{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:40:09Z","timestamp":1758987609702,"version":"3.44.0"},"reference-count":41,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T00:00:00Z","timestamp":1747872000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Jiangsu Province Higher Education Philosophy and Social Sciences Laboratory Project"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-01989-8","type":"journal-article","created":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T05:37:55Z","timestamp":1747892275000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Multifactor SM9 blind signature large models data privacy preservation approach"],"prefix":"10.1007","volume":"18","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5707-6012","authenticated-orcid":false,"given":"Jiazheng","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Shouwei","family":"Li","sequence":"additional","affiliation":[]},{"given":"Minghui","family":"Chen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,22]]},"reference":[{"key":"1989_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s12083-024-01817-5","volume":"18","author":"J Luo","year":"2025","unstructured":"Luo J, Chen Z, Chen W et al (2025) A study on the application of the T5 large language model in encrypted traffic classification. Peer-to-Peer Netw Appl 18:15","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1989_CR2","unstructured":"Laura W et al (2021) Ethical and social risks of harm from language models. Preprint at https:\/\/arxiv.org\/abs\/2112.04359"},{"key":"1989_CR3","unstructured":"Rishi B et al (2021) On the opportunities and risks of foundation models. Preprint at https:\/\/arxiv.org\/abs\/2108.07258"},{"key":"1989_CR4","doi-asserted-by":"crossref","first-page":"25","DOI":"10.63545\/economist.v1i1.10","volume":"1","author":"J Xu","year":"2024","unstructured":"Xu J, Wang YH (2024) The framework construction of data governance system and GlobaMarket outlook?-An exploration of data governance paths based on \u2018Twenty Articles on Data.\u2019 Economist 1:25\u201335","journal-title":"Economist"},{"issue":"11","key":"1989_CR5","first-page":"1278","volume":"36","author":"GY Wang","year":"2021","unstructured":"Wang GY, Mei H (2021) Constructing ethical order of digital world. Bull Chinese Acad Sci 36(11):1278\u20131287","journal-title":"Bull Chinese Acad Sci"},{"issue":"05","key":"1989_CR6","first-page":"42","volume":"41","author":"X Zhang","year":"2023","unstructured":"Zhang X (2023) Data risks and governance pathways of generative artificial intelligence. Sci Law (J Northwest Univ Political Sci Law) 41(05):42\u201354","journal-title":"Sci Law (J Northwest Univ Political Sci Law)"},{"key":"1989_CR7","doi-asserted-by":"publisher","unstructured":"Hacker P, Engel A, Mauer M (2023) Regulating ChatGPT and other large generative AI models. In: proceedings of the 2023 ACM conference on fairness, accountability, and transparency, pp 1112\u20131123.\u00a0https:\/\/doi.org\/10.1145\/3593013.35940","DOI":"10.1145\/3593013.35940"},{"issue":"1","key":"1989_CR8","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01858-w","volume":"18","author":"M Kashif","year":"2025","unstructured":"Kashif M, Kalkan K (2025) Differential privacy preserving based framework using blockchain for internet-of-things. Peer-to-Peer Netw Appl 18(1):1\u201323","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"31","key":"1989_CR9","doi-asserted-by":"publisher","first-page":"22959","DOI":"10.1007\/s00521-022-07087-7","volume":"35","author":"V Chamola","year":"2023","unstructured":"Chamola V, Goyal A, Sharma P et al (2023) Artificial intelligence-assisted blockchain-based framework for smart and secure EMR management. Neural Comput Appl 35(31):22959\u201322969","journal-title":"Neural Comput Appl"},{"issue":"1","key":"1989_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01866-w","volume":"18","author":"B Ma","year":"2025","unstructured":"Ma B, Qian H (2025) A scalable identity management scheme via blockchain: identity protection and traceability. Peer-to-Peer Netw Appl 18(1):1\u201312","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"1989_CR11","doi-asserted-by":"publisher","first-page":"800","DOI":"10.1007\/s12083-023-01614-6","volume":"17","author":"X Deng","year":"2024","unstructured":"Deng X, Shao J, Chang L, Liang J (2024) A blockchain-based privacy protection protocol using smart contracts in LEO satellite networks. Peer-to-Peer Netw Appl 17(2):800\u2013818","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"3","key":"1989_CR12","doi-asserted-by":"publisher","first-page":"2203","DOI":"10.1007\/s10586-021-03260-0","volume":"25","author":"W Liang","year":"2022","unstructured":"Liang W, Ji N (2022) Privacy challenges of IoT-based blockchain: a systematic review. Clust Comput 25(3):2203\u20132221","journal-title":"Clust Comput"},{"key":"1989_CR13","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1016\/j.future.2022.01.017","volume":"131","author":"N Deepa","year":"2022","unstructured":"Deepa N, Pham QV, Nguyen DC et al (2022) A survey on blockchain for big data: approaches, opportunities, and future directions. Futur Gener Comput Syst 131:209\u2013226","journal-title":"Futur Gener Comput Syst"},{"issue":"2","key":"1989_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-025-01910-3","volume":"18","author":"L Chang","year":"2025","unstructured":"Chang L, Yang X, Zhang K, Sui Z, Zhao J (2025) Blockchain-based synchronized data transmission with dynamic device management for digital twin in IIoT. Peer-to-Peer Netw Appl 18(2):1\u201315","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"2","key":"1989_CR15","doi-asserted-by":"publisher","first-page":"3392","DOI":"10.1109\/JIOT.2023.3296460","volume":"11","author":"X Li","year":"2023","unstructured":"Li X, Zhao H, Deng W (2023) BFOD: blockchain-based privacy protection and security sharing scheme of flight operation data. IEEE Internet Things J 11(2):3392\u20133401","journal-title":"IEEE Internet Things J"},{"issue":"9","key":"1989_CR16","first-page":"2620","volume":"30","author":"HB Tan","year":"2019","unstructured":"Tan HB, Zhou T, Zhao H et al (2019) Archival data protection and sharingmethod based on blockchain. Ruan Jian Xue Bao\/J Soft 30(9):2620\u20132635","journal-title":"Ruan Jian Xue Bao\/J Soft"},{"key":"1989_CR17","doi-asserted-by":"publisher","first-page":"59389","DOI":"10.1109\/ACCESS.2020.2982964","volume":"8","author":"J Sun","year":"2020","unstructured":"Sun J, Yao X, Wang S et al (2020) Blockchain-based secure storage and access scheme for electronic medical records in IPFS. IEEE Access 8:59389\u201359401","journal-title":"IEEE Access"},{"key":"1989_CR18","doi-asserted-by":"crossref","unstructured":"Perchinunno P, Massari A, L\u2019Abbate S, Crocetta C (2023) Blockchain and the general data protection regulation: healthcare data processing. In: International Conference on Computational Science and Its Applications. Cham: Springer Nature Switzerland, pp 377\u2013388. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-031-37111-0_27","DOI":"10.1007\/978-3-031-37111-0_27"},{"key":"1989_CR19","doi-asserted-by":"publisher","first-page":"e1882","DOI":"10.7717\/peerj-cs.1882","volume":"10P","author":"K Ansar","year":"2024","unstructured":"Ansar K, Ahmed M, Malik SUR et al (2024) Blockchain based general data protection regulation compliant data breach detection system. PeerJ Comp Sci 10P:e1882","journal-title":"PeerJ Comp Sci"},{"key":"1989_CR20","doi-asserted-by":"publisher","first-page":"913","DOI":"10.1016\/j.future.2020.05.011","volume":"112","author":"TH Yuen","year":"2020","unstructured":"Yuen TH (2020) PAChain: private, authenticated & auditable consortium blockchain and its implementation. Futur Gener Comput Syst 112:913\u2013929","journal-title":"Futur Gener Comput Syst"},{"issue":"12","key":"1989_CR21","doi-asserted-by":"publisher","first-page":"10715","DOI":"10.1002\/int.22946","volume":"37","author":"G Xu","year":"2022","unstructured":"Xu G, Zhang J, Cliff UGO et al (2022) An efficient