{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T16:58:36Z","timestamp":1771952316776,"version":"3.50.1"},"reference-count":35,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T00:00:00Z","timestamp":1641945600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T00:00:00Z","timestamp":1641945600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1007\/s12652-021-03672-1","type":"journal-article","created":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T18:02:40Z","timestamp":1642010560000},"page":"10089-10102","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["A conditional privacy-preserving fair electronic payment scheme based on blockchain without trusted third party"],"prefix":"10.1007","volume":"14","author":[{"given":"Zahra","family":"Hatefi","sequence":"first","affiliation":[]},{"given":"Majid","family":"Bayat","sequence":"additional","affiliation":[]},{"given":"Mahdi R.","family":"Alaghband","sequence":"additional","affiliation":[]},{"given":"Negin","family":"Hamian","sequence":"additional","affiliation":[]},{"given":"Seyed Morteza","family":"Pournaghi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,12]]},"reference":[{"key":"3672_CR1","doi-asserted-by":"crossref","unstructured":"Abe M, Ohkub M (2001) Provably Secure fair BlindSignatures with Tight Revocation. In: International Conferenceon the Theory and Application of Cryptology and InformationSecurity. Springer. pp. 583\u2013601","DOI":"10.1007\/3-540-45682-1_34"},{"key":"3672_CR2","doi-asserted-by":"crossref","unstructured":"Androulaki E, Barger A, Bortnikov V, Cachin C et al. (2018) Hyperledger fabric: A distributed operating system for permissioned blockchains. in Proc. 13th EuroSys Conf. pp. 30:1\u201330:15","DOI":"10.1145\/3190508.3190538"},{"key":"3672_CR3","doi-asserted-by":"crossref","unstructured":"Asamoah KO, Xia H, Amofa S, Amankona OI, Luo K, Xia Q, Gao J, Du X, Guizani M (2020) Zero-Chain: A Blockchain-Based Identity for Digital City Operating System. In: IEEE Internet of Things Journal, pp. 10336\u201310346","DOI":"10.1109\/JIOT.2020.2986367"},{"key":"3672_CR4","first-page":"1","volume":"2","author":"M Bayat","year":"2019","unstructured":"Bayat M, Barmshoory M, Pournaghi SM, Rahimi M, Farjami Y, Aref MR (2019) A new and efficient authentication scheme for vehicular ad hoc networks. J Intelli Transp Syst 2:1\u201313","journal-title":"J Intelli Transp Syst"},{"key":"3672_CR5","unstructured":"Blanchet B, Smyth B, Cheval V, Sylvestre M (2018) ProVerif 2.00: automatic cryptographic protocol verifier, user manual and tutorial. pp. 05-16"},{"key":"3672_CR6","unstructured":"Castro M, Liskov B (1999) Practical Byzantine fault tolerance. In: Proc. 3rd Symp. Operating Syst. Des. Implementation, pp. 173\u2013186,"},{"key":"3672_CR7","doi-asserted-by":"crossref","unstructured":"Chang PY, Hwang MS, Yang CC (2017) A blockchain-based traceable certification system. In:Inter-national Conference on Security with Intelligent Computing and Big-data Services. Springer. pp. 363\u2013369","DOI":"10.1007\/978-3-319-76451-1_34"},{"key":"3672_CR8","doi-asserted-by":"publisher","first-page":"252","DOI":"10.1016\/j.future.2013.07.015","volume":"37","author":"X Chen","year":"2014","unstructured":"Chen X, Li J, Ma J, Lou W, Wong DS (2014) New and efficient conditional e-payment systems with transferability. Futur Gen Comput Syst 37:252\u2013258","journal-title":"Futur Gen Comput Syst"},{"key":"3672_CR9","unstructured":"Chou JS, Chen Y, Cho MH, Sun HM (2009) A novel ID-based Electronic Cash System from Pairings.