{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:37Z","timestamp":1765622497735,"version":"3.48.0"},"reference-count":39,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T00:00:00Z","timestamp":1759190400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"name":"The National Key Research and Development Project","award":["31703-3"],"award-info":[{"award-number":["31703-3"]}]},{"name":"The Key Scientific Research Project of Colleges and Universities in Henan Province","award":["24A520045"],"award-info":[{"award-number":["24A520045"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s12083-025-02118-1","type":"journal-article","created":{"date-parts":[[2025,9,30]],"date-time":"2025-09-30T03:14:56Z","timestamp":1759202096000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A blockchain-based one-to-many traceless covert communication model for secure high-capacity information transmission"],"prefix":"10.1007","volume":"18","author":[{"given":"Wei","family":"She","sequence":"first","affiliation":[]},{"given":"Jiawei","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Kebing","family":"Xia","sequence":"additional","affiliation":[]},{"given":"Kong","family":"Cheng","sequence":"additional","affiliation":[]},{"given":"Shuhui","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhao","family":"Tian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,9,30]]},"reference":[{"key":"2118_CR1","doi-asserted-by":"crossref","unstructured":"Li Z, Shi J, Si J, Lv L, Guan L, Hao B, Tie Z, Wang D, Xing C, Quek TQ (2024) Intelligent covert communication: Recent advances and future research trends. Engineering","DOI":"10.1016\/j.eng.2024.12.007"},{"key":"2118_CR2","doi-asserted-by":"publisher","first-page":"136","DOI":"10.1016\/j.comcom.2023.04.001","volume":"205","author":"T Zhang","year":"2023","unstructured":"Zhang T, Li B, Zhu Y, Han T, Wu Q (2023) Covert channels in blockchain and blockchain based covert communication: overview, state-of-the-art, and future directions. Comput Commun 205:136\u2013146","journal-title":"Comput Commun"},{"key":"2118_CR3","doi-asserted-by":"publisher","first-page":"52350","DOI":"10.1109\/ACCESS.2019.2911675","volume":"7","author":"JF Harvey","year":"2019","unstructured":"Harvey JF, Steer MB, Rappaport TS (2019) Exploiting high millimeter wave bands for military communications, applications, and design. IEEE Access 7:52350\u201352359","journal-title":"IEEE Access"},{"issue":"5","key":"2118_CR4","doi-asserted-by":"publisher","first-page":"7992","DOI":"10.1109\/JIOT.2019.2904303","volume":"6","author":"K Gai","year":"2019","unstructured":"Gai K, Wu Y, Zhu L, Xu L, Zhang Y (2019) Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks. IEEE Internet Things J 6(5):7992\u20138004","journal-title":"IEEE Internet Things J"},{"issue":"10","key":"2118_CR5","first-page":"2170","volume":"54","author":"L Zhu","year":"2017","unstructured":"Zhu L, Gao F, Shen M, Li Y, Zheng B, Mao H, Wu Z (2017) Survey on privacy preserving techniques for blockchain technology. Comput Res Dev 54(10):2170\u20132186","journal-title":"Comput Res Dev"},{"issue":"4","key":"2118_CR6","doi-asserted-by":"publisher","first-page":"2163","DOI":"10.1109\/COMST.2022.3204281","volume":"24","author":"Z Chen","year":"2022","unstructured":"Chen Z, Zhu L, Jiang P, Zhang C, Gao F, He J, Xu D, Zhang Y (2022) Blockchain meets covert communication: a survey. IEEE Commun Surv & Tutorials 24(4):2163\u20132192","journal-title":"IEEE Commun Surv & Tutorials"},{"issue":"7","key":"2118_CR7","first-page":"2092","volume":"29","author":"A Liu","year":"2018","unstructured":"Liu A, Du X, Wang N, Li S (2018) Research progress of blockchain technology and its application in information security. J Softw 29(7):2092\u20132115","journal-title":"J Softw"},{"issue":"1","key":"2118_CR8","first-page":"1","volume":"21","author":"J Zhang","year":"2020","unstructured":"Zhang J, Zhong S, Wang T, Chao H-C, Wang J (2020) Blockchain-based systems and applications: a survey. J Internet Technol 