blockchain-based privacy-preserving scheme with attribute and homomorphic encryption. Int J Intell Syst 37(12):10715\u201310750","journal-title":"Int J Intell Syst"},{"issue":"10","key":"1989_CR22","doi-asserted-by":"publisher","first-page":"10365","DOI":"10.1016\/j.jksuci.2022.10.027","volume":"34","author":"YH Liu","year":"2022","unstructured":"Liu YH, Zhang JB, Muhammad SP et al (2022) Research on identity authentication system of Internet of Things based on blockchain technology. J King Saud University-Comp Inform Sci 34(10):10365\u201310377","journal-title":"J King Saud University-Comp Inform Sci"},{"issue":"8","key":"1989_CR23","first-page":"131","volume":"43","author":"XW Zhang","year":"2022","unstructured":"Zhang XW, Li ZH, Lin JC (2022) Privacy protection scheme based on fair blind signature and hierarchical encryption for consortium blockchain. J Comm 43(8):131\u2013141","journal-title":"J Comm"},{"issue":"6","key":"1989_CR24","first-page":"1692","volume":"30","author":"YT Yang","year":"2019","unstructured":"Yang YT, Cai JL, Zhang XW et al (2019) Privacy Preserving scheme in block chain with provably secure based on SM9 algorithm. J Softw 30(6):1692\u20131704","journal-title":"J Softw"},{"issue":"1","key":"1989_CR25","first-page":"3","volume":"55","author":"J Li","year":"2025","unstructured":"Li J, Li LX, Liu J et al (2025) Large language model ChatGPT versus small deep learning models for self-admitted technical debt detection: why not together? Software: Prac Exp 55(1):3\u201328","journal-title":"Software: Prac Exp"},{"key":"1989_CR26","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s10462-024-11015-7","volume":"58","author":"A Amini","year":"2025","unstructured":"Amini A, Firouzkouhi N, Farag W et al (2025) AI evaluation of ChatGPT and human generated image\/textual contents by bipolar generalized fuzzy hypergraph. Artif Intell Rev 58:85","journal-title":"Artif Intell Rev"},{"issue":"12","key":"1989_CR27","doi-asserted-by":"publisher","first-page":"12748","DOI":"10.1109\/TMC.2024.3418881","volume":"23","author":"PL Wu","year":"2024","unstructured":"Wu PL, Liu Q, Dong YJ et al (2024) Lmaas: exploring pricing strategy of large model as a service for communication. IEEE Trans Mob Comput 23(12):12748\u201312760","journal-title":"IEEE Trans Mob Comput"},{"key":"1989_CR28","doi-asserted-by":"publisher","first-page":"2047","DOI":"10.1007\/s12083-024-01677-z","volume":"17","author":"J Ge","year":"2024","unstructured":"Ge J, Shi LL, Liu L et al (2024) DIEET: knowledge-infused event tracking in social media based on deep learning. Peer-to-Peer Netw Appl 17:2047\u20132064","journal-title":"Peer-to-Peer Netw Appl"},{"key":"1989_CR29","doi-asserted-by":"publisher","first-page":"5867","DOI":"10.1109\/TIFS.2024.3404868","volume":"19","author":"P Reviriego","year":"2024","unstructured":"Reviriego P, Apple J, Larrabeiti D et al (2024) On the privacy of adaptive cuckoo filters: analysis and protection. IEEE Trans Inf Forensics Secur 19:5867\u20135879","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"1989_CR30","unstructured":"A web for catching datasets. https:\/\/www.kaggle.com\/datasets\/anandaramg\/taxi-trip-data-nyc"},{"issue":"4","key":"1989_CR31","first-page":"147","volume":"7","author":"Y Lyu","year":"2021","unstructured":"Lyu Y, Hou JP, Nie C et al (2021) Partial blind signature scheme based on SM9 algorithm. Chinese J of Netw Inform Sec 7(4):147\u2013153","journal-title":"Chinese J of Netw Inform Sec"},{"issue":"1","key":"1989_CR32","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJSWIS.322403","volume":"19","author":"J Fu","year":"2023","unstructured":"Fu J, Zhou W, Zhang S (2023) Fabric blockchain design based on improved SM2 algorithm. Int J Semantic Web Inform Syst (IJSWIS) 19(1):1\u201313","journal-title":"Int J Semantic Web Inform Syst (IJSWIS)"},{"key":"1989_CR33","doi-asserted-by":"crossref","unstructured":"Fuchsbauer G, Plouviez A, Seurin Y (2020) Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model. In: Advances in Cryptology\u2013EUROCRYPT 