\u201d In:IACR Cryptology ePrint Archive, p. 339"},{"key":"3672_CR10","unstructured":"coa C, Zuo YQ, Zhang F (2018) Research on comprehensive performance simulation of communication IP network based on OPNET. In:2018 International Conference on Intelligent Transportation, Big-data and Smart City (ICITBS). IEEE. pp. 195\u2013197"},{"key":"3672_CR11","doi-asserted-by":"publisher","first-page":"107333","DOI":"10.1016\/j.comnet.2020.107333","volume":"2","author":"M Fotouhi","year":"2020","unstructured":"Fotouhi M, Bayat M, Das AK, Far HAN, Pournaghi SM, Doostari MA (2020) A lightweight and secure two-factor authentication scheme for wireless body area networks in health-care IoT. Comput Netw 2:107333","journal-title":"Comput Netw"},{"issue":"1","key":"3672_CR12","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1186\/s40854-016-0034-9","volume":"2","author":"Y Guo","year":"2016","unstructured":"Guo Y, Liang C (2016) Blockchain application and outlook in the banking industry. Finan Innov 2(1):24","journal-title":"Finan Innov"},{"key":"3672_CR13","doi-asserted-by":"crossref","unstructured":"Heilman E, Baldimtsi F, Goldberg S (2016) Blindly signed contracts: Anonymous on-blockchain and off-blockchain bitcoin transactions. In:International conference on financial cryptography and data security. Springer, pp. 43\u201360","DOI":"10.1007\/978-3-662-53357-4_4"},{"key":"3672_CR14","doi-asserted-by":"crossref","unstructured":"Jesus EF, Chicarino VRL, Albuquerque CVN, Rocha1 A (2018) A survey of how to use blockchain to secure internet of things and the stalker attack. Secur Commun Netw","DOI":"10.1155\/2018\/9675050"},{"issue":"1","key":"3672_CR15","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/s102070100002","volume":"1","author":"D Johnson","year":"2001","unstructured":"Johnson D, Menezes A, Vanstone S (2001) The elliptic curve digital signature algorithm (ECDSA). Int J Inf Secur 1(1):36\u201363","journal-title":"Int J Inf Secur"},{"key":"3672_CR16","doi-asserted-by":"crossref","unstructured":"Lamport L, Shostak R, Pease M (1982) The Byzantine generals problem. In:ACM Transactions on Pro-gramming Languages and Systems (TOPLAS)4:382\u2013401","DOI":"10.1145\/357172.357176"},{"key":"3672_CR17","doi-asserted-by":"crossref","unstructured":"Langford SK (1995) Threshold DSS signatures without a trusted party. In:Annual International Cryptology Conference. Springer. pp. 397\u2013409","DOI":"10.1007\/3-540-44750-4_32"},{"key":"3672_CR18","doi-asserted-by":"crossref","unstructured":"Li W, Feng C, Zhang L, Xu H, Cao B, Imran MA (2021) A Scalable Multi-Layer PBFT Consensus for Blockchain. In: IEEE Transactions on Parallel and Distributed Systems, pp. 1146-1160,","DOI":"10.1109\/TPDS.2020.3042392"},{"key":"3672_CR19","doi-asserted-by":"publisher","first-page":"2440","DOI":"10.1109\/TIFS.2020.2969565","volume":"15","author":"C Lin","year":"2020","unstructured":"Lin C, He D, Huang X, Khan MK, Choo KKR (2020) DCAP: a secure and efficient decentralized con-ditional anonymous payment system based on blockchain. IEEE Trans Inf Forensics Secur 15:2440\u20132452","journal-title":"IEEE Trans Inf Forensics Secur"},{"key":"3672_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.33166\/AETiC.2018.01.001","volume":"2","author":"MH Miraz","year":"2018","unstructured":"Miraz MH, Ali M (2018) Applications of blockchain technology beyond cryptocurrency. Ann Emerg Technol Comput 2:1\u20136","journal-title":"Ann Emerg Technol Comput"},{"key":"3672_CR21","unstructured":"Nakamoto S (2008) Bitcoin: A peer-to-peer electronic cash system"},{"key":"3672_CR22","doi-asserted-by":"crossref","unstructured":"Onireti O, Zhang L, Imran MA (2019) On the viable area of wireless practical byzantine fault tolerance blockchain networks. In: Proc. IEEE Global Commun. Conf. pp. 1\u20136","DOI":"10.1109\/GLOBECOM38437.2019.9013778"},{"key":"3672_CR23","doi-asserted-by":"crossref","unstructured":"Pahlajani S, Kshirsagar A, Pachghare V (2019) Survey on Private Blockchain Consensus Algorithms. In: 1st International Conference on Innovations in Information and Communication Technology (ICIICT), pp. 1-6,","DOI":"10.1109\/ICIICT1.2019.8741353"},{"key":"3672_CR24","doi-asserted-by":"publisher","first-page":"4613","DOI":"10.1007\/s12652-020-01710-y","volume":"2","author":"SM Pournaghi","year":"2020","unstructured":"Pournaghi SM, Bayat M, Farjami Y (2020) A novel and secure scheme to share medical data based on blockchain technology and attribute-based encryption. J Ambient Intell Human Comput 2:4613\u20134641","journal-title":"J Ambient Intell Human Comput"},{"key":"3672_CR25","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1016\/j.csi.2016.11.012","volume":"54","author":"Z