21(1):1\u201314","journal-title":"J Internet Technol"},{"issue":"12","key":"2118_CR9","doi-asserted-by":"publisher","first-page":"3631","DOI":"10.1109\/JSAC.2022.3213330","volume":"40","author":"X Wang","year":"2022","unstructured":"Wang X, Jiang X, Liu Y, Wang J, Sun Y (2022) Data propagation for low latency blockchain systems. IEEE J Sel Area Comm 40(12):3631\u20133644","journal-title":"IEEE J Sel Area Comm"},{"issue":"10","key":"2118_CR10","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1109\/TIFS.2019.2907190","volume":"14","author":"KSK Arumugam","year":"2019","unstructured":"Arumugam KSK, Bloch MR (2019) Embedding covert information in broadcast communications. IEEE Trans Inf Foren Secur 14(10):2787\u20132801","journal-title":"IEEE Trans Inf Foren Secur"},{"issue":"3","key":"2118_CR11","doi-asserted-by":"publisher","first-page":"1735","DOI":"10.1109\/TWC.2021.3106346","volume":"21","author":"L Lv","year":"2021","unstructured":"Lv L, Wu Q, Li Z, Ding Z, Al-Dhahir N, Chen J (2021) Covert communication in intelligent reflecting surface-assisted NOMA systems: design, analysis, and optimization. IEEE T Wirel Commun 21(3):1735\u20131750","journal-title":"IEEE T Wirel Commun"},{"issue":"2","key":"2118_CR12","doi-asserted-by":"publisher","first-page":"3402","DOI":"10.1109\/JIOT.2023.3296414","volume":"11","author":"R Ma","year":"2023","unstructured":"Ma R, Yang W, Guan X, Lu X, Song Y, Chen D (2023) Covert mmwave communications with finite blocklength against spatially random wardens. IEEE Internet Things J 11(2):3402\u20133416","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2118_CR13","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1109\/TWC.2021.3098099","volume":"21","author":"X Zhou","year":"2021","unstructured":"Zhou X, Yan S, Wu Q, Shu F, Ng DWK (2021) Intelligent reflecting surface (IRS)-aided covert wireless communications with delay constraint. IEEE Trans Wireless Commun 21(1):532\u2013547","journal-title":"IEEE Trans Wireless Commun"},{"issue":"1","key":"2118_CR14","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1109\/TCOMM.2022.3220903","volume":"71","author":"C Wang","year":"2022","unstructured":"Wang C, Chen X, An J, Xiong Z, Xing C, Zhao N, Niyato D (2022) Covert communication assisted by UAV-IRS. IEEE T Commun 71(1):357\u2013369","journal-title":"IEEE T Commun"},{"issue":"9","key":"2118_CR15","doi-asserted-by":"publisher","first-page":"6193","DOI":"10.1109\/TWC.2017.2720736","volume":"16","author":"TV Sobers","year":"2017","unstructured":"Sobers TV, Bash BA, Guha S, Towsley D, Goeckel D (2017) Covert communication in the presence of an uninformed jammer. IEEE Trans Wireless Commun 16(9):6193\u20136206","journal-title":"IEEE Trans Wireless Commun"},{"issue":"3","key":"2118_CR16","doi-asserted-by":"publisher","first-page":"2741","DOI":"10.1109\/TNSM.2023.3339674","volume":"21","author":"M Li","year":"2023","unstructured":"Li M, Cui H, Liu C, Shan C, Du X, Guizani M (2023) A four-dimensional space-based data multi-embedding mechanism for network services. IEEE Trans Netw Serv Manag 21(3):2741\u20132750","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"3","key":"2118_CR17","doi-asserted-by":"publisher","first-page":"18","DOI":"10.3390\/cryptography2030018","volume":"2","author":"J Partala","year":"2018","unstructured":"Partala J (2018) Provably secure covert communication on blockchain. Cryptography 2(3):18","journal-title":"Cryptography"},{"issue":"2","key":"2118_CR18","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1109\/MNET.001.1900225","volume":"34","author":"F Gao","year":"2020","unstructured":"Gao F, Zhu L, Gai K, Zhang C, Liu S (2020) Achieving a covert channel over an open blockchain network. IEEE Netw 34(2):6\u201313","journal-title":"IEEE Netw"},{"issue":"2","key":"2118_CR19","first-page":"147","volume":"46","author":"W She","year":"2025","unstructured":"She W, Ma J, Zhang S, Cheng K, Liu W, Tian Z (2025) Covert communication model based on dynamic time binary trees. J Commun 46(2):147\u2013165","journal-title":"J