{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T01:16:17Z","timestamp":1768526177823,"version":"3.49.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T00:00:00Z","timestamp":1750636800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"Guangxi Natural Science Foundation","award":["2025GXNSFAA069678"],"award-info":[{"award-number":["2025GXNSFAA069678"]}]},{"name":"Guangxi Natural Science Foundation","award":["2024GXNSFAA010453"],"award-info":[{"award-number":["2024GXNSFAA010453"]}]},{"name":"Zhejiang Provincial Natural Science Foundation of China","award":["LZ23F020012"],"award-info":[{"award-number":["LZ23F020012"]}]},{"name":"Guangxi Young Teachers\u2019 Basic Ability Improvement Program","award":["2024KY0224"],"award-info":[{"award-number":["2024KY0224"]}]},{"name":"Guangxi Key Laboratory of Digital Infrastructure","award":["GXDIOP2023006"],"award-info":[{"award-number":["GXDIOP2023006"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,7]]},"DOI":"10.1007\/s12083-025-02030-8","type":"journal-article","created":{"date-parts":[[2025,6,23]],"date-time":"2025-06-23T03:50:39Z","timestamp":1750650639000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A multi-notary cross-chain system with supervision and identity tracking"],"prefix":"10.1007","volume":"18","author":[{"given":"Hai","family":"Liang","sequence":"first","affiliation":[]},{"given":"Xiaoye","family":"Lu","sequence":"additional","affiliation":[]},{"given":"Xinyong","family":"Peng","sequence":"additional","affiliation":[]},{"given":"Yujue","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Changsong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Lun","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Jun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,23]]},"reference":[{"key":"2030_CR1","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system. https:\/\/bitcoin.org\/bitcoin.pdf"},{"issue":"12","key":"2030_CR2","doi-asserted-by":"publisher","first-page":"14305","DOI":"10.1007\/s11227-021-03802-8","volume":"77","author":"AS Parihar","year":"2021","unstructured":"Parihar AS, Chakraborty SK (2021) Token-based approach in distributed mutual exclusion algorithms: a review and direction to future research. J Supercomput 77(12):14305\u201314355. https:\/\/doi.org\/10.1007\/s11227-021-03802-8","journal-title":"J Supercomput"},{"key":"2030_CR3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2020.102199","volume":"54","author":"O Ali","year":"2020","unstructured":"Ali O, Ally M, Clutterbuck P et al (2020) The state of play of blockchain technology in the financial services sector: A systematic literature review. Int J Inf Manage 54:102199. https:\/\/doi.org\/10.1016\/j.ijinfomgt.2020.102199","journal-title":"Int J Inf Manage"},{"key":"2030_CR4","doi-asserted-by":"publisher","unstructured":"Agbo CC, Mahmoud QH, Eklund JM (2019) Blockchain technology in healthcare: A systematic review. Healthcare 7(2). https:\/\/doi.org\/10.3390\/healthcare7020056","DOI":"10.3390\/healthcare7020056"},{"key":"2030_CR5","doi-asserted-by":"publisher","unstructured":"Cao Y-N, Wang Y, andothers YD, (2023) Blockchain-empowered security and privacy protection technologies for smart grid. Comput Stand & Int 85:103708. https:\/\/doi.org\/10.1016\/j.csi.2022.103708","DOI":"10.1016\/j.csi.2022.103708"},{"issue":"4","key":"2030_CR6","doi-asserted-by":"publisher","first-page":"4710","DOI":"10.1002\/ett.4710","volume":"35","author":"T Zhang","year":"2024","unstructured":"Zhang T, Wang Y, Ding Y et al (2024) Privacy-preserving blockchain-based contract signing with multi-party supervision. Trans Emerg Telecommun Technol 35(4):4710. https:\/\/doi.org\/10.1002\/ett.4710","journal-title":"Trans Emerg Telecommun Technol"},{"key":"2030_CR7","doi-asserted-by":"publisher","unstructured":"Choi T-M, Siqin T (2022) Blockchain in logistics and production from blockchain 1.0 to blockchain 5.0: An intra-inter-organizational framework. Trans Res Part E: Log Trans Rev 160:102653. https:\/\/doi.org\/10.1016\/j.tre.2022.102653","DOI":"10.1016\/j.tre.2022.102653"},{"key":"2030_CR8","doi-asserted-by":"publisher","unstructured":"Anees T, Habib Q, Al-Shamayleh AS, Khalil W, Obaidat MA, Akhunzada A (2023) The integration of wot and