Qin","year":"2017","unstructured":"Qin Z, Sun J, Wahaballa A, Zheng W, Xiong H, Qin Z (2017) A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing. Comput Stand Interfaces 54:55\u201360","journal-title":"Comput Stand Interfaces"},{"issue":"1","key":"3672_CR26","first-page":"64","volume":"25","author":"N Radziwill","year":"2018","unstructured":"Radziwill N (2018) Blockchain revolution: How the technology behind Bitcoin is changing money, business, and the world. Qual Manag J 25(1):64\u201365","journal-title":"Qual Manag J"},{"issue":"4","key":"3672_CR27","doi-asserted-by":"publisher","first-page":"921","DOI":"10.1016\/j.jnca.2007.01.001","volume":"31","author":"K Salah","year":"2008","unstructured":"Salah K, Calyam P, Buhari MI (2008) Assessing readiness of IP networks to support desktop video conferencing using OPNET. J Netw Comput Appl 31(4):921\u2013943","journal-title":"J Netw Comput Appl"},{"key":"3672_CR28","doi-asserted-by":"crossref","unstructured":"Sasson EB, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014) Zerocash: Decentralized anonymous payments from bitcoin. Proc. IEEE Symp. Secur. Privacy, Berkeley, CA, USA, pp 459\u2013474","DOI":"10.1109\/SP.2014.36"},{"key":"3672_CR29","doi-asserted-by":"crossref","unstructured":"Sharma V, You I, Jayakody DNK, Reina DG, Choo KKR (2019) Neural-Blockchain-Based Ultrareliable Caching for Edge-Enabled UAV Networks. In: IEEE Transactions on Industrial Informatics , pp. 5723\u20135736","DOI":"10.1109\/TII.2019.2922039"},{"key":"3672_CR30","first-page":"1995","volume-title":"Network and internetwork security: princi-ples and practice","author":"W Stallings","year":"1995","unstructured":"Stallings W (1995) Network and internetwork security: princi-ples and practice, vol 1. Prentice Hall Englewood Cliffs, NJ, p 1995"},{"key":"3672_CR31","doi-asserted-by":"crossref","unstructured":"W\u00fcst K, Gervais A (2018) Do you Need a Blockchain? In: Crypto Valley Conference on Blockchain Technology (CVCBT), pp. 45\u201354","DOI":"10.1109\/CVCBT.2018.00011"},{"key":"3672_CR32","doi-asserted-by":"crossref","unstructured":"Xu H, Zhang L, Liu Y, Cao B(2020) RAFT based wireless blockchain networks in the presence of malicious jamming. In: IEEE Wireless Commun. Lett. pp. 817\u2013821,","DOI":"10.1109\/LWC.2020.2971469"},{"key":"3672_CR33","doi-asserted-by":"publisher","first-page":"5393","DOI":"10.1109\/ACCESS.2017.2788411","volume":"6","author":"W Yin","year":"2018","unstructured":"Yin W, Wen Q, Li W, Zhang H, Jin Z (2018) An anti-quantum transaction authentication ap-proach in blockchain. IEEE Access 6:5393\u20135401","journal-title":"IEEE Access"},{"key":"3672_CR34","first-page":"85","volume":"16","author":"L Zhang","year":"2019","unstructured":"Zhang L, Luo M, Li J, Au MH, Choo KKR, Chen T, Tian S (2019) Blockchain based secure data sharing sys-tem for Internet of vehicles: a position paper. Veh Commun 16:85\u201393","journal-title":"Veh Commun"},{"key":"3672_CR35","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1016\/j.future.2018.10.012","volume":"93","author":"L Zhong","year":"2019","unstructured":"Zhong L, Wu Q, Xie J, Li J, Qin B (2019) A secure versatile light payment system based on blockchain. Fut Gen Comput Syst 93:327\u2013337","journal-title":"Fut Gen Comput Syst"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03672-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-021-03672-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-021-03672-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,21]],"date-time":"2023-06-21T15:04:07Z","timestamp":1687359847000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-021-03672-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,12]]},"references-count":35,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,8]]}},"alternative-id":["3672"],"URL":"https:\/\/doi.org\/10.1007\/s12652-021-03672-1","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,12]]},"assertion":[{"value":"10 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 January 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}