Commun"},{"issue":"10","key":"2118_CR20","doi-asserted-by":"publisher","first-page":"2913","DOI":"10.1109\/TC.2023.3275096","volume":"72","author":"L Zhu","year":"2023","unstructured":"Zhu L, Liu Q, Chen Z, Zhang C, Gao F, Yang Z (2023) A novel covert timing channel based on bitcoin messages. IEEE Trans Comput 72(10):2913\u20132924","journal-title":"IEEE Trans Comput"},{"issue":"8","key":"2118_CR21","first-page":"176","volume":"43","author":"L Xiong","year":"2022","unstructured":"Xiong L, Zhu R, Fu Z (2022) Covert communication method of blockchain network based on transaction construction and forwarding mechanism. J Commun 43(8):176\u2013187","journal-title":"J Commun"},{"key":"2118_CR22","doi-asserted-by":"crossref","unstructured":"Tian J, Gou G, Liu C, Chen Y, Xiong G, Li Z (2020) DLchain: A covert channel over blockchain based on dynamic labels. In: Information and communications security: 21st international Conference, ICICS 2019, Beijing, China, December 15\u201317, 2019, Revised Selected Papers 21, pp 814\u2013830. Springer","DOI":"10.1007\/978-3-030-41579-2_47"},{"key":"2118_CR23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103541","volume":"210","author":"C Zhang","year":"2023","unstructured":"Zhang C, Zhu L, Xu C, Zhang Z, Lu R (2023) EBDL: Effective blockchain-based covert storage channel with dynamic labels. J Netw Comput Appl 210:103541","journal-title":"J Netw Comput Appl"},{"key":"2118_CR24","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2025.3539909","author":"Z Chen","year":"2025","unstructured":"Chen Z, Zhu L, Jiang P, He J, Zhang Z (2025) Tackling data mining risks: a tripartite covert channel merging blockchain and ipfs. IEEE Trans Netw Sci Eng. https:\/\/doi.org\/10.1109\/TNSE.2025.3539909","journal-title":"IEEE Trans Netw Sci Eng"},{"issue":"4","key":"2118_CR25","first-page":"1002","volume":"50","author":"W She","year":"2022","unstructured":"She W, Huo L, Liu W, Zhang Z, Song X, Tian Z (2022) A blockchain-based covert communication model for hiding sensitive documents and sender identity. Acta Electron Sin 50(4):1002\u20131013","journal-title":"Acta Electron Sin"},{"issue":"13","key":"2118_CR26","doi-asserted-by":"publisher","first-page":"2523","DOI":"10.3390\/electronics13132523","volume":"13","author":"Q Liang","year":"2024","unstructured":"Liang Q, Shi N, Tan Y-a, Li C, Liang C (2024) A stealthy communication model with blockchain smart contract for bidding systems. Electronics 13(13):2523","journal-title":"Electronics"},{"issue":"2","key":"2118_CR27","doi-asserted-by":"publisher","first-page":"2822","DOI":"10.1109\/JSYST.2021.3057333","volume":"16","author":"L Zhang","year":"2021","unstructured":"Zhang L, Zhang Z, Wang W, Jin Z, Su Y, Chen H (2021) Research on a covert communication model realized by using smart contracts in blockchain environment. IEEE Syst J 16(2):2822\u20132833","journal-title":"IEEE Syst J"},{"key":"2118_CR28","doi-asserted-by":"publisher","first-page":"5186","DOI":"10.1109\/TIFS.2023.3305183","volume":"18","author":"N Yang","year":"2023","unstructured":"Yang N, Tang C, Zhou Q, He D (2023) Dynamic consensus committee-based for secure data sharing with authorized multi-receiver searchable encryption. IEEE Trans Inf Foren Secur 18:5186\u20135199","journal-title":"IEEE Trans Inf Foren Secur"},{"issue":"12","key":"2118_CR29","doi-asserted-by":"publisher","DOI":"10.1002\/ett.4371","volume":"32","author":"X Yang","year":"2021","unstructured":"Yang X, Li X, Li T, Wang X, Wang C, Li B (2021) Efficient and anonymous multi-message and multi-receiver electronic health records sharing scheme without secure channel based on blockchain. Trans Emerging Telecommun Technol 32(12):4371","journal-title":"Trans Emerging Telecommun Technol"},{"issue":"11","key":"2118_CR30","first-page":"3606","volume":"32","author":"L Wang","year":"2021","unstructured":"Wang L, Gao J, Li Q, Chen Z (2021) Blockchain-based multi-recipient multi-message signcryption scheme. J Softw 32(11):3606\u20133627","journal-title":"J