{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:47:12Z","timestamp":1773233232792,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T00:00:00Z","timestamp":1747440000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T00:00:00Z","timestamp":1747440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02010-y","type":"journal-article","created":{"date-parts":[[2025,5,17]],"date-time":"2025-05-17T06:07:59Z","timestamp":1747462079000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["ValidCertify: an effective blockchain-based domain certificate authentication and verification scheme"],"prefix":"10.1007","volume":"18","author":[{"given":"Priyanka Amol","family":"Kadam","sequence":"first","affiliation":[]},{"given":"Shashi","family":"Bhushan","sequence":"additional","affiliation":[]},{"given":"Vinay","family":"Rishiwal","sequence":"additional","affiliation":[]},{"given":"Mano","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Preeti","family":"Yadav","sequence":"additional","affiliation":[]},{"given":"Udit","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,17]]},"reference":[{"key":"2010_CR1","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2016.11.027","volume":"79","author":"A Singh","year":"2017","unstructured":"Singh A, Chatterjee K (2017) Cloud security issues and challenges: A survey. J Netw Comput Appl 79:88\u2013115","journal-title":"J Netw Comput Appl"},{"issue":"3","key":"2010_CR2","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102512","volume":"58","author":"RA Mishra","year":"2021","unstructured":"Mishra RA, Kalla A, Braeken A, Liyanage M (2021) Privacy protected blockchain based architecture and implementation for sharing of students\u2019 credentials. Inf Process & Manage 58(3):102512","journal-title":"Inf Process & Manage"},{"issue":"13","key":"2010_CR3","doi-asserted-by":"publisher","first-page":"15004","DOI":"10.1007\/s11227-023-05253-9","volume":"79","author":"H Hong","year":"2023","unstructured":"Hong H, Sun Z (2023) Constructing conditional pkeet with verification mechanism for data privacy protection in intelligent systems. J Supercomput 79(13):15004\u201315022","journal-title":"J Supercomput"},{"issue":"6","key":"2010_CR4","doi-asserted-by":"publisher","first-page":"3582","DOI":"10.1109\/TII.2019.2907092","volume":"15","author":"W Liang","year":"2019","unstructured":"Liang W, Tang M, Long J, Peng X, Xu J, Li K-C (2019) A secure fabric blockchain-based data transmission technique for industrial internet-of-things. IEEE Trans Ind Inf 15(6):3582\u20133592","journal-title":"IEEE Trans Ind Inf"},{"key":"2010_CR5","doi-asserted-by":"publisher","first-page":"85493","DOI":"10.1109\/ACCESS.2022.3194319","volume":"10","author":"U Agarwal","year":"2022","unstructured":"Agarwal U, Rishiwal V, Tanwar S, Chaudhary R, Sharma G, Bokoro PN, Sharma R (2022) Blockchain technology for secure supply chain management: A comprehensive review. Ieee Access 10:85493\u201385517","journal-title":"Ieee Access"},{"issue":"3","key":"2010_CR6","doi-asserted-by":"publisher","first-page":"1106","DOI":"10.1007\/s12083-021-01088-4","volume":"14","author":"H Hong","year":"2021","unstructured":"Hong H, Sun Z (2021) A secure peer to peer multiparty transaction scheme based on blockchain. Peer-to-Peer Netw Appl 14(3):1106\u20131117","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2010_CR7","doi-asserted-by":"crossref","unstructured":"Pandey S, Rishiwal V, Jat DS, Yadav P, Yadav M, Jain A (2024) Towards securing the digital document using blockchain technology with off-chain attribute based encryption framework. In: 2024 International conference on emerging trends in networks and computer communications (ETNCC), pp 857\u2013864. IEEE","DOI":"10.1109\/ETNCC63262.2024.10767571"},{"key":"2010_CR8","doi-asserted-by":"crossref","unstructured":"Zhaofeng