edge computing: Issues and challenges. Sustainability 15(7). https:\/\/doi.org\/10.3390\/su15075983","DOI":"10.3390\/su15075983"},{"issue":"1","key":"2030_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1109\/MITP.2022.3230837","volume":"25","author":"A Akhunzada","year":"2023","unstructured":"Akhunzada A, Zeadally S, Islam Su (2023) Toward performance and energy-efficient edge-of-things. IT Professional 25(1):17\u201323. https:\/\/doi.org\/10.1109\/MITP.2022.3230837","journal-title":"IT Professional"},{"issue":"12","key":"2030_CR10","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/MCOM.005.2100992","volume":"60","author":"MT Khan","year":"2022","unstructured":"Khan MT, Akhunzada A, Zeadally S (2022) Proactive defense for fog-to-things critical infrastructure. IEEE Commun Mag 60(12):44\u201349. https:\/\/doi.org\/10.1109\/MCOM.005.2100992","journal-title":"IEEE Commun Mag"},{"key":"2030_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2024.109609","volume":"119","author":"A Akhunzada","year":"2024","unstructured":"Akhunzada A, Al-Shamayleh AS, Zeadally S et al (2024) Design and performance of an ai-enabled threat intelligence framework for iot-enabled autonomous vehicles. Comput Elect Eng 119:109609. https:\/\/doi.org\/10.1016\/j.compeleceng.2024.109609","journal-title":"Comput Elect Eng"},{"issue":"6","key":"2030_CR12","doi-asserted-by":"publisher","first-page":"9230","DOI":"10.1109\/JIOT.2023.3323293","volume":"11","author":"G Liu","year":"2024","unstructured":"Liu G, Quan W, Cheng N et al (2024) E-chain: Lightweight and secure biot voting mechanism on variable bandwidth networks. IEEE Internet of Things Journal 11(6):9230\u20139243. https:\/\/doi.org\/10.1109\/JIOT.2023.3323293","journal-title":"IEEE Internet of Things Journal"},{"issue":"12","key":"2030_CR13","doi-asserted-by":"publisher","first-page":"12750","DOI":"10.1109\/TKDE.2023.3275220","volume":"35","author":"K Ren","year":"2023","unstructured":"Ren K, Ho N-M, Loghin D et al (2023) Interoperability in blockchain: A survey. IEEE Trans Knowl Data Eng 35(12):12750\u201312769. https:\/\/doi.org\/10.1109\/TKDE.2023.3275220","journal-title":"IEEE Trans Knowl Data Eng"},{"issue":"6","key":"2030_CR14","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/j.dcan.2022.04.012","volume":"8","author":"A Xiong","year":"2022","unstructured":"Xiong A, Liu G, Zhu Q et al (2022) A notary group-based cross-chain mechanism. Digit Commun Netw 8(6):1059\u20131067. https:\/\/doi.org\/10.1016\/j.dcan.2022.04.012","journal-title":"Digit Commun Netw"},{"key":"2030_CR15","doi-asserted-by":"publisher","unstructured":"Heilman E, Lipmann S, Goldberg S (2020) The arwen trading protocols. In: Bonneau J, Heninger N. (eds.) Financial Cryptography and Data Security, pp 156\u2013173. Springer. https:\/\/doi.org\/10.1007\/978-3-030-51280-4_10","DOI":"10.1007\/978-3-030-51280-4_10"},{"issue":"1","key":"2030_CR16","doi-asserted-by":"publisher","first-page":"7989","DOI":"10.1109\/JIOT.2021.3099898","volume":"9","author":"Y He","year":"2022","unstructured":"He Y, Zhang C, Wu B et al (2022) A cross-chain trusted reputation scheme for a shared charging platform based on blockchain. IEEE Internet of Things Journal 9(1):7989\u20138000. https:\/\/doi.org\/10.1109\/JIOT.2021.3099898","journal-title":"IEEE Internet of Things Journal"},{"key":"2030_CR17","doi-asserted-by":"publisher","unstructured":"Malavolta G, Moreno-Sanchez P, Schneidewind C, et al (2019) Anonymous Multi-Hop Locks for Blockchain Scalability and Interoperability. Network and Distributed System Security. https:\/\/doi.org\/10.14722\/ndss.2019.23330","DOI":"10.14722\/ndss.2019.23330"},{"key":"2030_CR18","doi-asserted-by":"publisher","unstructured":"Xie T, Gai K, Zhu L, et al (2024) Rac-chain: An asynchronous consensus-based cross-chain approach to scalable blockchain for metaverse. ACM Trans Multimedia Comput Commun Appl 20(7). https:\/\/doi.org\/10.1145\/3586011","DOI":"10.1145\/3586011"},{"key":"2030_CR19","doi-asserted-by":"publisher","unstructured":"Garoffolo A, Kaidalov D, Oliynykov R (2020) Zendoo: a zk-snark verifiable cross-chain transfer protocol enabling decoupled and decentralized sidechains. In: 2020 IEEE 40th international conference on distributed computing