Xiong H, Gong L, Li R, Kumari S, Chen CM, Amoon M (2024) Blockchain-enabled distributed identity-based ring signature with identity abort for consumer electronics. IEEE Trans Consum Electr","DOI":"10.1109\/TCE.2024.3426101"},{"issue":"11","key":"1987_CR28","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1145\/359168.359176","volume":"22","author":"A Shamir","year":"1979","unstructured":"Shamir A (1979) How to share a secret. Commun ACM 22(11):612\u2013613","journal-title":"Commun ACM"},{"key":"1987_CR29","doi-asserted-by":"crossref","unstructured":"Nakkar M, AlTawy R, Youssef A (2024) Lightweight group authentication scheme leveraging shamir\u2019s secret sharing and pufs. IEEE Trans Netw Sci Eng","DOI":"10.1109\/TNSE.2024.3373386"},{"key":"1987_CR30","doi-asserted-by":"crossref","unstructured":"Zhang Z, Xu C, Han Y (2024) Privacy-preserving cryptocurrency with threshold authentication and regulation. IEEE Trans Inf Forensic Secur","DOI":"10.1109\/TIFS.2024.3419694"},{"key":"1987_CR31","unstructured":"Goldfeder S, Gennaro R, Kalodner H, Bonneau J, Kroll JA, Felten EW, Narayanan A (2015) Securing bitcoin wallets via a new dsa\/ecdsa threshold signature scheme"},{"key":"1987_CR32","doi-asserted-by":"crossref","unstructured":"Dikshit P, Singh K (2017) Efficient weighted threshold ecdsa for securing bitcoin wallet. In: 2017 ISEA asia security and privacy (ISEASP), IEEE, pp 1\u20139","DOI":"10.1109\/ISEASP.2017.7976994"},{"key":"1987_CR33","doi-asserted-by":"crossref","unstructured":"Kurek R (2020) Efficient forward-secure threshold signatures. In: International workshop on security, Springer, pp 239\u2013260","DOI":"10.1007\/978-3-030-58208-1_14"},{"key":"1987_CR34","doi-asserted-by":"crossref","unstructured":"Chen X, Li F, Yang W, Chen T (2023) Frostoracle: A novel and efficient blockchain oracle scheme based on threshold signature. In: 2023 IEEE international conferences on internet of things (iThings) and IEEE green computing & communications (GreenCom) and IEEE cyber, physical & social computing (CPSCom) and IEEE smart data (SmartData) and IEEE congress on cybermatics (Cybermatics), IEEE, pp 781\u2013786","DOI":"10.1109\/iThings-GreenCom-CPSCom-SmartData-Cybermatics60724.2023.00137"},{"issue":"2","key":"1987_CR35","doi-asserted-by":"publisher","first-page":"502","DOI":"10.3390\/s24020502","volume":"24","author":"Z Wang","year":"2024","unstructured":"Wang Z, Gao M, Lu G (2024) Research on oracle technology based on multi-threshold aggregate signature algorithm and enhanced trustworthy oracle reputation mechanism. Sensors 24(2):502","journal-title":"Sensors"},{"key":"1987_CR36","doi-asserted-by":"crossref","unstructured":"Xian Y, Zhou L, Jiang J, Wang B, Huo H, Liu P (2024) A distributed efficient blockchain oracle scheme for internet of things. IEICE Trans Commun","DOI":"10.23919\/transcom.2023EBP3156"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01987-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01987-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01987-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:54Z","timestamp":1758986514000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01987-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,20]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1987"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01987-w","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,20]]},"assertion":[{"value":"5 February 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"Not applicable.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"This manuscript is approved by all authors for publication. The authors declare that they have no conflicts of interest.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}},{"value":"The authors declare no competing interests.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"183"}}