M, Jialin M, Jihui W, Zhiguang S (2020) Blockchain-based decentralized authentication modeling scheme in edge and iot environment. IEEE Internet of Things Journal 8(4):2116\u20132123","DOI":"10.1109\/JIOT.2020.3037733"},{"key":"2010_CR9","doi-asserted-by":"crossref","unstructured":"Kosba A, Miller A, Shi E, Wen Z, Papamanthou C (2016) Hawk: The blockchain model of cryptography and privacy-preserving smart contracts. In: 2016 IEEE symposium on security and privacy (SP), pp 839\u2013858. IEEE","DOI":"10.1109\/SP.2016.55"},{"key":"2010_CR10","doi-asserted-by":"crossref","unstructured":"Matsumoto S, Reischuk RM (2017) Ikp: Turning a pki around with decentralized automated incentives. In: 2017 IEEE symposium on security and privacy (SP), pp 410\u2013426. IEEE","DOI":"10.1109\/SP.2017.57"},{"issue":"5","key":"2010_CR11","doi-asserted-by":"publisher","first-page":"2961","DOI":"10.1007\/s12083-021-01150-1","volume":"14","author":"P Kamboj","year":"2021","unstructured":"Kamboj P, Khare S, Pal S (2021) User authentication using blockchain based smart contract in role-based access control. Peer-to-Peer Netw Appl 14(5):2961\u20132976","journal-title":"Peer-to-Peer Netw Appl"},{"issue":"5","key":"2010_CR12","doi-asserted-by":"publisher","first-page":"942","DOI":"10.1109\/JSAC.2020.2980916","volume":"38","author":"M Shen","year":"2020","unstructured":"Shen M, Liu H, Zhu L, Xu K, Yu H, Du X, Guizani M (2020) Blockchain-assisted secure device authentication for cross-domain industrial iot. IEEE J Select Areas Commun 38(5):942\u2013954","journal-title":"IEEE J Select Areas Commun"},{"key":"2010_CR13","unstructured":"Szalachowski P (2020) Smartcert: Redesigning digital certificates with smart contracts. arXiv:2003.13259"},{"issue":"2","key":"2010_CR14","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TNSE.2021.3069128","volume":"8","author":"A Garba","year":"2021","unstructured":"Garba A, Chen Z, Guan Z, Srivastava G (2021) Lightledger: a novel blockchain-based domain certificate authentication and validation scheme. IEEE Trans Netw Sci Eng 8(2):1698\u20131710","journal-title":"IEEE Trans Netw Sci Eng"},{"key":"2010_CR15","doi-asserted-by":"publisher","first-page":"91751","DOI":"10.1109\/ACCESS.2020.2993921","volume":"8","author":"B Liu","year":"2020","unstructured":"Liu B, Xiao L, Long J, Tang M, Hosam O (2020) Secure digital certificate-based data access control scheme in blockchain. Ieee Access 8:91751\u201391760","journal-title":"Ieee Access"},{"issue":"1","key":"2010_CR16","doi-asserted-by":"publisher","first-page":"136","DOI":"10.34306\/ijcitsm.v1i1.40","volume":"1","author":"G Maulani","year":"2021","unstructured":"Maulani G, Gunawan G, Leli L, Nabila EA, Sari WY (2021) Digital certificate authority with blockchain cybersecurity in education. Int J Cyber and IT Serv Manag 1(1):136\u2013150","journal-title":"Int J Cyber and IT Serv Manag"},{"key":"2010_CR17","doi-asserted-by":"crossref","unstructured":"Gu P, Chen L (2020) An efficient blockchain-based cross-domain authentication and secure certificate revocation scheme. In: 2020 IEEE 6th international conference on computer and communications (ICCC), pp 1776\u20131782. IEEE","DOI":"10.1109\/ICCC51575.2020.9345108"},{"key":"2010_CR18","unstructured":"Saleh OS, Ghazali O, Rana ME (2020) Blockchain based framework for educational certificates verification. Journal of critical reviews"},{"key":"2010_CR19","doi-asserted-by":"crossref","unstructured":"Shakan Y, Kumalakov B, Mutanov G, Mamykova Z, Kistaubayev Y (2021) Verification of university student and graduate data using blockchain technology. International Journal of Computers Communications & Control 