systems (ICDCS), pp 1257\u20131262. https:\/\/doi.org\/10.1109\/ICDCS47774.2020.00161","DOI":"10.1109\/ICDCS47774.2020.00161"},{"issue":"1","key":"2030_CR20","doi-asserted-by":"publisher","first-page":"2302","DOI":"10.1002\/nem.2302","volume":"35","author":"Y Ding","year":"2025","unstructured":"Ding Y, Huang W, Liang H et al (2025) A fast cross-chain protocol based on trusted notary group for metaverse. Int J Netw Manage 35(1):2302. https:\/\/doi.org\/10.1002\/nem.2302","journal-title":"Int J Netw Manage"},{"key":"2030_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.119322","volume":"645","author":"B Wen","year":"2023","unstructured":"Wen B, Wang Y, Ding Y et al (2023) Security and privacy protection technologies in securing blockchain applications. Inf Sci 645:119322. https:\/\/doi.org\/10.1016\/j.ins.2023.119322","journal-title":"Inf Sci"},{"key":"2030_CR22","doi-asserted-by":"publisher","first-page":"51817","DOI":"10.1109\/ACCESS.2019.2911265","volume":"7","author":"Q Tao","year":"2019","unstructured":"Tao Q, Cui X, Huang X et al (2019) Food safety supervision system based on hierarchical multi-domain blockchain network. IEEE Access 7:51817\u201351826. https:\/\/doi.org\/10.1109\/ACCESS.2019.2911265","journal-title":"IEEE Access"},{"key":"2030_CR23","doi-asserted-by":"publisher","unstructured":"Wang J, Wan Y, Hu Y, et al (2023) Cross-chain supervision mechanism of distributed notaries for consortium blockchain. In: 2023 6th international conference on artificial intelligence and big data (ICAIBD), pp 579\u2013584. https:\/\/doi.org\/10.1109\/ICAIBD57115.2023.10206042","DOI":"10.1109\/ICAIBD57115.2023.10206042"},{"issue":"4","key":"2030_CR24","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1049\/blc2.12047","volume":"3","author":"Y Xu","year":"2023","unstructured":"Xu Y, He R, Dai S et al (2023) Chainkeeper: A cross-chain scheme for governing the chain by chain. IET Blockchain 3(4):249\u2013264. https:\/\/doi.org\/10.1049\/blc2.12047","journal-title":"IET Blockchain"},{"key":"2030_CR25","doi-asserted-by":"publisher","unstructured":"Sun Y, Yi L, Duan L, et al (2022) A decentralized cross-chain service protocol based on notary schemes and hash-locking. In: 2022 IEEE international conference on services computing (SCC), pp 152\u2013157. https:\/\/doi.org\/10.1109\/SCC55611.2022.00033","DOI":"10.1109\/SCC55611.2022.00033"},{"key":"2030_CR26","doi-asserted-by":"publisher","unstructured":"Lu S, Liang H, Wang Y, et al (2025) A cross-chain model based on credit hierarchical notary group for iot roaming settlement. In: Blockchain, metaverse and trustworthy systems, pp 111\u2013124. Springer,. https:\/\/doi.org\/10.1007\/978-981-96-1414-1_8","DOI":"10.1007\/978-981-96-1414-1_8"},{"key":"2030_CR27","doi-asserted-by":"publisher","unstructured":"Tsabary I, Yechieli M, Manuskin A, et al (2021) Mad-htlc: Because htlc is crazy-cheap to attack. In: 2021 IEEE Symposium on Security and Privacy (SP), pp 1230\u20131248.https:\/\/doi.org\/10.1109\/SP40001.2021.00080","DOI":"10.1109\/SP40001.2021.00080"},{"key":"2030_CR28","doi-asserted-by":"publisher","unstructured":"Ren Y, Lv Z, Xiong NN, et al (2024) Hcnct: A cross-chain interaction scheme for the blockchain-based metaverse. ACM Trans Multimedia Comput Commun Appl 20(7). https:\/\/doi.org\/10.1145\/3594542","DOI":"10.1145\/3594542"},{"issue":"6","key":"2030_CR29","doi-asserted-by":"publisher","first-page":"3925","DOI":"10.1109\/TDSC.2021.3114151","volume":"19","author":"L Yin","year":"2022","unstructured":"Yin L, Xu J, Tang Q (2022) Sidechains with fast cross-chain transfers. IEEE Trans Depen Sec Comput 19(6):3925\u20133940. https:\/\/doi.org\/10.1109\/TDSC.2021.3114151","journal-title":"IEEE Trans Depen Sec Comput"},{"key":"2030_CR30","doi-asserted-by":"publisher","unstructured":"Selvi SSD, Vivek SS, Shukla D, et al (2008) Efficient and provably secure certificateless multi-receiver signcryption. In: Baek J, Bao F, Chen K, Lai X (eds.) Provable Security, pp 52\u201367. Springer. https:\/\/doi.org\/10.1007\/978-3-540-88733-1_4","DOI":"10.1007\/978-3-540-88733-1_4"},{"issue":"24","key":"2030_CR31","doi-asserted-by":"publisher","first-page":"21615","DOI":"10.1109\/JIOT.2023.3306030","volume":"10","author":"L