2020: 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10\u201314, 2020, Proceedings, Part II 30. Springer International Publishing, pp 63\u201395. https:\/\/link.springer.com\/chapter\/10.1007\/978-3-030-45724-2_3","DOI":"10.1007\/978-3-030-45724-2_3"},{"key":"1989_CR34","doi-asserted-by":"crossref","unstructured":"Bellare, Namprempre, Pointcheval, Semanko. (2003) The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme. J Cryptology 16: 185-215","DOI":"10.1007\/s00145-002-0120-1"},{"key":"1989_CR35","doi-asserted-by":"publisher","unstructured":"Porambage P, Kumar P, Schmitt C et al (2013) Certificate-based pairwise key establishment protocol for wireless sensor networks. In: 2013 IEEE 16th international conference on computational science and engineering, pp. 667\u2013674. IEEE, Sydney, NSW, Australia, 03-05 December 2013. https:\/\/doi.org\/10.1109\/CSE.2013.103","DOI":"10.1109\/CSE.2013.103"},{"key":"1989_CR36","doi-asserted-by":"publisher","unstructured":"Patel S, Patel DR, Navik AP (2016) Energy efficient integrated authentication and access control mechanisms for internet of things. In: 2016 international conference on internet of things and applications (IOTA), pp. 304\u2013309. IEEE, Pune, India, 22-24 January 2016. https:\/\/doi.org\/10.1109\/IOTA.2016.7562742","DOI":"10.1109\/IOTA.2016.7562742"},{"issue":"1","key":"1989_CR37","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1109\/JSEN.2015.2475298","volume":"16","author":"P Kumar","year":"2015","unstructured":"Kumar P, Gurtov A, Iinatti J et al (2015) Lightweight and secure session-key establishment scheme in smart home environments. IEEE Sens J 16(1):254\u2013264","journal-title":"IEEE Sens J"},{"key":"1989_CR38","doi-asserted-by":"publisher","unstructured":"Hossain M, Noor S, Hasan R (2017) HSC-IoT: a hardware and software co-verification based authentication scheme for Internet of Things. In: 2017 5th IEEE international conference on mobile cloud computing, services, and engineering (MobileCloud), pp. 109-116. IEEE, San Francisco, CA, USA, 06-08 April 2017. https:\/\/doi.org\/10.1109\/MobileCloud.2017.35","DOI":"10.1109\/MobileCloud.2017.35"},{"key":"1989_CR39","doi-asserted-by":"publisher","first-page":"102908","DOI":"10.1016\/j.jnca.2020.102908","volume":"174","author":"X Zhang","year":"2021","unstructured":"Zhang X, Liu C, Chai KK et al (2021) A privacy-preserving consensus mechanism for an electric vehicle charging scheme. J Netw Comput Appl 174:102908","journal-title":"J Netw Comput Appl"},{"key":"1989_CR40","doi-asserted-by":"publisher","unstructured":"Li Y (2013) Design of a key establishment protocol for smart home energy management system. In 2013 fifth international conference on computational intelligence, communication systems and networks\u00a0(pp. 88-93). IEEE, Madrid, Spain, 05-07 June 2013. https:\/\/doi.org\/10.1109\/CICSYN.2013.42","DOI":"10.1109\/CICSYN.2013.42"},{"key":"1989_CR41","doi-asserted-by":"publisher","unstructured":"Vaidya B, Makrakis D, Mouftah HT (2011) Device authentication mechanism for smart energy home area networks. In\u00a02011 IEEE international conference on consumer electronics (ICCE)\u00a0(pp. 787-788). IEEE, Las Vegas, NV, USA, 09-12 January 2011. https:\/\/doi.org\/10.1109\/ICCE.2011.5722864","DOI":"10.1109\/ICCE.2011.5722864"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01989-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-01989-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-01989-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:32Z","timestamp":1758986492000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-01989-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,22]]},"references-count":41,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["1989"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-01989-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,5,22]]},"assertion":[{"value":"7 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 April 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"184"}}