16(5)","DOI":"10.15837\/ijccc.2021.5.4266"},{"key":"2010_CR20","doi-asserted-by":"crossref","unstructured":"Al Hemairy M, Abu Talib M, Khalil A, Zulfiqar A, Mohamed T (2024) Blockchain-based framework and platform for validation, authentication & equivalency of academic certification and institution\u2019s accreditation: Uae case study and system performance (2022). Education and Information Technologies, pp 1\u201330","DOI":"10.1007\/s10639-024-12493-6"},{"key":"2010_CR21","doi-asserted-by":"publisher","first-page":"135","DOI":"10.58496\/MJAIH\/2024\/016","volume":"2024","author":"W Robert","year":"2024","unstructured":"Robert W, Denis A, Thomas A, Samuel A, Kabiito SP, Morish Z, Ali G (2024) A comprehensive review on cryptographic techniques for securing internet of medical things: A state-of-the-art, applications, security attacks, mitigation measures, and future research direction. Mesopotamian Journal of Artificial Intelligence in Healthcare 2024:135\u2013169","journal-title":"Mesopotamian Journal of Artificial Intelligence in Healthcare"},{"issue":"1","key":"2010_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s12083-024-01812-w","volume":"18","author":"V Maurya","year":"2025","unstructured":"Maurya V, Rishiwal V, Yadav M, Shiblee M, Yadav P, Agarwal U, Chaudhry R (2025) Blockchain-driven security for iot networks: State-of-the-art, challenges and future directions. Peer-to-Peer Netw Appl 18(1):1\u201335","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2010_CR23","doi-asserted-by":"crossref","unstructured":"Wang W, Hu N, Liu X (2018) Blockcam: a blockchain-based cross-domain authentication model. In: 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC), pp 896\u2013901. IEEE","DOI":"10.1109\/DSC.2018.00143"},{"issue":"6","key":"2010_CR24","doi-asserted-by":"publisher","first-page":"3722","DOI":"10.1007\/s12083-024-01780-1","volume":"17","author":"U Agarwal","year":"2024","unstructured":"Agarwal U, Rishiwal V, Shiblee M, Yadav M, Tanwar S (2024) Blockchain-based intelligent tracing of food grain crops from production to delivery. Peer-to-Peer Netw Appl 17(6):3722\u20133749","journal-title":"Peer-to-Peer Netw Appl"},{"key":"2010_CR25","doi-asserted-by":"crossref","unstructured":"Janssen M, Brous P, Estevez E, Barbosa LS, Janowski T (2020) Data governance: Organizing data for trustworthy artificial intelligence. Government Information Quarterly 37(3):101493","DOI":"10.1016\/j.giq.2020.101493"},{"issue":"18","key":"2010_CR26","doi-asserted-by":"publisher","first-page":"6248","DOI":"10.1002\/sec.1770","volume":"9","author":"IM Mahmoud","year":"2016","unstructured":"Mahmoud IM, Nour El-Din SH, Elgohary R, Faheem H, Mostafa MG (2016) A robust cryptographic-based system for secure data sharing in cloud environments. Sec Commun Netw 9(18):6248\u20136265","journal-title":"Sec Commun Netw"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02010-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02010-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02010-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:21:22Z","timestamp":1758986482000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02010-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,17]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2010"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02010-y","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,5,17]]},"assertion":[{"value":"10 August 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 May 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}},{"value":"Not Applicable","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical Approval"}},{"value":"Authors have no conflict, and they have consent to publish.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent to Publish"}}],"article-number":"177"}}