Zhao","year":"2023","unstructured":"Zhao L, Zhong L, Liu J et al (2023) A regulatable mechanism for transacting data assets. IEEE Internet of Things Journal 10(24):21615\u201321632. https:\/\/doi.org\/10.1109\/JIOT.2023.3306030","journal-title":"IEEE Internet of Things Journal"},{"key":"2030_CR32","doi-asserted-by":"publisher","unstructured":"Umrani A, Vangujar AK, Palmieri P (2024) A multi-receiver certificateless signcryption (mcls) scheme. In: 2024 8th International Conference on Cryptography, Security and Privacy (CSP), pp 46\u201352. https:\/\/doi.org\/10.1109\/CSP62567.2024.00015","DOI":"10.1109\/CSP62567.2024.00015"},{"issue":"13","key":"2030_CR33","doi-asserted-by":"publisher","first-page":"2214","DOI":"10.1002\/sec.1165","volume":"8","author":"SH Islam","year":"2015","unstructured":"Islam SH, Khan MK, Al-Khouri AM (2015) Anonymous and provably secure certificateless multireceiver encryption without bilinear pairing. Sec Commun Netw 8(13):2214\u20132231. https:\/\/doi.org\/10.1002\/sec.1165","journal-title":"Sec Commun Netw"},{"issue":"24","key":"2030_CR34","doi-asserted-by":"publisher","first-page":"6801","DOI":"10.1007\/s00500-016-2231-x","volume":"21","author":"D He","year":"2017","unstructured":"He D, Wang H, Wang L et al (2017) Efficient certificateless anonymous multi-receiver encryption scheme for mobile devices. Soft Comput 21(24):6801\u20136810. https:\/\/doi.org\/10.1007\/s00500-016-2231-x","journal-title":"Soft Comput"},{"issue":"1","key":"2030_CR35","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1109\/JSYST.2022.3173055","volume":"17","author":"Y Qu","year":"2023","unstructured":"Qu Y, Zeng J (2023) Anonymous certificateless multireceiver encryption scheme for mobile communication devices. IEEE Systems Journal 17(1):314\u2013324. https:\/\/doi.org\/10.1109\/JSYST.2022.3173055","journal-title":"IEEE Systems Journal"},{"key":"2030_CR36","doi-asserted-by":"publisher","first-page":"612","DOI":"10.2197\/ipsjjip.26.612","volume":"26","author":"EK Win","year":"2018","unstructured":"Win EK, Yoshihisa T, Ishi Y et al (2018) Lightweight and secure certificateless multi-receiver encryption based on ecc. J Inf Process 26:612\u2013624. https:\/\/doi.org\/10.2197\/ipsjjip.26.612","journal-title":"J Inf Process"},{"key":"2030_CR37","doi-asserted-by":"publisher","first-page":"78123","DOI":"10.1109\/ACCESS.2018.2884798","volume":"6","author":"L Pang","year":"2018","unstructured":"Pang L, Kou M, Wei M, Li H (2018) Efficient anonymous certificateless multi-receiver signcryption scheme without bilinear pairings. IEEE Access 6:78123\u201378135. https:\/\/doi.org\/10.1109\/ACCESS.2018.2884798","journal-title":"IEEE Access"},{"key":"2030_CR38","doi-asserted-by":"publisher","unstructured":"Deng J, Zhang Y, Quan W, et al (2024) Ccra: Covert channel-based reliable authentication scheme for uav-assisted ran. In: GLOBECOM 2024 - 2024 IEEE Global Communications Conference, pp 4860\u20134865. https:\/\/doi.org\/10.1109\/GLOBECOM52923.2024.sps10901302","DOI":"10.1109\/GLOBECOM52923.2024.sps10901302"},{"key":"2030_CR39","doi-asserted-by":"publisher","first-page":"84091","DOI":"10.1109\/ACCESS.2019.2924654","volume":"7","author":"L Pang","year":"2019","unstructured":"Pang L, Kou M, Wei M et al (2019) Anonymous certificateless multi-receiver signcryption scheme without secure channel. IEEE Access 7:84091\u201384106. https:\/\/doi.org\/10.1109\/ACCESS.2019.2924654","journal-title":"IEEE Access"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02030-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02030-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02030-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T15:22:11Z","timestamp":1758986531000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02030-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":39,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,7]]}},"alternative-id":["2030"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02030-8","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"23 December 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 May 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 June 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interests"}}],"article-number":"221"}}