Softw"},{"issue":"1","key":"2118_CR31","doi-asserted-by":"publisher","DOI":"10.1016\/j.hcc.2023.100103","volume":"3","author":"J Zou","year":"2023","unstructured":"Zou J, He D, Bi S, Wu L, Liu Z, Peng C (2023) A certificateless multi-receiver encryption scheme based on sm2 signature algorithm. High-Conf Comput 3(1):100103","journal-title":"High-Conf Comput"},{"issue":"10","key":"2118_CR32","doi-asserted-by":"publisher","first-page":"18146","DOI":"10.3934\/mbe.2023806","volume":"20","author":"XD Yang","year":"2023","unstructured":"Yang XD, Wang WJ, Shu B, Li MJ, Liu RX, Wang CF (2023) Multi-message multi-receiver signcryption scheme based on blockchain. Math Biosci Eng 20(10):18146\u201318172","journal-title":"Math Biosci Eng"},{"issue":"11","key":"2118_CR33","doi-asserted-by":"publisher","first-page":"2266","DOI":"10.1109\/TSMC.2019.2895123","volume":"49","author":"S Wang","year":"2019","unstructured":"Wang S, Ouyang L, Yuan Y, Ni X, Han X, Wang F-Y (2019) Blockchain-enabled smart contracts: architecture, applications, and future trends. IEEE Trans Syst, Man, Cybern: Syst 49(11):2266\u20132277","journal-title":"IEEE Trans Syst, Man, Cybern: Syst"},{"key":"2118_CR34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2024.3371504","author":"MM Merlec","year":"2024","unstructured":"Merlec MM, In HP (2024) Sc-caac: A smart contract-based context-aware access control scheme for blockchain-enabled iot systems. IEEE Internet Things J. https:\/\/doi.org\/10.1109\/JIOT.2024.3371504","journal-title":"IEEE Internet Things J"},{"issue":"1","key":"2118_CR35","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1109\/MWC.2004.1269719","volume":"11","author":"K Lauter","year":"2004","unstructured":"Lauter K (2004) The advantages of elliptic curve cryptography for wireless security. IEEE Wireless Commun 11(1):62\u201367","journal-title":"IEEE Wireless Commun"},{"issue":"4","key":"2118_CR36","first-page":"307","volume":"15","author":"L Harn","year":"2013","unstructured":"Harn L, Chang C-C, Wu H-L (2013) An anonymous multi-receiver encryption based on rsa. Int J Netw Secur 15(4):307\u2013312","journal-title":"Int J Netw Secur"},{"issue":"9","key":"2118_CR37","first-page":"209","volume":"49","author":"L Li","year":"2022","unstructured":"Li L, Du J, Lin H, Gao H, Yang Y, Gao J (2022) Research progress of blockchain network covert channel. J Commun 49(9):209\u2013223","journal-title":"J Commun"},{"key":"2118_CR38","doi-asserted-by":"crossref","unstructured":"Liu Y, Sun J, Chen Z, Gao F, Yuan X, Zhang Z, Zhang L, Gao Q, Zhu L, et al (2024) Covert transmission via steganography and smart contract. IEEE Internet of Things Journal","DOI":"10.1109\/JIOT.2024.3486994"},{"issue":"11","key":"2118_CR39","doi-asserted-by":"publisher","first-page":"2926","DOI":"10.1093\/comjnl\/bxac090","volume":"65","author":"M Wang","year":"2022","unstructured":"Wang M, Zhang Z, He J, Gao F, Li M, Xu S, Zhu L (2022) Practical blockchain-based steganographic communication via adversarial ai: a case study in bitcoin. Comput J 65(11):2926\u20132938","journal-title":"Comput J"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02118-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12083-025-02118-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-025-02118-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:13Z","timestamp":1765622233000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12083-025-02118-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,30]]},"references-count":39,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["2118"],"URL":"https:\/\/doi.org\/10.1007\/s12083-025-02118-1","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"type":"print","value":"1936-6442"},{"type":"electronic","value":"1936-6450"}],"subject":[],"published":{"date-parts":[[2025,9,30]]},"assertion":[{"value":"7 April 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 August 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 September 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"289"}}